Boult Audio Privacy Policy

Updated Date: February 18, 2022
Effective Date: March 10, 2022

Introduction

This Privacy Policy (hereinafter refrred to as “Policy”) applies to all products and services provided by Exotic Mile Pvt Ltd. (hereinafter referred to as "Boult " or “we” or “our” or “us”). This includes the Boult app, mini-programs, and various products and services offered as technology evolves. If a specific product has its own privacy policy or user service agreement with distinct provisions, the privacy policy for that product will take precedence. In the absence of a separate privacy policy for services provided by our affiliates, this Policy shall apply.
Boult recognizes the importance of protecting your personal information and details and information and thus it provides this Policy with respect to the access and use of various products and services offered by the Boult. Please read this Policy carefully, paying special attention to bold sections, to understand how we handle your personal information. If you have any questions, contact us through the information provided in the "Contact Us" section.
For the purposes of this Policy, the user of services and products may be customers or any other person using this platform (hereinafter referred to as “user” or “you”or “your”).

Main Content

Welcome to Boult! We highly value user privacy and the protection of personal information. This Policy explains how we collect, use, store, share, transfer, and protect your information when you use our products or services. This Policy is integral to the Boult’s services you use and is designed to be clear and understandable. Please read and ensure you fully understand our practices before using our products or services. Boult supports sharing data with third parties for enhanced services, subject to your consent and their Policy.
Your information, including sensitive personal data, is stored and is uploaded to our servers only with your explicit consent. Boult supports sharing your data with third parties only with your prior consent to obtain more professional services. Please carefully read their Policy in third-party software before enabling the service. In addition, we will obtain your authorization again before sharing data. After you exit the "Boult" application, the application will still access the phone's sensors to obtain step data and connect to the network for data synchronization, message reception, device software updates, and log uploads

1. Service Content

Our app offers services related to bluetooth earphone products, such as hardware connections and access to product information, while strictly prohibiting illegal and adult content. Violations of our community guidelines will result in a permanent ban.
1.1 This application is a bluetooth earphone product service app that can achieve hardware connections, obtain company product information, etc., and strictly prohibits all illegal and adult content within the app.
1.2 The specific content of the services provided by this application is provided by the application producer based on actual conditions.
1.3 Unless there are other explicit provisions in the registration and service agreement, new products, new features, and new services launched by this application are subject to the regulations of the registration and service agreement.
1.4 This application only provides related network services. Devices (such as personal computers, mobile phones, and other devices related to Internet or mobile networks) and the necessary expenses (such as telephone fees and internet fees for accessing the Internet, and mobile phone fees for using mobile networks) related to the relevant network services should be borne by the User.
1.5 When you use our services, we will monitor the device's gyroscope, accelerometer, gravity sensor, etc., to identify and judge the status of your device.
1.6 When you use our services, we will collect your personal information using the Umeng SDK. Specific information is as follows:
Platform Name: Umeng SDK
Name in Use: Umeng SDK
Service Type: Data Statistics and Analysis
Types of Personal Information Collected: Device information (clipboard information/device serial number/Android ID/IMEI/MAC/Android/ID/IDFA/OpenUDID/GUID/SIM card IMSI/geographical location, etc.)
Privacy Policy Link: [Umeng Privacy Policy](https://www.umeng.com/page/policy)
1.7 When you use our services, we will collect your personal information using the Amap SDK. Specific information is as follows:
Platform Name: Amap SDK
Name in Use: Amap SDK
Service Type: Map Service
Types of Personal Information Collected: Device information (clipboard information/device serial number/Android ID/IMEI/MAC/Android/ID/IDFA/OpenUDID/GUID/SIM card IMSI/geographical location, etc.)
Privacy Policy Link: [Amap Privacy Policy](https://cache.amap.com/h5/h5/publish/238/index.html)
1.8 When you use our services, we will collect your personal information using the iFlytek SDK.
Specific information is as follows:
Platform Name: iFlytek SDK
Name in Use: iFlytek SDK
Service Type: Voice Service
Types of Personal Information Collected: Device information (clipboard information/device serial number/Android ID/IMEI/MAC/Android/ID/IDFA/OpenUDID/GUID/SIM card IMSI/geographical location, etc.)
Privacy Policy Link: [iFlytek Privacy Policy] (https://www.xfyun.cn/doc/policy/privacy.html#%E4%B8%80%E3%80%81%E5%AE%9A%E4%B9%89%E4%B8% 8E%E8%A7%A3%E9%87%8A)

2. Collection and Use of Personal Information

2.1 Personal Information: Includes your name, address, email, telephone number, and other information you directly give us on our Services.
2.2 User Information: We collect information you post through the Services. For example, when you interact with our customer service, post to social media pages, or upload content.
2.3 Device and Usage Information: May include information specific to your mobile device (e.g., model, operating system, IP address, browser type, mobile network information); location information; and server log information (e.g., access dates and times).
2.4 Cookies: It helps us in recognizing you as a customer and remember your preferences so that we can personalize our services for you.

3. Use of Collected Information

3.1 Logging into the App when creating and logging into your App account, you need to provide your phone number for SMS verification login or create a username and password. If you don't log in or create an account, it will affect your use of the App for headphone connections.
3.2 Connecting Boult Products through App - Bluetooth Permission is a basic permission used by the App. Only with this permission can the App search for and connect Boult Bluetooth products through Bluetooth.
3.3 Location Permission is also a basic permission used by the App. The mobile system requires the App to have location permission when searching for nearby Bluetooth products. Only with this permission can the App search for nearby Boult Bluetooth products.
3.4 Background Location Permission is not a necessary permission and is used for Android phones to search for nearby Boult Bluetooth products after adding an APP desktop widget. 3.5 Sync Server Data
3.5.1 Network Access is a basic permission used by the App. Network permission is used for account login, loading discovery pages, downloading Boult product
3.5.2 Data read and write permission is a basic permission used by the App. Data read and write permission is used to create local database records, cache server data, cache network images, and read local albums (customizing the background of the music playback interface may read local album content).
3.6 Sensor permission is used when users can actively open web pages to support sensor data acquisition in web pages and support web page sensor functions. This permission is collected by Tencent SDK.
3.7 Camera permission is not a necessary permission and is used for Android phones to add Boult Bluetooth products
3.8. Reading contacts is also not a necessary permission and is used for Android phones to share Boult Bluetooth products.
3.9 Device Information is to identify your device, prevent malicious programs and cheating, improve service security, ensure operational quality and efficiency, we will collect your device information (including IMEI, device serial number, OAID, MEID, Android ID, IMSI, GUID, MAC address, SIM card serial number), installed APP information, or running process information.
3.9.1 Storage Permission is to implement garbage cleaning and running acceleration functions, we will request your storage permission to access external storage information (SD card data) for checking phone CPU, memory, and SD card status.
3.9.2 Clipboard Permission is used when you share or receive shared information, we need to access your clipboard locally to read passwords, share codes, links, etc., contained in it to achieve functions or services such as jumping, sharing, and activity linkage.

4. Information Sharing and Security

When using Boult Audio official mall services for online transactions, you 4.1 With consent: We will share personal information outside of Boult when we have your consent.
4.2 For external processing: We provide personal information to our affiliates or other trusted businesses or persons to process it for us, based on our instructions and in compliance with our Policy and any other appropriate confidentiality and security measures.
4.3 For legal reasons: We will share personal information outside of Boult if we have a good-faith belief that access, use, preservation, or disclosure of the information is reasonably necessary to meet any applicable law, regulation, legal process, or enforceable governmental request.
4.4 Data Protection Technical Measures
4.4.1 We have taken industry-standard, reasonable, and feasible security measures to protect your information from unauthorized access, public disclosure, use, modification, damage, or loss. We use encryption technology to enhance the security of personal information, and data exchange between your browser and the server is protected by SSL protocol. We provide secure browsing through the HTTPS protocol.
We use trusted protection mechanisms to protect personal information from malicious attacks. We deploy access control mechanisms to ensure that only authorized personnel can access personal information.
4.4.2 Data Protection Management Organization Measures: We have established an advanced data security management system centered around data throughout its lifecycle, including organizational development, policy design, personnel management, and product technology, to enhance the security of personal information from the dimensions of organization, system, personnel, and technology.
4.4.3 Response to Personal Information Security Incidents: If our physical, technical, or managerial protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, leading to damage to your legal rights and interests, we will promptly initiate emergency response plans and take reasonable and necessary measures to minimize the impact on your personal information. In the event of a personal information security incident, we will also notify you of the basic situation of the security incident, possible effects, measures we have taken or will take, and suggestions for your self-defense and risk reduction in accordance with the requirements of laws and regulations. We will inform you through text messages, phone calls, push notifications, and other reasonable channels. At the same time, we will report the handling of personal information security incidents to regulatory authorities as required.
4.4.4 Prevention of Account Security Risks: When using Boult official services for online transactions, you inevitably need to disclose your personal information, such as contact information or contact address, to the other party in the transaction or potential transaction. In addition, you can also establish communication, exchange information, or analyze content with third parties through our services. Please protect your personal information properly, provide it to others only when necessary, and do not provide it to others casually to avoid information.

5. Policy Updates

5.1. Data Protection Technical Measures: We have taken industry-standard, reasonable, and feasible security measures to protect your information from unauthorized access, public disclosure, use, modification, damage, or loss. For example, we use encryption technology to enhance the security of your personal information, and data exchange between your browser and the server is protected by SSL protocol.
5.2 We provide secure browsing through the HTTPS protocol. We use trusted protection mechanisms to prevent personal information from malicious attacks. We deploy access control mechanisms to ensure that only authorized personnel can access personal information. Currently, our important information systems have passed the evaluation of network security level protection of level three or above.
5.3 Data Protection Management Organization Measures : We have established an advanced data security management system centered around data throughout its lifecycle, including organizational development, policy design, personnel management, and product technology, to enhance the security of personal information from the dimensions of organization, system, personnel, and technology.
Please protect your personal information properly, provide it to others only when necessary, and do not provide it to others casually to avoid information

6. Account Deactivation

Account deactivation requires meeting specific conditions, including no abnormal logins and no pending complaints or disputes. Deactivation is irreversible and results in data deletion.

7.Contact Us

For questions or suggestions about this policy or your personal information, please contact our dedicated department for network security and personal information protection.

8.Protection of Minors

We take the protection of minors' personal information seriously. If you are under 18, we require consent from you or your guardian to process your information. Special provisions apply to children under 14, as outlined in our "Child Privacy Protection Statement."

9. Know your Rights

In addition to being able to update your data, you also have other data protection rights. This inclues restricting us from using your personal information. You have the option to allowor disallow us to use your personal data. Only after your due consent we can use your personal information.