TimeMaster Privacy Policy

Version Update Date: July 25, 2025

Effective Date: June 26, 2025

WeTime Team is the operator of the TimeMaster platform (hereinafter referred to as “we”). TimeMaster attaches great importance to users’ privacy and the protection of personal information. When you use our products and/or services, we may collect and use your relevant information. Through the “TimeMaster Privacy Policy” (“this Privacy Policy”), we would like to explain how we collect, use, store, share, and transfer such information when you use our products and/or services, and how we provide you with access to, update, delete, and protect such information. At the same time, we commit to adopting corresponding security protection measures in accordance with mature industry security standards to protect your personal information.

This Privacy Policy is closely related to your use of TimeMaster’s products and/or services. Please read and thoroughly understand the “TimeMaster Privacy Policy” (especially the content in bold and underlined) before using all TimeMaster products and/or services, and make sure you understand our rules for processing your personal information (as defined below) and other information, and then make the choices you deem appropriate. If you do not agree with all or part of this Privacy Policy, it means you choose to forgo using TimeMaster’s products and/or services; please also immediately stop using TimeMaster’s products and/or services. When you use any TimeMaster product and/or service, it indicates that you agree to and fully understand all the contents of this Privacy Policy.

If you have any questions or concerns about how we process your personal data, please contact us by emailing service#wetime.com.

Introduction

This Policy contains the following contents:

I. How we collect and use your personal information and other information

II. How we use Cookies and similar technologies

III. Situations of lawful sharing, transfer, and public disclosure of your personal information

IV. How we securely protect and store the information you provide

V. How you can access and control the information you provide

VI. Protection of minors’ personal information

VII. Notice and revision

VIII. Governing law and dispute resolution

IX. How to contact us

Special Notes

1. Thank you for using and trusting TimeMaster. We will continue to be committed to providing you with safer and more reliable services.

2. All products or services of TimeMaster (including all products or services of TimeMaster and those of TimeMaster’s affiliates) are subject to this Privacy Policy, but some specific products or services may also apply a specific privacy policy.

3. The privacy policy of the aforementioned specific products or services constitutes a part of this Privacy Policy. In case of any inconsistency with this Privacy Policy, the privacy policy of the specific product or service shall prevail.

4. Unless otherwise expressly stated in this Privacy Policy, this Privacy Policy does not apply to products or services independently provided to you by third parties accessed through our products or services, such as products or websites shown to you in search results, websites that may contain third-party services, or other websites linked within our services. Please note that if you provide your personal information and other information to a third party when using its products and/or services, your information shall be subject to that third party’s privacy statement or similar policy. We do not bear legal responsibility for any improper use or disclosure of the information you provide by any third party.

5. This Privacy Policy only applies to users aged 14 and above. If you are a child under the age of 14, or if you are a guardian intending to register a TimeMaster account for a child, please immediately stop reading this Privacy Policy and cease any other operations. TimeMaster does not provide products or services to children under 14, nor does it allow anyone to register an account on behalf of a child or register an account and then actually provide it to a child for use. If we discover that you or a related party has engaged in the aforementioned behavior, the company has the right to take relevant measures at its discretion, including but not limited to restricting use, canceling the account, etc., and the company will delete the children’s personal information that has been collected.

I. How we collect and use your personal information and other information

【Personal Information】refers to various information recorded electronically or by other means that can identify a specific natural person’s identity alone or in combination with other information, or reflect the activities of a specific natural person.

【Sensitive Personal Information】refers to personal information which, if leaked, illegally provided, or abused, may endanger personal and property safety and is highly likely to lead to damage to personal reputation, physical and mental health, or discriminatory treatment, including ID number, personal biometric information, personal health and physiological information, bank account, credit information, transaction and consumption records, whereabouts, accommodation information, communication records and content, etc.

We will follow the principles of legitimacy, lawfulness, and necessity to collect and use the personal information you voluntarily provide or that is generated during your use of the products and services for the purposes described in this Policy, as well as obtain relevant personal information about you from third parties.

We will specify one by one the types of personal information we collect and their corresponding purposes, so that you can understand the categories, purposes, and collection methods of the specific personal information collected for a particular function.

a. To ensure the secure operation of the software and services, prevent your personal information from being illegally obtained, more accurately prevent fraud, and protect account security, we will collect your unique device identifiers (IP address, Android_ID). If you do not agree to our collection of the above information, risk control verification may not be completed. Please understand that, to dynamically detect whether your account has abnormal logins and for statistical purposes, we will also collect your above device information when your device is in the background/silent state, and after completing the corresponding statistics, we will use de-identification, encryption, and other measures to protect it. We will keep the reading frequency within a reasonable range to maintain network security and a sound ecosystem.

b. To prevent malicious programs and ensure operational quality and efficiency, we will collect information about the application list of installed software or currently running processes, overall operation of applications, usage conditions and frequency, crash conditions, overall installation and usage conditions, performance data, and application sources.

We will only collect and use your personal information and other information for the following legitimate purposes:

(1) Situations where you must authorize us to collect and use your personal information

Our products and services include certain core functions, which contain functionalities necessary for local reading or online reading and functionalities necessary for improving our products and services. We may need to collect, store, and use the following information related to you to achieve the above functions. If you do not provide the relevant information, you will not be able to enjoy our products and services. These functions include:

1. Account registration, login, and verification

When you register an account, you need to provide us with your mobile phone number, and we will verify whether your identity is valid by sending an SMS verification code. Your account name is the system default nickname. You can modify and supplement your nickname, gender, and other related information, which all belong to your “account information.” The supplementary account information will help us provide you with a better user experience, but if you do not provide such supplementary information, it will not affect your normal use.

After you successfully register an account, you can use the account to log in to the “TimeMaster” APP. When logging in, you need to provide your TimeMaster account information. If you do not provide such information, the related benefits under your account may not be enjoyed. In that case, you can still use functions such as calendar and weather, and we will not collect your above personal information.

2. Use of product and service functions and information display

To ensure that you can normally use and we can provide this product and service, we will collect your unique device identifiers (IP address, Android_ID information) to sort the corresponding calendars or service content to adapt to your device interface.

3. Other functions and scenarios

When you use TimeMaster’s third-party login, sharing, or payment, to ensure that you can normally invoke, wake up, and use third-party application services, we need to obtain your software application list.

4. Feedback function

When you use the feedback function, you need to provide contact information so that our staff can communicate with you regarding the feedback. You understand and agree that this service by default generates software usage information, including but not limited to user homepage, usage duration, and personalized signature information.

(2) Situations where you may choose to provide personal information at your discretion

To make your use of TimeMaster more convenient or to provide a better experience and thus enhance your experience on TimeMaster, the following additional functions may collect and use your personal information. If you do not provide such personal information and other information, you can still use TimeMaster, but you may not be able to use these additional features that can provide you with a better experience, or you may need to repeatedly fill in some information when using certain services.

Please note that enabling any permission means that you authorize us to collect and use relevant personal information to provide you with corresponding services. Once you disable any permission, you revoke the authorization, and we will no longer collect and use relevant personal information based on the corresponding permission, and we will not be able to continue providing the services corresponding to that permission. Your decision to disable permissions will not affect the information collection and use previously carried out based on your authorization.

(3) You are fully aware that, under the following circumstances, we may collect and use personal information and other information without obtaining your authorization and consent:

1. Related to our fulfillment of obligations stipulated by laws and regulations;

2. Directly related to national security and national defense security;

3. Directly related to public safety, public health, and major public interests;

4. Directly related to criminal investigation, prosecution, trial, and judgment enforcement, etc.;

5. For the purpose of safeguarding your or other individuals’ life, property, and other major lawful rights and interests, but it is difficult to obtain your consent;

6. The personal information and other information involved is information that you have made public to the public by yourself;

7. Necessary for the conclusion of a contract at your request;

8. Your personal information and other information collected from legally and publicly disclosed information, such as legal news reports, government information disclosure, etc.;

9. Necessary for maintaining the safe and stable operation of the products and services provided, such as discovering and handling failures of products and services;

10. Other circumstances stipulated by laws and regulations.

(4) Situations where we obtain your personal information and other information from third parties

To jointly provide products and services to you, improve the quality of products and services, or for reasonable needs such as considering the security of products and services, we receive your personal information and other information from affiliated companies, alliance members, partners, and other trusted third-party suppliers, service providers, and agents in accordance with laws and regulations or based on your authorization. We will confirm the legality of the third party’s personal information sources and use your personal information within the scope of your authorization to the third party. If our products or features exceed the scope of your authorized use, we will, or we will require the above third parties to, obtain your consent again. You understand and agree that we do not need to bear legal responsibility for the collection and provision acts of such third parties.

(5) Self-start and associated start instructions

1. To ensure that the application can normally receive important reminders such as holidays, schedules, and anniversaries when it is closed or running in the background, this application needs to use the (self-start) capability, and will, at a certain frequency, be woken up by the system through broadcasting to self-start or associate-start the application, which is necessary for the realization of the functions and services.

2. When you open content-type push messages, upon obtaining your explicit consent, relevant content will be opened. Without your consent, there will be no self-start or associated start.

3. Since the SDK technology of this application is provided by third-party institutions that cooperate with us, to ensure timely message delivery, when you use the message push service, you can authorize us to adjust the communication link, mutually activating SDK push processes that have been closed to ensure the effective delivery of push messages.

(6) Rules for the use of your personal information and other information

1. We will use the personal information and other information collected in accordance with the law and as agreed in this Privacy Policy and to realize the functions of our products and services.

2. After collecting your personal information and other information, we may, depending on the circumstances, process such information via technical means in accordance with the law by de-identifying or anonymizing it. De-identified information cannot identify the user subject, but may be combined with other information to identify the user subject; anonymized information cannot identify the user subject, and the processed information cannot be restored.

3、【Usage Authorization】Please note that all personal information and other information you provide when using our products and services, unless you delete it or refuse our collection via system settings, will continue to authorize us to use it during your use of our products and services.

4. We will compile statistics on the usage of our products and services and may share these statistical information with the public or third parties (including but not limited to communication service providers who send emails or push notifications on our behalf, map service providers who provide us with location data, etc.) to show the overall usage trends of our products and services, or to maintain and improve our services, but these statistical information do not contain any information that identifies you.

5. We will only share your personal information and other information for legitimate purposes, and we will adopt desensitization measures such as content replacement and anonymization to protect the security of your personal information and other information.

II. How we use Cookies and similar technologies

1. Use of Cookies

1.1 To meet your needs, we will send one or more small data files called Cookies to your computer or mobile device. The Cookies assigned to you are unique and can only be read by the web server in the domain that issued the Cookies to you. We send Cookies to simplify your repeated login steps, help you optimize the selection and interaction of advertisements, help determine your login status, and ensure the security of your account or data.

1.2 We will not use Cookies for any purpose other than those described in this Privacy Policy. You can manage or delete Cookies according to your preferences. You can clear all Cookies stored on the relevant terminal; most web browsers automatically accept Cookies, but you can usually modify your browser settings to reject Cookies according to your needs; in addition, you can also clear all Cookies saved in the software. However, if you do so, you may need to personally change the user settings each time you visit our website, and the corresponding information you recorded previously will also be deleted, and this may have a certain impact on the security of the services you use.

III. Situations of lawful sharing, transfer, and public disclosure of your personal information

1. Sharing

1.1 We will not share your personal information with any company, organization, and individual other than TimeMaster and its affiliates, except for the following circumstances:

1.1.1 Obtaining your explicit consent or authorization in advance;

1.1.2 Providing it in accordance with applicable laws and regulations, legal procedures, and as required by administrative or judicial authorities.

1.2 We may share information that has been de-identified or anonymized, which cannot identify your identity and cannot be restored by the recipient, with our affiliates to provide better customer service and user experience, including but not limited to sharing with advertising or information service providers to help them improve the effective reach of content without identifying you personally, as well as analyzing the usage of our products and services.We will only share the necessary personal information and it will be subject to the purposes stated in this Privacy Policy. If our affiliates want to change the purpose of processing personal information, they will seek your authorization and consent again. Our affiliates include our affiliated companies, as well as partners such as advertisers, licensors, and suppliers.

1.3 You understand and agree that our products and/or services may contain third-party software development kits (SDKs) that collect and use your personal information in the form of embedded code, plugins, etc. To implement related functions, third-party SDK service providers may collect your relevant personal information. Where necessary, we will share necessary personal device information (IP address, MAC address, IMEI, Android_ID, IMSI, serial number) with these third parties based on the purposes stated in this Privacy Policy.

1.4 Solely to achieve the purpose of external processing, we will share with third-party partners after processing through encryption, anonymization, and other means. For your information security, we have signed strict data security and confidentiality agreements with third-party SDK/API service providers. These companies will strictly adhere to our data privacy and security requirements. Unless authorized by you, we will not share your personally identifiable information with them. To provide more services to users, ensure service stability and quality, or upgrade related functions, we may adjust the third-party SDKs we integrate. We will promptly explain the latest situation of third-party SDKs that collect user information on this page.

2. Transfer

We will not transfer your personal information to any company, organization, or individual, except for the following circumstances:

2.1 Obtaining your consent or authorization in advance;

2.2 Providing it in accordance with applicable laws and regulations, legal procedures, and mandatory administrative or judicial requirements;

2.3 Providing it in accordance with the relevant agreements signed with you (including electronically signed online agreements and corresponding platform rules) or other legal documents;

2.4 In the event of a merger, acquisition, asset transfer, or similar transaction, if it involves the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this Privacy Policy; otherwise, we will require the company or organization to seek your authorization and consent again.

3. Public disclosure

We will only publicly disclose your personal information under the following circumstances and after taking security protection measures that meet industry standards:

3.1 Based on your needs, we may disclose your specified personal information in a disclosure method you explicitly agree to;

3.2 In cases where we must provide your personal information in accordance with laws and regulations and mandatory administrative enforcement or judicial requirements, we may publicly disclose your personal information according to the required types and disclosure methods. Under the premise of complying with laws and regulations, when we receive requests for disclosure of information as mentioned above, we will require the appropriate legal documents to be provided, such as subpoenas or investigation letters. We firmly believe that the provision of requested information should be as transparent as possible within the scope permitted by law. We carefully review all requests to ensure they have a legal basis and are limited to data that law enforcement agencies have the legal right to obtain for specific investigative purposes. To the extent permitted by laws and regulations, the documents we disclose are protected by encryption keys.

4. Statement on responsibility for third parties

4.1【Third-party services】Please note that your transaction counterparties, the operators of third-party websites you visit, and third parties accessed through us (such as third parties providing services in the TimeMaster App) may have their own privacy protection policies. We will indicate to you that the relevant services are provided by third parties; when you view webpages created by third parties or use applications developed by third parties, TimeMaster recommends that you carefully review the third party’s “Privacy Statement” and “Service Agreement” to understand how they handle your personal information, so that you can prudently decide whether to use their services.

IV. How we securely protect and store your personal information

1. Storage location of information

Personal information collected and generated in Hong Kong is stored on data servers located in Hong Kong.

2. Storage period of information

We retain your personal information only for the time necessary to achieve the service purpose. When you cancel your TimeMaster account, we will delete the corresponding information; when our products or services cease operation, we will notify you in the form of an announcement and delete your personal information within a reasonable period as required by laws and regulations.

3. The technologies and measures we use to protect your personal information

We attach great importance to personal information security and take all reasonable and feasible measures to protect your personal information:

3.1【Data security technical measures】We promise to ensure information security protection reaches a reasonable level of security. To protect your information security, we are committed to using various security technologies and supporting management systems to prevent your information from being disclosed, damaged, or lost, including establishing reasonable institutional norms and security technologies to prevent your personal information from being accessed, used, or modified without authorization, and to avoid data damage or loss.

TimeMaster’s network services adopt encryption technologies such as Transport Layer Security protocol and provide secure services through https and other methods to ensure data security during transmission.

TimeMaster uses various encryption technologies to store users’ personal information in encrypted form, and applies logical or physical isolation to storage media or information systems containing users’ personal information to achieve security domain isolation.

When personal information is used, such as personal information display and personal information associative calculation, we adopt multiple data desensitization techniques to desensitize sensitive fields to enhance the security of personal information in use.

TimeMaster shall not bear legal liability for password leakage and passwords being obtained and used by third parties due to reasons not attributable to TimeMaster.

3.2【Other security measures taken by TimeMaster to protect personal information】TimeMaster standardizes the secure behavior of personal information in internal storage, use, and sharing through the establishment of information classification and grading systems, user information security management systems, secure development specifications, etc.

TimeMaster exercises comprehensive security control over data through confidentiality agreements for information contacts, monitoring, and audit mechanisms.

TimeMaster monitors staff behavior in processing your information, continuously trains staff on relevant laws, regulations, privacy security principles, and security awareness, organizes all staff to participate in security exams, and holds security and privacy protection training courses to enhance employees’ awareness of the importance of protecting personal information.

3.3 Please understand that, due to technological limitations and the possible existence of various malicious means, problems may occur due to factors beyond our control. In the unfortunate event of a personal information security incident, we will, in accordance with laws and regulations, promptly inform you of: the basic situation and possible impact of the security incident, the measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will promptly inform you of the relevant situation of the incident via email, letter, or phone; when it is difficult to inform personal information subjects one by one, we will take reasonable and effective ways to issue announcements. At the same time, we will also actively report the handling of personal information security incidents as required by regulatory authorities.

3.4 If we stop operating, we will promptly stop continuing to collect your personal information, notify you of the cessation of operation by individual delivery or announcement, and destroy or anonymize the personal information we hold.

V. How you can access and control the personal information you provide

1. The rights you can exercise over your personal information:

1.1 Access your personal information

You can log in to TimeMaster through your personal account information, go to “My,” and check all your personal information, modify or delete the above personal information, or perform related privacy and security settings through “My - Feedback.”

1.2 Correct your personal information

1.2.1 You can modify your mobile phone number through “My - Settings - Account and Security - Change Mobile Number,” and modify your nickname, avatar, gender, and other information through “My - Personal Center.”

1.2.2 When you find that the personal information we process about you is incorrect, you have the right to request us to correct it. You can submit a correction request through the methods listed in “(1) Access your personal information.”

1.2.3 If you find that the personal information we collect and store about you is incorrect, you can contact our customer service to request corrections.

1.3 Delete your personal information

In the following circumstances, you can request us to delete your personal information:

1.3.1 If you find that our collection and use of your personal information violates laws and administrative regulations or violates the agreement with you, you can contact our customer service and request deletion of your personal information collected under the violation;

1.3.2 If you no longer use our products and/or services, or you have canceled your account;

1.3.3 If we no longer provide you with products and/or services.

Please note: After you delete information from our services, we may not immediately delete the corresponding information from the backup system, but will delete such information when the backup is updated.

1.4 Cancel your account

You have the right to cancel your registered account. You can apply to cancel your account by logging into the WiFi Master Key associated account. Please follow the cancellation policy of the relevant software for specific methods. After your account is canceled, we will stop providing you with products and/or services and, according to your request, delete your personal information, except as otherwise provided by laws and regulations.

1.5 Change the scope of your authorization and consent:

Each business function requires some basic personal information to be completed (see Section I, “How we collect and use your personal information and other information” of this Privacy Policy). For the collection and use of additional personal information, you can give or withdraw your authorization and consent at any time.

You can operate by yourself in the following ways:

You can find TimeMaster in your device’s system settings - application management, and manage, modify, or delete related permissions.

After you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw consent will not affect the personal information processing previously carried out based on your authorization.

2. If you are unable to access, correct, or delete your personal information through the above methods, or if you need to access, correct, or delete other personal information generated during your use of our products and/or services, you can contact our customer service, who will assist you.

3. If you discover that your personal information has been leaked, especially if your account is compromised, please contact us immediately through the contact information stipulated in “How to Contact Us” at the bottom of this Policy, so that we can take corresponding measures.

4. Before responding to part of your requests under items (2) and (3) of paragraph 1 above, to ensure security, we need to verify your identity and credential information first. After verification, we will process it within five working days; under special circumstances, we will respond within no more than thirty days or within the period stipulated by laws and regulations. If you are not satisfied with our reply, you can also complain to the consumer rights protection department or bring a lawsuit to a court with jurisdiction.

5. In the following circumstances, in accordance with laws and regulations, we will be unable to respond to your request:

5.1 Related to public safety, public health, and major public interests;

5.2 Related to criminal investigation, prosecution, and trial, etc.;

5.3 There is sufficient evidence that you have subjective malice or abuse of rights;

5.4 Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.

VI. Protection of minors’ personal information

1. TimeMaster attaches great importance to the protection of minors’ personal information. Our products and/or services are only for users aged 14 and above. Children under the age of 14 should not use our products and/or services. If you are a minor over 14 but under 18 years old, please be sure to ask your guardian to carefully read this Privacy Policy and use our products and/or services or provide us with information only after obtaining your guardian’s consent.

2. If your guardian does not agree that you use our services or provide us with information in accordance with this Policy, please you or your guardian immediately terminate the use of our services and contact us in a timely manner.

3. Upon receiving your written notice and becoming aware, or if we become aware on our own, that TimeMaster has collected minors’ personal information without prior consent of the guardian, TimeMaster will immediately stop the collection and use of the relevant information and delete the relevant data as soon as possible.

4. TimeMaster will protect the confidentiality and security of minors’ personal information in accordance with the relevant laws and regulations of the state.

VII. Notice and revision

1. To provide you with better services and as TimeMaster’s business develops, this Privacy Policy will be updated from time to time. However, without your explicit consent, we will not reduce your rights that you are entitled to under this Privacy Policy. We will issue an updated version on the TimeMaster mobile terminal and, before it takes effect, remind you of the relevant content updates via website announcements or in other appropriate ways. Please also visit TimeMaster to keep informed of the latest Privacy Policy in a timely manner.

2. In the event of major changes, we will take more noticeable means to inform you, including but not limited to sending emails, letters, and phone calls. Major changes referred to in this Privacy Policy include but are not limited to:

2.1 Significant changes in our service model;

2.2 Changes in the main recipients of public disclosure of personal information.

3. 【Revision of the Privacy Policy】Revisions we may make to this Privacy Policy constitute a part of this Privacy Policy and have retroactive effect. If you continue to use our products and/or services, it means you agree to be bound by the revised Privacy Policy.

VIII. Governing law and dispute resolution

1. 【Governing Law】The implementation, interpretation, and dispute resolution of this Privacy Policy shall be governed by the laws of the People’s Republic of China, without regard to any conflict of laws.

2. 【Dispute Resolution】Any dispute between you and TimeMaster arising from the content of this Privacy Policy or its implementation shall be resolved through friendly negotiation. If the dispute cannot be resolved through negotiation, both parties agree to submit the dispute to a court with jurisdiction at the location of TimeMaster for litigation.

IX. How to contact us

1. If you have any questions, comments, or suggestions regarding this Privacy Policy or matters related to your personal information, please contact our company’s customer service center.

2. We have established a dedicated personal information protection department (or a Personal Information Protection Officer). You can contact them by sending an email to service#wetime.com.



Note: This “TimeMaster Privacy Policy” was revised and took effect on June 26, 2025.



WeTime Team

June 26, 2025