Effective Date: March 10, 2022
Introduction
This Privacy Policy (hereinafter refrred to as “Policy”) applies to all products and services
provided by Exotic Mile Pvt Ltd. (hereinafter referred to as "Boult " or “we” or “our” or “us”).
This includes the Boult app, mini-programs, and various products and services offered as technology
evolves. If a specific product has its own privacy policy or user service agreement with distinct
provisions, the privacy policy for that product will take precedence. In the absence of a separate
privacy policy for services provided by our affiliates, this Policy shall apply.
Boult recognizes the importance of protecting your personal information and details and information
and thus it provides this Policy with respect to the access and use of various products and services
offered by the Boult. Please read this Policy carefully, paying special attention to bold sections,
to understand how we handle your personal information. If you have any questions, contact us through
the information provided in the "Contact Us" section.
For the purposes of this Policy, the user of services and products may be customers or any other
person using this platform (hereinafter referred to as “user” or “you”or “your”).
Main Content
Welcome to Boult! We highly value user privacy and the protection of personal information. This
Policy explains how we collect, use, store, share, transfer, and protect your information when you
use our products or services. This Policy is integral to the Boult’s services you use and is
designed to be clear and understandable. Please read and ensure you fully understand our practices
before using our products or services. Boult supports sharing data with third parties for enhanced
services, subject to your consent and their Policy.
Your information, including sensitive personal data, is stored and is uploaded to our servers only
with your explicit consent. Boult supports sharing your data with third parties only with your prior
consent to obtain more professional services. Please carefully read their Policy in third-party
software before enabling the service. In addition, we will obtain your authorization again before
sharing data. After you exit the "Boult" application, the application will still access the phone's
sensors to obtain step data and connect to the network for data synchronization, message reception,
device software updates, and log uploads
1. Service Content
Our app offers services related to bluetooth earphone products, such as hardware connections and
access to product information, while strictly prohibiting illegal and adult content. Violations of
our community guidelines will result in a permanent ban.
1.1 This application is a bluetooth earphone product service app that can achieve hardware
connections, obtain company product information, etc., and strictly prohibits all illegal and adult
content within the app.
1.2 The specific content of the services provided by this application is provided by the application
producer based on actual conditions.
1.3 Unless there are other explicit provisions in the registration and service agreement, new
products, new features, and new services launched by this application are subject to the regulations
of the registration and service agreement.
1.4 This application only provides related network services. Devices (such as personal computers,
mobile phones, and other devices related to Internet or mobile networks) and the necessary expenses
(such as telephone fees and internet fees for accessing the Internet, and mobile phone fees for
using mobile networks) related to the relevant network services should be borne by the User.
1.5 When you use our services, we will monitor the device's gyroscope, accelerometer, gravity
sensor, etc., to identify and judge the status of your device.
1.6 When you use our services, we will collect your personal information using the Umeng SDK.
Specific information is as follows:
Platform Name: Umeng SDK
Name in Use: Umeng SDK
Service Type: Data Statistics and Analysis
Types of Personal Information Collected: Device information (clipboard information/device serial
number/Android ID/IMEI/MAC/Android/ID/IDFA/OpenUDID/GUID/SIM card IMSI/geographical location, etc.)
Privacy Policy Link: [Umeng Privacy Policy](https://www.umeng.com/page/policy)
1.7 When you use our services, we will collect your personal information using the Amap SDK.
Specific information is as follows:
Platform Name: Amap SDK
Name in Use: Amap SDK
Service Type: Map Service
Types of Personal Information Collected: Device information (clipboard information/device serial
number/Android ID/IMEI/MAC/Android/ID/IDFA/OpenUDID/GUID/SIM card IMSI/geographical location, etc.)
Privacy Policy Link: [Amap Privacy Policy](https://cache.amap.com/h5/h5/publish/238/index.html)
1.8 When you use our services, we will collect your personal information using the iFlytek SDK.
Specific information is as follows:
Platform Name: iFlytek SDK
Name in Use: iFlytek SDK
Service Type: Voice Service
Types of Personal Information Collected: Device information (clipboard information/device serial
number/Android ID/IMEI/MAC/Android/ID/IDFA/OpenUDID/GUID/SIM card IMSI/geographical location, etc.)
Privacy Policy Link: [iFlytek Privacy Policy]
(https://www.xfyun.cn/doc/policy/privacy.html#%E4%B8%80%E3%80%81%E5%AE%9A%E4%B9%89%E4%B8%
8E%E8%A7%A3%E9%87%8A)
2. Collection and Use of Personal Information
2.1 Personal Information: Includes your name, address, email, telephone number, and other
information you directly give us on our Services.
2.2 User Information: We collect information you post through the Services. For example, when
you interact with our customer service, post to social media pages, or upload content.
2.3 Device and Usage Information: May include information specific to your mobile device (e.g.,
model, operating system, IP address, browser type, mobile network information); location
information; and server log information (e.g., access dates and times).
2.4 Cookies: It helps us in recognizing you as a customer and remember your preferences so that
we can personalize our services for you.
3. Use of Collected Information
3.1 Logging into the App when creating and logging into your App account, you need to provide
your phone number for SMS verification login or create a username and password. If you don't log
in or create an account, it will affect your use of the App for headphone connections.
3.2 Connecting Boult Products through App - Bluetooth Permission is a basic permission used by
the App. Only with this permission can the App search for and connect Boult Bluetooth products
through Bluetooth.
3.3 Location Permission is also a basic permission used by the App. The mobile system requires
the App to have location permission when searching for nearby Bluetooth products. Only with this
permission can the App search for nearby Boult Bluetooth products.
3.4 Background Location Permission is not a necessary permission and is used for Android phones
to search for nearby Boult Bluetooth products after adding an APP desktop widget.
3.5 Sync Server Data
3.5.1 Network Access is a basic permission used by the App. Network permission is used for
account login, loading discovery pages, downloading Boult product
3.5.2 Data read and write permission is a basic permission used by the App. Data read and write
permission is used to create local database records, cache server data, cache network images,
and read local albums (customizing the background of the music playback interface may read local
album content).
3.6 Sensor permission is used when users can actively open web pages to support sensor data
acquisition in web pages and support web page sensor functions. This permission is collected by
Tencent SDK.
3.7 Camera permission is not a necessary permission and is used for Android phones to add Boult
Bluetooth products
3.8. Reading contacts is also not a necessary permission and is used for Android phones to share
Boult Bluetooth products.
3.9 Device Information is to identify your device, prevent malicious programs and cheating,
improve service security, ensure operational quality and efficiency, we will collect your device
information (including IMEI, device serial number, OAID, MEID, Android ID, IMSI, GUID, MAC
address, SIM card serial number), installed APP information, or running process information.
3.9.1 Storage Permission is to implement garbage cleaning and running acceleration functions, we
will request your storage permission to access external storage information (SD card data) for
checking phone CPU, memory, and SD card status.
3.9.2 Clipboard Permission is used when you share or receive shared information, we need to
access your clipboard locally to read passwords, share codes, links, etc., contained in it to
achieve functions or services such as jumping, sharing, and activity linkage.
4. Information Sharing and Security
When using Boult Audio official mall services for online transactions, you
4.1 With consent: We will share personal information outside of Boult when we have your consent.
4.2 For external processing: We provide personal information to our affiliates or other trusted
businesses or persons to process it for us, based on our instructions and in compliance with our
Policy and any other appropriate confidentiality and security measures.
4.3 For legal reasons: We will share personal information outside of Boult if we have a
good-faith belief that access, use, preservation, or disclosure of the information is reasonably
necessary to meet any applicable law, regulation, legal process, or enforceable governmental
request.
4.4 Data Protection Technical Measures
4.4.1 We have taken industry-standard, reasonable, and feasible security measures to protect
your information from unauthorized access, public disclosure, use, modification, damage, or
loss.
We use encryption technology to enhance the security of personal information, and data exchange
between your browser and the server is protected by SSL protocol. We provide secure browsing
through the HTTPS protocol.
We use trusted protection mechanisms to protect personal information from malicious attacks. We
deploy access control mechanisms to ensure that only authorized personnel can access personal
information.
4.4.2 Data Protection Management Organization Measures: We have established an advanced data
security management system centered around data throughout its lifecycle, including
organizational development, policy design, personnel management, and product technology, to
enhance the security of personal information from the dimensions of organization, system,
personnel, and technology.
4.4.3 Response to Personal Information Security Incidents: If our physical, technical, or
managerial protection facilities are damaged, resulting in unauthorized access, public
disclosure, tampering, or destruction of information, leading to damage to your legal rights and
interests, we will promptly initiate emergency response plans and take reasonable and necessary
measures to minimize the impact on your personal information. In the event of a personal
information security incident, we will also notify you of the basic situation of the security
incident, possible effects, measures we have taken or will take, and suggestions for your
self-defense and risk reduction in accordance with the requirements of laws and regulations.
We will inform you through text messages, phone calls, push notifications, and other reasonable
channels. At the same time, we will report the handling of personal information security
incidents to regulatory authorities as required.
4.4.4 Prevention of Account Security Risks: When using Boult official services for online
transactions, you inevitably need to disclose your personal information, such as contact
information or contact address, to the other party in the transaction or potential transaction.
In addition, you can also establish communication, exchange information, or analyze content with
third parties through our services. Please protect your personal information properly, provide
it to others only when necessary, and do not provide it to others casually to avoid information.
5. Policy Updates
5.1. Data Protection Technical Measures: We have taken industry-standard, reasonable, and
feasible security measures to protect your information from unauthorized access, public
disclosure, use, modification, damage, or loss. For example, we use encryption technology to
enhance the security of your personal information, and data exchange between your browser and
the server is protected by SSL protocol.
5.2 We provide secure browsing through the HTTPS protocol. We use trusted protection mechanisms
to prevent personal information from malicious attacks. We deploy access control mechanisms to
ensure that only authorized personnel can access personal information. Currently, our important
information systems have passed the evaluation of network security level protection of level
three or above.
5.3 Data Protection Management Organization Measures : We have established an advanced data
security management system centered around data throughout its lifecycle, including
organizational development, policy design, personnel management, and product technology, to
enhance the security of personal information from the dimensions of organization, system,
personnel, and technology.
Please protect your personal information properly, provide it to others only when necessary, and
do not provide it to others casually to avoid information
6. Account Deactivation
Account deactivation requires meeting specific conditions, including no
abnormal logins and no pending complaints or disputes. Deactivation is irreversible and results
in data deletion.
7.Contact Us
For questions or suggestions about this policy or your personal information, please contact our
dedicated department for network security and personal information protection.
8.Protection of Minors
We take the protection of minors' personal information seriously. If you are under 18, we
require consent from you or your guardian to process your information. Special provisions apply
to children under 14, as outlined in our "Child Privacy Protection Statement."
9. Know your Rights
In addition to being able to update your data, you also have other data protection rights. This
inclues restricting us from using your personal information.
You have the option to allowor disallow us to use your personal data. Only after your due
consent we can use your personal information.