Privacy Policy 

Last Updated: July 28, 2025
Effective Date: July 18, 2025

Introduction

Personal information refers to private details about an individual’s life that they do not wish to be publicly disclosed or known by others. Changsha aipo Information Technology Co., Ltd. ("we," "us," or the "Company") values the protection of user privacy. When you use our ParallelLauncher software ("Software"), we may collect and use your related information. This Privacy Policy ("Policy") explains what information may be collected, the purposes of collection, and how we and you can protect this information.

Please read this Policy carefully (especially the bolded sections) and confirm your understanding of our personal information processing rules before using the Software. If you have any questions about this Policy, please contact us. If you disagree with any terms of this Policy, you should immediately stop using the Software. By clicking to accept this Policy or continuing to use the Software after updates, you consent to our collection, use, storage, sharing, transfer, or disclosure of your information as described herein. We are committed to safeguarding your personal information and will take all reasonable measures to ensure its security. This Policy covers the following topics:

Personal Information refers to data that can, alone or in combination with other information, identify a specific individual, including but not limited to name, date of birth, ID number, address, phone number, account details, and password.

Table of Contents

  1. How We Collect Your Personal Information
  2. How We Use Your Personal Information
  3. How We Share, Transfer, or Disclose Your Personal Information
  4. How We Protect Your Personal Information
  5. Third-Party SDK Services
  6. Your Rights
  7. Partner Links and Services
  8. Policy Changes and Contact Information

1. How We Collect Your Personal Information

The definitions of personal information and sensitive personal information in this Policy align with the GB/T 35273 Personal Information Security Specification.

1.1 Information Collected for Account Registration

To provide account registration and login services, you must provide the following information:

  • When registering an account, you provide your phone number and login password.
  • When using a third-party account to log in, we collect your nickname and avatar from the third-party platform.

Currently, the Software supports login via phone number or WeChat. Any changes to login methods will be reflected in the Software.

The purposes of collecting this account information are:
(1) To provide better services through account management, enabling data synchronization across devices so you can access your data even after switching devices.
(2) To allow account recovery using a verified phone number or WeChat account if you lose access or forget your password.
(3) To perform statistical analysis on de-identified data to understand user habits, improve products, enhance service quality, and optimize user experience.

If you do not provide this information or register an account, you may be unable to use premium features like VIP services.

1.2 Information Collected During Service Usage

To assess product compatibility, detect account anomalies, and report errors, we may collect your device information and data on how you and your device interact with our products and services, including:

  1. Device and Application Information: Such as device name, device identifiers (e.g., ESN, MEID, SN), device activation time, hardware model, operating system version, application version, software identifiers, contacts, messages, and device/application settings (e.g., region/language/time zone/font).

  2. Mobile Network Information: Such as Public Land Mobile Network provider ID (PLMN), geolocation (signal tower identification), and Internet Protocol (IP) address.

  3. Log Information: When you use our services or view our content, we or our Partners automatically collect and store information in logs, such as access time, frequency, IP address, and event details (e.g., errors, crashes, restarts, upgrades).

  4. Specific Features: When we partner with software, smart device, or system service providers to offer services (e.g., authentication, messaging), we may collect de-identified device information (e.g., hardware model, operating system version, IMEI, MAC address) and share it with these providers.

  5. Microphone/Recording Permissions: Required for contacting customer service. Disabling this permission may prevent use of this feature.

  6. Content Stored on Partner Servers: Content you upload to cloud storage is stored on our data service providers’ servers to enable quick access and cross-device sharing. Neither we nor our Partners access this content. Personal information collected and generated within the People’s Republic of China (PRC) is stored within the PRC.

1.3 Features and Corresponding Permissions

  1. Customer Acquisition Tool: The core feature of the Software, requiring permissions such as floating window, accessibility, read/write storage, and contacts read/write. Disabling these permissions may cause the feature to fail.

  2. Image Processing: Features like batch image capture or watermarking may require camera or photo album permissions. Disabling these permissions may prevent use of these features. This feature also involves reading/writing SD card data (deleting/creating).

  3. Installed Apps List: Required for payment and WeChat login functionalities, including package names of installed apps (e.g., WeChat, Alipay).

  4. Other Features: OTA updates require app installation permissions; real-name authentication requires camera permissions for facial recognition; Yuyi and Fugui Bamboo SDKs require network and device information for data analysis; NetEase Qiyu SDK requires phone call permissions for customer service; Bugly SDK requires log permissions for error reporting; Xinyan SDK requires camera permissions for real-name authentication.

1.4 Information from Partners

Where permitted by law, we or our Partners may collect information about you from public or commercial sources or social media services (e.g., when you log in using a social media account). Other information about you, your device, or service usage may be collected with your consent or as explained at the time of collection.

1.5 Exceptions to Consent Requirements

We or our Partners may collect and use personal information without your consent in the following cases:

  1. For national security or defense purposes;
  2. For public safety, public health, or significant public interest;
  3. For criminal investigations, prosecutions, trials, or judgment enforcement;
  4. To protect the life or property of you or others when obtaining consent is impractical;
  5. For information you have publicly disclosed;
  6. For information collected from legally disclosed sources (e.g., news reports, government disclosures);
  7. As necessary to enter into a contract at your request;
  8. To maintain the security and stability of our products/services (e.g., troubleshooting);
  9. For legitimate news reporting;
  10. For academic research by institutions in the public interest, provided personal information is de-identified in results;
  11. As otherwise permitted by law.

1.6 Non-Identifying Information

Non-identifying information cannot identify an individual (e.g., website visits, app downloads, product sales). We and our Partners collect aggregated statistical data to understand how users interact with our products and services, enabling us to improve them. We may collect, use, disclose, or transfer non-identifying information for other purposes at our discretion.

2. How We Use Your Personal Information

To comply with laws, regulations, and supervisory requirements, provide services, enhance service quality, or ensure account and financial security, we use your information in the following cases:

2.1 We use personal information as outlined in this Policy to deliver our products and services.

2.2 You agree that we may use de-identified information that cannot identify you personally and may analyze and commercialize user databases without disclosing personal information.

2.3 Personal information provided during your use of our products/services is authorized for our use throughout your usage period.

2.4 We or our Partners may perform statistical analysis of product/service usage and share aggregated statistics with the public or Partners to demonstrate usage trends, without including identifying information.

2.5 When displaying your personal information, we use techniques like content replacement or anonymization to protect your data.

3. How We Share, Transfer, or Disclose Your Personal Information

3.1 Sharing

We do not share your personal information with any company, organization, or individual outside Changsha Nianyu Information Technology Co., Ltd., except in the following cases:

  1. With your explicit consent;
  2. As required by laws, regulations, or government authorities;
  3. With our affiliates, but only for the purposes stated in this Policy and with necessary information. If affiliates change the purpose of processing, we will seek your consent again;
  4. With authorized Partners to enhance services, where we share only necessary information for legitimate, necessary, and specific purposes as required by law or Partners. Refusing to share may prevent you from using certain services. Partners may not use shared information for other purposes unless you agree otherwise. When services are provided via third-party pages, those providers directly collect your information under their own authorization, not as shared by us.

Our Partners include:

  1. Functional and Technical Service Providers: We may share information with third parties supporting features like geolocation, mapping, payment, login authentication, security, and analytics (e.g., Yuyi SDK for data analysis; see Section 5).
  2. Third-Party Merchants: For transaction services, we share order and transaction-related information with merchants to fulfill purchases and provide after-sales support. See specific transaction service pages for details.

You should note that our products may include links to third-party websites, apps, or services. We do not guarantee these third parties’ content, and such links are provided for convenience only. When accessing these third parties, you must agree to their privacy policies. We and these third parties bear independent responsibility for data protection as per legal and contractual terms.

We are committed to keeping your information confidential. Before sharing with Partners (including affiliates and cooperating companies), we assess the legitimacy, necessity, and legality of such sharing. Shared information is tagged and de-identified to prevent identification. We sign legal agreements with Partners, requiring them to comply with laws and protect your information.

3.2 Transfer

Transfer refers to transferring control of personal information to another entity. We and our Partners will not transfer your personal information to any company, organization, or individual, except:

  • With your explicit consent;
  • In cases of mergers, acquisitions, or bankruptcy liquidation, where we ensure the new entity is bound by this Policy or require them to seek your consent again.

3.3 Public Disclosure

We and our Partners will only publicly disclose your personal information:

  • With your explicit consent;
  • When required by law, legal processes, litigation, or public/government authorities.

3.4 Exceptions to Consent for Sharing, Transfer, or Disclosure

We may share, transfer, or disclose personal information without your consent in the following cases:

  • For national security or defense;
  • For public safety, public health, or significant public interest;
  • For criminal investigations, prosecutions, trials, or judgment enforcement;
  • To protect your or others’ life or property when obtaining consent is impractical;
  • For information you have publicly disclosed;
  • For information collected from legally disclosed sources (e.g., news reports, government disclosures).

De-identified information that cannot be re-identified is not considered personal information sharing, transfer, or disclosure and does not require notification or consent.

4. How We Protect Your Personal Information

We use industry-standard security measures to protect your personal information from unauthorized access, disclosure, use, modification, damage, or loss. We deploy access controls to ensure only authorized personnel access personal information and conduct training to emphasize the importance of data protection.

In the event of a personal information security incident, we will promptly inform you of the incident’s details, potential impact, measures taken or planned, risk mitigation suggestions, and remedial actions, as required by law. If individual notifications are impractical, we will issue a public announcement. We will also report the incident to regulatory authorities as required.

5. Third-Party SDK Services

We use the following third-party SDKs, which may collect personal information as described below. These SDKs comply with industry-standard security measures to protect your data.

5.1 Third-Party SDK: NetEase Qiyu SDK

  • Provider: Hangzhou NetEase Quality Cloud Technology Co., Ltd. and affiliates
  • Purpose: To enable users to contact customer service
  • Usage Scenario: Contacting customer service
  • Collection Method: SDK local collection
  • Information/Permissions: Phone call permissions, microphone permissions, camera/photo album permissions, app auto-start permissions, device brand/model, operating system version, app version, Android ID, network status, Wi-Fi information, IP address, operator information, browser type/version, Yunxin communication logs, proximity sensor data, clipboard functionality
  • Details: See NetEase Qiyu SDK Privacy Policy

5.2 Third-Party SDK: TBS Tencent Browsing Service SDK

  • Provider: Tencent Technology (Shenzhen) Co., Ltd.
  • Purpose: Web browsing using Tencent’s X5 browser kernel for secure and fast browsing
  • Usage Scenario: Displaying H5 interfaces (e.g., Privacy Policy, User Agreement pages)
  • Collection Method: SDK local collection
  • Information/Permissions: Running process information, MAC address, unique device identifiers (e.g., IMEI, Android ID, IDFA, OpenUDID, GUID, SIM IMSI)
  • Details: See TBS Tencent Browsing Service Privacy Policy

5.3 Third-Party SDK: Fugui Bamboo SDK

  • Provider: Changsha Fugui Bamboo Network Technology Co., Ltd.
  • Purpose: (1) User feedback, suggestions, account deletion; (2) User login, payment, ad management, WeChat binding, password changes, verification codes
  • Usage Scenario: Software updates, phone number binding, G-code usage, privacy data export
  • Collection Method: SDK local collection
  • Information/Permissions: Device status/identity, user phone number, storage read/write permissions, MAC address, unique device identifiers (e.g., IMEI, Android ID, IDFA, OpenUDID, GUID, SIM IMSI)

5.4 Third-Party SDK: Tencent Bugly SDK

  • Provider: Tencent Technology (Shenzhen) Co., Ltd.
  • Purpose: Collecting crash logs to improve app stability
  • Usage Scenario: Business operations and data analysis
  • Collection Method: SDK local collection
  • Information/Permissions: MAC address, unique device identifiers (e.g., IMEI, Android ID, IDFA, OpenUDID, GUID, SIM IMSI)
  • Details: See Tencent Bugly Privacy Policy

5.5 Third-Party SDK: Yuyi SDK (com.hiyuyi)

  • Provider: Changsha Nianyu Information Technology Co., Ltd.
  • Purpose: (1) User login, payment, ad management, WeChat binding, password changes, verification codes; (2) Data reporting and analysis
  • Usage Scenario: Software updates, phone number binding, G-code usage, privacy data export
  • Collection Method: SDK local collection
  • Information/Permissions: Device status/identity, user phone number, storage read/write permissions, MAC address, unique device identifiers (e.g., IMEI, Android ID, IDFA, OpenUDID, GUID, SIM IMSI)

6. Your Rights

In accordance with Chinese laws, regulations, standards, and international practices, we ensure you have the following rights over your personal information:

6.1 Access or Correct Your Personal Information

You may access or correct your personal information through your account settings. If you cannot do so, you may email us, and we will respond within 15 days.

6.2 Account Deletion

You may delete your registered account at any time via "My Account > Delete Account." Upon deletion, we will cease providing products or services and delete or anonymize your personal information, except as required by law.

7. Partner Links and Services

Our websites, applications, products, or services may include links to Partners’ websites, products, or services, such as apps available on various app markets. These links are provided for your convenience only. We have no control over Partners’ content and make no guarantees, express or implied, regarding such content. These links do not imply endorsement or authorization by ParallelLauncher. We cannot control Partners’ privacy or data protection policies, and they are not bound by this Policy.

You are responsible for evaluating your interactions with these links. Before submitting personal information to Partners, please review their privacy policies. Neither we nor our Partners are liable for such interactions.

8. Policy Changes and Contact Information

We may update this Policy as needed. Updated versions will be available in the latest Software version. Continued use after changes constitutes acceptance. If you disagree with the updated Policy, you must stop using the Software.

If you have any questions, comments, or suggestions about this Privacy Policy, please contact us or our Partners at g19973125951@gmail.com. We will respond within 15 days.