Last updated: July 19, 1019
At Honor Expedition Technology Limited (“Honor”,“we”, “us”, “our”), we regularly collect and use information that could identify an individual (“personal data”), in particular about your use of our products, services and software applications (“you”, “your”). The protection of your personal data is very important to us, and we understand our responsibilities to handle your personal data with care, to keep it secure and to comply with legal requirements.
Please read this Policy carefully. This Policy is not intended to override the terms of any contract that you have with you or any rights you might have available under applicable data protection laws.
We may make changes to this Policy from time to time for example, to keep it up to date or to comply with legal requirements or changes in the way we operate our business. We encourage you to regularly check and review this policy so that you will always know what information we collect, how we use it, and who we share it with.
We may collect your personal data as follows while we are providing services. These data is critical for us to realize various functions of this Product. We will use these data to help us develop and improve our products to provide better services. We will use your personal data in strict compliance with the purposes set forth in this Policy. We will inform you in advance and obtain your consent before we use these data for any other purposes than set forth in this Policy or we use the personal data collected for specific purposes for other purposes.
This Product is a full functionality security product with rich content and services. We will collect different categories of your personal data in different scenarios according to various product features, and will use these data to realize such product features.
In order to strictly comply with the laws and policies of the relevant countries or regions, we need to use pre-activation services to know your country or region. During pre-activation, we will send your IP address, country code (MCC), mobile phone language, system version and other information to our server. This information is only used to know your country or region, thus providing you with agreements and services that comply with that country or region. This information will be deleted within a short period of time after knowing your country or region, and will not be permanently saved.
In order to provide a safe mobile usage environment, we build the Anti-Virus system through Quick Scan, Full Scan , Real Time Protect, False Positives Mark, Virus Database Updates and Virus Sample functions; When you start Quick Scan, Full Scan and enable Real Time Protect, we’ll read and collect information of applications you installed both in phone and SD card and file information or file storage information of installed applications. Then we can kill virus with our cloud antivirus engine and local antivirus engine.
In order to modify malicious application information marked with no false positives, we’ll read and collect information including application information, application file information you installed both in phone and SD card and virus information as well as input content , and upload them to the server.
In order to build up virus database, we’ll collect virus database sample file information and upload it to the server.
In order to upgrade the virus database manually or automatically for latest virus killing, we’ll read your WIFI status and current virus database information and then compare different versions.
We’ll read the application information、file storage information、application cache and multimedia file information installed both in your mobile and SD card, to help you clear junk files including system cache, ads unload residue, empty folders, useless installation packages, temporary files, other files, pictures, audios and videos etc. In this way, we can clear junk files and release more space by scanning and cleaning. Further more, if deeper cleaning is needed, we can also provide you better cleaning effect with auxiliary functions. We’ll also collect the application list and SD card catalog information in your mobile and SD card in the meanwhile for a continues optimized scanning speed and cleaning effect.
In order to close background process for space release and mobile efficiency enhancement, we’ll read the application information, file storage information, application cache and multimedia file information installed both in your mobile and SD card when you start Memory Boost function, and release more memory space by scanning and shutting down apps. Again, we can also provide you better boost effect with auxiliary function if you try our Super Mobile Booster. We’ll also collect the application list and SD card catalog information in your mobile and SD card in the meanwhile for a continues optimized scanning speed and boost effect.
In order to provide you with security related information, we’ll read your country and language data to show you relevant security information in your area.
1.1.6. Service quality measurement
In order to measure the quality of service of a product and thus provide you with better services experience and other new services, we will collect the following information during your use of the service, and the information obtained will only be used for this purpose.
Activation information: application information including application package name, application version, and application installation time; system information such as Android ID, country code, system language, system version, system time zone, and Google service version; screen resolution, mobile phone brand, mobile phone model, etc.; Network card information and other devices information; network types, operators and other network information.
Usage information: application information including application package name, application version, and application installation time; system information such as country code, system language, and system time zone; screen resolution and other device information.
In order to provide you with a stable service, we will collect the following related information for locating, analyzing ,and improving problems in the event of product. And the information is only used for this purpose.
Crash information: When our product crashes, you can choose whether to upload crash information. Then we will get the uploaded crash information, including application name, application version, application installation time, application signature and other application information; country code, system language, system time zone, memory information and other system information; screen resolution, mobile phone brand, horizontal screens, vertical screens and other information; crash process name, crash time, system non-sensitive log at crash, and crash log of this application.
Feedback: If you have any questions or suggestions about this policy, you can give us feedback through the product’s feedback function. We will get your feedback, including email address, feedback content, mobile phone brand, mobile phone model, system version and other information.
To prevent fraud and cheating, in order to ensure the normal operation of our business that provide you with better services and ecological environment, we need to obtain some necessary data, including: application package name, application version, application installation time, application signature and other applications Information; Android ID, country code, startup time, system time, memory information, system version, power, volume information, Bluetooth information, SIM card status and identification information, storage information and other system information; screen resolution, mobile brand, mobile phone Type, sensor information, camera information, CPU information, GPU information and other device information; location information, headset pluggable information, application installation and use information, screen unlocking information, Wi-Fi list information, network information and other user use information. The information obtained is used only for this purpose and is stored on the server as a pseudonym.
You can check if such permissions are allowed or not for our product and service, which can be done by checking “Settings – Apps” and / or “Settings – Permissions” in your device, and thereby decide whether each permission will continue to be allowed or will be denied. The specific way to review the status of such permissions and deny them may vary in different devices, and please refer to the notes or instructions provided by relevant device OEMs and OS developers.
Please note that allowing these permissions will be deemed as your consent to allow us collect and use relevant information to realize relevant functions; when you deny or disable the permissions in whole or in part, it means you have refused to provide related information to us, therefore also making us unable to provide you those functions relevant to such permissions. To the extent allowed by applicable laws, your decision to deny a certain permission on your device does not affect or invalidate our previous handling of your relevant information which has been based on your prior consent to allow such permission.
Read phone status and identity
This permission is used to acquire a unique ID of each device, and we will then apply a non-invertible encryption on the data. It does not include any personal identity information.
Read the contents of USB storage
Used in our junk files cleaning feature to scan junk from device’s hard drive.
Modify or delete the contents of USB storage
Used in our junk files cleaning feature to remove junk from device’s hard drive.
Find accounts on the device
Used to check if user has logged in to Google Play, and provide the corresponding installation and download services.
Read Google service configuration
Used to retrieve anonymous advertising ID so as to provide high-accuracy advertising recommendation service.
Full network access.
Used to achieve network-based services, e.g. performing version update notification. GPRS traffic may be needed.
Check network connections
Used in our smart settings and quick access function to check network connections.
Modify network connectivity
Used in our smart settings and quick access function in notification bar to turn on/off cellular data.
Check Wi-Fi connections
Used in our smart settings and quick access function to check Wi-Fi connection.
Access Bluetooth settings
Used in our smart settings, turning on/off Bluetooth connection.
Close other apps
Used to close apps running in background with 1-Tap Acceleration and File Magic.
Retrieve running apps
Used to check running apps with 1-Tap Acceleration and File Magic.
Run at startup
Used to wake cleaning and app lock services at device startup.
Draw over other apps
Used to provide floating window feature as well as displaying windows over other apps when using memory boost feature.
Read sync settings
Used to provide battery saver feature, checking sync status to save power; Used to support app lock feature, to retrieve forgotten password through email.
Toggle sync on and off
Used to support battery saver feature to toggle on/off sync.
Used to create shortcuts on other launcher’s home that users may continue to use File Magic services。
Measure app storage space
Used in our apps management feature, retrieving the amount of storage used by other apps.
Remove app shortcuts on other launchers.
Receive data from Internet
Allows programs to receive data from internet in order to provide immediate content updates.
Read, modify or delete contents on SD card
Allows apps to read and modify contents in SD card as user instructions.
Read or modify system settings
Used to support battery saver feature to control and adjust vibration, screen rotation and screen brightness, and we may use this permission to read device’s default input method.
Use of system-level dialog
Used for confirmation process in feature settings.
Retrieve recently used applications
When providing app lock feature, this permission is needed to monitor the app that is currently displayed on the platform.
Delete system’s cache
Used to provide junk files cleaning feature with removing system’s cache data.
Information Automatically Collected Through the Service.
We automatically collect information about you when you use the Service. If you access the Service through a mobile device, we may be able to identify the general location of your mobile device. We will collect information including, but not limited to: your mobile device’s brand, model, operating system, resolution, screen size, system version, Bluetooth settings, internet connection, RAM, history, the apps(including application details) you have installed, the apps you have running in the background, mobile device’s Android Advertising ID, along with your account activation time, content displayed to you and whether you clicked on it, advertisements displayed to you and whether you clicked on them, URLs you have visited, notifications that have appeared on your mobile device, your IP address, your mobile country code, and your identity. We will also request access to your photos, media and files, your device’s camera and microphone, your Wi-Fi connection information and your device ID and call information. You may be able to limit the amount of information collected from your device (phone, or tablet) with us by adjusting your mobile device’s settings. We may upload the above stated information to our own server for the purpose of making sure that our app’s functionalities can run as expected, like anti-virus and cache cleaner. We do not, in any way, share this information with any other parties.
Had you enjoyed our service and provided with us your account, password or other personal information, we will only use such information for our own service in accordance with the purpose we committed in this policy. If you disclose any your Google account information, we will only visit your Google account with your consent, and the usage of such information shall be subject to this policy.
Directory names on sdcard
We collect the encoded directory names to identify if it can be delete safely. None of the directory names will be exposed to anyone or any institution.
To make it easier for you to open web pages, we provide web page caching. We allow websites you visit to store some web page data, such as web page pictures and other information. When you visit the site next time, the site will directly read the saved data for display, thereby to open the webpage faste. The cache will expire due to expiration or manual removal. We will not upload any cached content.
We may share your data with other our affiliate companies in or outside Europe. We may also share your data with third parties, to help manage our business and deliver services. These third parties may from time to time need to have access to your personal data. These third parties may include:
We may share your personal data with our subsidiary products to provide a more consistent experience and better service. We guarantee that our subsidiary products will treat your personal data in accordance with the purposes and requirements shown in this Policy. We will obtain your prior consent again if our subsidiary products wish to use your personal data for purposes other than those set forth in this Policy.
We may share your personal data with our affiliated companies and will ensure their processing of your personal data is in compliance with the purposes and requirements of this Policy. We will obtain your prior consent again if affiliated companies intend to use your personal data for other purposes than set forth in this Policy.
We may engage third party service providers to provide specific services. Third party service providers may collect data when providing services, and we will ensure that they follow our instructions, follow the purposes and requirements set out in this policy to process your personal data, and take appropriate confidentiality and security measures to safeguard data security.
In order to provide you with better antivirus function, both cloud killing and local killing are available at the same time when you scan the virus. The local virus engine is provided by the third party service provider: Antiy; It may access and collect your device information, installed application information, file information, virus information, and virus database version to complete virus detection, analysis and killing.
In order to attribution of installation channel and provide you with better services, we use the services of a third party service provider. The service needs to obtain your information including: application package name, application version, application installation time, system version, Android ID, country information, mobile phone language information, mobile phone brand, mobile phone model. The information obtained is only used for this purpose.
In order to prevent fraud and prevent cheating, and to provide you with better services and better ecological environment, we use Digital Union’s services. The service needs to obtain your information including: application package name, application time information, application version number, installation path, application size and other application information; CPU, screen resolution, total memory information and other hardware general information; country code, start-up time, system time and other system information; mobile phone brand, mobile phone model, memory, CPU and other equipment hardware information. The information obtained is only used for this purpose.
Subject to compliance with this Policy, we may be required to share or disclose your personal data under certain circumstances, such as in accordance with laws and regulations, and compulsory requirements of government orders; to safeguard the legitimate rights and interests of yours, ours, and third parties; and to prevent or deal with fraud, secure or technical problems.
For any change of the organization or existing status of our company (such as restructuring, merger or bankruptcy), your personal data may be transferred to the company entity after change or our affiliated company (the “Data Transferee”). The Data Transferee will continue to be bound by this Policy.
The Product may contain a hyperlink directing to third party products or services, such as a hyperlink to another website. You may click the hyperlinks in this Product to access third party products or services. Meanwhile, we may also embed third party links in this Product and you may click these links to access or use third party products or services on the interface of this Product. We hereby remind you that when you access or use third party products or services via the above methods whereby your personal data will be obtained by such third party products or services, the privacy policies of such third party products or services will apply to such personal data.
In addition, we may use the third party interface to improve product function. For example, search module will request search engine interface based on the keyword input by user and obtain the search suggestions and keyword related webpage contents.
We are committed to protecting your personal data. We have adopted all possible security technologies and procedures to protect your personal data against unauthorized access, use, revision, damage, destruction or disclosure. These security measures mainly include the following:
a） Your personal data is stored in the computer systems located in a controlled site with security measures such as encryption.
b） Only Honor employees who have the necessity to process relevant data for the purpose of product operation are authorized to access your personal data and such employees are required to comply with strict confidentiality obligations.
c） We are constantly striving to ensure the security of your personal data, and we adopt encryption technologies during data transmission to prevent your information against unauthorized access, use, revision, damage, destruction or disclosure.
d） We are more prudential when we transmit and store special categories of your personal data and adopt encryption technologies and other security measures to ensure data security.
In case of personal data security incident, according to the requirements of relevant laws and regulations, we will promptly inform you via push notification, announcement, etc. the basic situations and possible influence of the security incident, response measures we have taken or will take, suggestions for you regarding self-prevention and risk reduction, remedial measures for you, etc. We will timely deal with system vulnerabilities, cyber-attacks, virus intrusion, and other security risks.
We will store your personal data for the necessary period for data collection and processing purposes. Beyond the above-mentioned period, we will delete or anonymize personal data.
The related data read through Anti-Virus, Memory Boost, Junk Files, Facebook Clean, Whatsapp Clean, Wifi Security, CPU Cooling, Battery Saver, Risk Reminder, Safe Browsing functions are for recording mobile using status continually(eg, real time monitor function in antivirus, strange WiFi detect function in WiFi security)and optimizing operating speed of related functions. We save data to the local with storage period the same as lifecycle of software and promise never upload data to the server. You can even clear related data in software management under system setting at any time.
The data collected from above functions, including app information installed in mobile and SD card, app file information and virus information, are used for products continuous improvement (eg, False Positives Mark in antivirus, close background app process by default in booster function ) and will be saved in the server for a long time. You can tell us the actions you need to do with data by clicking side bar>settings>personal data centert>manage more data. We’ll delete and anonymize personal data. If you want to know more about the data we collected, please consult us by sending email to mailbox at the page bottom.
The access records, application execution logs, and application debug logs of the cloud service are stored on the server for a short period of time, typically 7 days. If this period expires, we will delete or anonymize the data.
Application usage data is pseudo-persistently stored on the server for data analysis. You can access, edit or delete your data in the manner described in section 7. : How to Access and Control Your Personal Data.
After you cancel your account, we may not be able to delete your personal data immediately due to technical reasons; however, we will delete it during the next system update, and we undertake not to process your personal data during the period between cancellation of your account and the next system update.
You can access and edit your personal data onlie in Honor user information center.
You may select on the page of Honor User Information Center to change your authorization scope for us to process your personal data. Please be minded that since all functions of the Product need certain basic personal data for normal operation, certain functions of the Product may not operate normally when you withdraw your consent to processing of some personal data.
When we receive your withdrawal of consent, we will no longer process your corresponding personal data.
You may always choose whether to receive promotional emails, messages, calls, and mails from us or third parties. You may also choose to no longer receive interest-based advertisements through Honor User Information Center.
We will no longer use your personal data for the above-mentioned commercial promotion purposes when you refuse to receive interest-based advertisements.
You may submit a request to us to delete your personal data when:
a) Your personal data is no longer necessary for data collection or processing;
b) You have withdrawn your consent to our processing of your personal data ;
c) Your personal data has been processed illegally;
d) We are obligated to delete your personal data in accordance with the laws of EU members.
We may not be able to delete your personal data immediately due to technical reasons. We will delete it during the next system update. We will not process your personal data in any way during the period between your request of deleting your personal data and the next system update.
We may first verify your identity upon receipt of your request, and may request you to provide the necessary information for authentication.
We will respond to your request on the 30th day after we receive your request and communicate with you in an appropriate way. If necessary, we may extend it (by an additional 30-day at most), and will inform you of the reason for the extension of the deadline on the 30th day after receiving your request. If we have reasonable reasons to believe that no measures are needed to respond your request, we will inform you of our decision 30 days from the date of receipt of your request and provide you with appropriate explanation.
We will use best efforts to help you resolve relevant problems. If you are not satisfied with the response you received, you may refer the complaint to the relevant regulatory authority, or file a lawsuit before a competent judicial authority.
For policy reasons, Access and Control Your Personal Data only supports users in EU Members.
This Product is not intended for a minor under 16 years old (or equivalent minimum age set by the laws of EU members). We will only process the information of these minors to the extent permitted by law and with the consent of their guardians.
We will implement relevant technical measures and make our best efforts to verify whether the processing of minors’ information has been approved by their guardians. We will try to delete relevant data as soon as possible if we are aware that we have collected the personal data of a minor without the prior consent of their certified guardians.
If you have any questions or suggestions about this policy, or you need to do your data management power to manage your privacy data, please feel free to contact us: email@example.com.
If you find any violation of this policy, please feel free to contact our DPO: firstname.lastname@example.org.
If you have a complaint or concern about how we use your personal data, please contact us in the first instance and we will attempt to resolve the issue as soon as possible. You also have a right to lodge a complaint with your national data protection supervisory authority at any time. We do ask that you please attempt to resolve any issues with us first, although you have a right to contact your supervisory authority at any time.
We provide Honor products and services around the world, which means to conduct business globally, your personal data might be transmitted to a jurisdiction or accessed from such jurisdiction outside of the country/region where you use this Product. These jurisdictions include but are not limited to Singapore, United States, and China.
Please note that we only return demographic information to China and we do not include information on individual user identities. At the same time, in order to provide you with better services, our third party partners may transmit your data to other countries. For example, in order to detect robots or cheating, we have purchased a Chinese supplier’s traffic monitoring service. The merchant may return the user information to China in order to assist us in analyzing whether there is cheating in the user.
Personal data protection legislation in such jurisdiction might be different or even absent. Under such circumstance, we will adopt various measures to ensure security of your personal data. For instance, we will ask you for your explicit consent before transmission of your personal data, or implement security measures such as encryption and pseudonymisation during data transmission; when your personal data is transferred to such jurisdictions, we will apply the same protection of your personal data in accordance with the Policy. We will endeavor to protect your personal data with the measures stipulated in Article 46 and Article 47 of the EU General Data Protection Regulation.