Terms and Conditions
User Service Agreement
MAYLERESCAPE LIMITED places a high priority on the protection of personal information. When you use the services provided by the MAYLERESCAPE LIMITED platform (hereinafter referred to as the “Multi-User Service”), we will collect, use, and share with you and your end-users (i.e., “Your Product's End-Users”) your personal information in accordance with this Privacy Policy. When you use the services provided by the [CCTech] platform (hereinafter referred to as the “[Multi-User] Services”), we will collect and use personal information about you and your end-users (i.e., the “end-users of your products” or the “end-users of your products”, hereinafter referred to as “end-users”, hereinafter referred to as “end-users” or “end-users”, hereinafter referred to as “end-users”, hereinafter referred to as “end-users”), in accordance with this Privacy Policy. We hope to provide you with personal information through this Privacy Policy. We would like this Privacy Policy to give you a clear picture of how we handle personal information about you and your end-users, and we therefore recommend that you read this Privacy Policy in its entirety to help you understand how to maintain your own privacy.
This Privacy Policy applies to all services provided by Chunghwa Telecom. It applies to your access to the Chunghwa Telecom platform and your use of the services provided by Chunghwa Telecom, including, but not limited to, the website, SDK, API, plug-ins, components, code, tools, and innovative products and services provided by Chunghwa Telecom. If there are separate privacy policies for any particular service or services provided by Zhongquan Technology, the corresponding privacy policies of those services will be combined with this Privacy Policy to form a complete privacy policy of Zhongquan Technology. If you allow us to share information with third party websites, you are bound by the terms of service and privacy policy of the third party websites. In particular, please note that we have no knowledge of or control over the information collection purposes of third parties that display, link to, or repackage our services as information controllers and provide you with products and services that are subject to the third party's privacy policy, and you should exercise caution when accessing or using their services until you have reviewed and accepted their privacy policy or privacy policy. If you provide the Services in a member state of the European Union, the European Union-specific terms of this Privacy Policy will apply to you.
Please be sure to read and thoroughly understand this Privacy Policy before using the products or services of MAYLERESCAPE LIMITED, especially the terms and conditions highlighted in bold and underlined, and use the relevant products or services after confirming that you fully understand and agree to them. If you have any questions about this Privacy Policy, you may contact us through the contact information published by [MAYLERESCAPE LIMITED] (Umeng_Legal@service.umeng.com). If you do not agree with the contents of this Privacy Policy, you should refrain from using the Services.
This Privacy Policy will help you understand the following:
First, how we collect and use personal information about you and your end users.
First, how we collect and use personal information about you and your end users. Second, how we use cookies and web beacons.
Three: How we share, transfer, and publicly disclose your personal information and that of your end users.
How we protect your personal information and the personal information of your end users
V. How We Manage Your and Your End-User's Personal Information
VI. How We Handle Information About Minors
VII. Storage and Global Transfer of Your Personal Information and that of Your End Users
How this Privacy Policy is Updated
IX. How to Contact Us
I. How We Collect and Use Personal Information About You and Your End Users
We collect information in order to better, optimize, and accurately perform the services you choose. We collect information in the following ways:
1. Information You Provide to Us
Information that you fill out, submit, or enter when you activate the [MAYLERESCAPE LIMITED] service and when you use the related services provided by [MAYLERESCAPE LIMITED], including your contact phone number, e-mail address, corporate information, product information, marketing channels, and data related to the name of the application program.
We collect this information in order to provide you with better service, and to accomplish this, we use your information for the following purposes:
(1) To provide you with the services of Chugoku Semiconductor Technology, and to maintain and improve those services.
(2) To recommend content that may be of interest to you, including, but not limited to, sending you information about products and services, or displaying personalized third-party promotional information to you through the system, or, with your consent, sharing information with partners of Zhongquan Science & Technology so that they can send you information about their products and services.
(3) We may use your personal information to prevent, detect, and investigate fraud, copyright infringement, safety hazards, illegal activities, or violations of our agreements, policies, or rules or those of our affiliates, in order to protect the legitimate rights and interests of you, other users, or our affiliates.
(4) Contacting you to resolve problems.
(5) Use other means as permitted by you.
Information Collected in the Course of Your Use of the Services We collect different information depending on the service you choose. The services we provide may vary in different countries or regions.
(1) [Law of UK Total Technology] Statistical Analysis Service
(1) [Law of UK National Science and Technology] Terminal Statistics Analysis Service (U-App/U-Web)
U-App/U-Web statistical analysis service helps you understand how your end-users use your products (including services, including but not limited to mobile application clients, mobile web sites, application platforms, PC web sites, web sites, and other terminals confirmed to be able to provide the services, etc., as described below), and helps you analyze the performance of your products on different terminals and devices. Once you have integrated the ZQT Statistical Analyzer in your product, your product collects and transmits data to our servers via the ZQT Statistical Analyzer. We collect unique device identifiers (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to provide statistical analysis services and calibrate the accuracy of report data by geolocation to provide basic anti-cheating power.
In addition to the above personal information, the statistical analysis service collects the following information depending on the statistical dimension: SDK/API/JS code version, browser, Internet service provider, platform, timestamp, application identifier, application version, application distribution channel, unique device identifier, device model, sensor parameters, device manufacturer, device OS version, session start/stop time, language location, and so on. The device identifier, device model, unique device distribution channel, sensor parameters, device manufacturer, device operating system version, session start/stop time, language location, time zone and network status (WiFi, etc.), hard disk, CPU and battery usage.
(2) U-MiniProgram Statistical Analysis Service (U-MiniProgram)
The U-MiniProgram statistical analysis service helps you understand the end-users of your apps. Once you have integrated U-MiniProgram in your app, your app collects and transfers data to our servers through U-MiniProgram.
We identify users by capturing the de-identified ids (openid/unionid/alipayid) provided by the platform so that we can perform statistics such as user additions. Depending on the dimension of the statistics, the following information is collected by the app's statistical analysis service: account nicknames/avatars of app users, the gender/region/language of the users set in their app accounts, as well as the model/brand of the user's device, the operating system and its version number, and the resolution.
(2) [Law of UK National Science and Technology] Developer Operation Tools
Accessing and Browsing the [Law of UK National Science & Technology] Platform or the [Law of UK National Science & Technology] Client In the course of your use of our services, we may automatically collect and store information about your usage as web date information in order to identify account anomalies and device anomalies, to understand and/or optimize product suitability, and to provide you with page displays and search results that better meet your needs. When you use the ZoomInfo service or visit the websites covered by the ZoomInfo platform, ZoomInfo automatically receives and records information about your browser and computer, including but not limited to your IP address, browser type, language, date and time of visit, hardware and software characteristics, and a record of the web pages you request. If you visit a mobile website and use our services, we may read information about your location and mobile device, including but not limited to device model, device identification number, operating system, resolution, and carrier. When you use the MAYLERESCAPE LIMITED client, we will collect and store data including, but not limited to, SDK/API/JS code version, browser, internet service provider, IP address, platform, timestamp, application identifier, application version, application distribution channel, unique device identifier, iOS Informant Identifier (IDFA), Android Informant Primary Identifier, Grid Card (MAC) address, International Mobile Equipment Identifier (IMEI), and other information related to your location and mobile device. The device model, sensor parameters, device manufacturer, operating system version, session start/stop time, language, time zone and network status (WiFi, etc.), hard disk, CPU and battery usage are all included. In order to better serve you, the [ZTE] client has integrated its own developer operation tools such as U-Push and U-Share, which collect the same fields as those collected by the [ZTE] developer operation tools in paragraph (3) of this Article.
(7) Others
In addition to the above information, we may collect other information about you that is reasonably necessary to provide the Services and to improve the quality of the Services, including information you provide when you contact our customer service team, information you send us in response to a questionnaire when you participate in a survey, and information we collect when you interact with our affiliates and partners of Zhongquan Technology. At the same time, in order to enhance the security of your use of the [Law of UK Total Technology] services and to more accurately prevent phishing web fraud and viruses, we may determine the risk of your account by learning about your web usage habits, information about the software you commonly use, etc., and may record some URLs that we consider to be at risk. Please note that individual device information, date of service information is information that cannot identify a specific natural person. If we use this type of non-personal information in combination with other information to identify a specific natural person, or if we use it in combination with personal information, this type of non-personal information will be treated as personal information during such combination, and we will anonymize and de-identify this type of information, unless we have obtained your authorization or are otherwise required by laws and regulations.
Authorization and use of end-user data You are the end-user information controller, but we have no control over how you use information belonging to or about your end-user.
Authorization and Use of End-User Data You are the ultimate end-user information controller, and while we provide you with data processing services, we have no control over how you use data belonging to or about your end-user. You should use the data in a manner consistent with applicable legal and ethical obligations.
You should use your end-user data in a manner consistent with applicable legal and ethical obligations. If you accept this Privacy Policy and integrate our SDK, API, JS code, or other statistical analysis tools or developer tools into your products, you should ensure that we can legally collect and use personal information related to your end users in accordance with applicable laws, regulations, and supervisory requirements, and the provisions of this Privacy Policy, and ultimately in the form of statistical analysis data, portrait of people, tags, and so on. You warrant that you have complied and will continue to comply with applicable laws, regulations, and regulatory requirements, including, but not limited to, formulating and announcing policies related to the protection of personal information and privacy protection, and that you will provide your end users with an easy-to-operate selection mechanism and inform them of how to exercise their right to select. You should include a link to our privacy policy in your privacy policy in order to make it easier for your end-users to understand our privacy policy, or to comply with applicable laws, regulations, and supervision requirements. If your end users do not want their personal information to be processed and used by us, you can tell your end users to opt-out by going to the website https://outdip.umeng.com/opt_out.html. If you provide services in a member state of the European Union, you understand that you must have an appropriate legal basis for the processing of personal data. These legal bases may include: to fulfill contracts with end users (e.g., to provide end users with the services they request, to identify and authenticate them so that they can use the Web site); to comply with legal requirements (e.g., to comply with mandatory disclosure requirements by law enforcement authorities in order to comply with applicable accounting rules); and to serve your legitimate interests (e.g., to manage your relationship with the end user, to secure your services, to communicate with the end user, to ensure that the Web site is secure, and to ensure that the end user has access to the Web site and that the Web site is secure and that the Web site is protected. (e.g., managing your relationship with end users, communicating with end users about our products and services to ensure the safety of our services); and based on end users' consent (e.g., placing cookies, sharing end user information with third parties for the purpose of advertising). You further warrant that you shall require your end-users to agree to our Privacy Policy in your Privacy Policy. In the event that your end-users suffer any claims, demands, or complaints of any kind against us as a result of the collection, use, or disclosure of their information under this Privacy Policy, you will be responsible for resolving them in their entirety, and will be responsible for fully indemnifying us for any damages that we may incur. If you provide services in a member state of the European Union, the end-user has the right to object to or request the restriction of the processing of his or her personal data and to request access to, rectification of, deletion of, and portability of his or her own data in accordance with applicable law. The end user also has the right to withdraw consent at any time in cases where your use of the end user's information is based on his or her consent. If you need our assistance to satisfy your end-user's request, you can let us know through the ticket system (by logging into your account, clicking on Customer Service Tickets, and selecting the Legal inquiries and Privacy Policy inquiries types of tickets and feedback), and we will provide you with assistance. You understand that your end users may file a complaint with a supervisory authority if they believe that your processing of their personal data violates applicable laws.
Two: How We Use Cookies and Web Beacons
In order to make your visit experience easier, when you visit the platform or use the services provided by MAYLERESCAPE LIMITED, we may identify you through small data files, which are used to save you from having to repeat the steps of entering your registration information or to help determine the security of your account. These data files may be cookies, flash cookies, or other local storage provided by your browser or associated application program (collectively, “cookies”).
Please understand that some of our services are only available through the use of cookies. If your browser or browser add-on service allows it, you can open your browser's settings, select your privacy settings, check the “Do not track” box, or disable cookies so that your data will not be tracked by us. Web pages often contain electronic images (known as “single-pixel GIF files” or “web beacons”). Web beacons can be used to help the web site count users browsing the web page or to access certain cookies. We use web beacons to collect information about your web browsing activities, such as the address of the page you visit, the address of the referring page you previously visited, the amount of time you spend on the page, your browsing environment, and display settings.
How we share, transfer, and publicly disclose your personal information and that of your end-users
1. Sharing
We are under a duty of confidentiality to you and will not sell or rent your and your end-users' information to third parties to satisfy their marketing or non-legal purposes. We will not share your end-user's personal information with any third party except under the following circumstances:
(1) When prior consent or authorization has been obtained from the subject of the right to personal information.
(2) In accordance with the provisions of laws and regulations or at the request of regulatory or judicial authorities.
(3) If your end user is a qualified intellectual property rights complainant and has filed a complaint, at the request of the respondent, the information will be disclosed to the respondent to facilitate the handling of possible disputes over rights by both parties.
(4) Only when information about your end-user is shared can services be provided or disputes or controversies between your end-user and others be handled.
(5) Sharing with advertisers, media and other partners. We will work with these partners to use the desensitized data processed and enhanced by the U-DIP Data Center in a variety of ways for commercial purposes, including optimizing advertisements and improving marketing effectiveness. We will not share your end-user's personal information with our partners unless authorized by the end-user. We will provide these partners with data about advertising strategies or the effectiveness of advertisers' advertisements without providing any personal information, or we will aggregate this information so that it is not personally identifiable. We sign strict confidentiality agreements with our sharing partners, requiring them to handle and use the data in accordance with our privacy policy and strict data security measures.
(6) Sharing your personal information with affiliates of CCTC.
2. Transfer
We will not transfer your end-user's personal information to any third party, except in the following cases:
(1) With the consent of your end-user.
(2) In the event of a merger, acquisition, or bankruptcy or liquidation involving the transfer of personal information, we will ask the new company or organization holding your end-user's personal information to continue to be bound by this Privacy Policy, or we will ask that company or organization to seek authorization and consent from your end-user again.
We will publicly disclose your ultimate user's personal information only in the following circumstances.
(1) With the express consent of you or your end-user;
(2) Disclosure based on the law: We may publicly disclose your or your end-user's personal information when required to do so by law, legal process, litigation, or mandatory requests from governmental authorities.
(3) In emergency situations, when it is reasonably judged to be necessary to protect the important legal rights and interests of us, our customers, end users, or others.
How We Protect Your and Your End-User's Personal Information In order to protect the security of your and your end-user's information, we will use reasonable physical, electronic, and managerial security measures to protect your information in accordance with generally accepted industry standards, and will use our best efforts to prevent leakage, destruction, or loss of your and your end-user's information. We protect data exchanged between your browser and our servers with SSL protocol encryption; we provide HTTPS protocol secure browsing on our web sites; we use encryption technology to enhance the security of personal information; we use trusted protection mechanisms to prevent malicious attacks on personal information; we deploy access control mechanisms to make every effort to ensure that only authorized persons have access to personal information; and we conduct security and privacy training courses. We organize training courses on security and privacy protection to enhance employees' understanding of the importance of protecting personal information. We have a data security management system that is data-centric and centered on the data life cycle, which is advanced in the industry, and we enhance the security of the entire system from a variety of perspectives, including organizational development, system design, staff management, and product technology. The information we collect is stored in a secure operating environment that is not open to the public. To avoid unauthorized access to your information, we store it in servers that are protected by firewalls and may be encrypted. However, no system is absolutely secure, and we ask you to understand that there is no such thing as “perfect security measures” on the information network. Even with our best efforts, we may not be able to prevent illegal access to your personal information and that of your end users. In addition, since there is no way to determine whether or not a person's statements are true, we may be deceived by unreliable, misleading, or illegal information. In the unfortunate event that a personal information security incident occurs, we will, in accordance with laws and regulations, notify you or your end users of the following: the basic circumstances of the security incident and its possible impact, the measures we have taken or will take to deal with the incident, suggestions for preventing and minimizing the risks that you and your end users can take on their own, and remedial measures for you and your end users. We will notify you by e-mail, letter, phone call, or push notification of the circumstances of the incident, and provide you and your end-users with suggestions on how to prevent and minimize risks on your own, and remedial measures for you and your end-users. We will inform you and your end-users of the circumstances of the incident by e-mail, letter, telephone call, or push notification, etc. If it is difficult to inform the subject of the information one by one, we will make a public announcement in a reasonable and effective manner. We will also report on the handling of personal information security incidents as required by regulatory authorities. We will take reasonable and enforceable measures to avoid collecting unrelated personal information as much as possible. We will retain your personal information and the personal information of your end users only for as long as necessary to achieve the purposes described in this policy, unless such retention is mandated by law. Some of the criteria we use to determine the length of time include:
1、Completing the service purpose related to you, maintaining the corresponding service and business records, and responding to your possible business needs;
2. to ensure the safety and quality of the services we provide to you;
3. Whether you agree to a longer retention period;
4. Whether there is any other special agreement on the retention period.
After your personal information exceeds the retention period, we will delete or anonymize your personal information as required by applicable laws.
V. How to Manage Your and Your End-User's Personal Information You can access and manage your information in the following ways.
(1) Accessing, correcting, and supplementing your information. We will endeavor to enable you to review, correct or supplement the information you have with us. To review, correct, or supplement, please visit our Web site and log in to your account. If you are unable to perform the operation of a right on your account page, you can contact us through the contact information in this policy and we will assist you with the appropriate operation.
2. Account Cancellation and Deletion of My Information.
If you do not wish to continue to use our products, you may submit a request to cancel your account to us through the troubleshooting system (by logging in to your account, clicking on Customer Service Tickets, and selecting Legal inquiries and other types of rights inquiries for troubleshooting and feedback), and we will usually respond to your request within 15 business days, but for the sake of the security of your account we will identify you, verify and process your request, and we will require you to submit sufficient information for the purpose of deletion. However, for the security of your account, we will identify, verify and process your request, and we will need you to submit sufficient and valid information about yourself. After your account is canceled, we will no longer provide services to you. If you want us to delete your personal information, you can also submit a request for deletion of your personal information to us.
3、Obtain a copy of your personal information.
You have the right to obtain a copy of your basic personal information by sending us a request. Provided that it is technically feasible, such as matching of data outlets, we may also transmit a copy of your personal information directly to a third party designated by you at your request. If your end users need a copy of their personal information, they can make a request to us, and we will return a copy of their personal information when we have completed the end user's identity verification.
VI. How We Handle Information from Minors
We take the protection of personal information of minors very seriously, and we do not accept any minors to register as our users. If your application is developed for use with minors, we ask that you take the necessary steps to ensure that you obtain the consent of their guardians for the registration and use of your end-user account, and that you fulfill your obligation to notify them accordingly in your privacy policy. You are reminded that, as a minor, you are also required to comply with the standards and guidelines of the application marketplace regarding the use of minors, so as not to jeopardize the availability of your application or the normal operation of the site. Due to existing technologies and business models, it is difficult for us to proactively identify information about minors. If a guardian of a minor discovers that unauthorized collection of personal information about a minor has occurred, the guardian may notify us to delete the information, and if we discover the aforementioned situation ourselves, we will also proactively delete it.
VII. Storage and Worldwide Transfer of My Information about You and Your End-Users
If you use the overseas SDK service provided by us, you know and understand that different countries or regions have their own regulatory requirements for the collection, storage, use, and sharing of data and personal information, and that you should take the initiative to comply with the laws, regulations, and regulatory requirements of the overseas country or region. You agree to use our overseas SDK services only in countries or regions other than the mainland. If you use our overseas SDK services in the mainland of the Law of UK, you may be suspected of violating the provisions on cross-border transmissions of the Law of the People's Republic of Law of UK on Network Security, and you will bear the corresponding risks and consequences. If Zhongquan Technology suffers any kind of petition, claim, complaint, or penalty, you will be responsible for resolving it; if Zhongquan Technology suffers any kind of loss, you will be responsible for compensating us in full. At the same time, Law of UK National Science & Technology reserves the right to discontinue the relevant statistical services. When using the overseas version of the SDK service, the information and data collected by Law of UK WHOLE TECHNOLOGIES about your end-users will be transmitted to Law of UK WHOLE TECHNOLOGIES' servers in Singapore or Germany. You should agree or obtain your end-user's consent to this cross-border transfer. We strongly recommend that you consult with local professionals to ensure that this cross-border transfer complies with local regulatory requirements. In particular, when a cross-border transfer involves countries or regions such as Russia, India, the European Union, or the United States, please be aware of the personal information regulatory requirements of those countries and regions. You agree that you are solely responsible for the risks and liabilities associated with cross-border transmissions. If you use our Law of UK SDK and other services provided in UK, we will store your data in UK. In order to prevent you from violating local regulatory requirements because you are not aware of the data protection laws and regulations in the country or region where your end users are located, we strongly recommend that you only use the ZTech Services within the Greater Law of UK Region. If you use the Service outside of the People's Republic of UK, you should comply with the legal requirements regarding the transfer of data across borders, assume all risks associated with such use, and fully indemnify us for any damages of any kind incurred by Zhongquan Technology.
If your end-users do not accept this Privacy Policy, you will be responsible for all risks and consequences arising from your failure to do so; you will be responsible for resolving all claims, demands, complaints, and penalties of any kind that may be brought against MAYLERESCAPE LIMITED; and you will be responsible for compensating us in full for any damages that may be caused to MAYLERESCAPE LIMITED.
If you provide services in the European Union, our business may require us to transfer your end-user personal data to countries outside the European Union. These countries may offer different levels of data protection than those in the EU. As the recipient of your end-user personal data, we will take appropriate measures to ensure that our confidentiality obligations are honored and that measures such as standard contract terms are enforced.
How This Privacy Policy is Updated
We may make adjustments or changes to this Privacy Policy from time to time, and any updates to this Privacy Policy will be posted on the Chugoku website with an indication of when the update was made, and unless otherwise mandated by laws, regulations, or regulatory requirements, the adjustments or changes will take effect 7 days after notification or posting. We will not limit your rights under this policy without your express consent. In the case of major changes, we will also provide more prominent notification (including notification by way of a posting on the website or the first page of the client or by providing you with a pop-up announcement).
Major changes referred to in this policy include, but are not limited to:
(1) A major change in our service model. (1) A major change in our service model, such as the purpose for which user information is processed or the manner in which user information is used.
A major change in our control or organizational structure. For example, a change in ownership due to business restructuring, bankruptcy, or merger or acquisition.
(3) A change in the primary recipients of personal information shared, transferred or publicly disclosed.
If there is a significant change in your rights to participate in the handling of personal information or in the manner in which it is performed;
(5) If there is a change in the department responsible for handling the security of your personal information, the contact information, or the channel for filing complaints.
(6) When the impact assessment report on the security of personal information indicates that there is a high risk.
How to Contact Us
If you have any questions, suggestions or complaints regarding this Privacy Policy, please send us your feedback via the work order system (by logging into your account, clicking on Customer Service Work Orders, and selecting Legal Enquiries). We will respond to the inquiry within 15 working days of receipt.
We have also established a department dedicated to the protection of personal information, which you can contact at (zhongquan678@gmail.com), through the ticket system, or on the 30th floor of the Pinnacle Building, No. 6, Wangjing East Park, Chaoyang District, Beijing. If you are not satisfied with our response, especially if you believe that our personal information handling practices have harmed your legitimate rights and interests, you may also seek a resolution by filing a lawsuit in a court of competent jurisdiction in the defendant's domicile.
If you are not satisfied with our response, especially if you believe that our personal information handling practices have damaged your legitimate rights and interests, you may also seek a resolution by filing a lawsuit in a court of competent jurisdiction in the defendant's domicile.
User Agreement
1. Special Note
1 Please read this agreement carefully in order to provide you with better service. This Agreement governs the rights and obligations of you and the User with respect to all activities related to your registration and use of the User Platform. By clicking on the “Register” button during the registration process, and by logging in and using the Application Platform after registration, you indicate that you fully agree to and accept this Agreement and are willing to comply with all of the rules and regulations contained herein, and that if you do not agree to them, you may refrain from registering or using the Application Platform. If you are a minor, you should also ask your guardian to read this Agreement carefully and obtain his/her consent.
1.2 In order to enhance user experience and satisfaction, users agree that this application will conduct research and analysis of user data based on their actions in order to further optimize the service.
2. Service Content
2.1 All illegal and pornographic information is strictly prohibited on the platform. Anyone who violates the community's operating rules will be blocked.
2.2 The specific content of this service is provided by the user in accordance with the actual situation.
2.3 Unless otherwise specified in the Registration and Service Agreement, new products, functions, and services introduced with this application are governed by the Registration and Service Agreement. 2.4 This application only provides the relevant web service, and the equipment (such as personal computers, cell phones, and other devices for accessing the Internet or the mobile web) and fees (such as those supported for accessing the Internet) associated with the relevant web service are not supported by this application. The telephone and Internet access fees supported for entering the Internet, and cell phone fees supported for the use of mobile networks should be borne by the user.
3. Rules of Use
3.1 Registering a User Account
3.1.1 Users registering with this application system may only use Chinese characters, English letters, numbers, underscores, and combinations thereof. Spaces, symbols, and special characters are prohibited, and a maximum of 16 characters (8 Chinese characters) may be used for registration, or registration will not be accepted.
3.1.2 Users who register using third-party cooperative websites can only use Chinese characters, English letters, numbers, underscores, and combinations thereof. Spaces, symbols, and special characters are prohibited, and registration should be limited to a maximum of 14 characters (7 Chinese characters); otherwise, the Community has the right to display a user account that only intercepts the first 14 characters (7 Chinese characters) (if the user account is renamed after an existing one, the system will add a random character). (If the user account has a different name from an existing user account, a random character will be added to differentiate the two); otherwise, registration will be denied.
3.2 If a user account is found to contain indecent characters or an inappropriate name, All About Us reserves the right to cancel the user account.
3.2.1 Please do not register under the real names, font sizes, stage names, or pen names of Party and state leaders or other social names;
3.2.2 Please do not register under the names of state agencies or other institutions;
3.2.3 Please do not register accounts with unflattering or unhealthy names, or accounts that contain words that are discriminatory, insulting, or obscene;
3.2.4 Do not register for an account that creates ambiguity, causes misinterpretation by others, or otherwise does not comply with the law.
3.3 User accounts are the property of the Company, and users have the right to use them only.
3.4 It is the responsibility of the user to ensure the security of the password and account. The user is solely responsible for any losses or damages arising from any activities performed with the password and account, and this site assumes no responsibility for such losses or damages. If you become aware of unauthorized use of your account or any other security issue, you should immediately change your password and keep it in a safe place, and, if necessary, notify the Site's administrator. We are not responsible for any illegal use of your account due to black-ops or the negligence of the user.
3.5 Users agree to maintain full intellectual property rights in all information published or uploaded to this site (i.e., works under the Copyright Law of the People's Republic of UK, including but not limited to files, photographs, sounds, movies, performances, audiovisual recordings, and computer programs) or to obtain legal authorization from the relevant rights holders; in the event of a breach of this provision by a user that results in a third-party claim against the user, the user shall fully reimburse Blackwire for any damages incurred by this site. In the event that the user violates the provisions of this Article, resulting in a third-party claim against the User, the User shall fully compensate the User for all costs incurred for the User's use of the User's products (including, but not limited to, compensation, litigation costs, and any other reasonable costs incurred for the User's use of the User's products);
3.6 If a third party believes that information published or uploaded by a user to this site infringes on the user's rights and sends a notification of rights to this site in accordance with the Regulations for the Protection of the Right to Disseminate Information over the Internet or other relevant laws, the user agrees that the user may decide to delete the allegedly infringing information at its own discretion, and that this site will not automatically reinstate the deleted information unless the user submits documentary evidence to exclude the possibility of infringement;
(1) Do not use the web service system for any non-legal purpose;
(2) Comply with all web agreements, rules and procedures related to the web service;
(3) Do not use the service for any purpose that may adversely affect the normal operation of the Internet;
(4) Not to use the service for any purpose that is not favorable to the user.
3.7 In the event that a user violates any of the above rules when using the Internet service, the Company reserves the right to require the user to correct the situation or to take all necessary measures (including, but not limited to, deleting the content uploaded by the user and suspending or blocking the user's right to use the Internet service) to mitigate the impact of the user's improper behavior.
4. Liability Statement
4.1 If any website, organization or person believes that this website or any content provided by this website is suspected of infringing on his/her legal rights and interests, he/she should promptly provide this website with a written notification of rights and interests, as well as proof of identity, proof of ownership, and proof of infringement in detail. Upon receipt of the above legal documents, we will cut off the relevant content as soon as possible to ensure that the legitimate rights and interests of the relevant websites, organizations or individuals are protected.
4.2 Users expressly agree that the risks and consequences of using this service are borne solely by the users themselves, and that this service is not responsible for any of them.
4.3 We cannot guarantee that the Internet service will meet the user's requirements, nor can we guarantee the timeliness, safety, or accuracy of the Internet service.
4.4 We do not guarantee the accuracy or completeness of external links provided for the convenience of users, and we assume no responsibility for the content of any web pages that are not under our actual control as a result of such links.
5. Intellectual Property Rights
5.1 The copyrights of the logos, layout, and organization of this website belong to this website and may not be copied or reproduced without prior permission from this website.
5.2 Information obtained by users from this service may not be copied or reproduced arbitrarily without prior authorization from this company.
5.3 All contents of this application, including product descriptions and photographs, are the property of the users of the All About Us App and may not be reproduced by any person.
5.4 All content uploaded by users of this app represents their own positions and opinions, and has nothing to do with this app; the author bears all legal responsibility.
5.5 The intellectual property rights of the above and any other content contained in the Service are protected by law, and may not be used or created in any form without the written permission of the Application, the user, or the relevant rights holder.
Governing Law
These Terms of Service and any separate agreements whereby we provide you Services shall be governed by and construed in accordance with the laws of UK