Privacy Policy

Update Date: January 5, 2026
Effective Date: January 5, 2026
App Name: Zangle
Developer: Dongguan Zangle Acoustic Technology Co., Ltd.

1. Special Notice

Welcome to use Zangle app! Zangle is developed by Dongguan Zangle Acoustic Technology Co., Ltd. The service provider of Zangle app (hereinafter referred to as "we") fully understands the importance of your personal information and will do our utmost to protect the security and reliability of your personal information. We are committed to maintaining your trust in us and processing your personal information in accordance with the principles of legality, legitimacy, necessity and good faith. Therefore, we formulate this Privacy Policy (hereinafter referred to as "this Policy") to help you fully understand how we collect, use, store, share and transfer such information when you use the app, as well as the ways we provide for you to access, update, delete and protect such information. Before you use Zangle app, please carefully read this Policy and fully understand the content of each clause. You can make the choices you deem appropriate in accordance with the guidelines of this Privacy Policy. We have tried to express the relevant terms in this Privacy Policy in a concise manner and provide links for further explanation to help you better understand. If you have any questions, please contact us.

This Policy will help you understand the following contents:

1.1. How we collect and use your personal information

1.2. How we use COOKIES or similar technologies

1.3. How we share, transfer and publicly disclose your personal information

1.4. How we protect your personal information

1.5. How you can manage your personal information

1.6. How this Privacy Policy is updated

1.7. How to contact us

2. How we collect and use your personal information

2.1.Personal information refers to various types of information recorded by electronic or other means that are related to an identified or identifiable natural person, excluding information after anonymization. Sensitive personal information refers to personal information that, if disclosed or illegally used, may easily lead to infringement of the dignity of natural persons or endanger their personal or property safety, including biometric identification, religious beliefs, specific identities, medical and health, financial accounts, travel tracks and other information, as well as personal information of minors under the age of 14.


2.2.We will follow the principles of legitimacy, legality and necessity to collect and use your personal information that you actively provide or generate during the use of the app, as well as obtain relevant personal information about you from third parties, for the following purposes stated in this Policy. If we intend to use your personal information for other purposes not specified in this Policy, or use information collected for specific purposes for other purposes, we will inform you in a reasonable manner and obtain your consent again before use. When you cancel your account, we will stop using and delete the above information.


2.3.Situations where you can independently choose to provide personal information

2.3.1. To make your use of our app more convenient and enhance your experience, the following extended functions of ours may collect and use your personal information. If you do not provide such personal information, you can still use the core functions of the product or service name, but you may not be able to use the extended functions we provide for you or you may need to fill in some information repeatedly. These extended functions include:
2.3.1.1. Extended functions based on recording
You can record audio through the App and send it to hardware devices or broadcast it to other devices, so we need the recording function.
2.3.1.2. Data statistics and analysis function
To provide you with better services and experience, we will collect your device-related information (device ID, Android ID, device serial number (IMEI/Android ID/IDFA/OPENUDID/GUID/SIM card IMSI information/ICCID), device MAC address, device model, operating system and version, App version, software installation list, etc.) for statistical analysis and optimization of application performance, bringing you a better experience.
2.3.1.3. Access to third-party applications
Our product integrates Firebase Analytics SDK, which needs to collect your device Mac address and unique device identifiers (IMEI/Android ID/IDFA/OPENUDID/GUID/SIM card IMSI information/ICCID) to provide statistical analysis services..
When you use the accessed third-party applications in the product or service name, for the purpose of providing docking technical support, we may obtain your necessary personal information from the developers of such third-party applications and their technical service providers, such as device information and operation behavior log information. If it involves your sensitive personal information, we will obtain authorization from you separately. If you refuse us to collect relevant personal information, it may lead to the inability to realize all or part of the functions of the third-party applications, but it will not affect your use of other functions of the app.
The developers and technical service providers of such third-party applications may directly collect and use your personal information in accordance with their provided privacy policies, but we will not obtain such personal information. We recommend that you read and confirm your understanding of such privacy policies before accepting relevant services and providing personal information.

2.4.You are fully aware that we do not need to obtain your authorization and consent to collect and use personal information in the following situations

2.4.1 Related to national security and national defense security.
2.4.2 Related to public security, public health and major public interests.
2.4.3 Related to criminal investigation, prosecution, trial and execution of judgments, etc.
2.4.4 For the purpose of safeguarding the major legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the consent of the person concerned.
2.4.5 The collected personal information is voluntarily disclosed to the public by the personal information subject or his guardian.
2.4.6 Collecting your personal information from legally publicly disclosed information, such as legitimate news reports, government information disclosure and other channels.
2.4.7 Necessary for signing a contract according to your requirements.
2.4.8 Necessary for maintaining the safe and stable operation of the provided products and/or services, such as discovering and handling faults of products and/or services.
2.4.9 Necessary for legitimate news reporting.
2.4.10 When academic research institutions carry out statistics or academic research based on public interests, and when providing the results of academic research or descriptions to the outside world, de-identify the personal information contained in the results.
2.4.11 Other circumstances stipulated by laws and regulations.

3. How we share, transfer or publicly disclose your personal information

3.1 Entrusted processing

3.1.1 If we entrust a third party to process your personal information, we will agree with the trustee on the purpose, duration, processing method, type of personal information, protection measures and the rights and obligations of both parties, and supervise the personal information processing activities of the trustee.

3.2 Sharing

3.2.1 We share your personal information on the premise of abiding by the principles of "legitimacy, necessity and clear purpose". At the same time, we will conduct a personal information protection impact assessment in advance for the sharing of personal information, and take effective technical protection measures for the output form, circulation, use, etc. At the level of cooperation agreements, we strictly require partners to assume information protection obligations and responsibilities, and sign data security protection agreements with business partners before cooperation.
We have formulated the "Third-Party Sharing List" to clearly and concisely introduce to you our main situation regarding the sharing of your personal information. 3.2.2 We will not share your information with any third party outside the company, except in the following cases:
(1) Obtain your explicit consent or authorization in advance.
(2) Disclose your information to the outside in accordance with the requirements of applicable laws and regulations, legal procedures, mandatory administrative or judicial requirements.
(3) Only by sharing your personal information can we realize the core functions of our products and services or provide the services you need.
(4) To realize the relevant products or services we provide to you and protect your account, etc., we may share your personal information with our affiliated parties. We will share your personal information with our affiliated parties in accordance with the provisions of this Privacy Policy, but we will only share necessary personal information, which is bound by the purposes stated in this Privacy Policy. If our affiliated parties intend to change the purpose of processing personal information, they will seek your authorization and consent again.
(5) We may share your mobile phone information with partners and other third parties to ensure the smooth completion of the services provided to you. However, we will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and only share the personal information necessary for providing services. Our partners have no right to use the shared personal information for any other purposes.
(6) Provided based on academic research.
(7) Provided in accordance with the agreement signed with you for a single service or other legal documents.

3.3 Transfer

3.3.1 Transfer refers to the process of transferring the control right of personal information to other companies, organizations or individuals.
3.3.2 We will not transfer your personal information to any third party outside the company, except in the following cases:
(1) Obtain your explicit consent or authorization in advance.
(2) With the continuous development of our business, in the event of merger, acquisition or bankruptcy liquidation of our company, your information may be transferred as part of such transactions. If it involves the transfer of personal information, we will require the new company, organization or individual that holds your personal information to continue to be bound by this Policy; otherwise, we will require the company, organization or individual to seek authorization and consent from you again.

3.4 Public disclosure

4.4.1. We will not publicly disclose your personal information to any third party outside the company, except in the following cases:
(1) We may publicly disclose your personal information in accordance with the requirements of laws and regulations, litigation, dispute resolution, or in accordance with the legally proposed requirements of administrative and judicial organs.
(2) Disclose the information you specify in the disclosure method you explicitly agree to according to your needs.

4. How we protect your personal information

4.1 We have always attached great importance to protecting the security of users' personal information. To this end, we have adopted security technologies, organizational and management protection measures that meet industry standards to minimize the risk of your information being leaked, damaged, misused, unauthorized accessed, unauthorized disclosed and altered.

4.1.1 Data security technical measures
4.1.1.1
We will adopt security protection measures that meet industry standards, including establishing reasonable system specifications and security technologies to prevent your personal information from being accessed and used without authorization, modified, and avoid data damage or loss.
4.1.1.2
Our network services adopt encryption technologies such as Transport Layer Security Protocol, and provide browsing services throughhttps and other methods to ensure the security of user data during transmission.
4.1.1.3
We adopt encryption technology to encrypt and store users' personal information, and isolate it through isolation technology.
4.1.1.4
When using personal information, such as personal information display and personal information correlation calculation, we will adopt a variety of data desensitization technologies including content replacement andSHA256 to enhance the security of personal information in use.
4.1.1.5
We adopt strict data access permission control and multi-factor authentication technology to protect personal information and avoid unauthorized use of data.
4.1.1.6
We adopt code security automatic inspection and data access log analysis technology to conduct personal information security audit.
4.1.2
Other security measures we take to protect personal information
4.1.2.1
We manage and standardize the storage and use of personal information by establishing a data classification and grading system, data security management specifications and data security development specifications.
4.1.2.2
We conduct comprehensive security control of data through confidentiality agreements for information contacts, monitoring and audit mechanisms.
4.1.2.3
We have established a data security committee and set up a special department for information protection and a data security emergency response organization to promote and ensure the security of personal information.
4.1.2.4
We will hold security and privacy protection training courses to strengthen employees' security awareness and their understanding of personal information protection policies and relevant procedures.

4.2 Please be aware that although we will do our best to ensure the security of any information you send to us, the Internet environment is not 100% secure, and we are not liable for any risks or losses arising therefrom or related thereto.

4.3 In the unfortunate event of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions for you to independently prevent and reduce risks, and the remedial measures for you. We will promptly inform you of the relevant procedures of the incident by email, letter, telephone, push notification and other methods. When it is difficult to inform each personal information subject one by one, we will issue an announcement in a reasonable and effective manner. At the same time, we will also report the disposal of the personal information security incident in accordance with the requirements of the regulatory authorities.

5. How you can manage your personal information

5.1 We attach great importance to your management of personal information and do our utmost to protect your statutory rights to access, correct, delete, withdraw consent and other rights regarding personal information, so that you have sufficient ability to maintain the security of your privacy and personal information.

5.2 Access and correction of your personal information

5.2.1 Except as stipulated by laws and regulations, you have the right to access and correct your personal information at any time;
5.2.2 If you need to access or correct other personal information generated during your use of our products and services, please contact us at any time. We will respond to your request in accordance with the methods and time limits specified in this Privacy Policy

5.3 Deletion of your personal information

5.3.1 You may request us to delete your personal information through the methods specified in this Policy in the following circumstances:
(1) If our processing of personal information violates laws and regulations.
(2) If you no longer use our products and services, or you cancel your account.
(3) If we stop providing products and services, or the storage period has expired.
(4) If you withdraw your consent.
(5) If the purpose of our processing of personal information has been achieved, cannot be achieved, or is no longer necessary for achieving the processing purpose.

5.4 Change or withdraw your consent

5.4.1 You may withdraw all authorizations for us to continue collecting your personal information by deleting information, turning off device functions, or canceling your account.
5.4.2 Please understand that the app may need to collect necessary personal information to be realized. When you withdraw your consent, we will no longer be able to provide you with the services corresponding to the withdrawal of consent, but it will not affect the personal information processing services carried out based on your authorization before. 5.4.3 If you cannot exercise your rights in the above ways, you may contact us using the contact information specified in this Policy. To protect the security of your account, when you make the above requests to us, we may first require you to verify your identity before processing your request.
5.4.4 For your reasonable requests, we will not charge fees in principle, but for repeated requests beyond a reasonable limit, we may charge a certain cost fee as appropriate. We may refuse requests that are unreasonably repetitive, require excessive technical means, pose risks to the legitimate rights and interests of others, or are highly impractical.
Exceptions to response situations
In the following circumstances, we will not be able to respond to your request:
(1) Related to our performance of obligations stipulated by laws and regulations.
(2) Directly related to national security and national defense security.
(3) Directly related to public security, public health and major public interests.
(4) Directly related to criminal investigation, prosecution, trial and execution of judgments, etc.
(5) We have sufficient evidence to show that the personal information subject has subjective malice or abuses rights.
(6) For the purpose of safeguarding the major legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the consent of the person concerned.
(7) Responding to the request of the personal information subject will lead to serious damage to the legitimate rights and interests of the personal information subject or other individuals and organizations.
(8) Involving trade secrets

6. How this Privacy Policy is updated

6.1 Our Privacy Policy may be changed from time to time. We will post any changes made to this Privacy Policy on the [Please fill in the platform name]. For major changes, we will provide a more prominent notice, such as a special prompt on the browsing page, explaining the specific changes to the Privacy Policy. Without your explicit consent, we will not reduce the rights you are entitled to in accordance with this Privacy Policy.

6.2 Major changes referred to in this Privacy Policy include but are not limited to:

6.2.1 Major changes in our service model.
6.2.2 Major changes in the main objects of sharing, transfer or public disclosure of personal information.
6.2.3 Major changes in your rights to participate in personal information processing and their exercise methods.
6.2.4 Changes in our contact information and complaint channels.
6.2.5 When the personal information security impact assessment report indicates high risks.

6.3 We will archive the old versions of this Privacy Policy for your reference.

7. How to contact us

7.1 If you have any questions, comments or suggestions about this Privacy Policy, please contact us through the following methods:
Contact Phone: 13825710987
Contact Address: Room 301, Building 3, No.7, 5th Heng Road, Lianhu North Garden, Tangxia Town, Dongguan City, Guangdong Province
Email:
290252723@qq.com

7.2 In general, we will reply within fifteen working days. If you are not satisfied with our reply, especially if our personal information processing behavior has damaged your legitimate rights and interests, you may also file a complaint or report to regulatory authorities such as cyberspace administration, telecommunications, public security and industry and commerce, or seek solutions by filing a lawsuit with the people's court having jurisdiction over the defendant's domicile.

Annex 1: Definitions

1. Personal Information

Personal information refers to various types of information recorded by electronic or other means that can identify the identity of a specific natural person or reflect the activity status of a specific natural person alone or in combination with other information, including name, date of birth, ID card number, personal biometric information, address, communication contact information, communication records and content, account password, property information, credit information, travel track, accommodation information, health and physiological information, transaction information, etc.

2. Sensitive Personal Information

Personal information that, if disclosed or illegally used, may easily lead to infringement of the dignity of natural persons or endanger their personal or property safety, including biometric identification, religious beliefs, specific identities, medical and health, financial accounts, travel tracks and other information, as well as personal information of minors under the age of 14. For example, sensitive personal information includes ID card numbers, personal biometric information, bank account numbers, communication content, health and physiological information , etc.

3. Authorized Consent

It refers to the act of you explicitly authorizing the specific processing of your personal information, including authorizing through positive acts (i.e., express consent) and authorizing through negative inaction.

4. Anonymization

It refers to the process of technically processing personal information so that the subject of personal information cannot be identified or associated, and the processed information cannot be recovered.

5. De-identification

The process of processing personal information so that a specific natural person cannot be identified without the help of additional information.

6. Log Information

The content you publish and browse when using our platform, the operation time, type, network source address, target address, port when you publish the content, the date and time of access, login IP information.

7. Device Information

Including device identifiers (IMEI, IDFA, MAC address, OAID, IMSI and other device-related information), application information (application crash information, notification switch status, application installation list and other application-related information), device parameters and system information (device type, device model, operating system and hardware-related information), device network environment information (IP address, WiFi information, base station information and other network-related information). Subject to the actual collection of the product.

8. Product or Service Name

Refers to the product or service name website and its client program, mobile application product, and mini program.

9. Provider of Product or Service Name

Refers to [Limited Liability Company].

10. Children

Refers to minors under the age of 14.

Annex 2: Third-PartySDK List

1. Embedded SDK List

1.1 Firebase Analytics SDK

Information Collected: mac Android ID, device brand, model, software version, device connected WiFi and base station information, SDK host application package name, version number, service log information
Purpose of Use: For data statistics, improving the stability of the application program and reducing the crash of the application program
Privacy Policy: [Link]

1.2 Flutter SDK(io.flutter,io.flutter.plugin,io.flutter.embedding)

Information Collected: device serial number, Android ID
Purpose of Use: User data statistics
Privacy Policy: [Link]

1.3 Flutter Community(dev.fluttercommunity.android_id,dev.fluttercommunity.plus)

Information Collected: device serial number, Android ID
Purpose of Use: User data statistics

Privacy Policy: [Link]