Sleep Better Privacy Policy

 

Welcome to use the services provided by the Sleep Better Mobile App (hereinafter collectively referred to as the "Product")!

We take your privacy and personal information protection very seriously. This Privacy Policy applies to your access and use of this product and its services in any way.

You can use this product to detect sleep, detect snoring and sleep talk, and detect the risk of sleep apnea (hereinafter collectively referred to as "this product and its services").

This Privacy Policy is designed to help you understand what data we collect, why we collect it, what we do with it, and how we protect it. Please be sure to read this privacy policy carefully and use this product and its services after confirming that you fully understand and agree. If you or your guardian do not agree to any of the contents of this Privacy Policy,You should stop using the above services immediately.

Please note: You can find some control items in [Phone System Settings-Sleep Better], through which you can dynamically manage your own information, including managing our collection of your personal information.

Please note that the third parties who provide you with products and services through this product and the third-party website operators you visit through this product will store, use, process and protect your personal information according to the standards described in their own privacy policies. This privacy policy does not replace the privacy policies of the third parties mentioned above.We will try our best to require the third-party service provider to provide adequate security protection for your personal information and will clearly inform you on the specific product page that the service is provided by a specific third party. At the same time, we strongly recommend that you understand and confirm the privacy protection of the service provider before using the above third-party service.

This Privacy Policy will help you understand the following:

1. What information we collect and how we use it

2. How we use cookies and similar technologies

3. How we share, transfer, and publicly disclose your personal information

4. How we keep and protect your personal information

5. Your rights

6. How we handle personal information about minors

7. How your personal information is transferred across borders

8. How this policy is updated

9. How to contact us

We understand the importance of personal information to you and that providing effective protection for your information is the cornerstone of the healthy and sustainable development of our business. Thank you for your use and trust in HiClub! We are committed to maintaining your trust in us and protecting your personal information in accordance with the following principles:The principle of consistency of power and responsibility, the principle of clear purpose, the principle of choice and consent, the principal of minimum adequacy, the principal of ensuring safety, the tenet of subject participation, and the tenet of openness and transparency.

We solemnly promise that we will take appropriate security measures to protect your personal information according to the mature security standards of the industry.

 

I. How we collect and use your personal information

Personal information refers to all kinds of information recorded by electronic or other means that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information. The information in this product data that is not related to you personally is not your personal information.

When you use the following services, features, or settings, we collect and use your personal information in the following ways:

1. Personal information provided directly by you and automatically collected by us

The business functions of this product include detecting sleep conditions, detecting snoring and sleep talk, detecting the risk of sleep apnea, and so on.

In addition to the above business functions, this product has access to third-party services. Third-party services include Apple's payment services. Your non-use of third party services will not affect your use of other business features of the Product. Please note that the processing of your personal information by a third party service provider will be governed by the privacy policy of that third party service.

1) Registration information. You do not need to log in to use the services provided by this product.

This product will launch operation activities for newly launched services and functions from time to time. If you participate in relevant operation activities, we will collect information including but not limited to your identity information, contact information and transaction account information through the operation activity interface, so as to contact you and give you operation rewards.You are not required to provide this information if you do not participate in the operations.

2) Equipment information. When you use this product, in order to ensure your normal use of this product and its services, more accurately locate and solve the problems you encounter when using this product and its services, improve and optimize the service experience of this product, and protect your account security,We collect device attribute information (such as your hardware model, operating system version, device configuration, unique device identifier, advertising identifier IDFA), device connection information (carrier, language used), and device status information (such as device sensor data!). We may correlate the information we collect from your various devices,So that we can provide you with consistent service across these devices.

3) Log information. Like most Internet services, when you use the services of this product, our server will automatically record your log information, such as your click or use of audio resources, your published error messages, feedback and comments.Your browsing records, your likes and other operation behavior records, your hardware device information, the version of the operating system, the date, time and duration of your access to the service and other information provided, formed or retained when you use the product and its services. In order to provide you with more convenient search and information flow services and continuously improve this product and its services,We may use mechanisms such as browser web storage (including HTML5) and application data caching to collect information on your device and store it locally.

4) Audio information. The sleep monitoring function of this product needs to collect various sounds in the surrounding environment during your sleep, including noise, snoring, etc., so as to provide you with sleep monitoring services. You can start or stop the audio collection at any time through the button in the corresponding interface of the product.

You may stop the collection of audio information at any time by canceling the system authorization of the product to access your microphone, after which you may not be able to use the above related services or functions based on audio information, or to achieve the effect that the above related services based on audio information are intended to achieve.However, it will not affect your normal use of other business functions of the product.

2. Information we collect from you indirectly

1) Information about third-party products or services you use.

A) The product is connected to a third-party service. You may be required to submit your personal information when you use third-party services accessed by the Product. We will provide the information necessary for the service to the third party providing the service to you based on your authorization, and obtain the necessary relevant information from the third party based on your authorization.As for how the third-party service collects and uses your personal information, you are advised to refer to the relevant service agreement and privacy policy of the third-party service.

B) When you use the "Subscription" function in this product, we will exchange your payment information with third-party payment processors (such as Apple App Store) according to your authorization.

If you refuse us to collect the above information, please do not use the corresponding functions and services of this product. Your failure to provide relevant information will not affect your use of other business functions of this product.

2) We will receive your personal information and other information from affiliated companies, partners and other trusted third-party suppliers in accordance with laws and regulations or based on your authorization, in order to jointly provide you with products/services or improve the quality and personalization of products and services, or for the safety of products and services.And use your personal information in accordance with your agreement with a third party or this Privacy Policy. In case of any conflict between the two, this Privacy Policy shall prevail.

2. How we may use the information we collect

1) Provide and improve products and services

We use the information we collect to provide and improve products and services offered by us and our affiliates, partners and other trusted third party suppliers, service providers and agents, and to conduct necessary business operations, such as operating products or providing services, evaluating, maintaining and improving the performance of products or services.Participate in market research activities regarding our products and services, develop new products or services, provide customer support, etc.

We may also conduct statistics and analysis on product usage in order to improve our products and services and those of our affiliates, partners and other trusted third party suppliers, service providers and agents. At the same time, we may share these statistics with the public to show the overall usage trend of our services.However, these statistics will not contain any identifying information about you.

3. Exceptions to prior authorization

Please note that your prior consent is not required for the collection and use of personal information in the following circumstances:

A) Directly related to national security and national defense security;

B) Directly related to public safety, public health and major public interests;

(C) Directly related to the investigation, prosecution, trial and enforcement of sentences;

D) In order to safeguard your or other individuals' life, property and other major legitimate rights and interests, but it is difficult to obtain my consent;

E) The personal information collected is disclosed to the public by you;

F) Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels;

G) necessary to provide you with products or services according to your requirements;

H) Necessary for maintaining the safe and stable operation of the products or services provided, such as detecting and handling the faults of the products or services;

I) necessary for a news organization to carry out legitimate news reporting;

J) When it is necessary for academic research institutions to carry out statistical or academic research based on public interests and provide the results of academic research or description to the outside world, the personal information contained in the results is de-identified;

K) Other circumstances stipulated by laws and regulations.

4. Anonymization of personal information

After collecting your personal information, we will anonymize the data through technical means in a timely manner. On the premise of not disclosing your personal information, we have the right to mine, analyze and use the anonymized user database (including commercial use).Have the right to make statistics on the use of products/services and share desensitization statistics with the public/third parties.

5. You authorize us to use your personal information during your use of this product and its services.

6. Device permission call

In the process of providing services, in order to ensure that you can use the product functions normally, we will apply to the system for your following equipment permissions. Before applying, we will ask for your consent. You can choose to "allow" or "prohibit" the permission application. After your authorization, we will open the relevant permissions, and you can cancel the authorization in the system at any time.Your de-authorization will result in you being unable to use the relevant business functions, but will not result in you being unable to use other business functions.

The calling of various business functions to the privacy permission of the system is as follows:

 

Device permissions

Business function

Permission authorization method

Whether it can be closed

Health sharing

Using health data to assist in sleep curve optimization and other data accuracy improvement in sleep reports

Pop-up window asking for authorization after novice guidance

OK

Health update

Using health data to assist in sleep curve optimization and other data accuracy improvement in sleep reports

Pop-up window asking for authorization after novice guidance

OK

Microphone

Monitor sleep

Ask for authorization before first starting monitoring

OK

 

You can check the details of privacy permissions and turn off the corresponding permissions through the system settings of the mobile phone. In different devices, the permission display mode and closing mode may be different. For details, please refer to the instructions or guidelines of the device and system developer.

7. We may use your information for security, fraud monitoring, etc., to prevent, detect, and investigate fraud, acts that endanger security, are illegal, or violate our agreements, policies, or rules, in order to protect the legitimate rights and interests of you, us, our affiliates, our partners, and the public.

8. When we use information for other purposes not described in this Privacy Policy, we will seek your prior consent. When we want to use the information collected for a specific purpose for other purposes, we will ask for your consent in advance.

 

II. How we use cookies and similar technologies

Cookies and anonymous identifier tools. Cookies are a mechanism that enables the server side (or script) to store and retrieve information on the client side. When you use this product or service, we send one or more cookies or anonymous identifiers to your device. When you interact with this product and its services, we allow cookies or anonymous identifiers to be sent to our servers.Cookies typically contain an identifier, a site name, and some numbers and characters. Using Cookie technology, we can understand your usage habits, remember your preferences, save you the step of entering duplicate information, provide you with more thoughtful personalized services, or help you judge the security of your account. Cookies also help us count traffic,Analyze the effectiveness of page design and advertising.

We do not use cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. For more information, see the About Cookies. Org. You can clear all cookies stored on your computer. Most web browsers have a feature that blocks cookies. But if you do,You will need to personally change your user settings each time you visit our website, but you may not be able to log in or use our services or features that rely on cookies as a result of such changes.

You can limit our use of cookies by changing your browser settings. Take the browser as an example, you can choose to clear your cookies through "Privacy Settings-Clear Browsing Data" in the "Browser Settings" of the drop-down menu at the top right of the browser.

III. How do we share, transfer and publicly disclose your personal information?

Certain of our services will be provided by authorized partners solely for the purposes stated in this Privacy Policy. We may share some of your personal information with our partners to provide better customer service and user experience. We will only share your personal information for legitimate, legitimate, necessary, specific and clear purposes.And will only share personal information necessary to provide the service. Our partners are not authorized to use shared personal information for any other purpose.

(I) Sharing

We will not share your personal information with third parties other than our affiliates unless we have your prior authorization and consent, except if the processing does not identify a specific individual and cannot be recovered.

1. Personal information we may share with your authorized consent in the following circumstances:

(1) Third-party product or service providers. When you use third-party products or services, we will provide the third-party product or service provider with the information necessary to use the third-party products or services according to your authorization, so that it can provide you with products or services based on the relevant information. About how third-party services collect and use your personal information,You are advised to refer to the relevant service agreement and privacy policy of the third party service. (2) Advertising and consulting service providers/advertisers. Without your authorization, we will not share your personal information with advertising and consulting service providers. You authorize us to process information that does not identify you and cannot be recovered by the recipient, such as anonymized user portraits.Share with advertising or consulting service providers or advertisers to help them improve the effective reach rate of advertisements and analyze the use of our products and services without identifying you personally.

(3) Software and hardware/system service providers. When third-party software/hardware/system products or services are combined with our products or services to provide services for you, upon your authorization, we will provide the third-party software/hardware/system service providers with your necessary personal information so that you can use the services, or for us to analyze the use of products and services to improve your use experience.

(4) Software Development Kit (SDK). In order to adapt to the use of this product and third-party platform services on different mobile devices, and realize audio playback, breakpoint resume, receiving information push and other functions, this product accesses the third-party SDK.The above third-party SDK providers include FMDB, Reachability, FMDB, RM Store, SensorsAnalyticsSDK, SAMKeychain, SDWebImage, Toast, IJKMediaFramework, FirebaseCoreFirebaseCoreDiagnosticsFirebaseInstallationsGoogleDataTransportPromisesObjCAppsFlyerFramework

2. We will investigate the data security environment of companies, organizations and individuals with whom we share personal information, sign strict confidentiality agreements with them, and require them to handle personal information in accordance with our instructions, this privacy policy and any other relevant confidentiality and security measures.

(II) Transfer

We will not transfer your personal information to any company, organization or individual other than affiliated companies, except in the following cases:

1. Obtain your express prior authorization or consent;

2. Meet the requirements of laws and regulations, legal procedures or mandatory government requirements or judicial decisions;

3. If we or our affiliates are involved in a transaction such as a merger, division, liquidation, acquisition or sale of assets or business, and your personal information is likely to be transferred as part of such a transaction, we will ensure that such information is kept confidential at the time of transfer.We will do our best to ensure that the new company or organization holding your personal information will continue to be bound by this privacy policy, otherwise we will ask the company or organization to ask you for authorization and consent again.

(III) Public disclosure

We will only publicly disclose your personal information if:

1. Obtain your express consent;

2. Based on laws and regulations, legal procedures, litigation or mandatory requirements of government authorities.

(4) Exceptions to obtaining prior authorization and consent when sharing, transferring or publicly disclosing personal information

Under the following circumstances, the sharing, transfer and public disclosure of personal information need not obtain the authorization and consent of the subject of personal information in advance:

1. Directly related to national security and national defense security

2. Directly related to public safety, public health and major public interests;

3. Directly related to criminal investigation, prosecution, trial and execution of judgments;

4. In order to safeguard the major legitimate rights and interests of the subject of personal information or other individuals, such as life and property, but it is difficult to obtain their consent;

5. Personal information disclosed to the public by the subject of personal information;

6. Collecting personal information from legally publicly disclosed information, such as legitimate news reports, government information disclosure and other channels.

 

IV. How we keep and protect your personal information

1. Shelf life. You will keep your personal information for you during the period of using this product and service and before the expiration of the statute of limitations for related acts. If you take the initiative to delete the above information, we will keep your information in accordance with relevant laws and regulations. After you take the initiative to delete the above information, we will no longer use your personal information commercially.However, we may anonymize your personal information and use it.

2. Save the territory. Information collected by you through our website may be stored and processed in the United States or any other country where HiClub or its affiliates or service providers maintain facilities. If you are located in the European Union or another jurisdiction where the laws governing the collection and use of data may differ from those of the United States, please note that,We may transfer information, including personal information, to countries and jurisdictions that do not have the same data protection laws as your jurisdiction.

3. Security measures.

1) We will collect, use, store and transmit user information on the principle of "minimization", and inform you of the purpose and scope of the use of relevant information through the user agreement and privacy policy.

2) We take information security very seriously. We have set up a dedicated team to develop and apply a variety of security technologies and procedures. We will conduct security background checks on security management leaders and personnel in key security positions. We have established a sound information security management system and internal security incident handling mechanism.We store and protect your personal information with appropriate industry-standard security measures and technologies to prevent the loss, unauthorized access, public disclosure, use, destruction, loss or disclosure of your information. We will take all reasonably practicable steps to protect your personal information.We will use encryption technology to ensure the confidentiality of data. We use trusted protection mechanisms to protect data from malicious attacks.

3) We will train and assess employees on data security awareness and security capabilities, and enhance employees' awareness of the importance of protecting personal information. We will carry out identity authentication and authority control for employees who handle personal information, and sign confidentiality agreements with employees and partners who have access to your personal information to clarify job responsibilities and codes of conduct.Ensure that only authorized personnel have access to personal information. If there is any violation of the confidentiality agreement, the cooperation relationship with us will be terminated immediately, and the relevant legal responsibilities will be investigated, and the confidentiality requirements are also put forward for those who contact personal information when they leave their posts.

4) We also ask you to understand that in the Internet industry, due to the limitations and rapid development of technology and the possible existence of various malicious attacks, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information. Please be aware of the systems and communication networks used by you to use our products and/or services.There may be security problems in other links beyond our control.

5) According to our security management system, the leakage, damage or loss of personal information is listed as the most serious security incident. Once it happens, the company's highest level emergency plan will be launched, and the security department, government relations department, legal department and other departments will form a joint emergency response team to deal with it.

4. Security event notification

1) We will develop a network security incident contingency plan to promptly handle system vulnerabilities, computer viruses, network attacks, network intrusions and other security risks. In the event of an incident that endangers network security, we will immediately start contingency plan, take appropriate remedial measures, and report to the relevant authorities in accordance with the provisions.

2) The leakage, damage and loss of personal information are company-level major security incidents, and we will be responsible for regularly organizing members of the working group to conduct security plan drills to prevent such security incidents. If an unfortunate event occurs, we will start the contingency plan according to the highest priority and form an emergency response team to trace the cause and reduce the loss in the shortest time.

3) In the unfortunate event of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and possible impact of the security incident, the measures we have taken or will take to deal with it, the suggestions on the risks you can prevent and reduce independently, and the remedial measures for you.We will promptly inform you of the event in the form of in-station notification, SMS notification, telephone, e-mail and other contact information reserved by you. When it is difficult to inform you one by one, we will issue an announcement in a reasonable and effective way. At the same time, we will also take the initiative to report the disposal of personal information security incidents in accordance with the requirements of the regulatory authorities.

 

V. Your Rights

In accordance with the relevant laws, regulations and standards of China, as well as the common practices of other countries and regions, we guarantee that you exercise the following rights with respect to your personal information:

1. Access rights. In principle, you may request access to your personal information, such as the type of personal information we collect from you, the source, the purpose for which it is used, and the types of third parties that have obtained such personal information. After verifying your identity, we will provide it to you as long as we do not need to invest too much.

2. Right of correction. When you find that the personal information we process about you is wrong, you have the right to correct or update the wrong or incomplete information after verifying your identity and the correction does not affect the objectivity and accuracy of the information, and you can correct it in this product by yourself.Or submit your request for correction to us through feedback and error reporting.

3. Right of deletion. You may request the deletion of your personal information from us in the following circumstances:

1) If we collect, use, share or transfer your personal information with others in violation of laws and regulations or agreements with you;

2) If we disclose your personal information in violation of laws and regulations or the agreement with you, you have the right to request us to immediately stop the public disclosure and issue a notice requiring the relevant recipient to delete the corresponding information.

When you delete information from our services, we may not immediately delete the corresponding information in the backup system, but will delete the information when the backup is updated.

4. Right of rescission. Each business function requires some basic personal information to complete. You may give or withdraw your authorized consent at any time for the collection and use of additional collected personal information. When you withdraw your consent or authorization, we cannot continue to provide you with the service corresponding to the withdrawal of your consent or authorization.Your corresponding personal information will no longer be processed. However, your decision to withdraw your consent or authorization will not affect the processing of personal information previously carried out on the basis of your consent or authorization.

5. Right of cancellation. You do not need to sign up to use our services.

6. Be informed in advance of the right to stop operation of products and services. This product is willing to accompany you all the time. If this product or service is forced to stop operation due to special reasons, we will inform you 15 days in advance on the main page or website of the product or service, or send you an e-mail or other appropriate way to reach you, and will stop collecting your personal information.At the same time, your personal information will be deleted or anonymized in accordance with the law.

For security purposes, you may be required to provide a written request, or otherwise prove your identity. We may ask you to verify your identity before we process your request. We will reply within fifteen days.

For your reasonable request, we do not charge in principle, but for repeated requests that exceed the reasonable limit, we will charge a certain cost according to the situation. For those that are unnecessarily duplicative, require excessive technical means (E. G. require the development of new systems or fundamental changes to existing practices), pose risks to the legitimate interests of others, or are highly impractical (E. G.Information stored on backup tapes), we may deny.

7. Under the following circumstances, we will not be able to respond to your request for correction, deletion and cancellation of information in accordance with the requirements of laws and regulations:

1) Directly related to national security and national defense security;

2) Directly related to public safety, public health and major public interests;

3) Directly related to criminal investigation, prosecution, trial and execution of judgment;

4) We have sufficient evidence to show that you have subjective malice or abuse of rights (for example, your request will endanger public safety and the legitimate rights and interests of others, or your request is beyond the scope of general technical means and commercial costs);

5) Responding to the request of the subject of personal information will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

6) Involving trade secrets.

 

6. How do we handle personal information of minors?

HiClub attaches great importance to the protection of minors' information.

Our products, websites and services are primarily for adults. Children are not allowed to create their own user accounts without the consent of a parent or guardian. In the case of the collection of personal information of children with the consent of their parents,We will use or publicly disclose this information only as permitted by law, with the express consent of a parent or guardian, or as necessary for the protection of the child.

Although children are defined differently by local laws and customs, we consider any person under the age of 14 to be a child. If we find that we have collected personal information from a child without prior verifiable parental consent, we seek to delete the data as soon as possible.

If you are a minor under the age of 14, you are advised to ask your guardian to read this Privacy Policy carefully and use our products and/or services or provide information to us with the consent of your guardian.

If at any time the guardian has reason to believe that we have collected personal information from a minor without the guardian's consent, please contact us and we will take steps to delete the data as soon as possible.

 

7. How your personal information is transferred globally

Because we offer products or services through resources and servers around the world, this means that your personal information may be stored in, or accessed from, jurisdictions outside the country in which you use the products or services, subject to your authorized consent. Specifically, in order to provide you with better service,We will store your personal information in the United States.

Such jurisdictions may have different data protection laws or even no laws in place. In such cases, we will ensure that your personal information is adequately and equally protected in the People's Republic of China. For example, we may request your consent to transfer personal information across borders, or implement security measures such as data de-identification prior to cross-border data transfer.

 

VIII. Revision of Privacy Policy

Our Privacy Policy is subject to change.

We will not reduce your rights under this Privacy Policy without your express consent. We will post any changes to this Privacy Policy on this page.

For major changes, we will notify you on the main exposure page or website of the product or service, or send you an email or other appropriate way to reach you. If you do not agree to such changes, please immediately stop using this product and its services.

Material changes referred to in this policy include, but are not limited to:

1. Our service model has changed significantly. For example, the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;

2. We have undergone major changes in ownership structure and organizational structure. For example, the change of owner caused by business adjustment, bankruptcy and merger;

3. The main object of personal information sharing, transfer or public disclosure has changed;

4. A material change in your rights to participate in the processing of personal information and the manner in which you exercise them;

5. When the responsible department, contact method and complaint channel for handling personal information security change;

6. When the Personal Information Security Impact Assessment Report indicates a high risk.

We will also keep an older version of this policy on file for your review.

 

9. How to contact us

The growth of this product is inseparable from the joint efforts of all users. We are very grateful for your contribution to the data update and feedback of this product. You can contact us to feedback your suggestions on this product and the problems encountered in the use process, so as to help us optimize the product functions and services.Make it easier for more users to use our products and services.

We will process your request after verifying your identity. In general, we will reply in [15] days.

Attachment: Explanation of terms

Personal information refers to all kinds of information recorded by electronic or other means that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information.Personal information includes name, date of birth, ID card number, personal biometric information, address, communication contact information, communication records and contents, account password, property information, credit information, track, accommodation information, health physiological information, transaction information and so on.

Personal sensitive information refers to personal information that may endanger personal and property safety once disclosed, illegally provided or abused, and easily lead to personal reputation, physical and mental health damage or discriminatory treatment.Personal sensitive information includes identity card number, personal biometric information, bank account number, communication record and content, property information, credit information, track, accommodation information, health physiological information, transaction information and personal information of children under 14 years o f age.

Devices are devices that can be used to use our products and/or services, such as desktop devices, tablets, or smartphones.

A unique device identifier (sometimes referred to as a universal unique ID or UUID) is a string of characters programmed into a device by the device manufacturer that uniquely identifies the device (e.g., International Mobile Equipment Identity (IMei) number, network device hardware address (MAC)).Different device identifiers vary in terms of how long they are valid, whether they can be reset by the user, and how they are obtained. A corresponding device may have a numb of different unique device identifiers. The unique device identifier may be used for a variety of purposes,These include security and fraud detection, synchronization services such as a user's email inbox, logging a user's preferences, and serving ads with relevance.

Cookies are a mechanism that enables server-side (or script) storage and retrieval of information on the client, extending Web-based client/server applications by adding simple, persistent client state. When the server returns the HTTP object to the client, it sends a piece of status information, which is saved by the client. The URL range that is valid in this state is described in the state information.Thereafter, any HTTP request in the range initiated by the client will return the current value of the state information from the client to the server. This state information is called a Cookie.

Anonymous identifier means that we generate an identifier, such as CUID, based on device parameters and through machine algorithms, to help us identify a user, provide better products and/or services and improve user experience.

User portrait refers to the process of collecting, aggregating and analyzing personal information to analyze or predict the personal characteristics of a specific natural person, such as his occupation, economy, health, education, personal preferences, credit, behavior and so on, and to form his personal characteristics model. It directly uses the personal information of a specific natural person to form the characteristic model of the natural person.Referred to as direct user portraits. The use of personal information other than that of a specific natural person, such as the data of his group, forms the characteristic model of the natural person, which is called indirect user portrait.

Anonymization refers to the technical processing of personal information, so that the subject of personal information can not be identified, and the processed information can not be restored. The information obtained by anonymizing personal information does not belong to personal information.

The power to direct or cause to be directed, or other relationships that in fact constitute actual control, of management and decision-making.

 

Thank you again for trusting and using the Sleep Better mobile app!

 

This Privacy Policy was first published in April 2022