Privacy Policy
This policy only applies to "MQCGM" APP products or services of "Huzhou Meiqi Medical Instruments Co., Ltd."
Updated: July 05, 2023.
This policy will help you understand the following:
Ⅰ. How we collect and use your user information;
Ⅱ. Description of how we use cookies and APP basic permissions;
Ⅲ. How we share, transfer and publicly disclose your user information;
Ⅳ. How do we protect your user information;
Ⅴ. Your rights;
Ⅵ. How do we handle children's personal information;
Ⅶ. How your user information is stored and transferred globally;
Ⅷ. How to update this policy;
Ⅸ. Account cancellation process;
Ⅹ. How to contact us;
We are well aware of the importance of user information to you, and will do our best to protect the safety and reliability of your user information. We are committed to maintaining your trust in us and abide by the following principles to protect your user information: the principle of consistent power and responsibility, the principle of clear purpose, the principle of choice consent, the principle of least sufficient, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. . At the same time, we promise that we will take corresponding security protection measures to protect your user information in accordance with mature security standards in the industry.
Please read and understand this Privacy Policy carefully before using our products (or services).
Ⅰ. How we collect and use your user information
1. The information we collect and use when you use our products or services
We will only collect and use your user information for the business functions described in this policy. The purpose of collecting user information is to provide you with products or services. You have the right to choose whether to provide this information, but in most cases, if If you do not provide it, we may not be able to provide you with the corresponding services, nor can we respond to the problems you encounter.
When you use our services, allow us to collect information that you provide to us or that is necessary to provide services to you, including but not limited to the following types:
b. When the user uses functions such as password login/registration/retrieval of the password in this application, the application can obtain the user's account/acquire the MAC address/obtain the software installation list. However, the app will be encrypted and handled properly, and will not be leaked to other third parties;
c. This application will obtain the Android ID information of the user's mobile phone device information during use, which is only used to identify the uniqueness of the user's device and provide the SDK with a user push alias;
d. ation needs to obtain the basic information of the user's mobile phone (mobile phone model, Android version, etc.), location information permission, Bluetooth permission, etc. in the user's mobile phone during use;
e. The above types of sensitive permissions are mainly used to scan and connect surrounding Bluetooth devices when obtaining user consent; quickly jump to the system dialing interface when obtaining user consent; provide users with better data analysis and customer service.
For the personal information we collect, we will use it to create an account for you, provide check-in information sharing services, search services, and provide publishing services, etc.
The above information you provide will continue to authorize us to use it during your use of this application (service). When you stop using the service, we will stop using and delete the above information. We guarantee that the collected user information will be de-identified or anonymized in accordance with the law. Information that cannot identify the personal identity of a natural person alone or in combination with other information does not belong to personal information in the legal sense. If we combine non-personal information with other information to identify your personal identity, or use it in combination with your personal information, we will treat such information as your personal information during the combined use period in accordance with this Privacy Policy. Treat and protect. In order to better operate and improve our technology and services, or due to changes in business strategies, when the collection, use, and processing of user information required by the products or services we provide exceed the above scope or the collected user information is used for For other purposes not specified in this Privacy Policy, or when we use the information collected for a specific purpose for other purposes, we will notify you within a reasonable period after obtaining user information or before processing user information, and obtain Your authorization.
2. Exceptions to Authorized Consent
Please understand that according to laws and regulations and relevant national standards, we do not need your authorization to collect and use your user information in the following situations:
a. Directly related to national security and national defense security;
b. Directly related to public security, public health, or major public interests;
c Directly related to criminal investigation, prosecution, trial and judgment execution;
d. For the protection of your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain the consent of the person;
e. The collected user information is disclosed to the public by you;
f. Your user information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;
g. It is necessary to sign or perform a contract according to your request;
h. Necessary for maintaining the safe and stable operation of software and related services, such as discovering and handling software and related service failures;
i. The personal information controller is necessary for a news organization and it is carrying out legal news reports;
j. It is necessary for academic research institutions to carry out statistical or academic research based on public interests, and when providing academic research or description results to the outside world, de-identify the personal information contained in the results.
k. Other circumstances stipulated by laws and regulations.
II. How do we use cookies and APP basic permission
1. Cookie
To ensure the proper functioning of the website, we store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names and some numbers and characters. With the help of cookies, websites can store data about your visiting preferences.
We will not use cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your own preferences. You can clear all cookies saved on your computer, and most web browsers have the function of blocking cookies. But if you do this, you need to change the user settings yourself every time you visit our website.
2. Web Beacons and Pixel Tags
Besides Cookie, we also use the same kind of other technologies such as web beacon and pixel tag on the website. For example, emails we sent to you may include click URL linked to our web. If you click this link, we will track down this click, help us to know your preference to products or service and improve customer service. A web beacon is usually a transparent image embedded in a website or email. With the help of pixel tags in emails, we can know whether the emails are opened. If you do not want your activities to be tracked down in this way, you can unsubscribe from our mail list at any time.
3. DoNot Track (do not track)
Many web browsers have a Do Not Track feature that issues Do Not Track requests to websites. Currently, the major Internet standards organizations have not established policies on how websites should respond to such requests. However, if Do Not Track is enabled on your browser, all of our sites will respect your choice.
4. APP Basic Permission Description
a. READ_EXTERNAL_STORAGE: read data from external storage, basic data storage capability;
b. WRITE_EXTERNAL_STORAGE: Write data to external storage, basic data reading capability;
c. CAMERA: Use the camera to take pictures or record videos, and users upload pictures to release information, etc.;
d. ACCESS_COARSE_LOCATION: Positioning function, used to search for low-power Bluetooth device signals;
BLUETOOTH: Bluetooth function, used to connect low-power Bluetooth devices and data communication;
Ⅲ. How do we share, transfer and publicly disclose your user information
the
1. We will not share your user information with any other company, organization or individual, except in the following cases:
a. Sharing with explicit consent: After obtaining your explicit consent, we will share your user information with other parties.
b. We may share your user information externally in accordance with laws and regulations, or in accordance with the mandatory requirements of government authorities.
c. Sharing with our affiliates: Your user information may be shared with our affiliates. We will only share necessary user information and be bound by the purposes stated in this Privacy Policy. If the affiliated company wants to change the purpose of processing user information, it will ask for your authorization again.
d. Sharing with authorized partners: Only to achieve the purpose stated in this policy, some of our services will be provided by authorized partners. We may share some of your user information with our partners to provide better customer service and user experience. We will only share your user information for legal, legitimate, necessary, specific, and clear purposes, and will only share user information necessary to provide services. In order to better operate and improve technology and services, you agree that we and our authorized partners may use the collected information for other services and purposes in compliance with relevant laws and regulations.
The specific authorized partners are listed below, and the privacy policy link of the third party is provided. We recommend that you read the privacy policy of the third party:
(1) Third-party SDK name: com.tencent.bugly (Tencent: Bugly)SDK
Purpose of use: Used for program log collection function during APP use
Collection type: program running system error log, device information (Android ID/OpenUDID, etc.)
Description: Collect program operation error logs to improve user experience.
We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share user information, requiring them to process user information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.
2. transfer
We will not transfer your user information to any company, organization or individual, except in the following cases:
a. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your user information to other parties;
b. When it comes to mergers, acquisitions or bankruptcy liquidation, if it involves the transfer of user information, we will require the new company or organization that holds your user information to continue to be bound by this privacy policy, otherwise we will require the company or organization to ask for your authorization again.
3. Public Disclosure
We will only publicly disclose your user information under the following circumstances:
a. After obtaining your consent;
b. Disclosure based on law: We may publicly disclose your user information under the circumstances of laws, legal procedures, lawsuits or mandatory requirements of government authorities.
4. Exceptions to prior authorization and consent when sharing, transferring, and publicly disclosing information Please understand that, according to laws, regulations and relevant national standards, we do not need your authorization for sharing, transferring, and publicly disclosing your user information in the following situations agree:
a. Directly related to national security and national defense security;
b. Directly related to public security, public health, or major public interests;
c. Directly related to criminal investigation, prosecution, trial and judgment execution;
d. For the protection of your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain the consent of the person;
e. Information that you disclose to the public on your own;
f. Collected from legally disclosed information, such as legal news reports, government information disclosure and other channels.
Ⅳ. How do we protect your user information
2. We will take all reasonable and feasible measures to ensure that no irrelevant user information is collected. We will only retain your user information for the period necessary to achieve the purposes stated in this policy, unless an extended retention period is required or permitted by law.
3. The Internet is not an absolutely safe environment, and emails, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send user information through such methods.
4. We will regularly update and disclose relevant content of reports such as security risks and user information security impact assessments. You can obtain it in the following ways: supplementary security risk disclosure channels.
5.The Internet environment is not 100% safe, we will try our best to ensure the security of any information you send us. Even if we make great efforts and take all reasonable and necessary measures, it may still be impossible to prevent your user information from being illegally accessed, stolen, tampered with or destroyed, resulting in damage to your legitimate rights and interests. Please understand the above risks of the information network and bear them voluntarily.
6.After an unfortunate user information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the measures that you can independently prevent and reduce risks. Suggestions, remedies for you, etc. We will promptly inform you of the event-related situation by email, letter, phone call, push notification, etc. When it is difficult to inform the user information subject one by one, we will issue an announcement in a reasonable and effective manner. At the same time, we will also actively report the handling of user information security incidents in accordance with the requirements of the regulatory authorities.
Ⅴ Your rights
In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee you to exercise the following rights with respect to your user information:
1. Access to your user information You have the right to access your user information, except for exceptions stipulated by laws and regulations. If you would like to exercise your right to access your data, you can do so yourself via: Supplementary User Information Access If you are unable to access these user information through the links above, you can always use our web form to get in touch, or send an email to admin@mqcgm. com. We will respond to your access request within 30 days. For other user information generated during your use of our products or services, as long as we do not need too much investment, we will provide it to you. If you would like to exercise your data access rights, please email admin@mqcgm.com.
2. Correct your user information
When you find that the user information we process about you is wrong, you have the right to ask us to make corrections. You can apply for correction through the methods listed in "Accessing Your User Information". If you are unable to correct this user information via the links above, you may contact us at any time using our web form, or by email at admin@mqcgm.com. We will respond to your correction request within 30 days.
3. Delete your user information In the following situations, you can request us to delete your user information:
a. If our handling of user information violates laws and regulations;
b. If we collect and use your user information without your consent;
c. If our handling of user information violates our agreement with you;
d. If you no longer use our products or services, or you cancel your account;
e. If we no longer provide you with products or services. We will evaluate according to your deletion request, and if the corresponding regulations are met, we will take corresponding steps to deal with it. When you make a deletion request to us, we may ask you to verify your identity to ensure the security of your account. When you delete information from our service, we may not immediately delete the corresponding information from the backup system due to applicable laws and security technologies, and we will safely store your information until the backup can be cleared or anonymized.
4. Change the scope of your authorization and consent. Each business function requires some basic user information to be completed (see "Part 1" of this policy). For the collection and use of user information, you can give or withdraw your authorization and consent at any time. You can operate by yourself in the following ways: Supplement Change the access method of user information When you withdraw your consent, we will no longer process the corresponding user information. At the same time, please note that your withdrawal of authorization consent may lead to certain consequences, for example, we may not be able to continue to provide you with corresponding services or specific functions, but your decision to withdraw your consent will not affect the previous development based on your authorization. user information processing.
5. The user information subject cancels the account You can cancel the previously registered account at any time, and you can do it yourself in the following ways: Supplement the operation method of canceling the account After canceling the account, we will stop providing you with products or services and according to your requirements, Delete or anonymize your information, except as otherwise required by laws and regulations. This may also cause you to lose access to the data in your account, please proceed with caution.
6. The user information subject obtains a copy of user information You have the right to obtain a copy of your user information, and you can do it yourself in the following ways: Supplement the operation method of obtaining a copy of user information on the premise that it is technically feasible, such as data interface matching, we can also according to your Directly transmit a copy of your user information to the third party you designate.
7. Restrain information system automatic decision-making In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms including information systems and algorithms. If these decisions significantly affect your legal rights, you have the right to request an explanation from us, and we will also provide appropriate remedies.
8. Respond to your above request To ensure safety, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request. We will respond within thirty days. If you are dissatisfied, you can also complain through the following channels: Supplementary other appeal channels For your reasonable requests, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the situation . We may deny requests that are unnecessarily repetitive, require excessive technical means (for example, requiring the development of new systems or fundamental changes to existing practices), pose a risk to the legitimate rights and interests of others, or are highly impractical. Please also understand that due to security considerations, requirements of relevant laws and regulations or technical limitations, we may not be able to respond to some of your requests, such as the following situations:
a. It is related to the fulfillment of the obligations stipulated by laws and regulations by the user information controller;
b. Directly related to national security and national defense security;
c. Directly related to public security, public health, and major public interests;
d. Directly related to criminal investigation, prosecution, trial and execution of judgments;
e. The user information controller has sufficient evidence that the user information subject has subjective malice or abuse of rights;
f. In order to protect the major legal rights and interests of the user information subject or other individuals such as life and property, but it is difficult to obtain the consent of the person;
g. Responding to the request of the user information subject will cause serious damage to the legitimate rights and interests of the user information subject or other individuals or organizations;
h. Those involving commercial secrets.
Ⅵ. How do we handle children's personal information
We believe it’s very important to protect children's personal information, and our products, websites and services are mainly aimed at adults. Children should not create their own user accounts without the consent of a parent or guardian. Although local laws and customs define children differently, we consider anyone under the age of 18 to be a child. For the collection of children's user information with the consent of parents or guardians, we will only store, use or publicly disclose this information when permitted by law, expressly agreed by parents or guardians, or necessary to protect children, otherwise we will try to delete it as soon as possible related data. In view of the limitations of existing technologies and business models, it is difficult for us to actively identify children's personal information. If you find that we have collected children's personal information without our knowledge or without the prior consent of verifiable guardians, You can contact us in time, and we will try to delete it in time after we find it. If we find the above situation ourselves, we will delete it in time, unless we are required by law to keep it.
VII How your user information is stored and transferred globally
In principle, we only collect and generate user information within the territory of the country where the software is used, and will store it within the territory of the country of use. We will only retain your user information within the period required for the purpose and use described in this policy and within the shortest period stipulated by laws and regulations. After the above retention period is exceeded, we will delete your user information in accordance with the requirements of applicable laws and regulations or Anonymization. Unless otherwise stipulated by laws and regulations, or for the purpose of public interest, scientific and historical research, etc., or your separate authorization and consent, we may need to retain relevant data for a longer period of time. Since we provide products or services through resources and servers all over the world, this means that after obtaining your authorization and consent, your user information may be transferred to the overseas jurisdiction of the country/region where you use the product or service, or Receive visits from these jurisdictions. Such jurisdictions may have different data protection laws, or even no laws at all. For example, we will ask for your consent to the cross-border transfer of user information, or implement security measures such as data de-identification before cross-border data transfer.
Ⅷ. How to update this policy Our privacy policy may change.
We will not reduce your rights under this Privacy Policy without your express consent. We will post any changes to this policy on this page. For major changes, we will also provide more prominent notices. Major changes referred to in this policy include, but are not limited to:
1. Major changes have taken place in our service model. Such as the purpose of processing user information, the type of user information processed, the way of using user information, etc.;
2. We have undergone major changes in terms of ownership structure and organizational structure. Such as changes in owners caused by business adjustments, bankruptcy mergers, etc.;
3. The main object of user information sharing, transfer or public disclosure changes;
4. There are major changes in your right to participate in user information processing and its exercise method;
5. When the responsible department, contact information and complaint channels that we are responsible for handling user information security change;
6. When the user information security impact assessment report indicates that there is a high risk. We will also archive previous versions of this Policy for your review.
IX. User cancellation and account cancellation process
If you do not want to continue to enjoy the services we provide, you can contact our account specialist to cancel your account.
Account cancellation method:
Use the mobile phone number provided when registering an account to call our 400 service hotline to handle the account cancellation business;
Time limit for account cancellation:
Contact our account customer service specialist, after verifying the information and confirming that it is correct, the cancellation will be completed within 24 hours;
Kind tips
After the account is canceled, all data records and related information under your account will be cleared and cannot be recovered again!
Ⅹ. How to contact us
If you have any questions, comments or suggestions about this Privacy Policy, please contact us in the following ways:
Company Name: Huzhou Meiqi Medical Instruments Co., Ltd.
Email: admin@mqcgm.com
Customer service phone: +86 4000572278
Company Address: Building 5, No. 58, Yaochi Road, Huzhou City, Zhejiang Province
We have set up a dedicated department for user information protection. You can contact relevant personnel through the 400 customer service hotline or official email to supplement content related to user information protection. Generally, we will reply within 30 days. Disclose your personal information, such as contact information or postal address. Please properly protect your personal information and only provide it to others when necessary. If you find that your personal information is leaked, especially if the user name and password of this application are leaked, please contact our customer service immediately so that we can take corresponding protection measures for your use.
Thank you for taking the time to learn about our Privacy Policy! We will do our best to protect your personal information and legal rights, thank you again for your trust!