Private Communication

Ausounds (we) is very important for personal information protection. At the time of delivery of the goods, we can collect and use mutual information, and we can collect and use the original information. We hope to explain to you how we collect, use and store this information when you use our products and services through the "Privacy Terms" ("This Terms").Please be sure to fully understand the contents of these Terms before using our products and services.

When we want to use your personal information for other purposes not specified in these Terms, or when the information collected for a specific purpose is used for other purposes, we will ask for your consent in advance through your initiative to check the box. When we want to use your personal information for other purposes not specified in these Terms, or when the information collected for a specific purpose is used for other purposes, we will ask for your consent in advance through your initiative to check the box. Please note that all personal information you provide when using our products and services will be deemed to be your continued authorization for us to use while you are using our products and services, unless you delete it or refuse our collection through system settings.When you cancel your account, we will stop using and delete your personal information.

 

1.Personal information we collect

Personal information under this clause refers to various information recorded electronically or by other means that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information. During your use of AU Streams products and services, we may collect and use the following relevant information about you:

1) When you provide user feedback, upgrade the headset firmware, or connect a connected device, apply for storage permissions from the user through a pop-up window so that the user can better submit feedback using the photo album,and save downloaded headset upgrade files to upgrade or connect connected devices faster.

2) When you bind an AU Streams Bluetooth device, we will collect your device model, device unique identifier, device MAC address, etc. to provide the function of binding an AU Streams Bluetooth device.

3) When you scan an AU Streams product, we use your device's location permissions to obtain your approximate location. And with your permission, we may use your device's cellular network, wireless network, global positioning system (GPS) and/or Bluetooth information to determine your location and scan surrounding Bluetooth device information so that we can better update your location. Quickly connect to the AU Streams app.

4) When you use the local song function, we will collect your iTunes downloaded list or locally stored music files to provide the local song playback function.

5) When you use the voice assistant function, we will collect the voice information you input using the microphone. If you need to use the voice assistant to make calls, we will also collect your address book information. The purpose of collection is to identify the information you input to provide corresponding services. If you refuse to provide this information, you will not be able to use the above functions, but it will not affect your normal use of other AU Streams services.

6) When you use user feedback and choose to submit photos, we will apply for permission to use the camera to take pictures with the camera, and collect the pictures you upload or take to record the feedback information and opinions you provide.

7) When you use a third-party service (such as Mimi), the third party will need to provide an email address and choose a password when registering to save personalized settings and use this service to collect user interactions and behaviors to obtain the best user experience. And get timely feedback when improvements are made. You will need to do this each time you log out of the Service or reset your account. If you encounter special circumstances when using third-party services, you need to apply for recording permission to collect error information for analysis in order to provide more accurate services.

8) After the AU Streams application is launched, when it detects a new version or starts detecting version updates within the application, it will read the list of installed applications on the user's device and allow the user to select the corresponding application market to update the application.

9) When you perform version detection, access firmware upgrades, submit user feedback, and access the help list on the AU Streams application, you will need to use a third-party SDK. We will not collect your IP information.

10) In order to distinguish your device, ensure uniqueness, improve service security, and ensure operation quality, we will collect your device information (including IMEI, IMSI, Android ID, GUID, MAC address), application information you installed or running Process information.

 

2. Information sharing and exceptions

Generally, we will not share or disclose your personal information with any company, organization or individual other than our affiliates, except in the following circumstances:

1) Obtain your explicit consent or authorization in advance;

2) Provided in accordance with applicable laws and regulations, legal process requirements, mandatory administrative or judicial requirements;

3) To the extent permitted by laws and regulations, it is necessary to protect the interests, property or safety of our affiliates or partners, you or other AU Streams users or the public from damage;

4) Only by sharing your information can we realize the core functions of our products and services or provide the services you need;

5) Handle disputes or controversies between you and others according to your needs;

6) Provided in compliance with relevant agreements or other legal documents signed with you;

7) Use based on social and public interests that comply with laws and regulations.

 

3. How to protect your personal information

1) We attach great importance to the security of personal information and take all reasonable and feasible data security technical measures to protect the security of your personal information. We will establish an information security system in strict accordance with the relevant requirements of laws and regulations, and take technical measures and other necessary measures to protect the security of your personal information.

2) For example: use encryption technology to ensure the confidentiality of data; use trusted protection mechanisms to prevent data from malicious attacks; authorize relevant access; regularly carry out special inspections of data security and other security protection and detection measures;provide data security awareness and security capability training to employees to enhance their understanding of the importance of protecting personal information.

3) We will try our best to ensure or guarantee the security of any information you send to us to prevent our physical, technical, or administrative protection facilities from being damaged, which may lead to unauthorized access, public disclosure, tampering, or destruction of your personal information. However, due to technical limitations and various possible malicious means, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% information security. If an information security incident unfortunately occurs, we will promptly inform you of the basic situation and possible impact of the security incident as well as the handling measures we have taken or will take in accordance with the requirements of laws and regulations. At the same time, we will also proactively report the handling of information security incidents in accordance with the requirements of regulatory authorities.

4) If you have any questions about our personal information protection, you can contact us according to the contact information in Article 7 of these Terms. If you find that your account, password or other personal information is abnormal or leaked, please contact us immediately so that we can take appropriate measures in a timely manner to protect the security of your information.

 

4. Third Party Providers and Their Services

To ensure a smooth experience, you may receive content from AU Streams partners (hereinafter referred to as "third parties"). AU Streams has no control over such third parties. You can choose whether to access links, content, products and services provided by third parties. AU Streams has no control over the privacy and data protection policies of third parties and such third parties are not bound by these Terms. Before submitting personal information to third parties, please refer to the privacy policies of those third parties.

 

5. Minors using our services

For minors (determined according to the laws of the user’s country of nationality) to use our products and services, we recommend that the minor’s parents or other guardians read this terms, and recommend that the minor seek the advice of his or her parents or guardians before submitting personal information. Consent and guidance.

 

6. Effectiveness and changes

This Terms will take effect on January 1, 2024. Your use of our products and services is deemed to have accepted the contents of this Terms. We may revise the content of these Terms from time to time, and such revisions shall form part of these Terms. If such revisions result in a substantial reduction of your rights under these Terms, we will notify you by prominently displaying the revised content on our homepage before the revisions take effect. In this case, if you continue to use our services, you agree to be bound by the revised terms.

 

7. contact us

Developer information of this application: Shenzhen Ausounds Intelligent Co., Ltd. When you have other complaints, suggestions, issues related to the protection of minors’ personal information or need to delete all access records, you can call +86-18698070064, Shenzhen Ausounds Intelligent Co., Ltd. will review the issues involved as soon as possible and respond within thirty days after verifying your user identity.