This privacy policy is formulated by [OnlyOwner Technology Limited.] (hereinafter referred to as “we”) and applies to your understanding of our development MOwner App( Hereinafter referred to as “this App”) Access and use of the supporting Bluetooth hardware device “MOwner” (hereinafter referred to as the “Bluetooth hardware device”). We highly value your privacy and security, always taking data localization and encryption protection as core principles, and are committed to ensuring that your personal information and privacy data are not leaked, tampered with, or abused. Please carefully read this privacy policy. If you click “agree” or actually use this App By using Bluetooth hardware devices, you indicate that you have fully understood and agreed to this policy (including d versions), and agree that we will collect, use, store, and process your relevant information in accordance with this policy.
1. How do we collect and use your information
MOwner App It is a tool application that focuses on encrypted storage and targeted encryption sharing of mobile document data, with all core operations (such as...) PIN Code verification and document encryption/decryption are all completed locally on your mobile phone, without the need for cloud registration. We only collect the necessary information to implement basic functions and do not collect or store your encrypted document content or sensitive personal data. The specified document upload to the cloud will only be performed when you choose to upload the file to the cloud storage space.
1.1. Device binding and login related data
1.1.1. Bluetooth hardware identification data: To establish this App Unique binding relationship with Bluetooth hardware devices, ensuring that only the matching hardware you hold can be unlocked App, We will collect the model and device number of Bluetooth hardware devices (i.e App The name of the “MOwner01” class displayed on the interface. This data is only used for local verification of binding relationships and will not be uploaded to cloud servers.
1.1.2. Login verification data: When logging in, we will collect your phone's Bluetooth enabled status, connection results with Bluetooth hardware devices (such as “connection successful/failed”) PIN Code input verification result (“correct/incorrect”). among which, PIN The code verification process is completely completed locally, and we do not collect or store your data PIN Code (Initial) PIN Code '999999' and your customized code PIN The codes are only stored in Bluetooth hardware devices, and login is only allowed based on the verification results.
1.1.3. Necessary permission associated data: In order to complete Bluetooth device search and document reading/storage operations, this App Bluetooth permission and document access permission need to be applied for (some mobile phone systems require Bluetooth search associated location permission, which is only used for local scanning of Bluetooth devices and does not collect your actual geographic location information). We only obtain the basic data necessary for implementing the function within the scope of your authorized permissions (such as Bluetooth device list, encrypted document path), and do not collect additional information beyond your permissions.
1.2. Document management related data
1.2.1. File metadata: When you move a document into a “Security Zone”, export the document (plaintext/ciphertext), or share it encrypted, we temporarily collect the basic metadata of the document (such as document name, size, format, creation time). This data is only used to adapt encryption algorithms, verify document integrity, ensure the normal completion of encryption/decryption operations, and does not collect the document content itself. The basic metadata is only locally retained in the “document stack” after the operation is completed.
1.2.2. Document operation log data: For your convenience in tracing document processing records, this App Your document operation behavior will be recorded locally, including the time, document name, and operation results (such as “success/failure”) of “document move into Security Zone”, “Security Zone document export”, “encrypted document sharing”, “receive encrypted document decryption”, etc. This log is only stored in the local “file stack” of the phone and is managed by you. We do not retrieve or store this log data.
1.3. Contact book and friend management related data
1.3.1. App Internal Address Book Data: Friends manually added in the “Address Book” section ID. Friend nicknames and group information (such as “family” and “colleagues”) are only stored locally on the phone and are used to accurately recipients for targeted encrypted sharing. We do not actively obtain the address book data that comes with your phone system, nor do we collect or store friends ID Corresponding real identity information (such as friend name, contact information).
1.3.2. Equipment ID Data: This App” The “Equipment” displayed in the “Basic Settings” section ID”( Used to add friends, it is a unique identifier generated based on the binding between your phone and Bluetooth hardware device, and supports you to long press to copy and share with friends. This data is only used for identifying each other's identities among friends to complete targeted encrypted sharing, and we do not store this device ID The associated information with your personal identity will not be used for non functional purposes.
1.4. Personal notepad data
The key information you edit and the images you add (up to 9) in “Basic Settings - Personal Notebook” will be edited by this App After automatic encryption, it is stored locally on your phone and can only be viewed or edited after connecting to the bound Bluetooth hardware device. We do not collect or store any content from this notebook, nor can we access or decrypt this information in any way.
1.5. Equipment and usage log data
1.5.1. Basic equipment information: To optimize this App To ensure compatibility on different devices and stable connection with Bluetooth hardware devices, we will collect your phone model and operating system version (such as Android 13). Bluetooth version. This type of information is only used for the development of adaptation functions (such as fixing Bluetooth connection vulnerabilities of specific models), and is not associated with your personal identity. It is only used when you use this information App Temporary retri, not long-term storage.
1.5.2. Use exception logs: If this App In the event of abnormal situations such as crashes, Bluetooth connection failures, encryption/decryption errors, etc., a temporary log containing error codes and operational scenarios (such as “Failed to export Security Zone documents”) will be automatically generated. This log is only for your reference when troubleshooting or contacting our customer service. We may only obtain this log when you actively submit feedback, and it will only be used for damage repair and not for any other purposes.
2. How do we share, transfer, and publicly disclose your data
We strictly adhere to the principle of “non active sharing, non arbitrary transfer, and non public disclosure”, and will never provide your data to any third-party vendor except in the following necessary circumstances:
2.1. Third party vendor service provider (technical support only)
If it is due to the implementation of basic technical functions (such as App For version push and Bluetooth connection stability optimization, we may share non identity related device basic data such as your phone model and operating system version with rigorously screened third-party vendor service providers (such as cloud computing service providers and push service providers). We will sign strict confidentiality agreements with third-party vendors, requiring them to:
>Use the data only under our explicit instructions and not for any other purposes;
>Take the same security measures as us (such as data encryption storage) to protect data;
>No further sharing or transfer of data to other third-party vendors is allowed.
2.2. Mandatory requirements by laws and regulations
Your document data is only stored locally on your phone (only when you choose to upload files to cloud storage space, will the specified document upload to the cloud be performed). If required by laws, regulations, judicial authorities, or administrative regulatory departments, we may disclose your relevant data within the necessary scope. But we will prioritize confirming the legality of the requirements through legal channels and only disclose the minimum scope of data necessary to achieve compliance purposes; If permitted by laws and regulations, we will make every effort to notify you before disclosure (unless prohibited by law).
In addition, we will not share or transfer any of your data (including documents, contacts, operation logs, etc. stored in the local storage area) to any third-party vendors, nor will we disclose it publicly in any form.
3. How do we save your data
3.1. Storage location
You are using this App All data generated during the process is only stored locally on your mobile phone or compatible Bluetooth hardware device, and is not uploaded to our cloud server or any third-party storage platform (only when you choose to upload files to the cloud storage space, will you perform the specified document upload cloud operation):
>Bluetooth hardware identification App Store encrypted content such as internal contacts, document operation logs, and personal notebooks locally on the phone;
> PIN The code is stored in the Bluetooth hardware device and is only connected through an encrypted Bluetooth channel App Complete local verification;
>Communication data between mobile phones and Bluetooth hardware devices (such as PIN Code verification instructions and encrypted document sharing instructions are only transmitted between the two through encrypted Bluetooth channels, without being forwarded by external servers.
>When you choose to upload files to cloud storage space, the documents you specify will be encrypted and stored in the storage space of the cloud server.
3.2. Storage period
3.2.1. Local functional data: App Internal address book, document operation log, device ID Data directly related to the use of the function will be stored locally as you continue to use it until you actively it (such as deleting friends, clearing file stacks, clearing Security Zone, uninstalling) App) Or clear relevant data from the mobile phone system;
3.2.2. Temporary data: Temporary data such as document basic data and device basic data, after completing corresponding operations (such as document encryption, Bluetooth connection), will only be retained for 24-72 hours for verification, and will be automatically cleared locally after the deadline;
3.2.3. Fault logs and feedback data: Fault logs that have not been actively submitted will be automatically d locally after 72 hours; The fault logs and feedback suggestion data that you voluntarily submit will be d within 15 working days after the problem is fixed or the requirements are processed, and will not be stored for a long time;
3.2.4. Document data in cloud space: The storage period of documents is determined by the user's cloud space usage period.
3.2.5. Special requirements of laws and regulations: If laws and regulations have clear provisions on the storage period of data, we will only retain necessary data locally on your mobile phone for the shortest period of time that meets the requirements.
3.3. Security protection measures
We adopt a triple security measure of “local encryption+transmission encryption+permission control” to comprehensively safeguard your data security:
3.3.1. Technical security measures:
>Local data and cloud space data encryption: “Security Zone” documents, personal notepad content, and cloud space documents are all encrypted using AES-256 Encryption algorithm encryption, the encryption key is generated and stored by the Bluetooth hardware device, and is only temporarily decrypted when connected to the hardware to ensure that unauthorized personnel cannot access it after the phone is lost; App Internal address book, equipment ID Using hash algorithm to prevent local unauthorized access by other applications;
>Transmission encryption: all communication data between mobile phones and Bluetooth hardware devices (such as PIN Code verification instruction), via Bluetooth LE Encryption channel transmission, using ECC Elliptic curve encryption algorithm to prevent data from being intercepted or tampered with;
>Vulnerability Protection: Regular s on this App Perform security vulnerability scanning and promptly fix potential risks in modules such as Bluetooth connection, document encryption, and cloud storage.
3.3.2. Management security measures:
>Internal permission control: Our employees have no access to your local data, and may only have access to the device model and fault logs provided by you when you actively submit fault feedback. Contact personnel must sign a confidentiality agreement and leave a trace of the entire operation process;
>Emergency response mechanism: In the event of a cause App We will immediately release a version to fix the risk of local data leakage caused by vulnerabilities (such as specific models being able to bypass Bluetooth verification and access the Security Zone), and pass it through App Notify you through pop ups, official website announcements, and other means to guide you in taking remedial measures (such as re encrypting documents).
Although we have taken the above measures, due to technical limitations and potential risks of malicious attacks, we cannot guarantee absolute data security. If you find any data security issues (such as unauthorized access to Security Zone documents), please immediately disconnect your Bluetooth device and uninstall it App, And notify us through this statement “7. Contact Us”, and we will assist you in investigating and handling the matter.
4. How do you manage your information
You are interested in this App All data within has complete autonomy and can be exercised through the following methods:
4.1. Data access and viewing rights
You have the right to access and view your content at any time App Related data in:
>Access the 'File Stack/Security Zone' to view document operation logs and related documents;
>Access the 'Contacts' to view friends ID. Nickname and group information;
>Access' Basic Settings' to view the device ID;
>After connecting the bound Bluetooth hardware device, access “Basic Settings - Personal Notebook” to view important encrypted information stored.
4.2. Right to modify and data
4.2.1. Address Book Management: In the “Address Book” section, you can modify friend nicknames, adjust friend groups, or directly friends; Custom groups can be d;
4.2.2. Document operation log management: In the “File Stack/Security Zone”, long press to a specific document, which can be directly d;
4.2.3. Personal notebook management: In “Basic Settings - Personal Notebook”, you can edit saved information, added images, or clear all notebook contents;
4.2.4. Device binding data management: by uninstalling and reinstalling the device App, Can release the binding relationship with Bluetooth hardware devices and the corresponding binding data.
4.3. Permission management
You can close this device at any time in the system settings of your mobile phone App Bluetooth permission, document access permission, and location permission (disabling them may cause Bluetooth connection failure, document encryption failure, and other functions to fail, so caution should be exercised).
4.4. Data clearing
If you need to completely remove this App Relevant data can be found in the “Application Management” section of the mobile phone MOwner App, Select 'Clear Data' or 'Uninstall', and all locally stored data (including encrypted documents in the Security Zone, address book, document operation logs, and encrypted content in the personal notebook) will be permanently d (please backup important documents in advance through the 'Security Zone' plaintext/ciphertext export function to avoid data loss).
5. How do we protect the information of minors
We attach great importance to the privacy protection of minors. If you are a minor under the age of 18, use this App Prior consent from the guardian must be obtained and used under their guidance.
5.1. We collect any personal information of any user (including minors), and if a guardian discovers that a minor is in this App Sensitive information is stored in, which can assist minors in clearing relevant data through functions such as “personal notepad deletion” and “Security Zone document deletion”, or uninstalling App Completely information.
5.2. If the guardian discovers that we have mistakenly obtained information about minors due to technical malfunctions, they can contact us through the “7. How to Contact Us” section of this policy. After verification, we will guide you to complete the information deletion and provide necessary technical support.
6. How to this policy
6.1. We may adjust based on changes in laws and regulations App Functional upgrades (such as adding the feature of “synonizing contacts to Bluetooth devices”) or adjustments to privacy protection requirements, this privacy policy.
The d privacy policy will be included in this document App” Publish in the “Basic Settings - About - Privacy Policy” section and inform you through pop-up prompts, push notifications, and other means;
6.2. If the d content involves significant adjustments such as expanding the scope of information collection or changing the way of use, we will notify you the next time you open this document App Mandatory pop-up prompt, you need to read and agree before continuing to use;
6.3. If you do not agree with the d privacy policy, you may choose to stop using this App, And uninstall and clear the relevant data. You continue to use this App It is considered as acceptance of the d policy.
7. How to contact us
If you have any questions, opinions, or suggestions regarding this privacy policy, or if you discover any personal information security issues (such as abnormal leakage of encrypted documents or unauthorized device access to Bluetooth connections), please feel free to contact us through the following methods:
>Email:[ subject@onlyownerhk.com ]
>Contact phone number: [+852 2237 7288]
>Email address: Room 1007, 10/F, West Wing, Tsim Sha Tsui Centre, 66 Mody Road, Tsim Sha Tsui, Kowloon. Hong Kong
We will verify and reply within 5 working days after receiving your feedback. If there are any information security issues involved, we will prioritize processing and do our best to protect your privacy and security.