Select your country or region: Stay on current site Select another site

TOP

Choose Your Country or Region
GLOBAL
ASIA PACIFIC
EUROPE
LATIN AMERICA
MIDDLE EAST & AFRICA
Privacy
Safeguarding your privacy with innovative technologies.
By implementing innovative privacy protection technologies, we are actively minimizing our or third-party access to your private information.
Online Number
Identification
The Online Number Identification feature can help you identify unknown numbers by classifying them with a yellow page descriptor (brand and merchant) and a harassment type descriptor (harassment, fraud, sales, courier, real estate agent, and others). This feature works only with your authorization and will not store information about your call history.
Privacy options
Privacy options is a feature that provides privacy protection when sharing pictures:

1. You can choose to remove the location and parameter details from image files before sharing them to prevent sensitive information from being revealed.

2. Help protect your privacy by providing the ability to "Remove location information" and "Remove photo information" when sharing pictures.
Feature Advisor
Feature Advisor uses on-device data recording and analysis to predict and recommend system features that enhance your experience. Data used by this feature will only be processed on-device and will not be uploaded to servers. You can turn this feature off in Settings.
Notes lock
The Notes Lock feature provides password protection for the important information that you've entered on the fly. Data is processed on-device and will not be uploaded to servers.
YOYO Suggestions
YOYO Suggestions provide scenario and user habit-based service recommendations through card sets, floating windows, and notifications (e.g., Easy Travel).

1. With your authorization, YOYO Suggestions will collect and share your app usage information and pseudonymized device identifiers with third-party travel service providers to obtain travel information and provide you with thoughtful services.

2. YOYO Suggestions use the HONOR AIEngine to provide a personalized service experience. Data collected for this purpose will only be processed on-device and will not be uploaded to servers.

3. With your authorization, YOYO Suggestions will obtain details about the location you've entered to provide better travel services. Location information will only be processed on-device and will not be uploaded to servers.

4. Services provided by YOYO Suggestions can be turned on or off depending on your needs.
Secure input
Secure input provides you with a safe input environment and is enabled by default. The system will automatically switch to secure input when you need to enter a password. This feature will not collect your inputs or remember your input history. Also, screenshot and recording functions will be disabled when secure input is active to ensure password security.
Share what and with who? It's all up to you.
You have control over your data with permissions.
Data and Privacy
The “Data and Privacy” page shows our privacy principles, philosophy, and privacy statements for related apps. It helps you understand how Honor will collect and use your personal information, what personal data may be shared, how it will be used to improve your experience, and how your data subject rights can be exercised before you log in to your device.
App networking and
launch management
The network access methods (mobile data or WLAN) of individual apps can be managed to prevent them from collecting and transmitting data over the network without permission.

The launch behaviors (self-launch, associated launch or background activity) of individual apps can be managed to restrict unauthorized auto-launches and reduce the risk of revealing personal information. Unnecessary auto-launches can also be restricted using intelligent app launch management, which automatically identifies apps and usage scenarios.
Permission minimization
All permissions are managed transparently. Each permission requires your consent to use and can be disabled on the permission management page.

1. The system will provide suggestions on granting the least number of permissions to common apps.

2. Background access to the camera and microphone is not permitted by default.

3. Granted permissions will be automatically revoked for apps that have not been used for 90 days.
Progressive permission
granting model
We use a tiered, progressive permission management model to reduce and limit access to user data.

1. A permission can have the following four states: “deny”, “Allow this time only”, “Allow only while in use”, and “Allow all the time”.

2. The Storage permission can have the following three states: “deny” (only access to the app‘s own directories are allowed), “Photo and videos", and "All files".

3. The Location permission will be first granted as "Allow only while in use" and then as " Allow all the time".
Data and Privacy
The “Data and Privacy” page shows our privacy principles, philosophy, and privacy statements for related apps. It helps you understand how Honor will collect and use your personal information, what personal data may be shared, how it will be used to improve your experience, and how your data subject rights can be exercised before you log in to your device.
Privacy access history &
risk report
With the privacy access history and risk report feature,users can stay informed about sensitive permission access history and privacy risks.In addition,optimization suggestions will be provided based on the "Minimization and only when necessary" principle.
Sensitive permission
access alerts
Notification bar reminders and pop-up messages ensure that you are alerted timely and can stop an app from trying to access sensitive permissions.
Privacy access history &
risk report
With the privacy access history and risk report feature,users can stay informed about sensitive permission access history and privacy risks.In addition,optimization suggestions will be provided based on the "Minimization and only when necessary" principle.
Protecting device security.
Multiple protections that starts and stays with your device.
Lock Screen Password
As a crucial barrier that protects the security of your device, screen lock passwords are guarded by the following measures in Magic UI to prevent them from being leaked.

1. Entered lock screen passwords will be stored by an irreversible algorithm and protected with a hardware-bound unique key.

2. Lock screen password verifications are done in a secure and hardware-isolated environment.

3. Magic UI imposes password attempt limits to prevent forced cracking.

The lock screen password must be entered after a reboot or after 72 hours of the last password input and cannot be substituted by biometric authentication methods such as facial recognition and fingerprints.

The lock screen password is also used to encrypt and protect your privacy. Data such as pictures, text messages, emails, and other application data will not be accessible without password verification.
App Lock
We have provided an App Lock feature to prevent unauthorized access to private information contained in your apps. Locked apps can only be accessed after authentication to ensure the privacy of the device owner.
Fingerprint
From enrollment to authentication, fingerprint information will never be uploaded to servers but converted into templates and stored in a secure and isolated environment on-device.
3D Face Recognition
Magic UI features built-in face recognition that's more secure and widely suited for high-security scenarios (such as making payments). Multiple safeguards are implemented to ensure the security of your facial data.

1. The acquisition, detection, extraction, comparison, and storage of facial data are performed in a TEE secure environment.

2. System and the third-party apps that use face recognition will only get the verification result but not the facial data itself.

3. Facial data is encrypted by a high-strength algorithm and saved to a secure storage location.

4. Facial data will only be stored on-device and will not be sent, exported, or backed up to cloud services or external storage media.
Find Device
This service allows you to locate your device remotely if it is accidentally lost.

1. Find Device is automatically enabled when you log in to your HONOR ID from your device.

2. To better protect your privacy, Honor will only receive your location information when you use Locate Device, or enable Lost mode or Low battery location reporting.

3. The location information passed to Honor through Locate Device and Low battery location reporting will be retained for 14 days to increase the chance of getting your device back. If Lost Mode is enabled, we will keep your device's location information in the last 24 hours for you. This information will be deleted immediately when you turn off Lost Mode.

4. If the device cannot be recovered, you can use the Erase Data feature to remotely erase the data on the lost device.

5. The Activation lock feature will also be enabled when you turn on Find Device. After being wiped or illegally reset, an Activation lock-protected device can only be reactivated with the correct HONOR ID information.
Differential Privacy
We use differential privacy technology to protect your privacy. When you agree to share your data with Honor, Magic UI processes the raw data through differential privacy algorithms and adds randomized "noise" before uploading it to Honor servers. With statistical analysis, Honor can only study the overall distribution of data but will not have access to exact information about you. For example, the "Honor User Experience Improvement Program" uses differential privacy technology to collect information about the daily screen time on user devices. This data can only express the approximate number of users in different time brackets but will not reveal the exact screen time of individual users.
Fake base station detection
To protect your privacy and property, we use underlying communication algorithms to identify fake base stations and prevent them from sending you false advertisements and fraudulent SMS messages.
MAC address randomization
We have provided the ability to use randomly assigned MAC addresses during network detection. Unlike fixed MAC addresses, a randomly assigned MAC address can help prevent tracking when connecting to Wi-Fi networks and enhance privacy protection.
Note:
-The information shown on this website (privacy protection features and product privacy features) is for reference only. Please refer to the features provided in the product for accurate information. Some features may only be available in certain countries or regions.
-The information shown on this website only applies to the Honor Magic UI mobile systems and certain applications. Please refer to relevant descriptions for the privacy features and functions of other Honor products (such as PC, Tablet, and TV).
-The information shown on this website applies to Honor phones with Magic UI 5.0 and above. Some content applies to Magic UI 3.0 and Magic UI 4.0.
If you have questions or suggestions about the information shown on this site, please contact us via privacy@hihonor.com.