Global Messenger Tracking Privacy Policy

Publication Date: May 25, 2023

Update Date: Feb 10, 2025

Welcome to Global Messenger Tracking!
Hunan Global Messenger Technology Co., Ltd. (referred to as "we" or "the Company") respects and protects your privacy. In order to safeguard your rights, the "Global Messenger Tracking Privacy Policy" (referred to as the "Privacy Policy") will explain to you how Global Messenger Tracking collects, uses, and stores your personal information, as well as the rights you have. Before using Global Messenger Tracking, please read, understand, and agree to this policy and related supplemental documents.
This Privacy Policy applies to the functionality and services of Global Messenger Tracking itself and does not apply to other products or services provided through Global Messenger Tracking or its clients, or any other products or services provided by third parties (collectively referred to as "Third-Party Services"). Before choosing to use Third-Party Services, you should fully understand the product features and privacy protection policies of the Third-Party Services.
This Privacy Policy will help you understand the following:
1. The types of information we collect
2. How we store this information
3. How we protect this information
4. How we use this information
5. Your rights
6. Protection of minors. Sharing and provision of information to external parties
7. Protection of minors
8. Changes to this Privacy Policy
9. Self-start and associated startup instructions
10. Other additional features

Definitions:
Global Messenger Tracking: Global Messenger Tracking is a tool for maintaining the display of satellite tracking products and data services of wildlife under the company. Global Messenger Tracking products include Global Messenger Tracking clients (including multiple application versions such as iOS and Android) and more.
Enterprise User: Refers to individuals or organizations who register, log in, use Global Messenger Tracking products and services, and obtain management permissions (referred to as "Enterprise Users"); Enterprise Users can create their own workspaces (referring to virtual workspaces created and managed by Enterprise Users, where multiple people can join and use Global Messenger Tracking services), invite and authorize individual users to join their workspaces as end users.
Enterprise User Administrator: Refers to individuals designated by Enterprise Users who have administrative privileges to operate the Enterprise User's management backend system; Enterprise User Administrators can be one or more individuals.
Individual User: Refers to the personal user who is invited by the Enterprise User to join the enterprise workspace, registers and uses Global Messenger Tracking, hereinafter referred to as "you" or "end user." When the Enterprise User invites you to access their workspace as an end user, you will receive an invitation and can choose whether to join that Enterprise User.

1. Types of Information We Collect

In order to provide services to you and enterprise users, optimize our services, and ensure the security of your account, Global Messenger Tracking collects the following information that you voluntarily provide, authorize, or generate through the use of our services:
1.1 When you use Global Messenger Tracking services, to provide Global Messenger Tracking products and services to you and enterprise users, maintain the normal operation of our services, improve and optimize our service experience, and ensure the security of your account, we collect the following information:
1.1.1 Device Information: To ensure software services, your account security, service quality, and efficiency, based on the device model and permissions granted during the installation and use of Global Messenger Tracking services, we collect relevant device information used to access Global Messenger Tracking services. This includes IP address, network interface card (MAC) address, International Mobile Equipment Identity (IMEI), SIM card information, device model, operating system, unique device identifier, device location information (GPS location and Wi-Fi access points that can provide relevant information), Global Messenger Tracking software version number, and device accelerators (such as gravity sensors).
1.1.2 Log Information: When you use Global Messenger Tracking services, we collect log information about your use of the services, including access methods, types and statuses of networks, network quality data, operation logs, and service log information (such as website information you view in Global Messenger Tracking, service failure information, etc.).
1.2 To provide data services, we collect information and data submitted or generated during the use of Global Messenger Tracking by enterprise users and their end users (referred to as "Enterprise Control Data"). Enterprise Control Data may include:
1.2.1 Your name, email, gender, phone number, and other personal information or information requested or required by enterprise users.
1.2.2 Other data submitted by enterprise users, such as organizational structures.
1.3 Information collected by third-party SDKs during your use of the services: In order to optimize service experience and quality, Global Messenger Tracking incorporates third-party SDKs. The following information explains the data collected by third-party SDKs when the agreement is in effect. If you choose not to provide the information mentioned, you may not be able to use the corresponding services. However, it will not affect your use of other services we provide.

SDK Name: Getui Message Push
SDK Package Name: com.igexin, com.getui
Company Name: MobTech Co., Ltd. (Getui)
Data Types: Device Identifier, Device Platform, Device Manufacturer used to generate unique Push Target ID (CID) and Device ID (GID), Application List Information, Network Information, and Location-related Information
SDK Purpose: Through Getui's powerful web portal and rich API interface, send push messages and analyze the effectiveness of push notifications.
Privacy Link: https://docs.getui.com/privacy

SDK Name: SENTRY
SDK Package Name: io.sentry.flutter
Company Name: Functional Software, Inc.
Data Types: Hardware Model, Operating System Version, Device Configuration, Unique Device Identifier, International Mobile Equipment Identity (IMEI), SIM Card Information (IMSI), iOS Advertising Identifier (IDFA), Android Advertising Identifier (OAID), Android ID, Device MAC Address, Device Location Information (obtained through GPS, Bluetooth, or Wi-Fi signals), and Device Status Information (such as sensor information)
SDK Purpose: Used for collecting and aggregating application error information
Privacy Link: https://sentry.io/legal/privacy/3.0.0/in-app

SDK Name: Geolocator
SDK Package Name: com.baseflow.geolocator
Company Name: Baseflow B.V.
Data Types: Device Location Information (obtained through GPS, Bluetooth, or Wi-Fi signals)
SDK Purpose: Used to retrieve device location information
Privacy Link: https://www.baseflow.com/privacy

SDK Name: MiPush
SDK Package Name: com.xiaomi.push
Company Name: Xiaomi Corporation
Data Types: Device Identifier OAID, Encrypted Android ID, Application Package Name, Version Number and Running Status, Device Manufacturer, Device Model, Device Memory, Operating System Version, MiPush SDK Version, Device Location (Country or Region), SIM Card Operator Name, Current Network Type, WiFi Status
SDK Purpose: Used for pushing notification messages to users
Privacy Link: https://dev.mi.com/distribute/doc/details?pId=1534

SDK Name: Vivo Push
SDK Package Name: com.vivo.push
Company Name: Vivo Mobile Communications Co., Ltd.
Data Types: Device Identification Information (such as IMEI, EmmCID, UFSID, ANDROIDID, GUID, GAID, OPENID, VAID, OAID, RegID, encrypted Android ID), Application Information of the Push Service (such as Application Package Name, Version Number, APPID, Installation, Uninstallation, Factory Reset, Running Status), Device Manufacturer, Network Type, Country Code, Device Type
SDK Purpose: Used for pushing notification messages to users
Privacy Link: https://dev.vivo.com.cn/documentCenter/doc/652#w1-12075822

SDK Name: OPPO Push
SDK Package Name: com.heytap
Company Name: Guangdong Heytap Technology Co., Ltd.
Data Types: Device-related Information (such as IMEI or OAID, Serial Number, IMSI, User ID, Android ID, Google Advertising ID, Phone Region Settings, Device Model, Phone Battery Level, Phone Operating System Version and Language), Application Information using the Push Service (such as APP Package Name and Version Number, Running Status), Push SDK Version Number, Network-related Information (such as IP or Domain Connection Results, Current Network Type), Message Sending Results, Notification Bar Status (such as Notification Bar Permission, User Click Behavior), Lock Screen Status (such as Lock Screen Status, Allow Lock Screen Notifications)
SDK Purpose: Used for pushing notification messages to users
Privacy Link: https://open.oppomobile.com/new/developmentDoc/info?id=10288

SDK Name: Huawei HMS Push
SDK Package Name: com.huawei.hms
Company Name: Huawei Technologies Co., Ltd.
Data Types: ID, Application ID, Application Package Name, Server Public IP Address
SDK Purpose: Used for pushing notification messages to users
Privacy Link: https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/privacy-statement-0000001050042021

SDK Name: Honor Push SDK
SDK Package Name: com.hihonor.push
Company Name: Shenzhen Honor Software Technology Co., Ltd.
Data Types: Device Information, Basic Information of the Application
SDK Purpose: Used for pushing notification messages to users
Privacy Link: https://developer.hihonor.com/cn/kitdoc?category=%E5%9F%BA%E7%A1%80%E6%9C%8D%E5%8A%A1&kitId=11002&navigation=guides&docId=sdk-data-security.md

You understand and agree that enterprise users are the controllers of Enterprise Control Data, and we only process such data in accordance with the instructions of enterprise users and our agreement with them. If you have any questions or concerns regarding the collection purpose, scope, and use of the Enterprise Control Data mentioned above, please contact the enterprise user or enterprise user administrator to handle it.
Please note that the features and services we provide to you are constantly updated and developed. If a certain feature or service requires the collection of your information and is not mentioned in the above explanation, we will separately explain the content, scope, and purpose of information collection through page prompts, interactive processes, website announcements, etc., to obtain your consent.

2. How We Store This Information

We strictly comply with applicable laws, regulations, and agreements with users regarding the use of collected information. If we exceed the purposes mentioned below in using your information, we will explain it to you again and obtain your consent.
2.1 Location of Information Storage: We will store the personal information collected and generated within the territory of China in accordance with applicable laws and regulations.
2.2 Retention Period of Information Storage: Generally, we only retain your personal information for the period necessary to fulfill the purposes. For enterprise control data, such as device data records and images, for which enterprise users can independently set the retention period, we will retain the relevant information according to the settings of enterprise users. We will not view or use the device data records, images, or other retained information set by enterprise users.
In the event that our products or services cease operation, we will notify you through push notifications, announcements, or other means. Within a reasonable period, we will delete or anonymize your personal information, cease the collection of personal information, and close third-party application service interfaces to prevent the collection and continued use of personal information by third-party services.

3. How We Protect This Information

3.1 We strive to provide safeguards for the security of user information to prevent its loss, misuse, unauthorized access, or disclosure.
3.2 We will use various security measures at a reasonable security level to protect the information. For example, we may use encryption technology (e.g., SSL/TLS) and anonymization methods to protect your personal information.
3.3 We establish dedicated management systems, processes, and organizations to ensure the security of the information. For example, we strictly limit the scope of personnel with access to the information and require them to comply with confidentiality obligations.
3.4 In the event of a personal information breach or other security incidents, we will activate emergency response plans in accordance with legal requirements, take measures to prevent the expansion of the security incident, and notify you about the situation of the security incident, its potential impact on you, and the remedial measures we will take through push notifications, announcements, or other means. We will also report the handling of personal information security incidents in accordance with legal and regulatory requirements and the requirements of regulatory authorities.

4. How We Use Information

4.1 The information we collect during your use of the Global Messenger Tracking service is intended to create and provide better services to Global Messenger Tracking users. We will use the collected information for the following purposes:
4.1.1 Security Assurance: To ensure the safety of you and all Global Messenger Tracking users, we will use the relevant information to assist in enhancing the security and reliability of the Global Messenger Tracking service. This includes detecting, preventing, and addressing fraud, abuse, illegal activities, security risks, and technical issues that may harm Global Messenger Tracking, our users, or the public.
4.1.2 Compliance with Applicable Laws, Regulations, and Government Directives: We will use your personal information to comply with relevant legal requirements, departmental regulations, and government instructions. Currently, we do not use your personal information for user profiling analysis, personalized recommendations, or advertising purposes. If we use your personal information beyond the stated purposes at the time of collection or beyond the scope directly or reasonably related to them, we will inform you again and obtain your explicit consent before using your personal information.
4.2 Regarding the use of enterprise-controlled data, we will handle it in accordance with the decisions of enterprise users and the relevant agreements between us and enterprise users in accordance with the law. For example, enterprise users have the right to decide which and how to display the relevant information of end users within Global Messenger Tracking.
4.3 According to relevant laws, regulations, and national standards, we may collect and use your personal information without seeking your authorization or consent in the following circumstances:
1) When it is directly related to national security, national defense security, or other matters directly related to major public interests such as public safety, public health, and public awareness;
2) When it is directly related to criminal investigations, prosecutions, trials, and execution of judgments;
3) When it is difficult to obtain your personal consent but necessary to protect your or other individuals' vital interests, such as life and property;
4) When the personal information collected is voluntarily made public by you to the public;
5) When the personal information is collected from legally publicly disclosed information, such as lawful news reports and government information disclosure;
6) When it is necessary for the conclusion and performance of a contract as requested by you;
7) When it is necessary to maintain the security and stable operation of the provided products or services, such as discovering and handling malfunctions of products or services;
8) Other circumstances as provided by laws and regulations.

5. Your Rights

In accordance with relevant laws, regulations, standards in China, as well as common practices in other countries and regions, we ensure that you have the following rights regarding your personal information:
5.1 Right to Access and Query
You have the right to access your personal information, except for situations specified by laws and regulations. If you want to exercise your right to access data, you can do so through the following methods:
1) Access/query personal information such as avatar, nickname, email, phone number, account, and password: Go to the "Me" section in the Universal Tracking app, click on your avatar/nickname to access the information.
2) Access/query device identification information and other information: You can contact us through the contact information provided at the bottom of the privacy policy to inquire.
5.2 Right to Rectification
If you find any errors in the personal information we process about you, you can modify it through the following path:
1) Modify personal information such as avatar, nickname, email, phone number, account, and password: Go to the "Me" section in the Universal Tracking app, click on your avatar/nickname to make corrections.
5.3 Right to Deletion
1) You can delete personal information such as avatar, nickname, email, phone number, etc. by going to "Me" - "Click on the avatar" - "Edit Profile".
2) In addition, you can request the deletion of relevant personal information by contacting our customer service through a phone call in the following circumstances:
(1) If our processing of personal information violates laws and regulations;
(2) If we collect and use your personal information without obtaining your consent;
(3) If our processing of personal information violates the agreements with you;
(4) If you no longer use our products or services, or you have cancelled your account;
(5) If we no longer provide products or services to you;
(6) If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us and request them to promptly delete it, unless otherwise provided by laws and regulations or unless these entities have obtained your independent authorization.
After your information is deleted from our services, we may not immediately delete the corresponding information from the backup system, but we will delete it when the backup is updated.
5.4 Right to Withdraw Consent
You can directly withdraw your consent to the collection and use of personal information (including but not limited to the permissions to access the application list and clipboard) through the following methods. After withdrawing consent, we will no longer process your personal information. When we share, transfer, or publicly disclose your personal information to third parties, we will notify you of the withdrawal of consent. The withdrawal of consent does not affect the processing of your personal information based on your consent prior to withdrawal.
1) For permissions to collect personal information (such as camera, microphone, etc.), you can turn them off by going to "Settings" - "Apps" - "Permission Management" on your phone.
5.5 Right to Account Deletion
If you need to delete your account after logging into the Universal Tracking app, you can open the app, go to the "Me" section, and click on the "Account & Security" page, then click on "Delete Account" to proceed. After your account is deleted, we will stop providing products or services to you and delete your personal information in accordance with applicable laws, or anonymize it.
5.6 Right to Obtain Personal Information Copies
1) You have the right to log into "Universal Tracking" - "Me" - "Click on the avatar" - "Edit Profile" to obtain personal information, and you can take screenshots to obtain copies of personal information.
5.7 Right to Restrict Automated Decision-Making
In certain business functions, we may make decisions solely based on automated decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request an explanation from us, and we will provide appropriate remedies.
5.8 Response to Your Requests
If you are unable to access, rectify, or delete your personal information through the above methods, or if you need to access, rectify, or delete other personal information generated when using our products and/or services, or if you believe that Universal Tracking violates any laws, regulations, or agreements regarding the collection or use of your personal information, you can contact us through the methods provided below. To ensure security, we may require you to provide a written request or prove your identity by other means. We will reply to your request within 15 days after receiving your feedback and verifying your identity. We generally do not charge fees for reasonable requests. However, for multiple repetitive requests or requests exceeding reasonable limits, we may charge a certain cost. We may refuse requests that are baseless, require excessive technical efforts (e.g., requiring the development of a new system or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are highly impractical (e.g., involving information stored on backup tapes).
According to legal requirements, we will be unable to respond to your requests in the following situations:
1) Requests related to the performance of obligations stipulated by laws and regulations;
2) Requests directly related to national security and national defense security;
3) Requests directly related to public security, public health, and major public interests;
4) Requests directly related to criminal investigation, prosecution, trial, and enforcement of judgments;
5) Personal information controller has sufficient evidence to show the subjective malice or abuse of rights by the personal information subject;
6) Requests that are difficult to obtain the consent of the individual or other persons concerned, but are necessary for the protection of the life, property, and other significant legitimate rights and interests of the personal information subject or other individuals;
7) Requests that, if honored, would cause serious harm to the legitimate rights and interests of the personal information subject or other individuals, organizations;
8) Requests involving trade secrets.

6. Sharing and External Provision of Information

6.1 We will not share or transfer your personal information to third parties, except in the following cases:
6.1.1 With your explicit consent: With your prior consent, we may share your personal information with third parties.
6.1.2 For the purpose of external processing: We may cooperate with affiliated companies or other third-party partners (third-party service providers, contractors, agents, application developers, etc.) to share your personal information, in order for them to process the information on our behalf, in accordance with our instructions, privacy policy, and other relevant confidentiality and security measures. They will use the information to provide services to you and achieve the purposes described in the "How We Use Information" section. If we share your information with the aforementioned affiliated companies or third parties, we will take measures such as encryption and anonymization to protect the security of your information.
6.2 We will not publicly disclose the collected personal information. If it is necessary to make a public disclosure, we will inform you of the purpose of the disclosure, the type of information to be disclosed, and the possibility of sensitive information being involved, and obtain your explicit consent. It should be noted that the disclosure or sharing of end user-related information within the enterprise user's work platform is determined and managed by the enterprise user.
6.3 As our business continues to develop, we may engage in transactions such as mergers, acquisitions, and asset transfers. We will inform you of relevant circumstances and continue to protect your personal information in accordance with legal requirements and standards that are no less stringent than those set forth in this guideline, or request the new controller to continue to protect your personal information.
6.4 We may disclose your personal information in response to legal requirements or enforcement requests from relevant departments.

7. Protection of Minors

We attach great importance to the protection of personal information of minors. According to relevant laws and regulations, if you are a minor, you should obtain written consent from your parent or legal guardian before using Global Messenger Tracking services. If you are a guardian of a minor and have any questions regarding the personal information of the minor you are supervising, please contact our customer service at +860731-85568037.

8. Changes to This Policy

In order to improve the quality of our products or services, we may modify this privacy policy periodically. The revised privacy policy will be announced by Global Xinsi Company or notified to you in another appropriate and prominent manner before the revisions take effect. In such cases, if you continue to use our services, it indicates that you agree to be bound by the revised privacy policy.

9. Self-starting and Associated Start Instructions

In order to ensure that this application can receive broadcast messages from the client push notifications while in the closed or background running state, this application needs to use the self-starting capability. It will send broadcasts through the system at a certain frequency to awaken and start itself or perform associated startup actions, which is necessary to achieve the required functionality and services.

10. Other Additional Features

1) Additional services based on camera and photo album permissions. After granting access to the camera and photo album, you can use this feature to upload avatars, device photos, additional images for bookmark points, and other functions.
2) Geolocation information. When tracking device location, we collect your geolocation information to calculate and provide position-related data of the device relative to you.
3) Permission to delete and create files in the SD card. By enabling the permission to delete and create files in the SD card, you can enable file caching functionality.
4) Bluetooth permissions. You can enable Bluetooth permissions to communicate with or read data from hardware devices that support Bluetooth transmission.
Please note that by granting the above permissions, you authorize us to collect and use the corresponding personal information to achieve the above functions. If you disable the corresponding permissions, it means that you revoke the corresponding authorization, and we will no longer collect and use your corresponding personal information, nor will we be able to provide you with the corresponding functionality.