This Privacy Policy will help you understand what may be involved in your use of TMS as follows.

1. How your personal information will be collected and used

2. How to share, transfer and publicly disclose your personal information

3. How to protect your personal information

4. Your rights

5. How to update this policy

6. How to update this policy

TMS understands the importance of personal information to you and will do our best to protect the security and reliability of your personal information. We are committed to maintaining your trust in us and protecting your personal information by adhering to the following principles: the principle of uniformity of rights and responsibilities, the principle of clarity of purpose, the principle of choice of consent, the principle of minimum sufficient, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency.

Please read and understand this Privacy Policy carefully before using our products (or services).

I. How we collect and use your personal information

Personal information refers to all kinds of information recorded electronically or otherwise that can identify a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information.

1. our app carries out the storage of data, but we do not store this data on servers, we simply store him locally, without affecting any of your privacy situation.

2. all data generated by you, we do not share facial data to third parties, our servers do not store any user's facial data.

TMS will only use your personal information for the following purposes as described in this policy.

1) TMS will only use your personal information for the following purposes as described in this policy.

2) Location (GPS) access, for obtaining the specific location of the node at the time of return, i.e., return accuracy matching.

3) If you refuse to open other permissions, it will lead to the inability to use the corresponding functions and affect the business.

3. When you give feedback, consultation or complaint to TMS, we may need your name, cell phone number, email address and other valid contact information in order to facilitate contact with you or help you solve the problem. If you refuse to provide the above information, it will affect the timely processing of questions and feedback.

4. TMS may access other third party APPs, TMS will only provide advertising cooperation or access jumping services, please make sure you read the third party's User Agreement and Privacy Policy carefully before using them and confirm them before using them, TMS will not touch and save your personal information collected when using the third party APP.

II. How we share, transfer and publicly disclose your personal information

(i) Sharing

We will not share your personal information with any company, organization or individual, except for the following cases.

1. Sharing with explicit consent: We will share your personal information with other parties after obtaining your explicit consent.

2. We may share your personal information with other parties in accordance with the provisions of laws and regulations, the need for litigation dispute resolution, or in accordance with the mandatory requirements set forth by government authorities or judicial organs in accordance with the law.

3. To the extent required or permitted by law, it is necessary to provide your personal information to a third party in order to protect the product and its users or the public interest, property or safety from damage.

(ii) Storage

Our App does not collect any data, and photos taken or album photos are only processed locally and are not uploaded to our servers. Our server does not collect and store any data of any user.

1. Uploading local photos only after explicitly obtaining the user's consent for album permissions.

2. The processing of photos after taking them only after explicitly obtaining the user's permission to take them.

3. Uploading location information only after explicitly obtaining the user's location permission.。

(iii) Transfer

We will not transfer your personal information to any company, organization or individual, except for the following cases.

1. Transfer under the condition of obtaining explicit consent: after obtaining your explicit consent, we will transfer your personal information to other parties.

2. In the event of a merger, acquisition or bankruptcy and liquidation involving the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy before we ask the company or organization to seek your authorized consent again.

(iv) Public Disclosure

We will disclose your personal information publicly only under the following circumstances.

1. After obtaining your express consent.

2. Disclosure based on law: We may disclose your personal information publicly if compelled to do so by law, legal process, litigation or government authorities.

(v) Exceptions

According to the relevant laws and regulations, we may collect, share, transfer or publicly disclose your personal information without your authorized consent in the following cases.

1. Directly related to national security, national defense security and other national interests.

2. Directly related to public safety, public health, public knowledge and other significant public interests.

3. Directly related to public safety, public health, public knowledge and other significant public interests.

4. For the purpose of safeguarding your or other individuals' life, property, reputation and other significant legitimate rights and interests but where it is difficult to obtain your consent.

5. Necessary for the conclusion and performance of a contract at your request.

6. Necessary for the maintenance of the safe and stable operation of the products or services provided, such as the discovery and disposal of product or service failures.

7. necessary to conduct statistical or academic research in the public interest, and when it provides the results of academic research or descriptions to the public, to de-identify the personal information contained in the results.

8. Personal information collected from legitimate public disclosure of information, such as legitimate news reports, government information disclosure and other channels.

9. Other cases stipulated by laws and regulations.

III. How we protect your personal information

(a) We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We promise to keep your personal information stored for as long as reasonably necessary to meet the legal requirements or to achieve the functions and services of our products. We will immediately delete or anonymize any personal information that exceeds the time limit.

(b) The Internet is not an absolutely secure environment, and since e-mail, instant messaging, and communication with other TMS users are not encrypted, we strongly recommend that you do not send personal information through such means. Please use complex passwords to help us keep your account secure.

(c) The Internet environment is not 100% secure and we will do our best to ensure or warrant the security of any information you send to us.

(d) In the unfortunate event of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of: the basic situation of the security incident and its possible impact, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce the risk, the remedial measures for you, etc. We will promptly inform you of the event-related situation by email, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will also take the initiative to report the disposal of personal information security incidents in accordance with the requirements of the regulatory authorities.

IV. Your rights

In accordance with the relevant Chinese laws, regulations and standards, as well as the common practices of other countries and regions, we protect your right to exercise the following rights with respect to your personal information.

(i) delete your personal information

1. In the following cases, you can request us to delete your personal information through the contact information in Article 10 of this policy.

(1) If our handling of personal information violates laws and regulations.

(2) If we collect and use your personal information without obtaining your consent.

(3) If our handling of personal information violates our agreement with you.

(4) If you no longer use our products or services.

(5) If we no longer provide products or services to you.

2. If we decide to respond to your request for deletion, we will also simultaneously notify the entities from which we obtained your personal information and request their prompt deletion, unless otherwise required by law or regulation, or if these entities have your independent authorization. When you delete information from our Services, we may not delete the corresponding information from our immediate backup system, but we will delete such information when the backup is updated.

(ii) Revocation of your authorization

If you wish to revoke your authorization, you may do so by contacting us using the contact information in this policy. We will process your request within a reasonable time after receiving your email or registered mail.

However, please understand and agree that when you withdraw certain authorizations, the product features associated with them will not be available and we will not be able to continue to provide you with the specific features and/or services for which you have withdrawn your consent or authorization, and that your decision to withdraw your authorization will not affect the processing of personal information previously performed on the basis of your authorization.

(iii) Response to your request above

1. For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We will respond within thirty days.

2. In the following cases, we will not be able to respond to your request in accordance with the requirements of laws and regulations.

(1) Directly related to national security and national defense security.

(2) Directly related to public safety, public health, and significant public interests.

(3) Directly related to crime investigation, prosecution, trial and execution of judgments, etc.

(4) Where there is sufficient evidence that you have subjective malice or abuse of rights.

(5) Responding to your request will lead to serious damage to the legitimate rights and interests of you or other individuals or organizations.

(6) If it involves trade secrets.

V. How to update this policy

(i) Our privacy policy and user agreement may be changed or revised. We will not reduce your rights under this Privacy Policy without your express consent. We will post any changes made to this policy on this page. For material changes, we will alert you by email, phone and push.

(ii) Material changes referred to in this policy include, but are not limited to.

1. The purposes for which we process personal information, the types of personal information we process, and the manner in which personal information is used.

2. Significant changes in your right to participate in the processing of personal information and the way it is exercised.

3. When the personal information security impact Pingo report indicates that there is a risk.

VI. How to contact us

You can contact us through the following ways: ssc@oocl.com