NW Teleprompter Privacy Policy

 

Updated: January 9, 2024

Effective from: January 9, 2024

Thank you for choosing to use the software developed and operated by Shenzhen NEEWER Technology Co., Ltd. (hereinafter referred to as "we" or "NEEWER") and/or its affiliates. This policy only applies to products or services related to NW Teleprompter.

We have taken every possible step to ensure that your privacy is protected. If you have any questions, comments or suggestions about this policy or personal information protection, you can contact us via the following email:

llContact address: Room 1901, Building A, Lushan Building, Chunfeng Road, Luohu District, Shenzhen

lPostal code: 518001

llEmail: neewer.privacy@xydglobal.com

Special Note:

Please read this policy carefully before using "NW Teleprompter". NEEWER will protect the personal information collected during any or all of your use of "NW Teleprompter" in accordance with relevant laws and regulations. Key terms relevant to your rights and interests outlined in this policy are highlighted in bold and we invite you to review them.

Ⅰ. Scope of application of this policy

Software developed and operated by NEEWER or its affiliates and applicable to this policy includes but is not limited to: NW Teleprompter PC application client (including PCs running macOS systems and PCs and tablets running Windows systems).

Ⅱ. Definition

1. Personal information: refers to various information related to identified or identifiable private individuals recorded electronically or by other means, excluding anonymized information.

2. Sensitive personal information: refers to personal information that may endanger personal safety and property security and, once leaked, illegally provided, or abused, may cause damage to a person's reputation, physical and mental health, or receive discriminatory treatment. We will clearly mark specific personal sensitive information in bold in this policy.

3. Personal information deletion: refers to the act of deleting personal information from the systems involved when performing daily business functions, so that it can no longer be retrieved or accessed.

4. Anonymization of personal information: Through the technical processing of personal information, your identity cannot be identified, and the processed information cannot be recovered.

5. NW Teleprompter PC application client: refers to PC application software running on macOS and Windows operating systems.

Ⅲ. What information do we collect and how do we use it?

In order to provide you with services, NW Teleprompter may need to apply for the following permissions from you within the necessary scope. We assure you that NW Teleprompter does not enable these permissions by default and they can only be accessed when performing specific services/functions with your separate consent. Even if you have authorized access to your corresponding permissions, we will only access and obtain the corresponding information (if necessary) within the scope of your authorization. You can withdraw your authorization at any time. After you withdraw your authorization, we will stop accessing the corresponding permissions and will no longer be able to provide you with some related services, but this will not affect your use of other services we provide. View a list of application permissions.

Ⅳ. How we share, transfer and publicly disclose your personal information

1. Share

In order to provide you with the services described in this privacy policy, we may share necessary personal information with partners, partners and other third parties on the premise of following the principles of "legitimate, minimally necessary, and clear purpose". include:

A. Disclose your personal information to third party service providers who provide certain business-related services to us (such as website hosting, data storage facilities, customer support services, email delivery services and other similar services) to ensure that they can provide us with Serve.

b. Regularly disclose your personal information to the company's subsidiaries or affiliated companies to carry out business activities.

2. Transfer

We will not transfer your personal information to any company, organization or individual other than our affiliated companies, except in the following circumstances:

A. Obtain your express authorization or consent in advance;

b. Comply with laws and regulations, legal procedures or government mandatory requirements or judicial decisions;

C. If we or our affiliates are involved in a merger, spin-off, liquidation, acquisition, or sale of assets or businesses, your personal information may be transferred as part of such transaction. We will ensure the confidentiality of such information when transferred and require new companies and organizations that hold your personal information to continue to be bound by this policy. Otherwise, we will ask the company and organization to seek authorization from you again.

3. Transmitting personal information without your permission

If we need to transfer personal information outside of your purview, whether to our subsidiaries (including communications, technology or cloud services companies) or third-party service providers, we will transfer the relevant information in accordance with applicable law. In particular, to ensure that all such transfers comply with applicable local data protection laws, we will implement appropriate security measures. According to the regulations, you will have the right to know the appropriate protective measures taken by NEEWER for the transmission of your personal information.

NEEWER is a multinational company headquartered in China. Subject to applicable law, we may transfer your personal data to any of NEEWER's subsidiaries and affiliates worldwide in order to process such information in compliance with this Privacy Policy. We may also transfer your personal data to our third party service providers, who may be located outside the European Economic Area (EEA).

Whenever NEEWER shares personal data from the European Economic Area with a third party, whether or not that third party is an entity outside the European Economic Area, we will share the relevant information in accordance with the EU Standard Contractual Clauses or any other safeguards set out therein. General Data Protection Regulation.

NEEWER may use overseas facilities operated and controlled by NEEWER to process or back up your personal information. We currently have data centers in Shenzhen and the United States. Such overseas jurisdictions may or may not have provisions similar to the data protection laws of your jurisdiction. We ask you to consider that there are different risks under applicable data protection laws and we may transfer and store your personal information in our overseas facilities; however, this does not change our commitment to protecting your personal information in accordance with this privacy policy.

4. Public disclosure

We will only publicly disclose your personal information under the following circumstances:

A. Obtain your express consent;

b. According to laws, regulations, legal procedures, lawsuits or mandatory requirements of government authorities.

5. Sharing, transfer, and disclosure of personal information shall not be subject to prior authorization and consent.

Ⅴ. How we protect and store your personal information

We will strictly abide by relevant laws and regulations on the processing of personal information, and strive to adopt security protection measures that comply with industry standards to protect your personal information and prevent your personal information from unauthorized access, public disclosure, use, modification, damage or loss. . The security measures we take are as follows, but please remember that no amount of security measures can provide guaranteed protection:

1. When you send information to or receive information from our servers, we ensure that it is encrypted using the Transport Layer Security (TLS) protocol and other appropriate algorithms.

2. All your personal information is stored on secure servers and protected in controlled facilities.

3. We will conduct due diligence on third-party partners to ensure their ability to protect your personal information. We will also check that third parties employ appropriate security standards by enforcing appropriate contractual restrictions and conducting audits and assessments as necessary.

We will revise and improve the above measures and management methods from time to time to improve the overall safety level.

. Your rights

We attach great importance to the management of your personal information and try our best to ensure that you can exercise your rights to access, copy, correct, supplement, delete, withdraw consent and authorize your personal information.

1. Change or revoke the scope of authorization

You can turn off relevant permissions, change the scope of consent, or withdraw authorization in the operating system settings of the device itself. After revoking authorization, we will no longer collect information related to this permission.

Ⅶ. Protection of children’s personal information

This application is for adults only. If you are a child, your parent or guardian needs to agree to use this application and agree to the relevant terms of service. Parents and guardians should also take appropriate precautions to protect children, including monitoring their use of the Application.

For cases where we collect personal information from children with the consent of parents or guardians, we will only use or publicly disclose such information as permitted by law, with the express consent of parents or guardians, or as necessary to protect the child.

Although the definition of a child may vary according to local law or custom, we consider anyone under the age of 14 to be a child.

Ⅷ. How this policy is updated

1. In order to provide you with better services and as our business develops, the provisions of this policy may be modified from time to time, but we will not reduce your rights under this policy without your explicit consent.

2. After this policy is updated, we will display the changed policy to you in the form of push notifications and pop-up windows when you log in to the updated version, so that you will know that there is an updated version of this policy.

Thank you for reading our privacy policy!

 

Attachment 1: Application permission list

In order to provide you with services, we may apply for or use relevant permissions on the operating system. We will use the following list to describe the relevant operating system permissions that may be requested and used. You can manage relevant permissions according to your actual needs.

Permission type

Permission

name

Purpose of use

Information involved 

Whether to ask

Can I close it?

Storage

Storage permissions

View documents

 Store files

Pop up query when  users actively uses

 Yes

Bluetooth

Bluetooth permissions

Obtain your Bluetooth permissions, and you can add and connect remote control functions through Bluetooth.

Bluetooth information

Pop up query when  users actively uses

Yes