Privacy Policy

Updated on: 2025/8/14

Effective date: 2025/8/15

This policy applies to products or services such as BMF Speed (hereinafter referred to as "this application")

This privacy policy section will help you understand the following:

  1. Definition and Scope of Application
  2. Explanation of self start and associated start
  3. How do we collect and use your information
  4. How do we use cookies and similar technologies
  5. How do we share, transfer, and publicly disclose users' personal information
  6. How do we protect user information security
  7. How do you manage personal information
  8. How do we handle information about minors
  9. How does your information transfer globally
  10. How to update this privacy policy
  11. How to contact us

BMF Speed (hereinafter referred to as "us") is well aware of the importance of personal information to you. We will provide sufficient protection for your personal information security in accordance with legal and regulatory requirements and in accordance with industry best practices. We are committed to maintaining your trust in us and adhering to the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of consent, the principle of minimum adequacy, and the principle of ensuring security, The principle of subject participation, the principle of openness and transparency, and so on. In view of this, we have formulated this Privacy Policy (hereinafter referred to as "this Policy/Privacy Policy") to help you fully understand how we collect, use, share, store, and protect your personal information during your use of our products/services, as well as how you manage your personal information.

Before using various products or services of this application, please carefully read and thoroughly understand this policy. After confirming full understanding and agreement, use the relevant products or services. Once you start using various products or services of this application, it means that you have fully understood and agreed to this policy. If you have any questions, opinions or suggestions regarding the content of this policy, you can contact us through the various contact information provided by this application.

Our product is developed based on DCloud uni app (5+App/Web2App), and during application operation, we need to collect your device unique identification code (device ID, IMEI/android ID/DeviceID/IDFA, device MAC address, OAID, software list, SIM card IMSI information) to provide statistical analysis services. We also improve performance and user experience through application startup data and abnormal error log analysis, providing better services for users. For more information, please visit the "DCloud User Service Terms".

1. Definition and Scope of Application

Personal information: Various types of information recorded electronically or in combination with other information that can identify the identity of a specific natural person or reflect the activities of a specific natural person, Personal information includes (name, date of birth, ID number, personal biometric information, address, communication contact information, communication records and content, account password, property information, credit information, travel trajectory, accommodation information, health and physiological information, transaction information), etc.

Personal sensitive information: Personal information that, once leaked, illegally provided, or abused, may endanger personal and property safety, and can easily cause damage to personal reputation, physical and mental health, or discriminatory treatment, Personal sensitive information includes (ID number, personal biometric information, bank account, communication records and content, property information, credit information, travel trajectory, accommodation information, health physiological information, transaction information, personal information of children under 14 years old (including), etc.).

Personal information processing: including the collection, storage, use, processing, transmission, provision, disclosure, deletion, etc. of personal information.

Personal information deletion: refers to the act of removing personal information from systems involved in implementing daily business functions, leaving it in a state that cannot be retrieved or accessed.

Data anonymization of personal information: a process in which the subject of personal information cannot be identified or associated through the technical processing of personal information, and the processed information cannot be recovered.

Deidentification of personal information: The process of processing personal information through technology, making it impossible to identify or associate with the subject of personal information without the use of additional information.

Personal information subject: The natural person identified or associated with personal information.

Personal information controller: An organization or individual with the ability to determine the purpose, method, etc. of personal information processing.

Device information: including device identifiers (IMEI, IDFA, Android ID, MAC, OAID, IMSI, and other device related information), application information (application crash information, notification switch status, application installation list, and other application related information), device parameters and system information (device type, device model, operating system, and hardware related information), The device network environment information (IP address, WiFi information, base station information, and other network related information) shall be based on the actual collection of the product.

Children: Refers to minors who have not reached their fourteenth anniversary.

2. Explanation of self start and associated start

  1. To ensure that this application can receive the installation package download broadcast information pushed by the client normally when it is closed or running in the background, this application must use the (self start) ability. There will be a certain frequency of self start or associated start behavior through system broadcast wake-up, which is necessary to achieve functions and services.
  2. In order to provide you with a better application update experience, the application has introduced network connection status monitoring (android. net. conn. CONNECTIVITY_CHANGE, android. net. wifi. STATE-CHANGE) to remind you to avoid unnecessary traffic waste when the network changes. At the same time, it is associated with self startup function (android. content. action. DOWNLOAD_NOTIFICATION_CLICKED), The purpose is to immediately remind you to install the application installation package when it is completed.
  3. Before you agree to the user agreement and privacy policy, if you click to view the user agreement and privacy policy, to prevent third-party SDKs from collecting your personal information, we will launch a system browser for you to view the user agreement and privacy policy.
  4. Our application has integrated WeChat sharing. After WeChat sharing is completed, it will return to the app to display the sharing status. We need to restart the app. The link shared by our app will open the app when it is already installed, in order to make it more convenient for you to open the app and view it
  5. Self startup permission: our app is integrated with Aurora Push. Tofacilitateuick Look of notification content, we will open the app through notification and display the corresponding content of the notification. Our application integrates WeChat Pay. After WeChat Pay is completed, it will return to the APP to display the payment status, and the APP needs to be restarted. In order to ensure that you can receive messages, messages, and other related content sent by platform users in a timely manner, we will request that you authorize the program to start automatically. The purpose of using this permission is to ensure that the app does not kill the running status of the app in the background in a timely manner after exiting the background, to ensure that you can receive messages within the application in a timely manner. If you refuse to grant the program self start permission, you will not be able to use this feature, but it will not affect your normal use of the app.

3. How do we collect and use your information

When you use our products/services, we need to collect and use your personal information, including the following two types:

  1. In order to provide you with the basic functions of our products/or services, you must authorize us to collect and use necessary information. If you refuse to provide the corresponding information, you will not be able to use our products and/or services normally;
  2. In order to provide you with additional features of our products and/or services, you may choose to separately share or disagree with the information we collect and use. If you refuse to provide, you will not be able to use the relevant additional features normally or achieve the desired functional effects, which will not affect your use of our basic functions.
  3. When providing you with local channel content or content or services related to the location of the device, with your authorization, we will use geographic location information related to this service (such as precise positioning information, WLAN access points, Bluetooth and base stations, sensor information) to ensure the quality of the content or service. Precise location information is personal sensitive information. If you refuse to grant location permission, it will affect the accuracy of the location, but it will not affect the normal use of other functions and services. We will only display content or services that may be related to you based on the city and/or county corresponding to network information (such as IP).
  4. When you use the app, you will obtain direction sensor and gyroscope device sensor information to identify whether you are a real user. When you use recording and photography related functions, you will obtain acceleration device sensor information to obtain the camera phone angle.
  5. Clipboard permission: When you may need to copy and paste text during use (such as SMS verification code, phone number, device SN, etc.), we may apply to call the clipboard copy/paste function and collect text information from your device's clipboard. The information of the clipboard will only be processed on your device, and we will not store your clipboard information for other purposes.

We would like to remind you that this information is not necessary for the operation of the business function, but it is of great significance for improving service quality, developing new products or services, etc. We will not force you to provide this information, and your refusal will not have an adverse impact on the use of this business function.

4. How do we use cookies and similar technologies

  1. Cookies
    Cookies and similar device information identification technology are commonly used technologies in the Internet. When you use our services, we may use related technologies to send one or more cookies or anonymous identifiers (hereinafter referred to as "cookies") to your device to collect, identify, and store information about your access to and use of this product. We promise not to use cookies for any other purpose other than those stated in this privacy policy, We mainly use cookies to ensure the safe and efficient operation of our products and services. They can help us confirm the security status of your account and transactions, troubleshoot related anomalies such as crashes and delays, and help you avoid repeating the steps and processes of filling out forms and entering search content.
  2. Website Beacons and Pixel Labels
    In addition to cookies, we also use similar technologies such as website beacons and pixel labels on our website. A website beacon is usually a transparent image embedded in a website or email. With the help of pixel labels in emails, we can know if emails have been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

5. How do we share, transfer, and publicly disclose users' personal information

1. Sharing

We will not share your personal information with companies, organizations, or individuals outside of our application service provider, except for the following situations:

  1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
  2. Sharing under legal circumstances: We may share your personal information with others in accordance with laws and regulations, litigation dispute resolution needs, or as required by administrative or judicial authorities in accordance with the law.
  3. Sharing with affiliated companies: In order for us to jointly provide services to you based on our affiliated account, your personal information may be shared with our affiliated companies. We will only share necessary personal information (if it is convenient for you to use our affiliated company's products or services using this application account, we will share your necessary account information with the affiliated company). If we share your personal sensitive information or if the affiliated company changes the purpose of using and processing personal information, we will seek your authorization and consent again.
  4. Sharing with authorized partners: For the purposes stated in this privacy policy only, certain of our services will be provided jointly by us and authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, arranging partners to provide services. We will only share your personal information for legitimate, legitimate, necessary, specific, and clear purposes, and only share personal information necessary for providing services. Our partners have no right to use the shared personal information for other purposes unrelated to the product or service.

Please note that the information you voluntarily share or even publicly share when using our services may involve personal information or even sensitive personal information of you or others. Please consider and make a decision with greater caution.

2. Transfer

We will not transfer your personal information to any company, organization, or individual, except for the following situations:

  1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
  2. When it comes to mergers, acquisitions, or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this personal information protection policy. Otherwise, we will require the company or organization to seek authorization from you again.

3. Public disclosure

We will publicly disclose your personal information under the following circumstances:

  1. After obtaining your explicit consent;
  2. Disclosure based on law: In cases where required by law, legal proceedings, litigation, or mandatory requirements of government authorities, we may publicly disclose your personal information.

4. Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing personal information

In the following situations, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent:

  1. Related to personal information controllers fulfilling their obligations under laws and regulations;
  2. Directly related to national security and national defense security;
  3. Directly related to public safety, public health, and major public interests;
  4. Directly related to Criminal investigation, prosecution, trial and judgment execution;
  5. For the purpose of safeguarding the significant legitimate rights and interests of personal information subjects or other individuals, such as life and property, but it is difficult to obtain my authorized consent;
  6. Personal information disclosed by the individual information subject to the public on their own;
  7. Collecting personal information from legally disclosed information centers, such as legitimate news reports, government information disclosure, and other channels.

According to legal regulations, sharing or transferring personal information that has undergone deidentification processing, and ensuring that the data recipient cannot recover and re identify the personal information subject, does not constitute external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not require separate notice to you and your consent.

6. How do we protect user information security

  1. We have used security measures that comply with De facto standard to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser and server, it is protected by SSL (Secure Socket Layer) protocol encryption (i.e. HTTPS protocol); We will use encryption technology to improve the security of personal information; We will use trusted protection mechanisms to prevent malicious attacks on personal information; We will deploy access control mechanisms to ensure that only authorized personnel can access personal information; And we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
  2. We have an industry-leading data security management system centered around the data lifecycle, which enhances the security of the entire system from multiple dimensions such as organizational construction, institutional design, personnel management, and product technology.
  3. We will take reasonable and feasible measures to ensure that unrelated personal information is not collected. We will only retain your personal information for the period required to achieve the purposes stated in this policy, unless an extension of the retention period is required or permitted by law.
  4. The Internet is not an absolutely secure environment, and we strongly recommend that you do not use communication methods other than those recommended by this application to send personal information. You can establish connections and share with each other through our services. When you create communication, trading, or sharing through our services, you can freely choose who to communicate, trade, or share with as a third party who can see your transaction content, contact information, exchange information, or share content and other related information.

If you find that your personal information, especially your account or password, has been leaked, please contact our customer service immediately so that we can take corresponding measures based on your application.

Please note that the information you voluntarily share or even publicly share when using our services may involve personal information or even sensitive information of yourself or others, such as when you choose to upload pictures containing personal information when posting updates or in public places such as group chats or circles. Please be more cautious when considering whether to share or even publicly share relevant information when using our services.

Please use complex passwords to assist us in ensuring the security of your account. We will do our best to ensure the security of any information you send us. At the same time, we will also report the handling of personal information security incidents in accordance with regulatory requirements.

7. How do you manage personal information

You can access and manage your information through the following methods, and we will respond to your request in compliance with legal and regulatory requirements:

1. Access your personal information

You have the right to access your personal information, except for exceptions specified by laws and regulations. You can access your personal information through the following methods:

Personal Information - If you wish to access or edit other information such as birth date, occupation, interests, and phone numbers in your personal information, you can do so by logging in to your account through "My" - "Settings".

Authorized use - You can log in to your account by clicking on the "Settings" icon in the upper right corner, clicking on "avatar" - "Settings", and turning off or enabling authorization in the authorization options.

2. Correct or supplement your personal information

When you discover that there are errors in the personal information we process about you, you have the right to request us to make corrections or supplements. You can apply for correction or supplementation through the methods listed in "(1) Access to your personal information" in this article.

3. Delete your personal information

You can delete some of your personal information through the methods listed in "(1) Accessing Your Personal Information" in this article.

In the following situations, you can request us to delete personal information through customer service:

  1. If our handling of personal information violates laws and regulations;
  2. If we collect and use your personal information without your explicit consent;
  3. If our handling of personal information seriously violates our agreement with you;
  4. If you no longer use our products or services, or if you cancel your account;
  5. If we are no longer providing you with products or services.

4. Change the scope of your authorization and consent

Each business can require some basic personal information to be completed (see "Article 1" of this privacy policy). In addition, for the collection and use of additional personal information, you can contact the customer service of this application to apply for or revoke your authorization consent.

Please note that for some types of personal information, we may not be able to respond to your request to change the scope of authorization if it is necessary for us to truthfully realize the basic functions of this application or fulfill our obligations under laws and regulations. After you revoke your authorization, we will no longer process the corresponding personal information, but your decision to revoke your authorization will not affect the personal information processing we conducted based on your authorization.

5. Constrained Information System Automatic Decision Making

In certain business functions, we may only make decisions based on non manual automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you can contact us through customer service.

6. Respond to your above request

To ensure security, you may need to provide a written request or otherwise prove your identity. We may require you to verify your identity before processing your request.

We will provide a response within 30 days. If you are not satisfied, you can also initiate a complaint through customer service on this application.

We do not charge any fees for your reasonable requests in principle, but for requests that are repeated multiple times and exceed reasonable limits, we will charge a certain cost according to the situation. We may refuse requests that are unfounded, require excessive technical means (such as developing new systems or fundamentally changing existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical (such as involving information stored on backup tapes).

7. Account cancellation

We will keep the data on your account for 180 days. If you do not wish to continue using our product, you can submit a cancellation application to us through My Settings Account Cancellation.

After you voluntarily cancel your account, we will stop providing you with products or services, and delete or Data anonymization your personal information according to the requirements of applicable laws, except for those required to be retained by laws and regulations.

If you are unable to access this personal information through the above path, you can contact us at any time through our application customer service. We will reply to your visit request within 15 days.

For any other personal information generated by you during the use of our products or services, we will provide it to you in accordance with the relevant arrangements in "(7) Responding to your above request" of this clause.

8. How do we handle information about minors

In digital office/learning, communication, and collaborative activities, we presume that you have corresponding civil capacity. If you are a minor, we request that you ask your parents or other guardians to carefully read this policy and use our services or provide us with information without obtaining the consent of your parents or other guardians.

If you are a child under the age of 14, before using our services, you and your guardian should carefully read the content of this privacy policy to ensure that you can only use our services under the guidance of your guardian with the consent of your guardian, ensuring your safety when using our services and conducting transactions.

If you are a parent or other guardian of a child, please pay attention to whether the child used our services after obtaining your authorized consent. If you have any questions about the child's personal information, please contact our personal information protection department.

For the collection of personal information of minors using our products or services with the consent of our parents or guardians, we will only use, share, transfer or disclose this information when permitted by laws and regulations, explicitly agreed by our parents or guardians, or necessary to protect minors.

9. How does your information transfer globally

Personal information collected and generated during our operations in the China is stored in China, except for the following circumstances:

  1. There are clear provisions in laws and regulations;
  2. Obtain your explicit authorization;
  3. You engage in personal proactive activities such as cross-border live streaming/publishing updates through the internet.

In response to the above situations, we will ensure that your personal information is adequately protected in accordance with this privacy policy.

10. How to update this privacy policy

To provide you with a better product and service experience, we continuously strive to improve our products, services, and technologies. When new services and business processes change, we may update our privacy policy to inform you of your rights under this policy.

Without your explicit consent, we will not reduce your rights under this personal information protection policy. We will post any changes made to this policy on this page.

For significant changes, we will also provide more significant notifications (including for certain services, we will send notifications via email explaining specific changes to personal information protection policies).

The significant changes referred to in this policy include but are not limited to:

  1. Our service model has undergone significant changes. For example, the purpose of processing personal information, the type of personal information processed, and the way personal information is used;
  2. We have undergone significant changes in ownership structure, organizational structure, and other aspects. Changes in ownership caused by business adjustments, bankruptcy mergers and acquisitions, etc;
  3. Changes in the main objects of personal information sharing, transfer, or public disclosure;
  4. Your right to participate in personal information processing and the way you exercise it have undergone significant changes;
  5. When there are changes in the responsible department, contact information, and complaint channels for handling personal information security;
  6. When the personal information security impact assessment report indicates the existence of high risks;

We will also archive the old version of this policy on the dedicated page of this application for your reference.

11. How to contact us

You can contact us through the following methods, and we will respond to your request within 15 days:

  1. If you have any questions, opinions or suggestions regarding the content of this policy, you can contact us through the mini program customer service and the APP's "My" - "Contact Customer Service";
  2. If you find that personal information may be leaked, you can report it through feedback on this application;

Email: speedbf@163.com