Privacy Policy

Welcome to the AiDEX app!

The AiDEX app (hereinafter referred to as "we" or "the software") is used to read, analyze and evaluate the glucose readings of the Continuous Glucose Monitoring System and form reports. We may collect and use your personal information during your use of our account, website, mobile applications, or other products and services. Personal information refers to various information recorded in digital or other forms that can identify the identity of natural persons alone or in combination with other information.

We will explain to you the purpose, method, and scope of the software's collection and use of your personal information, your rights to your personal information, and the protection measures we take to protect information security through the Personal Information Protection Policy (Privacy Policy). Before using the software, please read this policy carefully to understand our measures to protect users’ personal information. If you do not agree to the terms of this policy, we will not be able to provide you with related services. If you enable the software, it means that you fully and clearly understand the following information collection and use behaviors and your rights, etc.

This Policy will help you understand the following:

1.How we collect and use your personal information;

2.How we keep your personal information;

3.How we disclose your personal information;

4.How we protect your personal information;

5.Your rights to your personal information;

6.Third-party service providers and their services;

7.Changes to our privacy policy;

8.Contact;

1.How we collect and use your personal information

We collect personal information in order to operate more efficiently and provide you with the best user experience. The channels through which we collect personal information include:

(1) You provide information directly to us;

(2) Relevant information collected by us during your use of the software;

(3) Collect personal information from a third party.

The information we collect depends on the products you actually use, the context in which you interact with us, the choices you make, which includes your privacy settings, and the products and features you use. It’s optional to provide us with personal information when we collect it. For core functions, if you choose not to provide your information, we may not be able to provide services for you and respond to or solve your problems. For non-core functions, if you refuse to provide personal information, the relevant functions may not be available, but it will not affect your use of our core functions.

Account Registration & Login:

(1) You need to register and log in to your account to use the software. During the registration process, you need to read and agree to the Terms of Service and Privacy Policy. Your Email address, password, and verification code are collected in order to register an account for you to log in and use related services.

(2) When you use the software, it’s optional to provide your avatar, nickname, real name, gender, date of birth, height, weight, and other basic information. We collect the above information in order to combine personal conditions and blood glucose monitoring data to give you better health advice. When you pair for the first time or manage your paired device (CGMS transmitter) on the software, we need to collect the information of your device such as SN number, Bluetooth MAC address, etc., and we also need to collect the information of your mobile terminal device used to install the software. We collect the above information in order to complete the pairing of the device with the software and bind the account and device information, etc.

(3) If you bind the device and synchronize your data to the software for viewing, we will obtain the continuous blood glucose monitoring data.

(4) When providing after-sales service and customer support to you, we may ask you to provide your personal information, including device information, your name, mobile phone number, email address, address, log records, etc., and your call with our customer service may be recorded. We use data to analyze and diagnose product problems, repair users equipment, and provide other customer care and support services.

(5) At the same time, in order to fulfill the obligations of network security protection, to ensure the function of the software and the security of your account, and to improve and optimize your service experience, we will collect your terminal device information during your use of the software, including terminal name, terminal model, IMEI number, mobile phone model, Mac address, serial number, IP address, operating system version, and other device information, as well as your activities after logging in to your account, the time and duration of using the software, and software events information and other log records. We collect the above information to verify your identity and analyze the efficiency of service operations.

(6) We will use your personal information in strict compliance with the purposes described in this policy, and your personal information will only be used for the purposes identified, described, and authorized by you at the time of collection. If we want to use the information for other purposes not specified in this policy, we will ask for your consent in advance. If we want to use the information collected for a specific purpose for other purposes, we will ask for your consent in advance. We will not provide users personal information and behavioral data to third parties to use without the usersconsent.

Allow terminal device permissions:

(1) When you use the software, we may ask you to allow some of your device permissions in order to provide you with corresponding functions or services. Specifically, we may need you to allow the following device permissions:

 

 

Permissions

Corresponding functions/services

Purpose

Ask if permission is allowed

Optional for users

Effects of closing/denying permission

Camera

Scan QR code

Scan the QR code to bind the transmitter

Yes

Yes

It may cause that the transmitter cannot be bound by scanning the QR code with the camera; however, you can still bind it by manually entering the SN number.

Location

To enable Bluetooth on Android phones, you need to allow the terminal device’s positioning permission

Turn on the Bluetooth function

Yes

Yes

It may cause the Bluetooth function not able to be turned on; however, you can still turn it on manually.

 

(2) After the permission is allowed, you can enter the system [Settings] at any time to turn off the corresponding permission. After the permission is turned off, the corresponding function may not be able to be used normally.

We promise not to enable device permissions in scenarios that you do not authorize or use personal information collected by enabling device permissions for scenarios that you do not authorize.

Those authorized by you are exceptions:

You are fully aware that, in accordance with applicable laws, in the following situations, we do not need to ask for your authorization in advance to share, transfer and disclose your personal information:

(1) Related to our fulfillment of obligations stipulated by laws and regulations;

(2) Related directly to national security and national defense security;

(3) Related directly to public safety, public health, and major public interests;

(4) Related directly to a criminal investigation, prosecution, trial, and execution of judgments;

(5) When it is for the protection of your or other person’s lives, property, and other major legal rights and interests, but difficult to get your authorization;

(6) The personal information involved has been disclosed to the public by you;

(7) Necessary for the conclusion and performance of the contract between you and us;

(8) Your personal information is collected from legal and public sources, such as legal news reports, government information disclosure, and other channels;

(9) Necessary for maintaining healthy, safe, and stable operation, such as discovering and disposing of product or service failures;

(10) Necessary for news units to carry out legal news reports;

(11) For academic research institutions, it is necessary to carry out statistical or academic research in the public interest, and when the results of academic research or description are provided to the public, the personal information contained in the results is de-identified.

2.How we keep your personal information

The retention period of the personal information we collect is the shortest time required to achieve the purpose of collection as stated in this personal information protection policy unless otherwise provided by laws and regulations. At the end of any retention period or when the information deletion conditions are met, we will completely delete or anonymize personal information.

When we stop operating some or all of our products or services due to particular reasons, we will promptly inform you and stop the collection and processing of personal information for the relevant products or services, and at the same time, the personal information that we keep related to our products and services will be deleted or anonymized, unless otherwise provided by laws and regulations.

3.How we disclose your personal information

We will only publicly disclose your personal information in the following circumstances:

1. After obtaining your explicit consent, or when the disclosure is based on law: in the case of mandatory compliance with subpoenaing or other legal procedures, lawsuits, or mandatory requirements of government authorities, if we sincerely believe that disclosure is necessary for protecting our rights and your or others’ safety, investigating fraud and responding to government requests, we may disclose your personal information.

2. Authorization to share, transfer or publicly disclose personal information is an exception.

You are fully aware that, in accordance with applicable laws, in the following situations, we do not need your authorization to collect and use your personal information:

(1) Related to our fulfillment of obligations stipulated by laws and regulations;

(2) Related directly to national security and national defense security;

(3) Related directly to public safety, public health, and major public interests;

(4) Related directly to a criminal investigation, prosecution, trial, and execution of judgments;

(5) When it is for the protection of your or other person’s lives, property, and other major legal rights and interests, but difficult to get your authorization;

(6) The personal information involved has been disclosed to the public by you;

(7) Your personal information is collected from legal and public sources, such as legal news reports, government information disclosure, and other channels.

4.How we protect your personal information

We take reasonably practicable technical security and organizational measures to protect the collected information related to our services. We have taken industry-standard measures for security safeguards to protect the personal information you provide from unauthorized access, public disclosure, use, modification, damage, or loss. We will take all reasonably practicable measures to protect your personal information, including:

(1) We encrypt many services using mainstream security technologies such as SSL. We regularly review information collection, storage, and processing measures (including physical security measures) to prevent unauthorized access or tampering with various systems.

(2) We strictly control the access to personal information and only allow our employees who need to know the information in order to help us process personal information, and the personnel of service companies authorized to process personal information to access personal information, and they need to perform strict contractual confidentiality obligations and failure to follow these obligations may result in legal liability being investigated or termination of their relationship with us. Access logs of personal data will be recorded and regularly audited.

(3) The security of your information is very important to us. Therefore, we will continue to strive to ensure the security of your personal information, and implement safeguards such as full security encryption for the storage and transmission process, so as to prevent your information from being accessed, used, or disclosed without authorization. At the same time, the certain content of some encrypted data, except the user himself, no one else has the right to access.

(4) When we transmit and store your special types of personal information, we will adopt security measures such as encryption; when storing personal biometric information, we will use technical measures to process it before storing it.

(5) We will strictly screen business partners and service providers, and implement personal information protection requirements into business contracts or audits, assessments, and other activities of both parties.

(6) We will hold security and privacy protection training courses, testing, and publicity activities to enhance employees' awareness of the importance of protecting personal information.

(7) The internet environment is not 100% secure and we will do our best to ensure the security of any information you send us. Even if we make great efforts and take all reasonable and necessary measures, it may still be possible that your user information is illegally accessed, stolen, tampered with, or destroyed, resulting in damage to your legitimate rights and interests. Please understand the above risks of the information network and take it voluntarily.

(8) In the event of an unfortunate user information security breach incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the treatment measures we have taken or will take, recommendations for you to prevent and reduce risk by yourself, and remedies for you, etc. We will promptly notify you of the relevant information of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the subjects of user information one by one, we will publish announcements in a reasonable and effective way. At the same time, we will also actively report the handling of user information security incidents in accordance with the requirements of regulatory authorities.

5.Your rights to your personal information

We respect your rights to your personal information, and below is how we will protect your rights.

1. The right to be informed

By publishing this personal information protection policy and in accordance with the requirements of laws and regulations, we will inform you of how we will handle your personal information through specific announcements, text messages, or email. We are committed to ensuring transparency in the use of your information. You can regularly check this policy, receive emails and text messages about the update of the policy, contact us through the methods shown in this policy, and other means to learn about the collection and use of your personal information.

2. The right of access

You can directly search or access your personal information in our product or service interface, including that you can log in to your account at any time through the product page to access personal information related to your account.

If you are unable to search or access your personal information by yourself or encounter any problems in exercising your data access rights, you can contact us through the methods shown in this policy and request access to your personal information.

3. The right to rectification

You have the right to ask us to correct or supplement your personal information we process when you find that it is inaccurate or incomplete.

For some of your personal information, you can correct your profile information through "Home - Personal Center - Profile".

For personal information that has not yet provided you with a channel for self-correction, your decision to contact us and request to correct or supplement your personal information through the methods shown in this policy will not affect the previously initiated right to complaint based on your authorization.

4. The right to erasure

If you use the “delete account function in the software (in the “Personal Center - Others page, click delete account), you can delete your personal information completely in real time. For some of your personal information, you can delete it directly on the page related to the functions of the product or service. Specifically: For personal information that has not yet been provided you with a self-deletion channel or your personal information that we have collected and used in violation of our agreement with you, you can contact us through the methods shown in this policy and ask us to delete your personal information.

5. Respond to your above request

You have the right to contact us through the means shown in this policy and make a complaint. We will respond within 30 workdays after receiving your complaint.

Please note that for security reasons, we may verify your identity before processing your request. For your reasonable request, we do not charge any fees in principle. However, for repeated requests that exceed reasonable limits, we will charge certain fees as appropriate. For requests that are unreasonably repetitive, require excessive technical means (for example, require the development of new systems or fundamentally change the existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical, we may reject your requests and tell you the specific reasons for it. In addition, if your request involves matters directly related to public interests, such as national security, national defense security, public health, criminal investigation, etc., or may cause serious damage to the legitimate rights and interests of yourself or other individuals or organizations, we may not be able to respond to your request.

6.Third-party service providers and their services

Our websites, products, applications, and services may contain links to third-party websites, products, and services. You can choose whether to access or accept websites, products, and services provided by third parties.

Before submitting personal information to third parties, please carefully read and agree to the privacy policies of these third parties. This personal information protection policy does not apply to third-party services.

 

SDK name

Purpose

Huawei SDK

The mainly used is the scan framework in the Huawei joint operation service, which is convenient for users to scan quickly, and does not involve the collection of users’ private data.

Tencent SDK

Mainly to collect application crash logs to facilitate program optimization, and does not involve the collection of users’ private data.

Getui push notification SDK

The following information is mainly collected to provide you with push notifications services. For details, please visit the Getui User Privacy Policy:

https://legal.igexin.com/privacy_en.html

(1) Mobile equipment information: The equipment identity, platform, and manufacturer information are used to generate a unique push notifications target ID (CID) and equipment ID (GID) to ensure the accurate delivery of the push notifications and the accurate identification of equipment. Mobile equipment brand, model and system version are used to optimize the effectiveness of channel resources and improve the delivery rate and stability of push notifications. In addition, to ensure the uniqueness of the CID and improve the stability and accuracy of push notifications, you are also required to allow the storage permission (WRITE_EXTERNAL_STORAGE) and equipment permission (READ_PHONE_STATE).

(2) Application list information: We use link combination technology for push services. When equipment has multiple app push links active at the same time, we will randomly combine ours with one link to save battery power and data traffic for users. Therefore, it is necessary to obtain the application list information; at the same time, we provide the smart push service, which can recommend push content that is more in line with the needs of the users and reduce the interruption of useless push content. You can choose to enable or disable this service, but turning off this service will result in increased battery and data traffic consumption.

(3) Network information and location information: to maintain the stability of the network connection to the greatest extent and establish a long link, we need to know the network status and changes of the equipment, so as to achieve a stable and continuous push service. We provide situational push functions, and location information will help us provide you with refined pushes for real life scenarios, recommend push content that better suits the users’ needs, and reduce the interruption of useless push content to the users.

To ensure the stable running and functioning of the push service, so that you can use and enjoy more functions and services, the service will integrate software development kits (SDK) and application programming interfaces (API) provided by partners. We will conduct strict security checks on the software development kits (SDK) and application programming interfaces (API) that can obtain your information, and agree strict data protection measures with partners to make them comply with this policy and any other relevant confidentiality and security measures to handle personal information. The details of the partner are as follows, we recommend that you read the relevant privacy policies:

SDK name: Zhuoxin ID

Involved information: weak equipment features (features that do not have uniqueness and stability): equipment information (manufacturer, model, system information), equipment network information (networking mode and status information), equipment environment information (screen brightness, battery status and located country), equipment application information (installation information such as the version of common applications on the equipment)

Purpose of use: to provide equipment identity and security risk control services

Main partner: China Academy of Information and Communications

Collection method: SDK collection

Partner official website link: https://zxid.caict.ac.cn

Partner Privacy Policy Link: https://zxid.caict.ac.cn/privacy

 

7.Changes to our privacy policy

We reserve the right to update or modify this privacy policy from time to time. We will send you notifications of changes to our policy through various channels. For major changes to the policy, we will send you push notifications through the software.

This policy is subject to adjustment, but without your express consent, we will not weaken your rights in accordance with this policy.

If you do not agree to the above personal information protection policy, we will not be able to collect and use the information necessary to provide services, so that we will not be able to provide services to you normally.

The policy will take effect from the date of update (October 13, 2021).

8.Contact

If you have any questions or concerns about our personal information protection policies or practices, please contact us at:

Company Name: MicroTech Medical (Hangzhou) Co., Ltd.

Address: No.108 Liuze St., Cangqian, Yuhang District, Hangzhou, 311121 Zhejiang, P.R.China

Company Email: bd@microtechmd.com

Official Website: http://www.microtechmd.com

If you have any questions or concerns about our privacy policy or the processing of personal data, and you need to delete your data or have a complaint related to privacy, you can contact us to exercise your rights regarding your data privacy.