Privacy Policy

Welcome to use the services provided by M2! Muslim Smart Wearable Company (referred to in this agreement as Muslim Smart Wearable Company and its affiliated companies, hereinafter also referred to as "we") attaches great importance to the protection of your privacy and personal information.

M2 Privacy Policy (hereinafter referred to as "this Agreement") applies to your use of M2 services in different ways, including the M2 official website, multiple application versions including M2 for iOS and Android, and smart devices equipped with M2.

You can use M2 to achieve device connection, on-site recording, simultaneous interpretation, face-to-face translation, AI chat, AI painting, and smart PPT (hereinafter collectively referred to as "M2 products or services"). We will only process the personal information necessary for you to use our products or services.

This Agreement is intended to help you understand what personal information we collect, why we collect it, what we do with it and how we protect it. We will collect and use your personal information in accordance with the Privacy Policy, but will not collect all of your personal information in a mandatory manner just because you authorize and agree to this agreement.

1. Information We Collect and Corresponding Purposes of Use

We will collect and use your personal information in accordance with the principles of lawfulness, legitimacy and necessity. Specifically, we collect and process your personal information to provide you with corresponding business functions.

1.1 Register and Log In to Your Account

Device information includes: device serial number, IMEI, AndroidID, OAID, GAID, MAC address, installed APP information, used for registration and binding of unique device accounts. You can create a M2 account through your mobile phone number, and you can complete your account information. When registering and logging in to your M2 account, you need to provide us with your mobile phone number.

1.2 Provide You with Intelligent Voice Services

When you activate the M2 program, we will automatically receive and record audio-related information (including appropriate environmental parameters, such as noise indicators) generated during your interaction with the device terminal to provide you with services.

1.3 Smart Device Connection and Control

We collect your device information to provide more suitable services for different device terminals. In order to ensure that we provide you with normal services, we will collect your mobile phone's MAC address, smart device's MAC address, device Bluetooth MAC address, WiFi MAC address, and network card MAC address in the background to enable you to connect safely.

1.4 New Service and Function Operation and Customer Service Processing

If you participate in relevant operational activities, we may collect your identity information, contact information, and transaction account information through the operational activity interface in order to contact you and issue operational rewards to you.

1.5 Ensure Service Security, Optimize and Improve Service Purposes

When you use M2, in order to ensure your normal use of M2 services, more accurately locate and solve the problems you encounter when using M2 services, improve and optimize M2's service experience, ensuring the security of your account.

1.6 Device Permission Call

In the process of providing services, in order to ensure that you can use product functions normally, we will apply to the system for the following system device permissions of your device:

Device Permissions Business Functions Permission Authorization Method Can It Be Closed
Access phone status User device identification Pop-up window asking when the user opens the App for the first time Yes
Location Address management Pop-up window asking when the user performs location-related business for the first time Yes
Microphone Live recording, simultaneous interpretation, face-to-face translation, AI chat Pop-up window asking when using voice-related functions for the first time Yes
Wireless network Various business functions are connected to the network A pop-up window will appear when the user opens the App for the first time Yes
Bluetooth Device addition; device connection; device settings Pop-up window asking when the user uses related functions for the first time Yes
Notification Send notification message Pop-up window asking when the user opens the App for the first time Yes

2. How We Use Cookies and Similar Technologies

Cookies and Anonymous Identifier Tools. Cookies are a mechanism that supports server-side (or script) storage and retrieval of information on the client. When you use M2 products or services, we will send one or more Cookies or anonymous identifiers to your device.

We will not use Cookies for any purpose other than those stated in this Agreement. You can manage or delete cookies according to your preferences. See AboutCookies.org for details.

3. How We Share, Transfer and Publicly Disclose Your Personal Information

3.1 Sharing

Unless you have separately agreed in advance or comply with other laws and regulations, we will not share your personal information with third parties other than Muslim Smart Wearable, unless the specific individual cannot be identified after processing and cannot be restored.

3.2 Transfer

We will not transfer your personal information to any company, organization or individual other than Muslim Smart Wearable, except in the following circumstances:

3.3 Public Disclosure

We will only publicly disclose your personal information under the following circumstances:

4. How We Store and Protect Your Personal Information

4.1 Storage Period

We will keep your personal information for the period required to provide services, but laws and regulations have other provisions on the retention period. After the retention period has expired, we will delete or anonymize your personal information in accordance with legal requirements.

4.2 Save Region

In principle, the personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.

4.3 Security Measures

We will collect, use, store and transmit user information based on the "minimization" principle, and inform you of the purpose and scope of use of relevant information through the user agreement and privacy policy.

We take information security very seriously. We have established a dedicated team responsible for the development and application of various security technologies and procedures. We will conduct security background reviews for security management leaders and personnel in key security positions.

4.4 Security Incident Notification

We will formulate contingency plans for network security incidents to promptly deal with security risks such as system vulnerabilities, computer viruses, network attacks, and network intrusions.

5. Your Rights

In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you can exercise the following rights over your personal information:

5.1 Right of Access

In principle, you can check your personal information in the following ways: Account information: Visit [My] to access or edit the profile information in your account.

5.2 Right of Correction and Addition

When you find that the personal information we process about you is incorrect or incomplete, you have the right to correct the incorrect or incomplete information after your identity has been verified.

5.3 Right to Erasure

You can make a request to us to delete personal information under the following circumstances: If we process your personal information in violation of laws, regulations or agreements with you; If our processing purposes have been fulfilled, cannot be fulfilled or are no longer necessary to fulfill the processing purposes.

5.4 Withdrawal of Consent

Each business function requires some basic personal information to be completed. You may give or withdraw your consent at any time for the collection and use of additional personal information.

5.5 Right of Cancellation

You can log out of your account on M2 through the following path: [My] - [System Settings] - [Account Removal]. Once you log out of your M2 account, you will not be able to use the services of M2 user products.

5.6 Right of Reproduction and Portability

You have the right to copy the personal information we have collected about you. Under the conditions stipulated by laws and regulations, and in compliance with the instructions and conditions stipulated by the national cyberspace department, if technically feasible, you may also ask us to transfer your personal information to other entities designated by you.

6. How We Process Personal Information of Minors

Muslim Smart Wearable attaches great importance to the protection of minors' information. Our products and services are primarily intended for adults. We will only process the personal information of minors as permitted by laws and regulations and with the consent of parents or other guardians.

If you are a minor under the age of 14, before using M2 products and services, you should ask your parents or other guardians to read this agreement carefully, or read this agreement carefully together under the supervision and guidance of your parents or other guardians.

If we discover that we have collected personal information from minors under the age of 14 without first obtaining verifiable parental or other guardian consent, we will take steps to delete the relevant information as soon as possible.

7. Revision of Privacy Policy

Our privacy policy may change. We will not reduce your rights under this Agreement without your explicit consent. We will post any changes to this Agreement on this page.

For major changes, we will notify you on the main exposure page of the product or service, an in-site letter, or send you an email or other appropriate method to reach you. If you do not agree to these changes, please stop using M2 products and services immediately.

8. How to Contact Us

The growth of M2 cannot be separated from the joint efforts of user experts from all parties. We are very grateful for your contribution to M2 data updates and usage feedback.

You can contact us by sending an email to Enquiry@m2msw.com.

In order to ensure that we handle your problem efficiently and provide you with timely feedback, you are required to submit proof of identity, valid contact information, written request and relevant evidence. We will verify your identity and process your request.

Attached: Explanation of Terms

Personal information refers to various information related to identified or identifiable natural persons recorded electronically or by other means, excluding anonymized information. Personal information includes name, date of birth, ID number, personal biometric information, address, communication contact information, communication records and content, account password, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information etc.

Sensitive personal information refers to personal information that, once leaked or illegally used, could easily cause the dignity of a natural person to be infringed or the personal and property safety to be endangered, including biometrics, religious beliefs, specific identities, medical health, financial accounts, whereabouts and other information, and personal information of minors under the age of fourteen.

Device refers to a device that can be used to use M2 products and/or services, such as a desktop device, tablet or smartphone.

Device information may include device attribute information of the terminal device you use to install and run M2 SDK (such as hardware model, operating system version and system status, device configuration, International Mobile Equipment Identity IMEI, International Mobile Subscriber Identity IMSI, network device hardware address MAC, advertising identifier IDFA, vendor identifier IDFV, mobile device identification code MEID, anonymous device identifier OAID, integrated circuit card identification code ICCID, Android ID, hardware serial number and other device identifiers).

Log information refers to our server automatically recording the requests you make when accessing M2, such as your IP address, browser type and language used, hardware device information, operating system version, network operator information, the date, time, and duration of your access to the service.

Cookies refer to a mechanism that supports server-side (or script) storage and retrieval of information on the client, extending Web-based client/server applications by adding simple, persistent client state.

Location information refers to precise location information obtained through GPS information, WLAN access points, Bluetooth, base stations and other sensor information. It also includes rough geographical location information obtained through IP addresses or other network information.

De-identification is the process by which personal data are processed in such a way that they cannot be identified as a specific natural person without the aid of additional information.

Anonymization refers to the process of technical processing of personal information so that the subject of personal information cannot be identified and the processed information cannot be restored.