Maxcom Tracker
Privacy Policy
Maxcom Tracker (" my” , " our " or " nose ") understands the importance of your personal data, we will protect it in accordance with laws and regulations. We have created this Privacy Policy (" this policy ”) and we particularly recommend that you read and understand this Policy carefully before using Maxcom Tracker and related services (“our services”) in order to make the right choices.
This policy will help you understand:
We collect and use your information in accordance with this Policy. However, we will not aggregate it for the purpose of forcing bundles, even if you agree to this Policy.
When you use the Services or enable features, we collect and use information necessary for the functionality and services. You can decline to provide this information, and it will not impact other features or services, unless it is necessary to perform core business functions or is required by law or regulation. We will detail what is necessary in the Policy.
If you're not logged in to your account, we'll ensure basic push functionality using your device's identifying information. If you're logged in to your account, we'll implement push based on your account information.
Contacts, precise geographic locations, cameras, microphones, and photo album permissions are not enabled by default, only when you have authorized them for specific features or services, or you can revoke authorization. In particular, we do not collect your information when the relevant features or services are not required, even if we have obtained these confidential permissions with your consent.
This Policy applies to your access to and use of our services through the Maxcom Tracker application, the Maxcom Tracker software development kit (SDK), and the application programming interface (API) for third-party websites and applications.
The following information will help you learn more about how we collect, use, store, transmit, share, transfer (if applicable), and protect personal information, as well as understand how to search, access, delete, correct, and withdraw your authorized personal information. Important content of the terms and conditions relating to your personal data interests is highlighted in bold, please pay particular attention to this part.
- How we collect and use personal data
- Additional information regarding the occupancy permit
- Additional information regarding the use of third-party access rights (SDK/API/H5)
- How we use similar technologies, such as cookies
- How we share, transfer, and publicly disclose personal information
- How we store personal data
- How we protect the security of personal data
- Manage your personal data
- Terms of Use for Minors
- Policy Changes and Notices
- Contact us
- How we collect and use personal data
We collect information that you provide directly to us when you use the Services:
1.1 Register, log in, authenticate
1.1.1 Register and log in
- When you register and log in to our services, you'll be asked to provide appropriate network identification information (avatar, nickname, and password) to create an account. You can choose to fill in your gender, date of birth, region, and personal profile information to complete your information. During this time, we also store your user account preferences and settings.
- You may also use a third-party account to log in and use Maxcom Tracker, and you authorize us to obtain the public information (avatars, nicknames, and other information you authorize) you have registered with the third-party platform to associate with your Maxcom Tracker account so that you can log in directly and use our services.
1.1.2 Authentication
When you use an authentication feature or service (Parenting or Counselor), in accordance with applicable laws and regulations, You may be asked to provide real personal data (phone number) or an appropriate certificate (psychologist qualifications) to complete the verification. This information is confidential to personal information, which you may refuse to provide, but you may not be able to access the services without affecting your normal use of other features and services.
1.2 Viewing information
- Maxcom Tracker may recommend information you are interested in, and we may collect necessary log information to perform this function.
- Log information used to display information includes:
Actions you take when using the Services: clicking, following, favorites, searching, browsing, forwarding
Information you share voluntarily: opinions, posts, likes, comments
Geographic Information: Sensor information such as GPS information, Wi-Fi access points, Bluetooth, and base stations
- The above information that we collect and use is anonymized, and the data analysis only concerns specific, unrelated codes that do not directly refer to your identity and are not linked to your real identity.
1.3 Function and Interaction
1.3.1 Function
- When you use features like image uploading, WeChat, and video chat, we will ask you for authorization. camera, photo, microphone. If you decline, you will not be able to use this feature, but it will not affect the normal use of other features.
- When you use an "IoT SIM card" for real-name authentication, as required by laws and regulations, you must verify your identity through "facial recognition." In this process, the Third-Party Certification Agency requires you to provide real name, identification number and information about the value of facial features. This information is confidential to personal information, which you may refuse to provide without affecting your normal use of other features. This information is used solely for real-name authentication and for purposes specified in laws and regulations and will not be used for any other purposes without your express consent.
1.3.2 Release Notes
- When you post content, comments, questions, or answers, we will collect information about your posts and display your screen names, avatars, and published content.
- Once you publish and choose your display location, we'll ask you for authorization. geographic location permissions and collect location information related to this service. If you decline to provide accurate geographic location information, you will not be able to use this feature, but it will not affect your normal use of other features.
- We collect information that you provide to us when you use the Services (such as information about you contained in comments, messages, post graphics, audio and video files).
1.3.3 Interactive communication
- When you actively follow and interact with accounts and circles you're interested in, and view, comment, collect, like, or retweet content, we collect the accounts you follow and show you what interests you.
- When you add contacts using the Phone Book, Recipient Address feature, we will ask you for permission to contact and we will encrypt the information in the address book using an encryption algorithm. Contact information is sensitive personal information, if you refuse to provide it, it will only prevent you from using the Quick Add feature, it will not affect the use of other features in Maxcom Tracker.
1.4 Search
When you use the Maxcom Tracker search service, we collect information about your search keywords and record your searches. To provide you with an efficient search service, some information is temporarily stored on your local storage device and displays your search results and history.
1.5 Safe operation
1.5.1 Security Features
We are committed to providing you with a safe, trusted product and environment, and providing high-quality, reliable service, and this is our primary goal. Information collected for security purposes is necessary .
1.5.2 Device Information and Log Information
- To ensure the secure operation of the software and services, we collect data on the hardware model, operating system version number, international mobile equipment identification number, unique device identifier, network device hardware address, IP address, Wi-Fi access point, Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, usage, service logs.
- To prevent malware and secure operations, we collect information about installed applications or processes that are running, general application performance, usage and frequency, application crashes, general installation usage, performance data, application sources.
- We may use your account information, device information, service log information, and information that our partners and affiliates may use to determine account security, authenticate, detect, and prevent security incidents when you are authorized or legally available to do so.
1.6 Changes to the purpose of collecting and using personal information
Please note that as our business evolves, changes may be made to the functionality and services we provide. Generally, when new features or services are significant to those we currently provide, the personal data collected and used will be directly or reasonably related to the original processing purpose. We will collect and use your personal data where there is no direct or reasonable relationship with the original processing purpose, and we will inform you again and obtain your consent.
1.7 Exemption from the obligation to obtain consent for the collection and use of personal data
Please understand that, in accordance with laws, regulations and applicable national standards, we collect and use your personal data without your consent in the following cases:
- Directly related to national security, the country's defense security;
- Those directly related to public safety, public health and important public interests;
- Directly related to criminal investigation, prosecution, trial and execution of sentences;
- Those aimed at protecting the subject's personal data or other personal life, property and other important rights and legal interests for which it is difficult to obtain the person's consent;
- The Personal Information we collect is that which you yourself disclose publicly;
- Personal data collected from information legally disclosed to the public, such as legal press reports, government disclosures, etc.;
- Necessary to conclude or perform a contract in accordance with your request;
- Necessary to maintain the secure and stable operation of software and related services, such as detection, removal of software and related service failures;
and . Those necessary for legal reporting of news;
- These research institutions must conduct statistical or scientific research based on public interest and anonymize the personal data contained in the results when the research results or description are made available to the outside world;
- Other situations required by law.
Please note that if information cannot be identified individually or in combination with other information, it is not considered personal data under the law. If we can or will use data that cannot be associated with any specific personal data in combination with other personal data, it will be processed and protected as your personal data in accordance with this Policy when combining that information.
- Additional information regarding the occupancy permit
Below is a summary of the permissions that features related to Maxcom Tracker may use.
2.1 Address Book Permissions
Features that use this permission: phone book, shipping address import function.
2.2 Connection Permissions
Functions that use this permission: function call.
2.3 Location Permissions
Features that use this permission: Map feature, Entry feature, Personal Hub Profile Settings feature.
2.4 Camera Permissions
Features that use this permission: QR code scanning feature, audio and video call feature, personal center profile settings feature, device user information settings feature.
2.5 Album Permissions
Functions that use this permission: remote photo taking function, WeChat function (sending photos), screen saver setting function, publishing function, personal center profile setting function, device user information setting function.
2.6 Microphone Permissions
Features that use this permission: voice reminder feature, WeChat feature, video call feature.
- Additional information regarding the use of third-party access rights (SDK/API/H5)
To provide you with a better experience, we will access high-quality third parties. We will carefully assess the purpose for which affiliates and third parties will use the information you share, conduct a comprehensive security assessment, and ensure that they comply with our Legal Collaboration Agreement. We will conduct strict security monitoring of the software tools from which partners obtain information, such as software development kits (SDKs), application program interfaces (APIs), and H5, to protect data security. We will share your personal data with our affiliates and third parties with your consent and authorization, unless the personal data shared is anonymized and the individual who shared the information with the third party cannot be re-identified. If affiliates and third parties use it beyond the scope of the original authorized consent, they must obtain your consent again.
3.1 Affiliate Advertising (SDK)
The following permissions are required:
- Get carrier information;
- Access to Wi-Fi network information;
- Read the current status of your phone;
- Access to network permissions;
- Write/Read external storage device;
- Location;
- Installation;
- Get information about the task;
- Energy management operations.
- 2 Mobile Payments (SDK)
The following permissions are required:
1.Network access;
- Get network status;
- Get Wi-Fi Status;
- Read the current status of your phone;
- Save external storage devices;
- Change sound settings.
3.3 Push System (SDK)
The following permissions are required:
1.Network access;
- Save external storage devices;
- Get network status;
- Get Wi-Fi Status;
- Read the current status of your phone;
- Installation;
- Obtaining information about the task;
8.OPPO Mobile Message(Only for OPPO mobile phones);
- Message on MEIZU mobile phone (only for MEIZU phone model).
3.4 Video Call (SDK)
The following permissions are required:
- Open the camera device;
- Change network status (e.g. whether you can access the network);
- Change sound settings;
- Recording;
- Network access;
- Writing to an external storage device;
- Get network status;
- Get Wi-Fi Status;
- Read the current status of your phone;
- Reading external storage devices;
- Wake lock.
3.5 Himalayan (SDK)
The following permissions are required:
- Save external storage device
- Network access
- Recording
- Get network status
- Get Wi-Fi Status
- Use the notification service at the reception
- Aparat fotograficzny
3.6 Fengfeng School (H5)
The following permissions are required:
- Encrypted order data synchronization permissions
- How we use similar technologies, such as cookies
Cookies and similar technologies are widely used across the internet. When you use our services, we may use technology to send one or more cookies or anonymous identifiers to your device to collect and store information about your access to and use of Maxcom Tracker. We promise not to use cookies for any purpose other than those described in this policy. We primarily use cookies and similar technologies to provide the following features or services:
4.1 Ensuring the safe and efficient operation of products and services
We may set a cookie or anonymous identifier for authentication and security purposes to enable us to confirm whether you are securely logged into the Services or whether you have encountered theft, fraud, or other misconduct. These technologies also help us improve the performance of the Services, as well as login and response times.
4.2 Help you gain easier access to experience
By using such technologies, you can skip the steps and processes associated with entering personal data and search terms (e.g., searching records, filling out forms).
4.3 Recommend, showcase, or promote content or accounts that may be of interest to you
We may use cookies and similar technologies to learn about your preferences and usage habits and then perform data analysis to improve product services, recommend information or features that interest you, and optimize your advertising selection.
4.4 Clear cookies
Most browsers and mobile applications provide users with the ability to clear browser cache data. Clearing data can be done through the browser or application's settings. If you do this, you may not be able to use the services or relevant features provided by Maxcom Tracker that rely on cookies due to these changes.
- How we share, transfer, and publicly disclose personal information
5.1 Sharing
5.1.1 sharing rules
- Authorization Agreement: Sharing your personal information with our affiliates and third parties with your consent and authorization, unless the personal information shared is anonymized and the individual who shared the information with the third party cannot be re-identified. If they use the information beyond the scope of the original authorized consent, they must obtain your consent again.
- Principles of legality and minimum necessity: Data shared with affiliates and third parties must serve legitimate purposes, and the data shared must be to the extent necessary to achieve the purpose.
- Safety and precautionary rules: We will carefully assess the purpose for which affiliates and third parties use the information we share, conduct a comprehensive security assessment of them, and require them to comply with the Legal Collaboration Agreement. We will also closely monitor the security of the software tools from which partners obtain information, such as software development kits (SDKs) and application program interfaces (APIs), to protect data security.
5.1.2 Information shared about the implemented feature or service
- We will share anonymized personal data with our affiliates and third parties when you use features they provide or when software vendors, smart device providers, or system service providers partner with us to provide services to you. We will also conduct comprehensive statistics and algorithmic analysis of features and preferences to create proxy crowdsourcing profiles to recommend, display, or promote information that may be of interest to you, or specific features, services, or advertisements that are more relevant to you.
- Third-Party Account Login: When you log in to a third-party product using your Maxcom Tracker account, we share your nickname, profile picture, and other information you consent to with the third-party product you log in to.
- Location Services: When you use location-based services, we share GPS information with our location-based service provider (AutoNavi) so we can return location results to you. GPS information is sensitive personal information. Refusing to provide it will only affect the location service; other features will continue to function.
- Payment: The payment functionality is provided by a third-party payment agency that we work with. These third-party payment agencies may need to collect your name, Bank card type and card number, expiration date, and mobile phone number. Bank card number, expiration date, and mobile phone number. This is sensitive personal information. This information is required to complete the payment. Refusing to provide this information will only affect the payment functionality; other features will continue to function.
5.1.3 Advertising and Analytics Controls
- Push Advertising: We may share information with partners who entrust us with promotion and advertising, but we do not share information (name, mobile phone number) that could identify you, and we only provide them with indirect image tags and anonymized or de-identified information to help them increase the effective reach of their advertising without requiring your personal identification.
- Advertising Statistics: We may share anonymous analytics statistics that are difficult to link to your identity with service providers, suppliers and other business partners to help us analyze and measure the effectiveness of advertising and related services.
5.1.4 Information shared for security and analytics purposes
- User Security: We take the security of your accounts and services seriously. We may share necessary hardware, account, and login information with our affiliates or service providers to protect your accounts and the property of other users from unlawful infringement of your legitimate rights and interests.
- Product Usage Analysis: To analyze the use of our services and improve user experience, we may share statistical data about product usage (crashes, flashbacks) that is not easily identifiable to the user, in combination with other information, with affiliates or third parties.
5.1.5 Marketing and promotion
When you participate in relevant marketing activities organized by us and our affiliates or third parties, you may be asked to provide information such as your name, address, contact details, etc. This information is confidential to your personal information, and if you decline, your participation in the related activity may be affected, but other features will still work. Only with your consent will we share this information with the affiliate or third party to provide you with a consistent experience in the activity or to enable the third party to fulfill your reward on time.
5.2 Transfer
- We will not share your personal data with any other third parties without your express consent.
- As our business develops, we may undergo mergers, acquisitions, or asset transfers, and your personal data may be transferred. In the event of such changes, we will continue to protect your personal data in accordance with laws and regulations and with security standards no lower than those set out in this Policy; otherwise, we will require the recipient to re-obtain your authorization and consent.
5.3 Disclosure
- We won't disclose your information publicly unless we comply with local laws and regulations or obtain your consent. If we do so, we will implement industry-standard security measures.
- We will disclose relevant account information when we announce penalties for illegal accounts and fraud.
5.4 Exemption from the obligation to obtain consent for the sharing, transfer and public disclosure of personal data
Please understand that we may share, transfer and publicly disclose your personal information without your consent in the following cases, in accordance with national laws, regulations and standards:
- Directly related to national security, the country's defense security;
- Those directly related to public safety, public health and important public interests;
- Directly related to criminal investigation, prosecution, trial and execution of sentences;
- Those intended to protect your or another person's personal life, property and other important rights and interests for which it is difficult to obtain the consent of an individual;
- Personal information you disclose publicly;
- These collect personal data from legally disclosed information publicly, such as legal reports, government disclosures, and other channels.
- How we store personal data
6.1 Storage location
In accordance with laws and regulations, we store your personal information collected and generated during our domestic operations in China. Currently, we will not transfer this information internationally, and if we do so, we will comply with relevant domestic laws or obtain your consent.
6.2 Retention period
We only retain your personal data for the time necessary to provide our services: information you post, comments, likes, and related information. We retain it until you withdraw, delete, or cancel your account. After that time, we will delete or anonymize your personal data, unless otherwise required by law or regulation.
- How we protect the security of personal data
- We take the security of your personal information seriously and will strive to take reasonable security measures (both technical and administrative) to protect your personal information from misuse or unauthorized access, public disclosure, use, modification, damage, loss or disclosure of the personal information you provide.
- We will use encryption, anonymization, and other reasonable and feasible measures to protect your personal information using encryption technology no less advanced than our industry competitors, and will use security mechanisms to protect your personal information from malicious attacks.
- We will establish a professional security management system and data security processes to ensure the security of your personal data. We have a strict data use and access system to ensure that only authorized personnel have access to your personal data, and that data and technology are securely audited in a timely manner.
- Despite the reasonable and effective measures described above and the standards required by applicable legal requirements, we ask you to understand that it is impossible to ensure 100% information security at all times in the online industry, even if we do our best to strengthen security measures due to technical limitations and possible malicious means. In any case, we will make every effort to ensure the security of the personal data you provide to us.
- You understand that the communication systems and networks you use to access our services may be subject to problems due to factors beyond our control. Therefore, we strongly recommend that you take positive measures to protect the security of your personal information, including, but not limited to, using complex passwords, changing passwords periodically, and not disclosing your account password and related personal information to others.
- We develop and implement contingency plans for user information security incidents to prevent the spread of the effects and consequences of these security incidents. When a user information security incident (leak, loss) occurs, we will promptly inform you of the underlying circumstances and potential impact of the security incident, the actions we have taken or will take, the proposals you can take to mitigate the risk, and the countermeasures you can implement. We will inform you of the incident in a timely manner via push notifications, text messages, and related forms. Where individual notification is difficult, we will use reasonable and effective means to make announcements. We will also report user information security incidents in accordance with the requirements of the relevant regulatory authorities.
- Once you have left our services to browse or use other websites, services and content resources, we have no ability or direct obligation to protect any personal information you submit there, whether you log in, browse or use the software described above, or whether the website relies on links or directions from Maxcom Tracker.
- Manage your personal data
We take the management of your personal data very seriously and make every effort to protect your rights regarding personal data inquiries, access, modification, deletion, revocation of permissions, account cancellation, complaint reporting, as well as privacy features to help you protect your privacy and information security.
8.1 Self-selected personalized recommendation information
8.1 Self-control of information reception
Independently determined to receive push information: Our information recommendation features may rely on automated decision-making mechanisms, including IT systems and algorithms. While we continually refine and test the recommended system optimization program, we adopt a strict audit strategy at the audit level. In particular, to protect your autonomy in receiving information, when you are not interested in the information we push or want to limit certain information recommendations, you can click the "X" on the push information bar to block them.
8.2 Access, deletion and correction of your personal data
8.2.1 Access to personal account information
You can access your profile picture, username, profile, gender, date of birth, and region. You can also access and search for these details in the Maxcom Tracker Personal Center - Edit Profile.
8.2.2 Inquiry, access, correction, cancellation of the following account
Go to "Me>Follow" to check, access, and unfollow an account you're following on your followlist.
8.3.3 Queries and access to collections, reading records, search history
- Click "Me>Favorites" to access, query or delete;
- You can delete your reading history by clicking "System Settings" > clicking "Clear Cache".
- Click on the search bar>delete search history;
8.3.4 Removal of published content, uploaded content, comments
- Deleting posts or uploading content: Type "me" > click "Personal Page" > click "Dynamic" or "Articles" to find the appropriate post or article to delete.
- Comments: Find the appropriate location (article or post) to post comments, click the "Delete" button to delete them.
- In particular, please note that you may not be able to modify some of the initial registration information submitted during registration for security and identification reasons, such as the Number Appeal service. If you need to modify such information, please contact us using the contact details provided in this policy.
8.4 Cancel account
You can request to cancel your account through Maxcom Tracker Online Help. We will verify your personal identity, security status, device information, etc. before logging out. See the log out instructions for the log out process and details. Please understand that a cancellation request is irreversible, and if you do, we will delete or anonymize your information, unless otherwise required by law or regulation.
8.5 Complaints and reports
You can submit complaints or reports through our advertising system. If you believe your personal data rights may have been violated or you find any indications (such as that our collection of your personal data is unlawful or mutually agreed upon), you can track the Maxcom Tracker WeChat account (WeChat ID: aqsh12345) and submit the issue to customer service. We will forward your complaints and reports in a timely manner after verifying and verifying your user identity.
8.6 Access
- You can read the full text of this Policy on the registration page or by logging in to your personal account "System Settings" > "About Us".
- Please understand that our services described in this Policy may vary depending on the device you use, e.g., phone model, system version, software application version, mobile client, etc. The final products and services are based on the software you use.
8.7 Operation Stop Notification
In the event of a cessation of business, we will cease collecting your personal data within a reasonable time, notify you of the cessation by means of a single mailing or announcement, and delete or anonymize your personal data.
- Terms of Use for Minors
- If you are a minor under the age of 18, you should read and accept this Policy under the supervision and guidance of a parent or other guardian before using our services.
- We protect the personal data of minors in accordance with applicable laws and regulations and will only collect, use, store, share, transfer, or disclose the personal data of minors as permitted by law, with the express consent of their parents or other guardians, or as necessary to protect them. If we discover that a minor's personal data has been collected without prior confirmation of parental consent, we will endeavor to delete it as quickly as possible.
- If you are the legal guardian of a minor and have any questions about the personal data of the minor for whom you are responsible, please contact us using the contact details provided in the policy.
- Changes and Notices Regarding This Policy
- To provide you with better services, our services will be updated and changed from time to time. We will make timely changes to this Policy, which are incorporated into this Policy and are equivalent to this Policy, and we reserve your rights under this Policy as currently in effect without your express consent.
- If we have updated the Terms, we will post the updated version on Maxcom Tracker before the updated Terms take effect and provide you with additional notice (such as adding a statement to announcements, the home page of the Services, or sending you a notification). We encourage you to review the Policy whenever you access or use our Services or otherwise interact with us to stay informed about our information practices and ways you can help protect your privacy.
- Contact us
If you have any complaints, suggestions or questions regarding personal data protection, please contact us:
Towarowa 23a Tychy 43-100 Poland
+48 32 327 70 89
and report the issue to customer service. We will immediately forward your comment and report it after verifying your identity.
Copyright © 2020 ShenZhen Anquanshouhu Tech Co., Ltd. All rights reserved.





