Privacy Policy

Home » Privacy Policy

Update date: May 26, 2023

Effective date: May 26, 2023

About Us

Hawkinsight and related technologies and functions are operated by Hawk Insight Media Pte. Ltd. The terms “you” and “user” in this agreement refer to any individual who uses and/or accesses this service.

Hawksight providers (referred to as “us”) are well aware of the importance of personal information to you, and we will protect your personal information and privacy security in accordance with laws and regulations. We have established this Privacy Policy and kindly remind you to carefully read and understand it before using Hawkinsight and related services in order to make appropriate choices.

This privacy policy will help you understand:

We will collect and use your information in accordance with our privacy policy, but we will not collect personal information in a bundled manner solely based on your agreement to this privacy policy.

When you use or enable related functions or services, we will collect and use relevant information necessary to achieve the functions and services. Unless it is necessary information to achieve basic business functions or in accordance with legal and regulatory requirements, you may refuse to provide it without affecting other functions or services. We will explain each item in our privacy policy which information is necessary. The identifier, precise geographic location, camera, and album (storage) permissions corresponding to the device will not be enabled by default. Only with your explicit authorization can they be used to implement specific functions or services, and you can also revoke the authorization. When you share or receive shared information, participate in activities, etc., we need to access your clipboard locally, read the passwords, sharing codes, links contained in it, in order to achieve functions or services such as redirection, sharing, and activity linkage. We only upload the content of the clipboard to our server when we locally recognize it as belonging to instructions such as jump, share, and activity linkage. Besides, we will not upload any other information about your clipboard to our server. It should be noted that even with your authorization, we have obtained these sensitive permissions and will not collect your information when the relevant functions or services are not needed. This privacy policy applies to your access and use of our products and services through Hawkinsight applications, Hawkinsight web pages, software development kits (SDKs) and application programming interfaces (APIs) for third-party websites and applications. The following text will help you understand in detail how we collect, use, store, transmit, share, transfer (if applicable) and protect personal information; Help you understand the ways to query, access, delete, correct, and revoke authorized personal information. Among them, we have highlighted important provisions regarding your personal information rights in bold. Please pay special attention.

  1. How do we collect and use personal information
  2. How do we use similar technologies such as cookies
  3. How do we share, transfer, and publicly disclose personal information
  4. How do we store personal information
  5. How do we protect the security of personal information
  6. Manage your personal information
  7. Terms of Use for Minors
  8. Revision and Notification of Privacy Policy
  9. Explanation of third-party SDK situation
  10. Contact us
  11. How do we collect and use personal information

We will collect information that you proactively provide while using the service, as well as information that you generate during the use of features or service acceptance through automated means, in the following ways:

1.1 Registration, Login, and Authentication

1.1.1 Registration and Login

a. When you register and log in to Hawkinsight and related services, you can create an account using your phone number, and you can complete the relevant network identification information (avatar, nickname). Collecting this information is to help you complete your registration. You can also choose to fill in the introduction according to your own needs to improve your information.

b. You can also use a third-party account to log in and use, and you will authorize us to obtain public information (such as avatars, nicknames, and other authorized information) registered on the third-party platform for binding with your Hawkinsight account, allowing you to directly log in and use this product and related services.

c. You can also choose to browse some of Hawkinsight’s features as a tourist.

1.1.2 Certification

When using identity authentication features or services, according to relevant laws and regulations, you may need to provide your real identity information (phone number) to complete real name verification. The above information is personal sensitive information, and you may refuse to provide it. However, you may not be able to access relevant services (such as commenting or posting), but it does not affect the normal use of other functions and services.

1.2 Publishing and Interaction

1.2.1 Information Release

a. When you comment or post, we will collect the information you post and display your nickname, profile picture, and post content.

b. When you use the functions of uploading pictures and publishing videos, we will request your authorization for camera and album (storage) permissions. If you refuse authorization, you will not be able to use this feature, but it does not affect your normal use of other features of Hawkinsight.

c. The information collected by us due to the use of our products or services by users, such as information posted by other users that may contain some of your information (such as information related to you in comments, post graphics, or post videos).

1.2.2 Interactive communication

When you actively follow and interact with accounts and topics that interest you, browse, comment, bookmark, like or share content, we will collect the accounts you follow and show you the accounts you follow.

1.2.3 Recommendation section on homepage

”Hawkinsight does not provide targeted push or precision marketing functions to users. The homepage only provides a fixed recommendation list for staff.

1.3 Search

When you use Hawkinsight search services, we will collect your search keywords. In order to provide efficient search services, some search keywords and service log information will be temporarily stored on your local storage device, and can display search result content and search history to you.

1.4 QR code scanning

When you use the scan QR code function, we need to obtain the system’s camera and video recording reading permission to support the provision of the aforementioned functions. We will only collect the aforementioned information if you click on the QR code to scan the entrance or call up the corresponding search function in other ways that Hawkinsight can provide in the future. If you refuse to collect the above information, please disable the device’s permission to take photos and record videos, but this will also prevent you from accessing the relevant services.

1.5 Operation and Security Guarantee

1.5.1 Operations and Security

We are committed to providing you with safe and reliable products and usage environments, and our core goal is to provide high-quality, efficient, and reliable services and information.

1.5.2 Equipment information and log information

a. In order to ensure the security, quality, and efficiency of software services, we will collect your hardware model, operating system version number, international mobile device identification code, unique device identifier, network device hardware address, IP address, WLAN access point, software version number, network access method, type, status, operation, usage, and service logs.

b. In order to prevent malicious programs, ensure operational quality and efficiency, we will collect data on the operation, usage and frequency, application crashes, and performance of applications.

c. We may use your account information, device information, service log information, as well as information authorized or legally shared by our affiliated companies and partners to determine account security, perform identity verification, detect and prevent security incidents.

1.6 Change in purpose of collecting and using personal information

Please be aware that as our business develops, there may be adjustments and changes to the functionality and services provided by Hawkinsight. In principle, when a new feature or service is related to the one we are currently providing, the personal information collected and used will be directly or reasonably related to the original processing purpose. In scenarios where there is no direct or reasonable correlation with the original processing purpose, we will collect and use your personal information and inform you again and obtain your consent.

1.7 Personal information that is exempted from collection and use by law with consent

Please understand that in the following situations, according to laws, regulations, and relevant national standards, we do not need to obtain your authorization and consent to collect and use your personal information:

a. Directly related to national security and national defense security;

b. Directly related to public safety, public health, and major public interests;

c. Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;

d. For the purpose of protecting the significant legitimate rights and interests of personal information subjects or other individuals, such as life and property, but it is difficult to obtain my consent;

e. The personal information collected by you is publicly disclosed to the public on your own;

f. Collect your personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels;

g. Necessary for signing or fulfilling the contract according to your requirements;

h. Necessary for maintaining the safe and stable operation of software and related services, such as discovering and dealing with software and related service failures;

i. Necessary for legitimate news reporting;

j. When academic research institutions conduct statistical or academic research based on the public interest and provide academic research or descriptive results to the public, they de identify the personal information contained in the results;

k. Other situations stipulated by laws and regulations.

Please be advised that if your personal identity cannot be identified solely or in combination with other information, it does not constitute your personal information in the legal sense; When your information can be individually or in combination with other information to identify your personal identity, or when we combine data that cannot be linked to any specific personal information with other personal information, this information will be treated and protected as your personal information in accordance with this privacy policy during the combined use period.

  1. Use of cookies and similar technologies

Cookies and similar technologies are widely used in the Internet. When you use Hawkinsight and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information about your access and use of this product. We promise not to use cookies for any purpose other than those stated in this privacy policy. We use cookies and similar technologies mainly to achieve the following functions or services:

2.1 Ensuring the safe and efficient operation of products and services

We may set cookies or anonymous identifiers for authentication and security to confirm whether you are securely logging into the service, or whether you have encountered theft, fraud, and other illegal activities. These technologies will also help us improve service efficiency, enhance login and response speed.

2.2 Help You Get a More Easy Access Experience

Using this type of technology can help you avoid repeating the steps and processes of filling out personal information and entering search content (such as recording searches and filling out forms).

2.3 Clearing Cookies

Most browsers provide users with the function of clearing browser cache data, and you can perform corresponding data clearing operations in the browser settings function. If you clear it, you may not be able to use services or corresponding features that rely on cookies provided by the company due to these modifications.

  1. How do we share, transfer, and publicly disclose personal information

3.1 Sharing

3.1.1 Sharing principle

a. Principle of Authorization and Consent: Sharing your personal information with our affiliates or third parties requires your authorization and consent, unless the shared personal information is deidentified and the third party cannot re identify the natural person subject of such information. If the purpose of using information by related parties or third parties exceeds the scope of original authorization and consent, they need to obtain your consent again.

b. The principles of legality, legitimacy, and minimum necessity:

The data shared with related parties and third parties must have a legitimate and legitimate purpose, and the shared data must be limited to the extent necessary to achieve the purpose.

c. The principle of safety and prudence: We will carefully evaluate the purpose of using shared information with related parties and third parties, comprehensively evaluate the security capabilities of these partners, and require them to comply with cooperation legal agreements. We will strictly monitor the security of software tool development kits (SDKs) and application program interfaces (APIs) used by our partners to obtain information, in order to protect data security.

3.1.2 Implement shared information for security and analysis statistics

a. Ensuring usage security: We attach great importance to a good environment for accounts, services, and network information services. To protect the legitimate and legitimate rights and interests of you and other users, and to maintain the information network environment, we and our affiliates or service providers may share necessary equipment and log information.

b. Analyzing product usage: In order to analyze the usage of our services and improve the user experience, we may share deidentified data on product sources and usage (crashes, crashes, usage duration, etc.) with related parties or third parties. This data is difficult to combine with other information to identify your personal identity.

3.1.3 Help you participate in marketing and promotional activities

When you choose to participate in marketing activities organized by us, our affiliates, or third parties, you may need to provide information such as your name, mailing address, and contact information. These information are sensitive personal information, and refusing to provide them may affect your participation in related activities, but it will not affect other functions. We may share avatars, nicknames, and/or the above information with related parties or third parties to ensure that you receive consistent service experiences in joint activities, or entrust third parties to timely redeem rewards for you.

3.2 Transfer

a. We will not transfer your personal information to any other third party unless we obtain your explicit consent.

b. With the continuous development of our business, we may engage in mergers, acquisitions, asset transfers, and your personal information may be transferred as a result. When the aforementioned changes occur, we will require the recipient to protect your personal information in accordance with laws and regulations and security standards not lower than those stated in this privacy policy. Otherwise, we will require the recipient to obtain your authorization and consent again.

3.3 Disclosure

a. We will not publicly disclose your information unless we comply with national laws and regulations or obtain your consent. We will adopt security measures that comply with industry standards when publicly disclosing your personal information

b. We will disclose the information of the relevant accounts when we announce the punishment for illegal accounts and fraudulent behavior.

c. When you authorize games, mini programs, or other features or services, your and your friends’ avatars and nicknames will be displayed in rankings and related features.

3.4 Personal information that is exempt from consent to share, transfer, or publicly disclose in accordance with the law

Please understand that in the following situations, according to laws, regulations, and national standards, we do not need to obtain your authorized consent to share, transfer, or publicly disclose your personal information:

a. Directly related to national security and national defense security;

b. Directly related to public safety, public health, and major public interests;

c. Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;

d. For the purpose of safeguarding your or other individuals’ significant legitimate rights and interests such as life and property, but it is difficult to obtain my consent;

e. Personal information that you disclose to the public on your own;

f. Collecting personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels.

  1. How do we store personal information

4.1 Storage location

We will store your personal information collected and generated during domestic operations within the territory of the People’s Republic of China in accordance with laws and regulations. At present, we will not transmit the above information overseas. If we transmit it overseas, we will comply with relevant national regulations or seek your consent.

4.2 Storage period

We only retain your personal information for the period necessary for the purpose of providing Hawkinsight and services: the information, comments, likes, and related information you post will be retained during the period when you have not withdrawn, deleted, or cancelled your account. After the necessary deadline, we will delete or anonymize your personal information, except as otherwise provided by laws and regulations.

  1. How do we protect the security of personal information

a. We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information, prevent the personal information you provide from being improperly used or accessed, publicly disclosed, used, modified, damaged, lost or leaked without authorization.

b. We will use encryption technology, anonymization processing, and other reasonable and feasible means not inferior to industry peers to protect your personal information, and use security protection mechanisms to prevent malicious attacks on your personal information.

c. We will establish a dedicated security department, security management system, and data security process to ensure the security of your personal information. We adopt strict data usage and access policies to ensure that only authorized personnel can access your personal information, and conduct timely security audits of data and technology.

d. We will develop emergency response plans and immediately activate them in the event of user information security incidents, striving to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage, loss) occurs, we will promptly inform you in accordance with legal requirements: the basic situation and possible impact of the security incident, the measures we have taken or will take to dispose of it, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will promptly inform you of the relevant situation of the event in the form of emails, letters, text messages, and related forms. If it is difficult to inform you one by one, we will take reasonable and effective measures to publish an announcement. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.

g. Once you leave Hawkinsight and related services, browse or use other websites, services, and content resources, we will have no ability or direct obligation to protect any personal information submitted by you on software or websites outside of Hawkinsight and related services, regardless of whether you log in, browse or use the aforementioned software or websites based on links or guidance from Hawkinsight.

  1. Manage your personal information

We attach great importance to your management of personal information and make every effort to protect your rights to query, access, modify, delete, revoke consent authorization, cancel your account, file complaints and reports, and set personal updates to only be visible to you, in order to ensure your privacy and information security.

6.1 Change or revocation of authorization scope

6.1.1 Changing or revoking sensitive permission settings

a. You can disable GPS geolocation, camera, and album permissions in the device’s operating system to change the scope of consent or revoke your authorization. After revoking the authorization, we will no longer collect information related to these permissions.

b. After using the mini program, you can manage the application permissions obtained by the mini program in the mini program interface, and you can revoke the application permission authorization for the mini program.

6.1.2 Information processing for changing or revoking authorization

Specific business functions and services will require your information to be completed. When you withdraw your consent or authorization, we cannot continue to provide you with the corresponding functions and services, nor will we process your corresponding personal information. But your decision to withdraw your consent or authorization will not affect the company’s previous personal information processing based on your authorization.

6.2 Accessing, deleting, and correcting your personal information

6.2.1 Accessing Personal Account Information

You can search and access your profile picture, username, and profile. You can search and access it in “My Settings Avatar Edit” on Hawkinsight.

6.2.2 Query access, delete your favorites, read history, search history.

a. Click on “My – Collections and History” to access and delete queries;

b. Click on the search bar – delete search history;

c. You can click on “My Settings” and then click on “Clear Cache”.

Please be advised that for security and identity recognition reasons (such as number appeal services), you may not be able to independently modify certain initial registration information submitted during registration. If you do need to modify this type of registration information, please contact us according to the contact information stated in this privacy policy.

6.2.3 “Hawkinsight” Application Usage Permission List

To ensure the functionality and safe and stable operation of the Hawkinsight product, we may apply for or use the relevant permissions of the operating system.

To protect your right to know, we will display the relevant operating system permissions that the product may apply for and use through the following list. You can manage the relevant permissions according to your actual needs.

According to product upgrades, there may be changes in the types and purposes of permission applications and usage. We will adjust the list in a timely manner based on these changes to ensure that you are informed of permission applications and usage in a timely manner.

Please be informed that for the functionality and security needs of our business and products, we may also use third-party SDKs, which may also apply for or use relevant operating system permissions.

In the process of using the product, you may use H5 pages or mini programs developed by third parties, and these plugins or mini programs developed by third parties may also apply for or use relevant operating system permissions necessary for business functions.

Android operating system application permission list

Permission Name: CAMERA Camera

Permission function description: Use to take photos

Usage scenario: Accessing local albums

Purpose of use: To replace photos

Permission Name: READ-PHONESTATE Read Phone Status (Device IMSI/IMEI Number)

Permission function description: Provides access to mobile device identification and other information. Please rest assured that this permission cannot listen to or obtain any of your call content and information

Usage scenario or purpose: Read device call status and identification code, recognize mobile device ID, and use it to complete main functions such as audio and video, information display, account login, security protection, etc

Permission Name: READ-EXTERNAL-STORAGE Read External Memory

Permission function description: Provides the function of reading data from the phone’s storage space

Usage scenario or purpose: Allow the app to read stored images, files, and other content, mainly used to help you publish information, record crash log information locally (if any), and other functions

Permission name: WRITE-EXTERNAL_STORAGE Write to external storage

Permission function description: Provides the function of writing to external storage

Usage scenario or purpose: Allow the app to write/download/save/modify/delete images, files, crash logs, and other information

6.3 Complaints and Reports

You can file a complaint or report according to our public policy. If you believe that your personal information rights may be infringed upon, or if you discover clues that infringe upon your personal information rights (such as believing that our collection of your personal information violates legal regulations or mutual agreements), “My Opinion Feedback”, enter the user feedback interface to contact us. We will promptly provide feedback on your complaints and reports after verification.

6.4 Access Privacy Policy

a. You can view the full content of this privacy policy in “My Settings About Hawkinsight/About Us” on Hawkinsight. b. Please be aware that the “Hawksight” and related services described in this privacy policy may vary depending on factors such as the phone model, system version, software application version, and mobile client you are using. The final products and services are subject to the Hawkinsight software and related services you use.

6.5 Stopping operations to inform you

If we cease operations, we will promptly cease the collection of your personal information, notify you of the cessation of operations in the form of individual deliveries or announcements, and delete or anonymize your personal information held.

6.6 Account Cancellation

You can directly apply for account cancellation in our product. You can do it yourself by following the path: “My – Account Settings – Cancel Account” (it needs to be displayed in login mode), click “Cancel Account”. After you cancel your account, we will stop providing you with products and services, and according to your requirements, unless otherwise provided by laws and regulations, we will delete your personal information.

  1. Minors clause

a. If you are a minor under the age of 18, you should read and agree to this privacy policy under the supervision and guidance of your parents or other guardians before using Hawkinsight and related services.

b. We protect the personal information of minors in accordance with relevant national laws and regulations. We will only collect, use, store, share, transfer or disclose the personal information of minors when permitted by law, with the explicit consent of parents or other guardians, or when necessary to protect minors; If we find that we have collected personal information of minors without obtaining verifiable parental consent in advance, we will try to delete the relevant information as soon as possible.

c. If you are the guardian of a minor, if you have any questions about the personal information of the minor you are monitoring, please contact us through the contact information disclosed in our company’s privacy policy.

  1. Revision and Notification of Privacy Policy

a. In order to provide you with better services, Hawkinsight and related services will be updated and changed from time to time. We will revise this privacy policy in a timely manner, and these revisions form part of this privacy policy and have the same effect as this privacy policy. Without your explicit consent, we will not reduce your rights under the current effective privacy policy.

b. After the update of this privacy policy, we will send an updated version to Hawkinsight and remind you of the updated content through appropriate means before the updated terms take effect, so that you can stay informed of the latest version of this privacy policy in a timely manner.

  1. Explanation of third-party SDK situation:

Flutter SDK

Types of personal information involved: Pasteboard Usage scenarios: Sharing or receiving shared information, participating in activities, etc. Third party entity: Flutter (Google Inc.) Official website: https://flutter.dev/showcase Flutter is Google’s UI toolkit that allows for the construction of beautiful, locally compiled applications for mobile, network, and desktop applications through a single code repository. When you share or receive shared information, participate in activities, etc., we need to access your clipboard locally, read the passwords, sharing codes, links contained in it, in order to achieve functions or services such as redirection, sharing, and activity linkage. We only upload the content of the clipboard to our server when we locally recognize it as belonging to instructions such as jump, share, and activity linkage. Besides, we will not upload any other information about your clipboard to our server.

  1. Contact us

If you have any questions about this agreement, please contact us through Hawkinsight customer service hotline+85254941066, and we will provide you with necessary assistance.