This INMOX Privacy Policy (this “Policy”) sets out how Jizhi Ruanchuang (Hebei) Technology Co., Ltd. (the “we”, “us”, or “our”) collects, uses, discloses, processes, and protects information you provide to us through this application when you use our products and services. We are responsible for the daily operation of this application, user services, the primary processing of personal information, and the technical R&D and feature iterations of this application, and we do not independently collect, store, or use users’ personal information. If we ask you to provide certain information to verify your identity when you use our products and services, we will use such information in accordance with this Policy and our Terms and Conditions. You should fully understand our personal information collection and use practices and be confident that you can ultimately control the personal information you provide to us.
In this Policy, “personal information” means data that can identify a specific individual either by the information itself or when combined with other information to which we have access. Such personal information includes your name, address, telephone number, and email address. “Personal sensitive information” means personal information that, once leaked or illegally used, is likely to lead to infringement of a natural person’s dignity or harm to personal or property safety, including ID document numbers, biometric information, bank or other financial account numbers, property information, whereabouts, transaction information, geographic location, and personal information of children under the age of 14 (inclusive).
If you do not agree to this Policy, please do not use INMOX products and services. When you click “Agree” and use our products and services, you are deemed to have read, acknowledged, and accepted all the terms described in this Policy, including any changes we may make from time to time. We commit to protecting the privacy, confidentiality, and security of your personal information in accordance with applicable laws.
Unless otherwise agreed, the terms used in this Policy have the same meanings as those in the User Agreement.
II. How We Collect and Use Your Personal Information
We comply with applicable laws and regulations and follow the principles of legitimacy, lawfulness, necessity, and good faith. We process your personal information only for the business functions and necessary purposes described in this Policy, and based on your consent or other legal bases permitted by law. You are not required to provide permissions or personal information; however, if you choose not to provide or grant them, in some cases it may affect the corresponding business functions we can provide.
1. Account Registration
When you register an INMOX account in this application, we will collect your nickname, avatar, mobile phone number, and password. We collect this information to help you complete account registration and protect your account security. The mobile phone number is personal sensitive information collected to meet real-name requirements under applicable laws and regulations. If you do not provide such information, you may be unable to use our services normally.
2. Device Connection
When you use device connection services, we will collect your device’s Bluetooth MAC address, mobile phone model, device serial number, device ID, and custom device identifiers. After you enable the relevant permissions, such information is collected automatically by the system. The purpose is to enable the discovery, binding, and maintenance of the connection between devices (e.g., glasses and mobile phones) and the application, so as to provide more device-side features.
3. Logging In and Using Your Account
When you log in and use the application services, to ensure normal service operation, improve and optimize the service experience, and protect your account security, we may collect in the foreground or background your device model, operating system, unique device identifiers, application ID, login IP address, MAC address, network access method/type/status, operation logs, and service logs (e.g., browsing history under reading features, service failure information, etc.). This type of information is necessary to provide the services.
4. Voice Features
When you use voice-related features in the application (e.g., push-to-talk), we will request microphone permission and collect your voice content. This information is collected when you actively provide it and is necessary to realize the above features.
5. Camera Features
Purpose: The camera is a sensitive permission. We request it only when you use features such as taking photos or scanning QR codes, and it is enabled after you grant authorization.
Scenarios: We request this permission only when you use corresponding features, such as changing your avatar via photo capture or scanning a QR code (including enabling the flashlight while scanning).
Note: The permission name may vary by system (e.g., “Camera”). You may choose to enable or disable the camera permission. If disabled, you may be unable to use scanning or photo-taking features.
6. Microphone/Recording
Purpose: The microphone is a sensitive permission. We request it only when you use features that record audio, and it is enabled after you grant authorization to collect your audio recordings.
Scenarios: With your authorization, we will use the microphone to collect your audio for features such as push-to-talk.
Note: We collect information only when you use corresponding features. We request microphone permission to obtain audio and support subsequent recognition and interaction. The permission name may vary by system (e.g., “Microphone” or “Recording”).
7. Device Information
Overview: Device information refers to device identifiers and network access information. On mobile terminals, this may be described as “phone information,” which does not mean the App collects your communications content or any private information you actively input.
Purpose: While you browse or use our products, we collect device information, including unique device identifiers (OAID/Android ID/MAC address on Android; IDFA/IDFV on iOS; OAID on HarmonyOS), login IP address, device model, device name, browser type/settings, language settings, operating system version, application version, application list, WLAN access points (SSID, BSSID), Bluetooth, base station, network access method/type/quality/state, carrier name, and sensor data (ambient light, accelerometer, gravity). This enables interface rendering, prevention of abnormal logins from other devices, retention of necessary log information, and protection of your account, transaction, and system security. If you are not logged in, we use device information to push relevant content displays. Device information is also used for anti-cheating and to determine whether an account is in a secure environment.
Note: Many mobile device manufacturers now support changing device identifiers to help you control your personal information. Please refer to your device documentation for details.
8. Location Access
For certain location-based services (e.g., viewing a device’s current location), we collect, use, and process approximate or precise location from GPS, WLAN, and network IDs. We will ask you which applications you wish to enable location-based services for. You can disable the relevant permission in settings to refuse use of your location information.
9. Ensuring Basic Security of Network Access and Services
To provide a secure, trustworthy product environment and reliable services, we need to collect device model, operating system, device identifiers (e.g., Android ID/OAID, which may vary by system version), application information (package name and version, runtime state, and related event information), network access method/type/status, and operation/service logs.
10. Third-Party Services
Third-party services within the application are provided by external third parties. We cannot obtain the information generated when you use those services. However, if you expressly consent for a third party to obtain personal information you provided to us (e.g., avatar, nickname, mobile phone number, location), that third party may obtain such information via interfaces in this application.
11. Contacting Customer Service
To contact you, help resolve issues, or record solutions and outcomes, we may collect your contact information (phone number, WeChat, or other contact details you actively provide), your communications (including text/image/call records between you and us or related personnel), and other necessary information.
12. Situations Not Requiring Consent
We may collect and use your personal information without consent in the following circumstances:
- Directly related to national security or national defense security;
- Directly related to public safety, public health, or significant public interests;
- Directly related to criminal investigation, prosecution, trial, or enforcement of judgments;
- Necessary to protect your or others’ life, property, reputation, or other major lawful rights and interests but difficult to obtain consent;
- Personal information that you have made public yourself;
- Personal information collected from lawful public sources such as legal news reports or government disclosures;
- Necessary to sign and perform a contract at your request;
- Necessary to maintain the safe and stable operation of products or services provided, such as discovering or handling faults;
- Necessary for lawful news reporting;
- Necessary for statistical or academic research in the public interest, where results provided externally are de-identified;
- Other circumstances stipulated by laws and regulations.
Please understand our features and services continue to evolve. If a feature or service not described above collects your information, we will separately inform you of the scenario, purpose, type, and method of collection and obtain your consent or rely on another legal basis.
III. How We Store Your Personal Information
(1) Storage Location
Personal information collected and generated during our operations within the People’s Republic of China (“China”) is stored in China, except in the following circumstances:
- Explicitly required by laws and regulations;
- Your explicit authorization is obtained.
For the above circumstances, we will ensure adequate protection of your personal information in accordance with this Policy.
(2) Retention Period
We retain personal information only for the period necessary to achieve the purposes stated in this Policy, unless a longer retention is required by law. We consider, among others:
- Completion of the services related to you, maintenance of service/business records, and handling queries or complaints;
- Ensuring the security and quality of services provided to you;
- Whether you agree to a longer retention period;
- Whether there are other special retention agreements.
After the retention period expires, we will delete or anonymize your personal information in accordance with applicable laws.
(3) Deletion and Anonymization
If the application services cease operations, the operator (Jizhi Ruanchuang (Hebei) Technology Co., Ltd.) will stop collecting your personal information after the shutdown and notify you by public announcement. Personal information already held will be deleted or anonymized. For children’s personal information, we will promptly notify the guardians.
V. How We Protect Your Personal Information
(1) Our Security Measures
We place great importance on information security. Led by the application operator (Jizhi Ruanchuang (Hebei) Technology Co., Ltd.) with technical support from the R&D party (Jizhi Ruanchuang (Hebei) Technology Co., Ltd.), we adopt various technical (including encryption, intrusion prevention, antivirus, etc.) and organizational measures to protect your personal information from unauthorized access, use, disclosure, alteration, damage, or loss.
(2) What You Can Do
While we are responsible for protecting your personal information, you are responsible for proper use and safekeeping of your account information. Please use a strong password to enhance account security. If you discover unauthorized use of your account, promptly notify the person who assigned the account access or contact us for assistance in stopping such use.
(3) Handling Security Incidents
If an information security incident (such as a leak or loss) unfortunately occurs, the application operator will, as required by law, promptly inform you of the basic situation and possible impacts, measures taken or to be taken, recommendations for your self-protection and risk mitigation, and remedies. We will notify you via push notifications or other means; where individual notice is difficult, we will make a reasonable and effective public announcement. We will also report the incident handling to regulators as required.
VI. How You Manage Your Personal Information
We respect your rights as a data subject and strive to protect your control over your personal information. We provide multiple methods to help you manage privacy settings and personal information securely and conveniently.
(1) Access Your Personal Information
You have the right to understand and access how we process your personal information. To enhance transparency, we publish this Policy. In our products/services, you may review the privacy policy, personal information collection list, and third-party information sharing list to understand what we may collect and process.
(2) Rectify or Supplement Your Personal Information
If you find that personal information we process about you is inaccurate or incomplete, you may request timely correction or, where appropriate, completion. For certain information, you may correct or supplement it directly in the relevant view. To ensure data quality, we may need to verify your identity before processing such requests.
(3) Delete Your Personal Information
You may request deletion where:
- We collected/used your personal information in violation of laws and regulations;
- We collected/used your personal information in violation of this Policy;
- You no longer use our products or services, or you have cancelled your account;
- We no longer provide products or services to you.
You may contact us to delete basic profile and contact data submitted when using INMOX products/services. After we assist deletion, due to legal and technical limitations, we may be unable to immediately delete from backup systems. We will store your personal information securely and restrict any further processing until backups can be cleared or anonymized.
(4) Withdraw Consent
You may contact us to withdraw consent for the collection, use, and/or disclosure of your personal information under our control. We will process your request within a reasonable time and thereafter cease collecting, using, and/or disclosing your personal information in accordance with your request.
Please understand that certain business functions depend on basic personal information. After withdrawal, we may be unable to continue providing the corresponding services and will stop processing the related personal information. Your withdrawal will not affect prior processing based on your authorization.
(5) Account Cancellation
You may cancel your registered account at any time by contacting us using the contact details in this Policy. Cancelling your INMOX account will prevent you from continuing to use all INMOX products and services—please proceed with caution. To protect your or others’ lawful rights, we will determine whether we can support your request based on your use of INMOX products and services. After cancellation, unless otherwise required by law, we will cease providing related services and delete or anonymize your personal information; where deletion is technically difficult, we will stop processing except for storage and necessary security measures.
(6) Right to Data Portability
You have the right to obtain copies of your personal information that we have collected (e.g., basic profile, identity information). Where legal conditions are met, you may request that we transfer your personal information to a third party designated by you in accordance with applicable laws and regulations.
(7) Responding to the Above Requests
You may exercise your rights by contacting us. For security, we may first require identity verification before processing your request. Reasonable requests are generally free of charge; for repeated or excessive requests, we may charge a cost-based fee. We may reject requests that are groundlessly repetitive, require disproportionate technical effort (e.g., developing new systems or fundamentally changing current practices), or jeopardize others’ lawful rights and interests.
We will not be able to respond to your request in the following cases as required by law:
- Directly related to national security or national defense security;
- Directly related to public safety, public health, or major public interests;
- Directly related to criminal investigation, prosecution, trial, or enforcement of judgments;
- There is sufficient evidence of malicious intent or abuse of rights;
- Your request would cause serious harm to the lawful rights and interests of you or other individuals/organizations;
- Involves trade secrets.
VIII. Cross-border Transfers of Your Personal Information
Personal information collected and generated within the People’s Republic of China is stored in China. If in the future our services change and it becomes necessary to transmit your personal information to other countries or regions, we will inform you of the categories of information to be transferred, the purposes and methods of the transfer, the name and contact details of the overseas recipient, and how you may exercise your rights with the recipient, and we will fulfill compliance obligations and obtain your separate consent as required by law, unless otherwise provided by laws and regulations.
IX. Protection of Minors’ Personal Information
We attach great importance to protecting minors’ personal information. Our products and services are primarily intended for adults, and we do not proactively collect, use, or disseminate personal information of minors, especially children under 14. Because “age” and “date of birth” are not required by this application, if you do not provide such information, we cannot accurately identify your age. Therefore, unless consent is obtained from a legal guardian, minors—especially children under 14—should not use the application account or provide personal information (e.g., name or phone number).
If we collect a minor’s personal information without a guardian’s consent, please contact us using the details in this Policy. After verifying identity and reasons, the application operator (Jizhi Ruanchuang (Hebei) Technology Co., Ltd.) will handle the information in accordance with law. We will use, provide, or disclose such information only when permitted by laws and regulations, with explicit guardian consent, or when necessary to protect minors. If we discover that children’s personal information has been collected beyond the above scope, we will endeavor to delete the data as soon as possible.
If you are a guardian of a minor, please pay attention to whether the minor you supervise uses INMOX products and services after obtaining your authorization and consent.
X. Other Provisions
(1) Governing Law
This Policy is governed by the laws of the People’s Republic of China (for clarity, excluding the laws of the Hong Kong SAR, Macao SAR, and Taiwan region).
In the event of a dispute, the parties shall first attempt amicable negotiation; failing which, either party may bring a lawsuit before the court where the application operator (Jizhi Ruanchuang (Hebei) Technology Co., Ltd.) is located.
(2) Updates to This Policy
This Policy takes effect from the effective date shown below the title. We reserve the right to modify this Policy at any time. All modifications take effect immediately upon publication of the latest version. Please review this Policy periodically to stay informed of the latest terms.
(3) Do You Have to Agree to Any Third-Party Terms and Conditions?
This Policy does not apply to products and services provided by third parties. Our products and services may include third-party products/services and links to third-party websites. We have no control over such third parties. You may choose whether to access such links, content, products, and services. We cannot control those third parties’ privacy policies, and they are not bound by this Policy. Before submitting personal information to a third party, please review that third party’s privacy policy. We are not responsible for the collection, use, or disclosure policies and practices (including data security practices) of other organizations, including personal information you disclose to other organizations via the software.
XI. Contact Us
We value privacy and actively protect your rights in personal information processing activities. If you wish to exercise the rights described above, or if you have any questions or suggestions about this Policy or our privacy practices, please contact us:
Phone: 4008878167
To protect your account security, we may require a written request and identity verification before handling your request and/or complaint.
Jizhi Ruanchuang (Hebei) Technology Co., Ltd.