Global Messenger Tracking Privacy Policy
Publication Date: May 25, 2023
Update Date: Feb 10, 2025
Welcome to Global Messenger Tracking!
Hunan Global Messenger Technology Co., Ltd. (referred to as "we" or "the Company") respects and protects
your privacy. In order to safeguard your rights, the "Global Messenger Tracking Privacy Policy"
(referred to as the "Privacy Policy") will explain to you how Global Messenger Tracking collects, uses,
and stores your personal information, as well as the rights you have. Before using Global Messenger
Tracking, please read, understand, and agree to this policy and related supplemental documents.
This Privacy Policy applies to the functionality and services of Global Messenger Tracking itself and
does not apply to other products or services provided through Global Messenger Tracking or its clients,
or any other products or services provided by third parties (collectively referred to as "Third-Party
Services"). Before choosing to use Third-Party Services, you should fully understand the product
features and privacy protection policies of the Third-Party Services.
This Privacy Policy will help you understand the following:
1. The types of information we collect
2. How we store this information
3. How we protect this information
4. How we use this information
5. Your rights
6. Protection of minors. Sharing and provision of information to external parties
7. Protection of minors
8. Changes to this Privacy Policy
9. Self-start and associated startup instructions
10. Other additional features
Definitions:
Global Messenger Tracking: Global Messenger Tracking is a tool for maintaining the display of satellite
tracking products and data services of wildlife under the company. Global Messenger Tracking products
include Global Messenger Tracking clients (including multiple application versions such as iOS and
Android) and more.
Enterprise User: Refers to individuals or organizations who register, log in, use Global Messenger
Tracking products and services, and obtain management permissions (referred to as "Enterprise Users");
Enterprise Users can create their own workspaces (referring to virtual workspaces created and managed by
Enterprise Users, where multiple people can join and use Global Messenger Tracking services), invite and
authorize individual users to join their workspaces as end users.
Enterprise User Administrator: Refers to individuals designated by Enterprise Users who have
administrative privileges to operate the Enterprise User's management backend system; Enterprise User
Administrators can be one or more individuals.
Individual User: Refers to the personal user who is invited by the Enterprise User to join the
enterprise workspace, registers and uses Global Messenger Tracking, hereinafter referred to as "you" or
"end user." When the Enterprise User invites you to access their workspace as an end user, you will
receive an invitation and can choose whether to join that Enterprise User.
1. Types of Information We Collect
In order to provide services to you and enterprise users, optimize our services, and ensure the security
of your account, Global Messenger Tracking collects the following information that you voluntarily
provide, authorize, or generate through the use of our services:
1.1 When you use Global Messenger Tracking services, to provide Global Messenger Tracking products and
services to you and enterprise users, maintain the normal operation of our services, improve and
optimize our service experience, and ensure the security of your account, we collect the following
information:
1.1.1 Device Information: To ensure software services, your account security, service quality, and
efficiency, based on the device model and permissions granted during the installation and use of Global
Messenger Tracking services, we collect relevant device information used to access Global Messenger
Tracking services. This includes IP address, network interface card (MAC) address, International Mobile
Equipment Identity (IMEI), SIM card information, device model, operating system, unique device
identifier, device location information (GPS location and Wi-Fi access points that can provide relevant
information), Global Messenger Tracking software version number, and device accelerators (such as
gravity sensors).
1.1.2 Log Information: When you use Global Messenger Tracking services, we collect log information about
your use of the services, including access methods, types and statuses of networks, network quality
data, operation logs, and service log information (such as website information you view in Global
Messenger Tracking, service failure information, etc.).
1.2 To provide data services, we collect information and data submitted or generated during the use of
Global Messenger Tracking by enterprise users and their end users (referred to as "Enterprise Control
Data"). Enterprise Control Data may include:
1.2.1 Your name, email, gender, phone number, and other personal information or information requested or
required by enterprise users.
1.2.2 Other data submitted by enterprise users, such as organizational structures.
1.3 Information collected by third-party SDKs during your use of the services: In order to optimize
service experience and quality, Global Messenger Tracking incorporates third-party SDKs. The following
information explains the data collected by third-party SDKs when the agreement is in effect. If you
choose not to provide the information mentioned, you may not be able to use the corresponding services.
However, it will not affect your use of other services we provide.
SDK Name: Getui Message Push
SDK Package Name: com.igexin, com.getui
Company Name: MobTech Co., Ltd. (Getui)
Data Types: Device Identifier, Device Platform, Device Manufacturer used to generate unique Push Target
ID (CID) and Device ID (GID), Application List Information, Network Information, and Location-related
Information
SDK Purpose: Through Getui's powerful web portal and rich API interface, send push messages and analyze
the effectiveness of push notifications.
Privacy Link: https://docs.getui.com/privacy
SDK Name: SENTRY
SDK Package Name: io.sentry.flutter
Company Name: Functional Software, Inc.
Data Types: Hardware Model, Operating System Version, Device Configuration, Unique Device Identifier,
International Mobile Equipment Identity (IMEI), SIM Card Information (IMSI), iOS Advertising Identifier
(IDFA), Android Advertising Identifier (OAID), Android ID, Device MAC Address, Device Location
Information (obtained through GPS, Bluetooth, or Wi-Fi signals), and Device Status Information (such as
sensor information)
SDK Purpose: Used for collecting and aggregating application error information
Privacy Link: https://sentry.io/legal/privacy/3.0.0/in-app
SDK Name: Geolocator
SDK Package Name: com.baseflow.geolocator
Company Name: Baseflow B.V.
Data Types: Device Location Information (obtained through GPS, Bluetooth, or Wi-Fi signals)
SDK Purpose: Used to retrieve device location information
Privacy Link: https://www.baseflow.com/privacy
SDK Name: MiPush
SDK Package Name: com.xiaomi.push
Company Name: Xiaomi Corporation
Data Types: Device Identifier OAID, Encrypted Android ID, Application Package Name, Version Number and
Running Status, Device Manufacturer, Device Model, Device Memory, Operating System Version, MiPush SDK
Version, Device Location (Country or Region), SIM Card Operator Name, Current Network Type, WiFi
Status
SDK Purpose: Used for pushing notification messages to users
Privacy Link: https://dev.mi.com/distribute/doc/details?pId=1534
SDK Name: Vivo Push
SDK Package Name: com.vivo.push
Company Name: Vivo Mobile Communications Co., Ltd.
Data Types: Device Identification Information (such as IMEI, EmmCID, UFSID, ANDROIDID, GUID, GAID,
OPENID, VAID, OAID, RegID, encrypted Android ID), Application Information of the Push Service (such as
Application Package Name, Version Number, APPID, Installation, Uninstallation, Factory Reset, Running
Status), Device Manufacturer, Network Type, Country Code, Device Type
SDK Purpose: Used for pushing notification messages to users
Privacy Link: https://dev.vivo.com.cn/documentCenter/doc/652#w1-12075822
SDK Name: OPPO Push
SDK Package Name: com.heytap
Company Name: Guangdong Heytap Technology Co., Ltd.
Data Types: Device-related Information (such as IMEI or OAID, Serial Number, IMSI, User ID, Android ID,
Google Advertising ID, Phone Region Settings, Device Model, Phone Battery Level, Phone Operating System
Version and Language), Application Information using the Push Service (such as APP Package Name and
Version Number, Running Status), Push SDK Version Number, Network-related Information (such as IP or
Domain Connection Results, Current Network Type), Message Sending Results, Notification Bar Status (such
as Notification Bar Permission, User Click Behavior), Lock Screen Status (such as Lock Screen Status,
Allow Lock Screen Notifications)
SDK Purpose: Used for pushing notification messages to users
Privacy Link: https://open.oppomobile.com/new/developmentDoc/info?id=10288
SDK Name: Huawei HMS Push
SDK Package Name: com.huawei.hms
Company Name: Huawei Technologies Co., Ltd.
Data Types: ID, Application ID, Application Package Name, Server Public IP Address
SDK Purpose: Used for pushing notification messages to users
Privacy Link: https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/privacy-statement-0000001050042021
SDK Name: Honor Push SDK
SDK Package Name: com.hihonor.push
Company Name: Shenzhen Honor Software Technology Co., Ltd.
Data Types: Device Information, Basic Information of the Application
SDK Purpose: Used for pushing notification messages to users
Privacy Link: https://developer.hihonor.com/cn/kitdoc?category=%E5%9F%BA%E7%A1%80%E6%9C%8D%E5%8A%A1&kitId=11002&navigation=guides&docId=sdk-data-security.md
You understand and agree that enterprise users are the controllers of Enterprise Control Data, and we
only process such data in accordance with the instructions of enterprise users and our agreement with
them. If you have any questions or concerns regarding the collection purpose, scope, and use of the
Enterprise Control Data mentioned above, please contact the enterprise user or enterprise user
administrator to handle it.
Please note that the features and services we provide to you are constantly updated and developed. If a
certain feature or service requires the collection of your information and is not mentioned in the above
explanation, we will separately explain the content, scope, and purpose of information collection
through page prompts, interactive processes, website announcements, etc., to obtain your consent.
2. How We Store This Information
We strictly comply with applicable laws, regulations, and agreements with users regarding the use of
collected information. If we exceed the purposes mentioned below in using your information, we will
explain it to you again and obtain your consent.
2.1 Location of Information Storage: We will store the personal information collected and
generated within the territory of China in accordance with applicable laws and regulations.
2.2 Retention Period of Information Storage: Generally, we only retain your personal information
for the period necessary to fulfill the purposes. For enterprise control data, such as device data
records and images, for which enterprise users can independently set the retention period, we will
retain the relevant information according to the settings of enterprise users. We will not view or use
the device data records, images, or other retained information set by enterprise users.
In the event that our products or services cease operation, we will notify you through push
notifications, announcements, or other means. Within a reasonable period, we will delete or anonymize
your personal information, cease the collection of personal information, and close third-party
application service interfaces to prevent the collection and continued use of personal information by
third-party services.
3. How We Protect This Information
3.1 We strive to provide safeguards for the security of user information to prevent its loss, misuse,
unauthorized access, or disclosure.
3.2 We will use various security measures at a reasonable security level to protect the information. For
example, we may use encryption technology (e.g., SSL/TLS) and anonymization methods to protect your
personal information.
3.3 We establish dedicated management systems, processes, and organizations to ensure the security of
the information. For example, we strictly limit the scope of personnel with access to the information
and require them to comply with confidentiality obligations.
3.4 In the event of a personal information breach or other security incidents, we will activate
emergency response plans in accordance with legal requirements, take measures to prevent the expansion
of the security incident, and notify you about the situation of the security incident, its potential
impact on you, and the remedial measures we will take through push notifications, announcements, or
other means. We will also report the handling of personal information security incidents in accordance
with legal and regulatory requirements and the requirements of regulatory authorities.
4. How We Use Information
4.1 The information we collect during your use of the Global Messenger Tracking service is intended to
create and
provide better services to Global Messenger Tracking users. We will use the collected information for
the
following purposes:
4.1.1 Security Assurance: To ensure the safety of you and all Global Messenger Tracking users, we will
use the
relevant information to assist in enhancing the security and reliability of the Global Messenger
Tracking service.
This includes detecting, preventing, and addressing fraud, abuse, illegal activities, security risks,
and technical issues that may harm Global Messenger Tracking, our users, or the public.
4.1.2 Compliance with Applicable Laws, Regulations, and Government Directives: We will use your personal
information to comply with relevant legal requirements, departmental regulations, and government
instructions. Currently, we do not use your personal information for user profiling analysis,
personalized recommendations, or advertising purposes. If we use your personal information beyond the
stated purposes at the time of collection or beyond the scope directly or reasonably related to them, we
will inform you again and obtain your explicit consent before using your personal information.
4.2 Regarding the use of enterprise-controlled data, we will handle it in accordance with the decisions
of enterprise users and the relevant agreements between us and enterprise users in accordance with the
law. For example, enterprise users have the right to decide which and how to display the relevant
information of end users within Global Messenger Tracking.
4.3 According to relevant laws, regulations, and national standards, we may collect and use your
personal information without seeking your authorization or consent in the following circumstances:
1) When it is directly related to national security, national defense security, or other matters
directly related to major public interests such as public safety, public health, and public
awareness;
2) When it is directly related to criminal investigations, prosecutions, trials, and execution of
judgments;
3) When it is difficult to obtain your personal consent but necessary to protect your or other
individuals' vital interests, such as life and property;
4) When the personal information collected is voluntarily made public by you to the public;
5) When the personal information is collected from legally publicly disclosed information, such as
lawful news reports and government information disclosure;
6) When it is necessary for the conclusion and performance of a contract as requested by you;
7) When it is necessary to maintain the security and stable operation of the provided products or
services, such as discovering and handling malfunctions of products or services;
8) Other circumstances as provided by laws and regulations.
5. Your Rights
In accordance with relevant laws, regulations, standards in China, as well as common practices in other
countries and regions, we ensure that you have the following rights regarding your personal
information:
5.1 Right to Access and Query
You have the right to access your personal information, except for situations specified by laws and
regulations. If you want to exercise your right to access data, you can do so through the following
methods:
1) Access/query personal information such as avatar, nickname, email, phone number, account, and
password: Go to the "Me" section in the Universal Tracking app, click on your avatar/nickname to access
the information.
2) Access/query device identification information and other information: You can contact us through the
contact information provided at the bottom of the privacy policy to inquire.
5.2 Right to Rectification
If you find any errors in the personal information we process about you, you can modify it through the
following path:
1) Modify personal information such as avatar, nickname, email, phone number, account, and password: Go
to the "Me" section in the Universal Tracking app, click on your avatar/nickname to make
corrections.
5.3 Right to Deletion
1) You can delete personal information such as avatar, nickname, email, phone number, etc. by going to
"Me" - "Click on the avatar" - "Edit Profile".
2) In addition, you can request the deletion of relevant personal information by contacting our customer
service through a phone call in the following circumstances:
(1) If our processing of personal information violates laws and regulations;
(2) If we collect and use your personal information without obtaining your consent;
(3) If our processing of personal information violates the agreements with you;
(4) If you no longer use our products or services, or you have cancelled your account;
(5) If we no longer provide products or services to you;
(6) If we decide to respond to your deletion request, we will also notify the entities that have
obtained your personal information from us and request them to promptly delete it, unless otherwise
provided by laws and regulations or unless these entities have obtained your independent
authorization.
After your information is deleted from our services, we may not immediately delete the corresponding
information from the backup system, but we will delete it when the backup is updated.
5.4 Right to Withdraw Consent
You can directly withdraw your consent to the collection and use of personal information (including but
not limited to the permissions to access the application list and clipboard) through the following
methods. After withdrawing consent, we will no longer process your personal information. When we share,
transfer, or publicly disclose your personal information to third parties, we will notify you of the
withdrawal of consent. The withdrawal of consent does not affect the processing of your personal
information based on your consent prior to withdrawal.
1) For permissions to collect personal information (such as camera, microphone, etc.), you can turn them
off by going to "Settings" - "Apps" - "Permission Management" on your phone.
5.5 Right to Account Deletion
If you need to delete your account after logging into the Universal Tracking app, you can open the app,
go to the "Me" section, and click on the "Account & Security" page, then click on "Delete Account" to
proceed. After your account is deleted, we will stop providing products or services to you and delete
your personal information in accordance with applicable laws, or anonymize it.
5.6 Right to Obtain Personal Information Copies
1) You have the right to log into "Universal Tracking" - "Me" - "Click on the avatar" - "Edit Profile"
to obtain personal information, and you can take screenshots to obtain copies of personal
information.
5.7 Right to Restrict Automated Decision-Making
In certain business functions, we may make decisions solely based on automated decision-making
mechanisms such as information systems and algorithms. If these decisions significantly affect your
legitimate rights and interests, you have the right to request an explanation from us, and we will
provide appropriate remedies.
5.8 Response to Your Requests
If you are unable to access, rectify, or delete your personal information through the above methods, or
if you need to access, rectify, or delete other personal information generated when using our products
and/or services, or if you believe that Universal Tracking violates any laws, regulations, or agreements
regarding the collection or use of your personal information, you can contact us through the methods
provided below. To ensure security, we may require you to provide a written request or prove your
identity by other means. We will reply to your request within 15 days after receiving your feedback and
verifying your identity. We generally do not charge fees for reasonable requests. However, for multiple
repetitive requests or requests exceeding reasonable limits, we may charge a certain cost. We may refuse
requests that are baseless, require excessive technical efforts (e.g., requiring the development of a
new system or fundamentally changing current practices), pose risks to the legitimate rights and
interests of others, or are highly impractical (e.g., involving information stored on backup tapes).
According to legal requirements, we will be unable to respond to your requests in the following
situations:
1) Requests related to the performance of obligations stipulated by laws and regulations;
2) Requests directly related to national security and national defense security;
3) Requests directly related to public security, public health, and major public interests;
4) Requests directly related to criminal investigation, prosecution, trial, and enforcement of
judgments;
5) Personal information controller has sufficient evidence to show the subjective malice or abuse of
rights by the personal information subject;
6) Requests that are difficult to obtain the consent of the individual or other persons concerned, but
are necessary for the protection of the life, property, and other significant legitimate rights and
interests of the personal information subject or other individuals;
7) Requests that, if honored, would cause serious harm to the legitimate rights and interests of the
personal information subject or other individuals, organizations;
8) Requests involving trade secrets.
6. Sharing and External Provision of Information
6.1 We will not share or transfer your personal information to third parties, except in the following
cases:
6.1.1 With your explicit consent: With your prior consent, we may share your personal information with
third parties.
6.1.2 For the purpose of external processing: We may cooperate with affiliated companies or other
third-party partners (third-party service providers, contractors, agents, application developers, etc.)
to share your personal information, in order for them to process the information on our behalf, in
accordance with our instructions, privacy policy, and other relevant confidentiality and security
measures. They will use the information to provide services to you and achieve the purposes described in
the "How We Use Information" section. If we share your information with the aforementioned affiliated
companies or third parties, we will take measures such as encryption and anonymization to protect the
security of your information.
6.2 We will not publicly disclose the collected personal information. If it is necessary to make a
public disclosure, we will inform you of the purpose of the disclosure, the type of information to be
disclosed, and the possibility of sensitive information being involved, and obtain your explicit
consent. It should be noted that the disclosure or sharing of end user-related information within the
enterprise user's work platform is determined and managed by the enterprise user.
6.3 As our business continues to develop, we may engage in transactions such as mergers, acquisitions,
and asset transfers. We will inform you of relevant circumstances and continue to protect your personal
information in accordance with legal requirements and standards that are no less stringent than those
set forth in this guideline, or request the new controller to continue to protect your personal
information.
6.4 We may disclose your personal information in response to legal requirements or enforcement requests
from relevant departments.
7. Protection of Minors
We attach great importance to the protection of personal information of minors. According to relevant laws and regulations, if you are a minor, you should obtain written consent from your parent or legal guardian before using Global Messenger Tracking services. If you are a guardian of a minor and have any questions regarding the personal information of the minor you are supervising, please contact our customer service at +860731-85568037.
8. Changes to This Policy
In order to improve the quality of our products or services, we may modify this privacy policy periodically. The revised privacy policy will be announced by Global Xinsi Company or notified to you in another appropriate and prominent manner before the revisions take effect. In such cases, if you continue to use our services, it indicates that you agree to be bound by the revised privacy policy.
9. Self-starting and Associated Start Instructions
In order to ensure that this application can receive broadcast messages from the client push notifications while in the closed or background running state, this application needs to use the self-starting capability. It will send broadcasts through the system at a certain frequency to awaken and start itself or perform associated startup actions, which is necessary to achieve the required functionality and services.
10. Other Additional Features
1) Additional services based on camera and photo album permissions. After granting access to the camera
and photo album, you can use this feature to upload avatars, device photos, additional images for
bookmark points, and other functions.
2) Geolocation information. When tracking device location, we collect your geolocation information to
calculate and provide position-related data of the device relative to you.
3) Permission to delete and create files in the SD card. By enabling the permission to delete and create
files in the SD card, you can enable file caching functionality.
4) Bluetooth permissions. You can enable Bluetooth permissions to communicate with or read data from
hardware devices that support Bluetooth transmission.
Please note that by granting the above permissions, you authorize us to collect and use the
corresponding personal information to achieve the above functions. If you disable the corresponding
permissions, it means that you revoke the corresponding authorization, and we will no longer collect and
use your corresponding personal information, nor will we be able to provide you with the corresponding
functionality.