Following is the legal software license agreement between you, the software end user and the software provider (hereinafter referred to as "we"). Please read this License Agreement carefully before using the software and related services. Installing or using software or services on a computer or other hardware device indicates that you have read the license agreement and agree to its terms, terms of service and privacy policies.
We know the importance of personal information to you and will do our best to protect your personal information. We are committed to maintaining your trust in us, abiding by the following principles and protecting your personal information: the principle of unanimity of power and responsibility, the principle of clear purpose, the principle of choice and consent, the principle of insufficient use, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency. At the same time, we promise that we will take appropriate security measures to protect your personal information in accordance with the industry's mature security standards.
This policy is the basic legal document for your use of our products and/or services. We hope that you read carefully before using the service and make it clear that you have fully understood the content of this policy, and hope that you can make appropriate choices based on your understanding . After we update this policy (we will prompt you to update the situation), your continued use of our products and/or services means that you agree to the content of this policy (including updated versions) and agree to our collection and Use, save, disclose and transfer your relevant information.
1. License authorizationThis license allows you to use a copy of the software contained in this package or product on a single personal computer or hardware device. For each software licenser, the program can be used at any given time only on a personal computer or hardware device. This license does not allow you to use this software on any hardware device or personal computer that is not owned or controlled by you, and you are not allowed to distribute the software over the network or make it available to multiple devices using a network at the same time. If the program is to be installed on a network server for distribution only to other computers, a special license for this software is required. You may not modify, translate, reverse assemble, decompile, disassemble or otherwise attempt (i) to break, avoid, bypass, delete, disable or otherwise circumvent any software protection mechanism in this software, including but not limited to restricting or controlling the functionality of the software, or (i i) to export source code from the software. Or basic ideas, algorithms, structures or organizations (unless applicable law prohibits such activities). You may not use this software for any purpose which is unlawful under applicable law in the area where you use it.
2. Use of contentThis software is for licensed media use only. You may not use this software for any purpose that infringes copyrights, trademarks, patents, trade secrets, publicity rights, or any other rights of third parties. You are responsible for ensuring that any content or material (including but not limited to text, photos, sound and video recording) created, copied, downloaded, compressed, recorded, played back, published and/or distributed through this software infringes these rights and from these The owner of the rights gets permission. You may not attempt to use this software or use it in conjunction with any equipment, program or service in order to circumvent the jurisdiction of technical measures used to control access or rights to any content files or other works protected by copyright law.
3. Content distributionYou can only use this software for your personal non-commercial purposes and may not provide it in any way or use it as part of any commercial service or application. If you are interested in any other uses, please contact us. Copies of content documents, including but not limited to songs and other audio recordings, are downloaded or reproduced using this software and are protected by copyright law or by relevant laws of any jurisdiction only for your own personal use and will not be distributed to third parties or executed outside your normal family and social circle of acquaintances.
4. Registration and privacy policyThe software registration, purchase and/or activation process may require you to provide personally identifiable information. We will not share or sell such information with any third party unless: (i) you have agreed to disclose such information in advance; (ii) we need To disclose such information to provide the products or services you request; or (iii) we disclose such information to fulfill our legal obligations.
How do we collect and use your personal information?Personal information refers to all kinds of information recorded electronically or otherwise that can identify a particular natural person or reflect the activities of a particular natural person individually or in combination with other information. Personal information covered by this policy includes: basic information (including personal name, birthday, sex, address, personal telephone number, e-mail); network identity information (including department). General Account, IP Address, Mail Address, User Name, Nickname in this APP, Password and Secret Protection Related to the foregoing; Personal Internet Records (including browsers, search records, software usage records, click records); Personal Common Equipment Information (including Internet Service Providers, Terminal Manufacturers, Hardware Types) A description of the number, MAC address of the device, type of operating system, unique device identification of the software list (such as IMEI/android ID/IDFA/AdVertising ID/OPENUDID/GUID/UDID), SIM card IMSI, session start/stop time, language location, time zone and network status (WiFi, etc.), hard disk, CPU, and battery usage, etc. Information about the basic situation of a person's commonly used device, video content containing personal information, and other information (including timestamps, application identifiers, application versions, application distribution channels, personal phone numbers, mobile phone numbers, web browsing records, accurate positioning information,).
Personal sensitive information refers to personal information that, once leaked or modified, will have a negative impact on the subject of personal information (including reputation, physical and mental health damage or discriminatory treatment, etc.). Personal sensitive information covered in this policy includes: network identity information (including system account, IP address, mailbox address, user name, nickname in this APP, and password and security related to the aforementioned); and other information. (including timestamps, application identifiers, application versions, application distribution channels, personal phone numbers, mobile phone numbers, web browsing records, accurate positioning information); related identity certificates; video content containing personal sensitive information.
(a) Personal information we collect and useOur products and/or services include core features, including cloud services, service-based foundational features such as surveillance video previews, device operations and controls, etc. We may collect, save, and use some information about you to achieve these features. If you do not provide this information, we may not be able to provide you with the products and services you need.
Our products and services also include additional features, including value-added services such as cloud storage, AI labs, message alerts, device unbundling, network testing, and more. If you use these additional features, we will collect personal information based on the additional features you choose to use, and if you do not provide such personal information, you may still purchase cloud services and use the basic features related to the Software products based on the Services, but you will not be able to use the appropriate additional features.
In the course of your use of our products and/or services, we collect information that you voluntarily provide or generate as a result of your use of our products and/or services in order to provide you with our products and/or services, optimize our products and/or services:
We will use the collected personal information in accordance with the provisions of this policy and to realize the functions of our products and/or services.
We will send you commercial electronic information (including SMS, email, etc.) to provide you with product/service information related to you. If you do not wish to receive such information, you can unsubscribe by using the "unsubscribe" function in the information we send.
2)Please note that all personal information you provide when you use our products and/or services, unless you delete the software, refuse our collection through account settings or system settings, otherwise it will be used when you use our products and/or services. We continue to authorize our use during the service period. When you cancel your account, we will stop using it and delete your personal information after 6 months.Cookie is a mechanism that supports the server (or script) to store and retrieve information on the website or client. When you use a product or service, we will send one or more small data files called cookies on your computer or mobile device. The cookie assigned to you is unique, and it can only be issued to you by the cookie. The web server in the domain reads. Cookies usually contain identifiers, site names, and some numbers and characters. We will use cookie technology to simplify your repeated login steps, store your browsing preferences and other data to provide you with preferences, help you optimize your choice and interaction with advertisements, and help determine your login status and account or data security.
We promise that the research on cookie information is only used for the purpose of improving service/product quality and optimizing user experience. We will not use cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. For details, see AboutCookies.org. You can clear all cookies saved on your computer. Most web browsers will automatically accept cookies, but you can usually modify your browser settings to reject cookies according to your needs; in addition, you can also clear all cookies saved in the software . But if you do this, you may need to personally change user settings every time you visit a website or software, and the corresponding information you have recorded before will also be deleted, and it may have a certain impact on the security of the service you use.
In addition to Cookie, we will use web site beacons and pixel labels and other similar technologies on the website. For example, the e-mail we sent to you may contain clicking URL linked to the content of our website. If you click on this link, we will track this click to help us understand your product or service preferences and improve customer service. Web beacon is usually a transparent image embedded into a website or e-mail. With the help of pixel labels in e-mail, we can learn whether or not e-mail is being opened. If you don't want your activities to be tracked in this way, you can always unsubscribe from our mailing list.
How do we protect and save your personal informationFirst, your personal information protection and safety measures.
1. We will make all reasonable efforts to protect the personal information obtained from you, and the personal information will be protected by a dedicated data security department. In order to prevent users' personal information from being illegally accessed, copied, modified, transmitted, lost, destroyed, processed or used in unexpected and unauthorized situations, we have and will continue to take the following measures to protect your personal information;
1) Our network services adopt encryption technologies such as transmission security protocols, and provide browsing services through https and other methods to ensure the safety of user data during transmission.
2) User's personal information is encrypted and saved by encryption technology, and isolated by isolation technology.
3) In the use of personal information, such as personal information display and personal information related calculations, we will use a variety of data desensitization technologies to enhance the security of personal information in use.
4) Set up strict data use and access system, adopt strict data access control and multiple identity authentication technology to protect personal information and avoid data being used illegally. We only allow authorized personnel to access personal information and ask them to perform corresponding confidentiality obligations.
5) Take special data and technology security audit, set up log audit and behavior audit measures.
2. Other security measures taken to protect personal information
1) To manage and standardize the storage and use of personal information by establishing data classification and classification system, data security management norms and data security development norms.
2) Establish information protection departments and data security emergency response organizations to promote and protect personal information security.
3) enhance safety awareness. We will also conduct security and privacy training courses to enhance staff awareness of the importance of protecting personal information.
3. Despite the reasonable and effective measures mentioned above and the standards required by relevant laws, we still can not guarantee the security of your personal information when communicating through unsafe channels. Therefore, you should take positive measures to ensure the security of personal information, such as: set up complex passwords, regularly modify the account password, do not disclose their own account password and other personal information to others.
4. There are always risks of information leakage in the network environment. When unexpected events, force majeure and other circumstances lead to the leakage of your information, we will try our best to control the situation, timely inform you of the cause of the incident, the security measures we have taken, security measures you can take the initiative to take, and other relevant circumstances.
5. After the unfortunate personal information security incidents, we will inform you in time according to the requirements of laws and regulations: the basic situation and possible impact of security incidents, the measures we have taken or will take to deal with them, the suggestions you can take to prevent and reduce the risks on your own, and the remedial measures for you. At the same time, we will timely inform you of the relevant events by mail, letter, telephone, push notification and other means, it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to publish the announcement. At the same time, we will report to the competent authorities in accordance with the requirements of laws and regulations.
Two. Save your personal information.
1.we will store the user's personal information collected within in accordance with laws and regulations. If you transmit your personal information to the outside world, you will be informed and asked for permission.
2.during your use of products or services, we will keep your personal information for you. If you cancel your account or delete your personal information on your own initiative, we will continue to keep your information within 6 months after you cancel your account or delete your personal information in accordance with the laws and regulations of the Internet Security Law.
Three. Legal basis for data processing
We have already introduced the purpose of processing personal data. Our legal basis for dealing with personal data includes: fulfilling contracts with you (e.g., providing you with the services you request, identifying and authenticating you so that you can use the website); and fulfilling mandatory disclosure requirements for compliance with legal requirements (e.g., for compliance with applicable accounting rules) To protect our legitimate interests (e.g., to manage our relationship with you, to ensure the safety of our services, to communicate our products and services with you), and to share your information with third parties for advertising purposes, based on the consent of our customers (e.g., cookies).
In some cases, you may need to provide us with personal data for the above processing, so that we can provide you with all our services and make it easy for you to use all our functions.
How do we share your information?According to applicable laws, you have the right to object to or request the restriction of the processing of your personal data, and to request the right to access, correct, delete and portability of your personal data.
Where the use of your information is based on your consent, you have the right to withdraw the consent at any time, but the withdrawal of the consent does not affect the legality of the data processing based on the consent before the withdrawal.
You can submit your requirements to us through the "Comments and Feedback" function.
If you find that your information has changed or is inaccurate, please notify us of these changes so that our records can be updated or corrected. If you believe that our processing of your personal data violates applicable laws, you can file a complaint with a supervisory authority.
Our retention time for your personal data depends on the needs of providing services or products to you, or in accordance with the requirements or permits of applicable laws such as tax and accounting laws.
For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost as appropriate.For those that are unreasonably repeated, require too many technical means (for example, the need to develop new systems or fundamentally change existing practices), bring risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes) Request, we may reject it.
In the following situations, we will not be able to respond to your request in accordance with the requirements of laws and regulations:
You agree that this software may monitor your use of software to improve product availability. In doing so, the software can record usage information about the functions of the selected product, the unique machine ID (automatically generated when the software is installed) and other software products installed on the same machine. Such usage information will not be collected with any corresponding personal identification information and will remain anonymous.
6. Software Update and MarketingThis software may cause your computer, without additional/or prior notice, to automatically connect to the Internet and communicate with the software to check for available bug fixes, additional features, plug-ins and new versions (collectively referred to as "software updates"). You hereby agree that the software can deliver you relevant software updates and special preferential information provided by the software, the software alliance and third-party partners.
7. Copyright InformationThe software contained in this package or equipment is protected by the related copyright law , the provisions of international treaties and all other applicable national laws. Software must be treated like all other copyrighted materials, such as books and music recordings. This license does not allow software to rent, and it is not allowed to copy with the written materials (if any) of the software.
8. Owner's DeclarationOwnership and all intellectual property rights in the software and its accompanying documents, as well as copies of any of the above documents, remain the sole and exclusive property of the software and/or its third-party licensors. You agree to abide by the copyright law and all other applicable laws. You acknowledge that the software contains valuable confidential information and trade secrets from the software and/or its third-party licensors.
9. DisclaimerThe software and services do not provide any form of guarantee. No express or implied warranties, including, but not limited to, implied warranties of marketability and applicability for specific purposes, and warranties of non-infringement of intellectual property rights, are made, and the software expressly denies that all warranties are not here. You assume all the risks associated with the quality and performance of software and services. If the software proves defective, you, not the software or authorized distributor, assume the necessary services and assume the full cost of maintenance or correction. Implied warranties are not allowed to be excluded in certain countries/regions or jurisdictions, so the above exclusions may not apply to you.
10. Limited liability statementYour sole remedy and the full responsibility of this software and its Licensor are stipulated in the above clause. In no event shall this software and its licensees be liable to you or any other person for any damage, including any incidental or consequential damage, expense, loss of profits, loss savings or other damage resulting from the use or inability to use the software, or even if the software or its licensee has been informed of this The possibility of class damage. Since certain jurisdictions do not permit the exclusion or limitation of consequential or accidental damage, the above limitations may not apply to you.
11. Export declarationIf there is no corresponding license, you may not export or re export products containing this software.
12. High risk activity statementThis software is not fault-tolerant and does not apply to hazardous environments requiring fail-safe performance, or any other software failure that may directly result in death, personal injury or serious physical or property losses (collectively referred to as "high-risk activities"). The software expressly denies any express or implied warranty of applicability to high-risk activities.
13. Compensation statementYou agree to grant this software to any loss, damages, fines and charges (including attorney's fees and fees) arising from or in connection with any claim you have. Its officers, directors and employees are innocent, indemnified and defended (i) against the rights of the other party or against any law, using, viewing, copying, downloading,etc. Encoding, compressing, copying or transmitting any material (other than those provided by the software) in connection with this software, or (ii) in violation of any terms of this license agreement.
14. Revision and renewal of the policyWe may make changes to this policy in due course. Without your explicit consent, we will not reduce your rights in accordance with this policy.
For changes to this policy (including but not limited to major changes), we will notify you in the form of push notifications, pop-ups, emails, etc.
This agreement will remain fully valid when you use the service. You can terminate the service at any time. We can deny or suspend your access to and/or use of services and/or accounts at any time and for any reason without warning. This may result in forfeiture and destruction of all information related to your membership. If you violate any of the terms and conditions of this agreement, we may terminate or suspend any and all services and access to the website without prior notice or liability. After your account terminates, your right to use services, access to websites and any content will immediately cease. All provisions of this Agreement except "1. License Authorization" shall, by their nature, remain valid after termination, including, but not limited to, statements of limited liability, exemptions and claims.
16. How to contact us