Boost Master Privacy Policy

Updated : November 25 , 2025

Effective Date : November 25 , 2025

Developer : Zhou Wenting

Foreword

This statement will clearly and concisely inform you of the personal information processing rules when using the Boost Master application (hereinafter referred to as "the Application"), helping you to fully control your privacy rights. We strictly comply with the requirements of the "Boost Master Privacy Policy" and the "Personal Information Protection Law of the People's Republic of China," adhering to the principles of "minimum necessity" and "purpose limitation." All personal information processing operations will not exceed the scope stipulated in this statement.

It should be clarified that this statement applies only to the services we directly provide and does not cover any third-party products or services. When using third-party features within this application, please be sure to review the privacy policy independently published by that third party to understand their personal information processing rules. We recommend that you carefully read the entire statement, paying particular attention to the core terms highlighted in bold , in order to more fully exercise your legal rights, such as the right to know and the right to make decisions.

I. Your Core Rights and Guidelines for Exercising Them

We protect your right to manage your personal information. The following are the specific ways to exercise this right:

(i) Information Management and Authorization Revocation

1.   Personal Information Deletion : We do not store your personal information locally. Uninstalling this application will delete all your personal information.

2.   Authorization Scope Adjustment : You can withdraw authorization in three ways: Cancel login; Disable the corresponding functional module; Modify application permissions in your phone's system settings. After withdrawing authorization, we will immediately cease processing related information, but this will not affect operations previously completed based on legal authorization. Please understand that some specific business functions and services require your information to function. When you withdraw your consent or authorization, we will stop providing you with the corresponding functions and services and will no longer process your related personal information. However, please note that your withdrawal decision will not affect the processing of personal information previously completed based on authorization, and related data processing activities will still be bound by the original authorization.

3.   Unsubscribe from marketing messages : You can refuse to receive our marketing messages through "Phone System Settings - App Permissions - Turn Off Push Notifications".

(ii) Account Cancellation and Feedback Channels

1.   Account cancellation : Apply for cancellation via "Settings - My Feedback" or by sending an email to chouchouting2025@163.com . We will verify your identity and device information before cancellation. This operation is irreversible; after cancellation, all services will be terminated and your information will be deleted.

2.   Feedback : If you have any objections to the information processing, you can submit a request through the above-mentioned cancellation channels. We will respond promptly after identity verification. Reasonable requests will not be charged; however, duplicate, high-cost, or impractical requests may be rejected.

iiiAccess Privacy Policy

To ensure you fully understand the complete rules for personal information processing, you can view the full text of this policy within the Boost Master client through the following path: After opening the application, go to the "Settings" module, find and click the "Privacy Policy" option on the "Settings" page, and you will be redirected to the full policy page. If you encounter any issues such as page loading errors or difficulty finding the path during access, you can contact our official customer service channels (such as official email or customer service portal). We will provide timely assistance to ensure you can successfully obtain all information regarding the Privacy Policy.

ivComplaints and reports

If an application makes a decision that affects your rights through automated decision-making mechanisms such as algorithms, you have the right to request an explanation and access to remedies.

We generally do not charge fees for your reasonable requests. However, for repeated requests or requests that exceed reasonable limits, we will charge a certain cost fee based on the actual circumstances. We may refuse requests that are unjustifiably repetitive, require excessive technical resources (such as developing a new system or significantly adjusting the existing management model), may infringe upon the legitimate rights and interests of others, or are clearly not feasible.

vInforming you of your rights regarding the cessation of operations

If we cease operations, we will promptly cease collecting your personal information, notify you of the cessation of operations individually or by public announcement , and delete or anonymize the personal information we hold in our possession .

 

 

II. Contextual Explanation of Application Permissions

We only request necessary permissions when required for specific functions. Denying permissions only affects the use of the corresponding function and does not affect other services.

Permission Name

Information collection description

Use cases and purposes

Network access permissions

Network connection status and type

Ensure stable operation of application downloads, updates, and online functions.

Tracking permissions

Equipment identification information

To achieve personalized content recommendations and optimize the service experience.

Notification permissions

Receive and display push notifications

Used to send timely posture change reminders via the notification bar, preventing you from missing important memos.

III. Rules for the Collection and Use of Personal Information

We collect only the necessary information to achieve specific service purposes, as follows:

(i) Security and Protection Information

To prevent phishing scams, virus intrusions, and system failures, we collect:

     Basic device information: Unique, unchangeable device identifier, hardware serial number, MAC address, IMEI, and device model;

     Security verification information: country code, system startup time, application installation path and version number.

     Operating environment information: Login IP address, operation log, network operator and type, WIFI name;

The above information will be de-identified immediately after collection and will be used only for security protection and troubleshooting.

(ii) Functional implementation information

1.   Customer Service : When you submit a complaint or inquiry, we may collect your contact information, such as name, mobile phone number, and email address, for communication and feedback on the processing results . If you refuse to provide the above information, we may not be able to provide you with timely feedback on the processing results.

2.   Ad optimization : Adjust ad delivery format based on network type (Wi-Fi/Mobile) to save on your data usage.

(iii) Special Circumstances Regarding Information Use

If we need to use the information for purposes not specified in this statement, we will notify you through prominent means such as pop-up notifications and will implement the use only after obtaining your explicit consent.

IV. Standards for Third-Party Cooperation and Information Flow

We strictly adhere to the principles of "minimum necessity, full controllability, and clear notification" in managing the external flow of information, and have established a full lifecycle compliance management mechanism for third-party cooperation. The specific rules are as follows:

(i) Information processing of third-party SDKs

To achieve specific service functions, we only introduce authorized partner SDKs that have legal qualifications and meet privacy protection standards. All collaborations are accompanied by written agreements that include information security, confidentiality obligations, and the division of responsibilities, ensuring that the entire data processing process is traceable.

SDK name

Provider

Information gathering

Purpose of use

Third-party policy links

Adjust SDK

Adjust, Inc

Device ID

Marketing Attribution Analysis

https://www.adjust.com/terms/privacy-policy/

Firebase SDK

Firebase, Inc

Application Information

Crash Log Collection and Analysis

https://policies.google.com/privacy

Digital Alliance SDK

Beijing Digital Alliance Network Technology Co., Ltd.

Hardware Information

Preventing equipment information tampering and cheating

https://www.shuzilm.cn/privacy_en

Counting SDK

Shushu Information Technology (Shanghai) Co., Ltd.

Application data statistics

User behavior analysis and product optimization

https://docs.thinkingdata.cn/ta-manual/latest/en/installation/installation/privacy.html

(ii) Information sharing, transfer and disclosure

1. Information sharing: Strictly limit the scope and purpose.

We promise not to proactively share your personal information with any unrelated third parties, and will only do so under the following legal or contractual circumstances:

l When mandated by laws and regulations: In accordance with the lawful requests for inquiry and retrieval from judicial organs or administrative departments, provide necessary information after verifying the authenticity and legality of legal documents, and record the transfer process.

l When necessary to protect interests: To prevent fraudulent activities and protect the personal and property safety of Boost Master , its users, and the general public, information may be shared to a reasonable and necessary extent (such as providing evidence of fraudulent activities to security agencies).

l With your explicit consent: Information may be shared with third parties designated by you, according to the scope and method of your authorization (such as authorizing friends to view collaborative works). Before authorization, the shared content, recipients, and usage restrictions will be clearly communicated to you.

l When authorized partners require the service, information will only be shared with the partners listed in this statement, and the following conditions must be met: The shared information is necessary to provide the service; The agreement explicitly prohibits third parties from using it for purposes other than those agreed upon ; All information has been de-identified and cannot be associated with personal identities.

2. Information Transfer: Ensuring the Continuity of Rights

We will not transfer your personal information to any company, organization, or individual, except in the following special circumstances, strictly in accordance with the rules:

l With your explicit authorization: Upon receiving your written or in-app confirmation, the application will be transferred to a third party within the scope and manner specified by you. Prior to the transfer, the transferee's privacy policy will be provided for your review.

l When a company undergoes a change of ownership: In the event of a merger, division, acquisition, reorganization, or bankruptcy liquidation that requires the transfer of personal information, we will: require the transferee to provide a written commitment to continue complying with this statement and relevant laws and regulations; if the transferee changes its information processing rules, it will need to obtain your explicit consent again; inform you of the transfer details and available remedies via in-app notifications, emails, etc.

3. Information Disclosure: Adhere to the principle of minimum necessity.

We will never proactively disclose your personal information, and will only do so in accordance with laws and regulations in the following circumstances:

l Legal mandate: Information required to be disclosed according to laws, regulations, judicial rulings, or administrative orders will be strictly disclosed within the required scope and in the required manner.

l Pre-disclosure processing: For information that can be disclosed in accordance with the law, priority will be given to de-identification processing to ensure that it cannot identify any specific natural person and does not contain sensitive personal information.

l With your explicit authorization: Upon your voluntary application and confirmation, information may be publicly disclosed within the scope and for the purposes you specify (such as disclosing your work and authorship information). The authorized content must be clearly and specifically stated.

4. Exceptions to Unauthorized Collection, Sharing, Transfer, or Public Disclosure of Personal Information

In accordance with relevant laws and regulations, we may collect, share, transfer, or publicly disclose your personal information without your authorization or consent in the following circumstances.

l Necessary for the conclusion and performance of the service contract in which you are a party (such as processing device identification information to complete cloud synchronization of materials);

l It directly involves significant public interests such as national security, defense security, public safety, public health, and public awareness;

l It directly involves the needs of judicial procedures such as criminal investigation, prosecution, trial, and execution of judgments;

l Processing personal information that has been publicly disclosed through legitimate news reports, government information disclosure, and other channels, without violating public order and good morals;

l To protect your or other individuals' vital legal rights, such as life, property, and reputation, and when obtaining your consent is difficult (e.g., emergency freezing requires device information verification if an account is discovered to have been stolen);

l Necessary for maintaining the secure and stable operation of this application service (such as detecting and handling application crashes, malicious attacks, and other faults);

l For statistical or academic research that serves the public interest, and for which personal information has been de-identified when providing research results to the public;

l Other circumstances as stipulated by laws and regulations.

V. Cookies and Data Security

(i) Rules for using cookies

We use cookies to store your login status, language preferences, and other information to avoid duplicate operations. You can manage or delete cookies in your browser settings, but disabling all cookies may cause some functions to malfunction.

(ii) Full-process safety protection measures

To ensure the security of your personal information throughout the entire process of collection, transmission, storage, and use, we have adopted the following multi-layered protection measures:

1.   Technical protection : Your information is encrypted with SSL and HTTPS protocols during transmission, preventing others from intercepting or altering it at will; when stored, it is protected with high-strength encryption algorithms and equipped with a "security guard" (IDS/IPS system) to prevent hacker intrusion; to access this information, you need to pass a "double checkpoint" of token verification and account password, so not just anyone can see it.

2.   Internal Management : We regularly provide privacy protection training for employees so that everyone understands how to protect your information; moreover, employees can only access information necessary for their work, and absolutely cannot see anything they shouldn't, to prevent information from being misused.

3.   Security Incident Response : In the event of an incident such as information breach, we will notify you via email, push notifications, etc., provide remedial suggestions, and report to regulatory authorities.

4.   Storage period : Your information will not be stored indefinitely. It will be deleted immediately once the service is no longer needed or the legally stipulated retention period expires, or converted into anonymous data that cannot be linked to you, thus completely eliminating information security risks.

VI. Protection of Special Groups and Global Data Processing

(i) Protection of Children's Personal Information

Minors under the age of 14 (hereinafter referred to as "children") must comply with the following rules when using this application:

l  Prerequisites: Before using this application and service, children must carefully read this policy under the supervision of a guardian and ensure that their explicit consent has been obtained before they can use the application and service.

l  Information Processing Restrictions: For children's personal information collected with the guardian's consent, we will only collect, use, share, transfer, or disclose it as permitted by laws and regulations, with explicit authorization from the guardian, or when necessary to protect the child's rights, strictly adhering to the principle of "minimum necessity."

l  Handling Objections: If a guardian does not agree to a child's use of the service or provision of personal information in accordance with this policy, please immediately cease use and inform us. We will assist in deleting the relevant information in accordance with the rules. If a guardian has any questions about a child's use of the service or information processing, they can contact us at any time through the contact information published in this policy, and we will assist in handling the matter promptly in accordance with the law.

(ii) Cross-border Data Processing Standards

Your information is primarily stored on servers within China. For cross-border transfers, we will: inform you separately of the destination, information type, and associated risks; ensure equivalent security through encryption, standard contracts, and other means; and periodically assess the security capabilities of overseas recipients.

VII. Updates to the Statement and Applicable Law

(i) Changes and notifications of the declaration

1.   Change Triggering Conditions : This statement may be changed due to adjustments in laws, regulations, and policies, iterations of business functions, optimizations of service models, etc. We promise that we will not restrict any rights you enjoy under the currently effective version of this policy without your explicit consent.

2.   Updated public announcement method :

l  All policy updates will be published on the "Settings - About - Privacy Policy" page within the app. You can check historical versions and update history at any time.

l  In the event of significant changes, we will notify you through prominent means such as in-app pop-ups and push notifications to ensure you are fully aware of the changes.

3.   Significant changes are defined as including, but not limited to, the following situations:

l  Significant adjustments have been made to the content or methods of exercising user rights in personal information processing activities;

l  There has been a substantial change in the purpose, type of processing, or method of use of personal information;

l  The addition or alteration of personal information processing scenarios that have been assessed as having a high risk.

4.   User Choice and Effectiveness: If you do not agree to the updated privacy policy, you may choose to stop using this product and related services; if you continue to use the service, it will be deemed that you have fully read, understood and accepted all the revised terms, and the updated policy will take effect from the end of the publicity period or from the date you confirm your agreement.

(ii) Applicable Law and Jurisdiction

This statement is governed by the laws of the People's Republic of China (excluding Hong Kong, Macau, and Taiwan), and any related disputes shall be subject to the jurisdiction of the court at the defendant's domicile.

VIII. Contact Us

If you have any questions, suggestions, or complaints regarding this statement, please send an email to: chouchouting2025@163.com .