< back
Privacy Statement of Authentic Global LLC
(This statement will be issued and take effect on [May 22, 2025].)

Authentic Global LLC (hereinafter referred to as "Authentic" or "we") is committed to assisting clients in improving advertising and marketing models, and we respect and protect your privacy. This statement explains in detail the types of personal data we may collect about you when you interact with us. Authentic is the data controller for any personal data you provide to us (including data related to this website). 

This statement explains the following: 

1. How We Collect and Use Your Personal Information

2. How We Use Cookies and Similar Technologies 

3. How We Share, Transfer, and Disclose Your Personal Information

4. How We Protect Your Personal Information

5. Your Rights 

6. How We Handle Minors’ Personal Information

7. How Your Personal Information Is Transferred Globally

8. How This Statement Is Updated 

9. How to Contact Us

Authentic recognizes the importance of your personal information and adheres to the following principles to protect it: accountability, purpose limitation, consent, data minimization, security, individual participation, and transparency. We promise to adopt industry-standard security measures to safeguard your personal information. 

1. How We Collect and Use Your Personal Information  

Personal information refers to any information recorded electronically or otherwise that can identify a specific natural person or reflect their activities, either alone or in combination with other information.

We only collect and use your personal information for the purposes stated below. Our services are exclusively provided to users in the mainland of the People's Republic of China. If you are located outside Mainland China, different jurisdictional requirements may apply to the collection, storage, use, and sharing of data and personal information. If we intend to use your information for purposes not stated in this declaration, we will seek your consent in advance. 

We provide data analytics tools and services to host applications, including but not limited to application statistical analysis and mobile ad monitoring. We only collect your data based on the needs and purposes of the host application developers, who must ensure they have obtained your explicit consent. The specific data collected includes: 

Product FunctionData TypeSpecific FieldsPurpose
Application AnalyticsRequiredBasic Personal InfoUnique device identifiers (OAID and Android ID), IP address, IDFV, IDFAIt is used to generate a desensitized unique identifier for end-users and conduct basic analysis.
Other basic data about applications, devices and networks.SDK or API version, platform, timestamp, creation time of system files, application identifier, application version, application distribution channel, application process information, IDFA authorization status of the application, sensor information, NFC permission status of the application (yes or no), whether the device supports NFC functionality (yes or no), whether the device supports Bluetooth functionality (yes or no), device model, terminal manufacturer, operating system version of the terminal device, session start/stop time, language location, mobile network/country code, time zone, hard disk, CPU and battery usage, network information (connection status of WiFi network or mobile network, BSSID or SSID information of the connected WiFi).It is used for rough multi-dimensional analysis, evaluating the effectiveness of advertising placements, and identifying, analyzing, and eliminating fraudulent traffic.
OptionalOptional Personal InfoMEID、IMEI、Mac informationIt is used to identify users more accurately and recognize fraudulent traffic.
Application listIt is used to identify, analyze, and eliminate fraudulent traffic.
Location information (latitude and longitude, base station System ID, Network ID, Base station ID)It is used to generate more accurate location distribution reports and identify fraudulent traffic.
Mobile advertising monitoringRequiredBasic Personal InfoUnique device identifiers (OAID and Android ID), IP address, IDFV, IDFAIt is used to generate desensitized unique identifiers for end-users and conduct basic analysis.
Other basic data related to applications, devices, and networks.SDK or API version, platform, timestamp, creation time of system files, application identifier, application version, application distribution channel, application process information, IDFA authorization status of the application, sensor information, NFC permission status of the application (yes/no), whether the device supports NFC functionality (yes/no), whether the device supports Bluetooth functionality (yes/no), device model, terminal manufacturer, operating system version of the terminal device, session start/stop time, language location, mobile network/country code, time zone, hard disk, CPU and battery usage, network information (connection status of WiFi or mobile network, BSSID or SSID information of the connected WiFi).It is used for rough multi-dimensional analysis, evaluating the effectiveness of advertising placements, and identifying, analyzing, and eliminating fraudulent traffic.
OptionalOptional personal informationMEID、IMEI、Mac infoIt is used to identify users more accurately and detect fraudulent traffic.
Application listIt is used to identify, analyze, and eliminate fraudulent traffic.
Location information (latitude and longitude, base station System ID, Network ID, Base station ID)It is used to generate more accurate location distribution reports and identify fraudulent traffic.

If you do not want your personal information to be collected as described above, you may exercise your right to erasure in accordance with Articles 5 and 11 of this Statement. Once you have exercised your right to erasure, your personal information will not be collected and processed in any form and your consent will not be sought more frequently.

(1) Permissions Related to Data Collection 

Subject to different system requirements, the host application may also need to obtain relevant permissions to use our services to collect personal information.

Android Permissions: 

Permission namePermission purpose
INTERNETIt is used to allow the application to access the network and send statistical data.
ACCESS_NETWORK_STATEIt is used to allow the application to detect the network connection status and pause data transmission when the network is in an abnormal state.
READ_PHONE_STATEIt is used to generate desensitized unique identifiers for end-users.
ACCESS_WIFI_STATEIt is used to generate desensitized unique identifiers for end-users and identify fraudulent traffic
WRITE_EXTERNAL_STORAGEIt is used to store device information and record logs.
ACCESS_FINE_LOCATION(optional)It is used to correct the regional distribution data of end-users, make the report data more accurate, and identify fraudulent traffic.
ACCESS_COARSE_LOCATION(optional)It is used to identify fraudulent traffic.
GET_TASKS(optional)It is used for more accurate statistics on the activity level of end-users.

iOS Permissions:

Permission namePermission purpose
INTERNETIt is used to allow the application to access the network and send data.
IDFAIt is used to generate desensitized unique identifiers for end-users.
Location information (optional)It is used to correct the regional distribution data of end-users, make the report data more accurate, and identify fraudulent traffic.
WIFI information(optional)It is used to identify fraudulent traffic.

We only collect data after host apps confirm your consent. You should understand and confirm that we will only collect if the host application promises to have your authorized consent. You may refuse or revoke consent by disabling the appropriate permissions.

(2) Exceptions to Authorized Collection and Use of Personal Information 

Under the following circumstances, we may collect and use your personal information without consent, as permitted by laws and regulations and relevant national standards: 

Related to the fulfillment of our obligations under laws and regulations; 

Directly related to national security and national defense security; 

Directly related to public safety, public health, and significant public interests; 

Directly related to crime investigation, prosecution, trial and judgment execution; 

When it is difficult to obtain the consent of the subject of personal information or other individuals for the purpose of safeguarding their lives, property and other important legal rights and interests; 

The personal information collected from you is disclosed to the public on your own; 

Your personal information collected from legitimate public disclosure of information, such as legitimate news reports, government information disclosure and other channels; 

Necessary for the signing or fulfillment of a contract at your request; 

Necessary for maintaining the safe and stable operation of the products or services we provide, such as discovering and disposing of product and related service failures; 

Necessary for legitimate news reporting;

Necessary for academic research institutions to carry out statistical or academic research in the public interest, and to de-identify the personal information contained in the results when providing the results of academic research or descriptions to the public; 

Other cases stipulated by laws and regulations.

2. How We Use Cookies and Similar Technologies

When you use our services, we may store small data files called "Cookies" on your device. Cookies typically contain identifiers, site names, and alphanumeric characters. Cookies enable us to store your preferences and usage habits, saving you the step of repeating information and providing you with a more personalized and attentive service and a more convenient user experience.

We do not use Cookies for purposes beyond this statement. You may manage or delete Cookies as desired.

3. How We Share, Transfer, and Disclose Your Personal Information

4. How We Protect Your Personal Information

(1)Protection

To ensure the security of your personal information, we have put in place commercially appropriate security measures that comply with industry standards and applicable regulations to reduce the risk of unauthorized access, disclosure, use, modification, damage or loss. We regulate the scenarios in which your personal information is used to ensure that the principle of minimum necessary data collection is followed. In addition, we have established appropriate early warning mechanisms and contingency plans as required by law. In the event of an information security incident, we will inform you of the situation in a timely manner through email, phone calls, and push notifications. If necessary, we will also actively report on the handling of personal information security incidents in accordance with the requirements of regulatory authorities and work closely with government agencies.

(2) Storage 

We will continually monitor and reasonably adopt or modify security measures that comply with current industry standards or applicable laws. We are committed to keeping your personal information for the shortest period of time necessary to fulfill the purposes of processing in accordance with relevant laws and regulations. After this period, we will delete or anonymize your personal information. If we cease to operate, we will immediately stop collecting your personal information, inform you by means of an individual notice or a public statement, and delete or anonymize all personal information relating to you.

5. Your Rights

(1) Access and Query 

You may access your personal information, except for the exceptions stipulated by laws and regulations. 

(2) Correction

Where you become aware of an error in the personal information we process about you, you have the right to ask us to make a correction.

(3) Deletion

You have the right to request us to delete your personal information if we do not do so voluntarily in the following circumstances:

The purpose of processing is fulfilled or no longer necessary; 

Services are terminated, or retention periods expire; 

You withdraw consent; 

We process your personal information in violation of laws, administrative regulations or agreements.

After you delete information from our Services, we may not be able to immediately delete the corresponding information in our backup systems because of applicable laws and security technology limitations, but we will securely store your personal information and restrict any processing of it until it can be erased in a backup.

(4) Change the scope of your authorized consent or withdraw your authorization

Each business function requires some basic personal information in order to be completed. You may give or withdraw your authorized consent for the collection and use of additional personal information collected at any time. You may also choose to cancel or disable certain functions.

When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the processing of personal information based on your authorization prior to withdrawal.

If you wish to exercise your rights as described above, please contact the contact information provided in Article 11 of this Statement for a response or guidance. For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.

6. How We Handle Minors’ Personal Information

Our products and services are intended primarily for adults. If you are a minor, we ask that you ask your parent or other guardian to read this statement carefully and to use our services or provide information to us with the consent of your parent or other guardian.

In the case of collecting personal information from minors with parental consent, we will only use or publicly disclose this information when permitted by law, with the express consent of the parent or guardian, or when it is necessary for the protection of minors, and in strict compliance with the requirements of the Personal Information Protection Act and the Regulations on the Network Protection of Children's Personal Information. If we discover that personal information of minors has been collected without prior verifiable parental consent, we will attempt to delete the relevant data as soon as possible.

7. How Your Personal Information Is Transferred Globally 

Unless otherwise stated in this Privacy Statement, we will not transfer or store your personal information across borders. If cross-border transmission or storage is required in the future, we will inform you of the purpose of the information leaving the country, the recipients, security measures and security risks, and other information that is required to be informed to you according to the relevant laws and regulations, and obtain your consent.

8. How This Statement Is Updated  

This Privacy Notice may be updated from time to time to reflect changes in the law, best practice or our operations in relation to the processing of personal data. The date of the latest revision will be shown at the top of this page. If you do not agree with the changes, please stop continuing to use our services and please do not share your personal data with us. You should check this notice from time to time for updates.

9. How to Contact Us

For questions, suggestions, or complaints, please contact:

Email: [support@auth-asia.com]