Top Widgets-privacy policy (iOS)

Effective 2023:16 March

The privacy and security of Top Widgets’ users is something we take very seriously. We believe that customizing your device should not come at the expense of your privacy. This privacy policy outlines how Top Widgets (“Top Widgets”, “we” or “us”) ensures that your data stays private.


This policy is closely related to the software or services you use. When you download, Install, start, log on and use our software or services, we will handle and protect your personal information in accordance with this policy. The provisions of this policy which (May) be of great interest to you will be highlighted in bold. Please refer to them. Please confirm that you are aware of and fully understand the policy before you decide to register, log in or use the service. If you click“Agree and continue”, you will be deemed to have read and agreed to this policy, and will be bound by all the contents of this policy.


A: The personal information collected by this software and the purpose of collecting personal information

1. When you use this software and its services, we automatically collect and use the following types of personal information:
equipment information. In order to comply with the relevant laws and regulations, to prevent users from improper use, to identify users' illegal acts, to remove security failures, to maintain network, operation and system security, and to ensure the safe operation of software and services, ensure that you use the software normally. While you are using the software, we may collect some technical information about your device and the software, including:

2. When you use this software and its services, the personal information you voluntarily submit to US or the permissions you grant us:

(1) access to albums/photos. To make sure that you can sync the wallpaper in your theme to your phone's wallpaper, and to make sure that you can use the photos in your phone's photo album as custom icons for third-party apps, we need access to your album. If you deny access, you will not be able to use the above functions.

(2) access to Bluetooth. In order to display the Bluetooth connection status when you apply the style theme of the control panel, you need to authorize us to access your Bluetooth status, otherwise the control panel will not display the Bluetooth status.

(3) access movement steps. In order for your desktop to display the number of steps you are moving, we need you to authorize us to access the steps that your health App or device system counts, this step number information is saved only locally on the device. If you deny authorization, the movement step widget will not display your daily steps correctly, but it will not affect the rest of the software.


B, How to share and transfer your information

We do not share your information with any company, organization, or individual other than us, except:

(1) with your express consent, we will share your information with other parties;

(2) share your information in accordance with laws and regulations, the needs of dispute resolution, or in accordance with administrative and judiciary requirements;

(3) to the extent permitted by law and regulations, to provide you with more network services, we share your information with its related parties or partners;

(4) necessary for the public interest, property or safety of the community to be protected from harm;

(5) to handle disputes or disputes between you and others on your behalf;

(6) used in accordance with the public interest of the society as prescribed by law;

(7) share your information with third parties in accordance with the terms of this agreement.


C, How to protect your information

1. We have taken reasonable and feasible security measures in line with industry standards to protect the security of the information you provide, protect information from unauthorized access, public disclosure, use, modification, damage, or loss. We will use encryption to improve the security of information; we will use trusted protection mechanisms to protect information from malicious attacks; we will deploy access control mechanisms, do your best to ensure that only authorized personnel have access to the information.
We will take all reasonable and feasible measures to ensure that no irrelevant information is collected.

3. Although the above reasonable and effective measures have been taken and the standards required by the relevant legal provisions have been complied with, please understand that due to technical limitations and possible malicious means, in the internet industry, it is not always possible to guarantee 100% security of information, even if we do our best to strengthen security measures. We will do our best to ensure the security of the information you provide us. You are aware and understand that the systems and communication networks you use to access our services may be compromised by factors beyond our control. Therefore, we strongly recommend that you take active steps to protect the security of your information.

4. We will draw up contingency plans and initiate contingency plans immediately in the event of a user information security incident, in an effort to prevent the expansion of the impact and consequences of such security incidents. In the event of a user information security incident (leakage, loss, etc.) , we will comply with the requirements of laws and regulations, keep you informed of the basic situation and possible impact of the security incident, the measures we have taken or will take to deal with it, your own recommendations to prevent and reduce risks, remedial measures for you, etc. . We will inform you about the incident in the form of push notification, mail, letter, short message, etc. . When it is difficult to inform one by one, we will take a reasonable and effective way to issue the announcement. At the same time, we will also be required by the relevant regulatory authorities to report the handling of user information security incidents. You confirm that we will be relieved of all liability for any loss suffered as a result of the non-intentional leakage of your information, provided that we have taken the above-mentioned emergency measures.


D, Storage of information

1. The duration of the information. We undertake to store your information for as long as is legally required or reasonably necessary to implement the software's functions and services. For information beyond the deadline, we will immediately delete or do anonymous processing.

2. Where to store information. In accordance with laws and regulations, we will collect and produce in the course of domestic operations of your information stored in the People's Republic of China.


E, Your Right

1. In accordance with China's relevant laws, regulations and standards, we guarantee you the right to read, correct, modify and delete your information, revoke the right to consent to our collection, use, and disclosure of your information, the right to close your account, and the right to complain about the security of your personal information. However, please understand and agree that when you revoke certain licenses, the product functionality associated with it will become unavailable and we will not be able to continue to provide you with the specific functionality and/or service that corresponds to the revoking of the license or license.
Response to your claim. For security purposes, we will need to verify your identity before processing your request when you make the above claim. In general, we will process and respond within [15] days. We are unable to respond to your request under the following circumstances:

(1) relating to state security or national defense

(2) related to public safety, public health and major public interests;

(3) relevant to criminal investigation, prosecution, trial and execution of a judgment;

(4) if there is sufficient evidence to show that the subject of personal information has subjective malice or abuse of rights;

(5) responding to your request will result in serious damage to the legitimate rights and interests of you or other individuals or organizations;

(6) involving trade secrets.

E, How to deal with the information of minors

If you are a minor under the age of 14, it is recommended that you ask your guardian to read this privacy policy carefully and use our services and provide us with information with your Guardian's express consent.

2. In cases where information on minors has been collected with the consent of the guardian for the use of our products or services, we will only use, share, transfer or disclose this information if it is permitted by law or regulations, with the express consent of the guardian or is necessary for the protection of minors.

3. If your guardian disagrees to your use of our services or to provide us with personal information in accordance with this policy, please immediately terminate your use of our services and notify us in a timely manner.

4. If you have any questions about the use of our products/services or the personal information provided to us by minors in your
custody, please do not hesitate to contact us.

How to contact us
If you have any questions, comments or suggestions regarding this privacy policy or your information, you can send us an email (ifan.coder.meta@gmail.com) , we will give feedback in 15 days.