Toppal TEAM (hereinafter referred to as the "Company ") with this remind carefully read the user fully understand this "User Agreement" (hereinafter referred to as the "Agreement "). Users should carefully read and fully understand the terms of this agreement, especially not to involve excluded or limited liability company, the dispute resolution provisions and the law applicable. The terms of exemption or limitation of liability will be marked in bold, and you need to read it carefully. Once you activate this product, it means that you have read and fully agree to be bound by the terms and conditions described under this agreement.
\1. General
1.1 This agreement is an agreement between you (hereinafter also referred to as the "user") and the company regarding the user's use of the company's products and the use of the company's related services.
1.2 This product and service are car security products installed both in vehicles and your cell phone provided by the company, and related services (including electric fence, security alert,driving track,etc.), and are provided by a third party Skills/services provided (such as navigation, social account, etc.), and related Internet technical services.
1.3 The ownership and operation rights of this product and service belong to the company.
\2. Rights statement
2.1 The company enjoys and reserves the complete and indivisible ownership or intellectual property rights of the following items:
(1) Product- related technologies, procedures, codes, user interfaces, etc.;
(2) Trademarks and graphic marks related to this product.
2.2 The applications, text, software, sounds, pictures, animations, videos, charts, etc. involved in the service content provided by the company are protected by relevant intellectual property laws and other relevant laws. Without the authorization of the company or other related rights holders, users are not allowed to copy, use, modify, extract, translate, and distribute. Third parties may not use them in any way without the written permission of the company or related rights holders.
\3. product update
In order to improve this product and ultimately improve the user experience, since users get this product from the date of, the Company may ask the user to provide this product (including, but not limited to system software and built-in customized services such as application software) update, upgrade, Supplements and additional components (if any). This product update service is to improve the performance, safety and reliability of the product or to meet the operator's functional customization requirements. The product updates include bug fixes, system software updates, application software updates, and any previously installed software (including brand new versions) updates and performance improvements. The updated version may add new functions, in a few cases, it could delete the original features, while not necessarily include the Company on newer models or other terminal existing features or new features.
The company`s products may automatically search and download update content upgrade packages through the Internet to provide users with timely update services. These update services will help improve the user experience, fix software vulnerabilities or network security vulnerabilities and prevent new security risks.
\4. User Code of Conduct
4.1 The user can use this product and service in accordance with this agreement under the premise of abiding by the law and this agreement, and the user shall not perform the following behaviors:
(1) Delete all copyright information on this product, and modify, delete or avoid the technical measures set by this product to protect intellectual property rights;
(2) Reverse engineering of this product, such as disassembly, decomplication or other ways to try to obtain the source code of this product;
(3) by modifying or counterfeit products operation instruction, data, by addition, deletion, change the product features or operating results, or the product will be used for this application operate or communication to the public, regardless of whether these actions are commercial purpose;
(4) use of the product any harm network security behavior, including but not limited to: unauthorized use or access unauthorized data server / account; unauthorized access public networks or others and delete addition, modification , Increase storage information; attempt to probe, scan, test the weakness of the product's system or network without permission, or perform other behaviors that undermine network security; attempt to interfere with, disrupt the normal operation of the product system or website, and deliberately spread malicious programs or viruses And other behaviors that disrupt and interfere with normal network information services.
(5) Users log in or use this product and service through third-party compatible software or systems that are not developed, authorized or approved by the company, or make, publish, or disseminate the above tools;
(6) without the Company's written consent, the user of the product and the information trespassing since the implementation of the following acts, including but not limited to: the use, lease, lend, copy, modify, link, reprint, compilation, publication, publishing, create mirror sites, Unauthorized use of this software to develop related derivative products, works, services, plug-ins, plug-ins, compatibility, interconnection, etc.;
(7) Use this product to publish, transmit, disseminate, and store content that violates local laws;
(8) other unlawful in any way for any unlawful purpose or in any manner inconsistent with this Agreement permit the use of this product and use other services provided by the Company.
4.2 The user understands and agrees:
(1) The Company will make the user recognize whether the alleged breach of the Terms of Use set, and according to the results determined to suspend, terminate the license to the user or take other restrictive measures to be taken under this agreement;
(2) If the user's violation of the above-mentioned use regulations causes damage to a third party, the user shall independently bear legal responsibility in his own name, and shall ensure that the company is free from losses or increased costs due to this;
(3) If the user violates the relevant laws and regulations or agreement, the company was affected by the loss, or claims by third parties, or punished organs, the user shall indemnify the Company losses incurred and (or) occurs Expenses, including reasonable attorney fees, investigation and evidence collection fees.
\5. Third-party applications
5.1 the third-party application refers to a non-built-in system and the non-customized by a third party to be developed independently Using procedures. Some third-party applications may be pre-installed, and users can choose whether to use third-party programs that may be provided with the software. If users choose to use these third-party programs, they should follow the provisions of the corresponding third-party license agreement. Since the company does not have control over such applications, users should acknowledge and agree that the company does not make any express or implied guarantees or guarantees for the legality, accuracy, effectiveness, and safety of such applications, and It cannot be held responsible for its content, advertisements, products, services or other materials applicable to it. Users should clearly acknowledge and agree to independently bear the risks of applying such third-party applications, as well as the risks in terms of quality, performance, and accuracy they bring. The user can decide whether to take precautions to ensure that the selected third-party application does not contain viruses, worms, Trojan horses or other destructive content.
5.2 The names, marks, products or any services of third parties quoted in this product are only for the convenience of users, and do not contain or imply any endorsement, sponsorship, recommendation or affiliation with third parties and their products and services. The user agrees that the company is not responsible for any damage or loss caused, suspected or related to the use or trust of the available content, products or services of such third-party applications, including but not limited to damage to mobile devices or data loss. Direct or indirect liability.
5.3 The user shall acknowledge and agree that the use of a third-party application shall be subject to the "Terms of Use ", "License Agreement", "Privacy Protection Measures" or other such agreements of the third-party application provider, and the user intentionally or unintentionally Any information and personal data provided to such third-party application provider shall comply with the privacy protection measures of the third-party application provider. The company hereby declares that it is not responsible for any data disclosure or any other practices of third-party application providers. The company expressly disclaims liability for whether the personal information of the user is captured by any third-party application provider and the possible use of such personal information by such third-party application provider.
\6. Privacy Policy and Personal Information Protection
The company promises to protect the privacy of users in accordance with the privacy policy of this product. For details, please see the appendix at the end: "Privacy Policy".
\7. Liability for breach of contract
The company has the right to determine whether the users behavior complies with the rights stipulated in the terms of this service agreement. If it believes that the user violates the relevant laws and regulations or the provisions of this agreement or related rules, according to the severity of the users violation, the company has the right to correct without notice. The user takes to delete the illegal information, restrict, suspend, terminate the user's use of this product service, pursue the user's legal responsibility, and other handling measures deemed appropriate by the company. If the company suffers any losses (including but not limited to receiving any third-party claims or any administrative penalties), the user shall bear full responsibility.
\8. Disclaimer
8.1 The company provides service support with current technology. The company does not guarantee that this product will be uninterrupted or error-free in operation, that it will correct all defects of this product, or that this product can meet all user requirements. The company does not assume any responsibility for the consequences arising therefrom.
8.2 The company is not responsible for all losses suffered by users due to third parties such as communication line failures, technical problems, network, system instability and other force majeure reasons.
8.3 This product content in question just out to provide users with more information, just for reference use, does not mean that the company agree with their statement or description and does not constitute professional advice in any field areas; as you need to solve specific problems, please Consult professionals in related fields.
8.4 The Company does not guarantee that through this product information available content (including but not limited to third-party content service call) the legality, authenticity, accuracy, validity, the Company does not user-based queries, view any act made Take any responsibility for the results.
8.5 When the user uses this product or requires the company to provide specific services, this product may call a third-party system or third-party software to support the user`s use or access. The results of the use or access are provided by the third party. The user shall not only comply with this agreement In addition to relevant rules, third-party agreements and relevant rules should also be observed. The user must understand and agree that when using third-party services, the third party may read user data, and the company does not guarantee the safety, accuracy, validity, and effectiveness of the results achieved through third-party systems or third-party software support. For other uncertain risks, users should judge carefully, and the company will not bear any responsibility for any disputes and damages caused by this.
8.6 Except for clear provisions in laws and regulations, the company will do its utmost to ensure that the products and the technology and information involved are safe, effective, accurate and reliable. However, due to the limitations of existing technology, users understand that the company cannot guarantee this.
8.7 The user agrees that the company has the right to suspend, interrupt or terminate the provision of all or part of this service to the user based on the requirements of the judicial, regulatory, and supervisory agencies or its own business reasons. The company does not bear any responsibility for this.
8.8 The user understands and agrees that the company will make commercially reasonable efforts to ensure the safety of the user`s data storage in this product, but the company cannot provide a complete guarantee. The user must understand that the company does not delete or store the data in the service or responsible for backup failure.
\9. Agreement change
The company has the right to modify the terms of this agreement when necessary. Once the terms of the agreement are changed, the revised terms of the agreement will be published on the relevant page.
Toppal TEAM (or hereinafter referred to as "we", the "Company") attaches great importance to protecting your privacy and personal information protection. In view of the fact that when you use our services, we may collect and use your relevant information. In order to clarify to you the rules for the collection, use, sharing, management and protection of user information, this "Privacy Policy" (hereinafter referred to as " This policy").
Please take the time to read this policy carefully before using our products or services. Once you activate this product, it means that you have read and fully understood this policy. This policy may not cover all possible data processing scenarios. Information about the collection of product or service specific data will be published by us in a supplementary policy, or in a specific notice or policy provided at the time of data collection. Please pay attention to the reminder when you enable a specific function or use a specific product or service or notice.
This privacy policy section will help you understand the following:
What information we collect and how we use it
How do we share, transfer, and publicly disclose personal information
How we store personal information
How do we protect personal information
How do we deal with the personal information of minors
Third-party products or services
How to update this policy
Appendix: Privacy Policy
*What messages do we collect and how we use them*
The "personal information" referred to in this policy refers to various information recorded electronically or in other ways that can be used alone or in combination with other information to identify the identity of a specific natural person or reflect the activities of a specific natural person, including but not limited to your name, family Address, phone number, email address, other contact information, geographic location information, vehicle status, product or service platform usage behavior, etc.
The purpose of collecting personal information is to provide you with products and services, and to ensure that we comply with applicable laws, regulations and other normative documents. In order to provide you with the services corresponding to the following functions of our products, we will perform the following purposes as described in this policy: when you use certain functions of our products, we will collect and use the following types of information (Regardless of whether it is personal information), whether the personal information corresponding to each item is collected depends on whether you use the service corresponding to the function.
*How do we share, transfer, and publicly disclose personal information*
2.1 Sharing of user information
Except for the following circumstances, we will not share your personal information with any individual, company or organization other than our company:
(1) Obtain your explicit authorization or consent;
(2) According to applicable laws, regulations, legal procedures, administrative or judicial mandatory requirements When necessary
(3) Within the scope permitted by laws and regulations, in order to maintain the company and its related parties or partners,
When you or other users of the company or the public interest, property or safety of the society are not damaged;
(4) Only to achieve the purpose stated in this privacy policy, some of our services will be provided by authorized partners, the company may provide your personal information to third parties such as partners.
We will only share your personal information for legal, legitimate, necessary, specific and clear purposes. And only provide personal information necessary for the service. Our partners do not have the right to Personal information is used for any other purpose, and will comply with this privacy policy to protect your personal information.
2.2 Transfer of user information
Except for the following circumstances, we will not transfer your personal information to any individual, company or organization:
(1) Obtain your explicit consent or authorization in advance;
(2) According to applicable laws, regulations, legal procedures, administrative or judicial mandatory requirements When necessary;
(3) According to the relevant agreement or other legal documents signed with you;
(4) When it involves cooperation, joint operation, merger, acquisition, asset transfer or other similar transactions.
2.3 Public disclosure of user information
Without your explicit consent or your active choice, we will not disclose your personal information publicly. Except in the following cases:
Disclosure based on legal requirements: We may publicly disclose your personal information when required by law, legal procedures, litigation, or compulsory government authorities. We will also disclose your data when there is a reasonable need, for example for the execution of a contract and we believe that it is necessary and appropriate to disclose it in order to prevent physical damage or property loss or investigate possible or actual illegal behavior.
You know and understand that in the following circumstances, we do not need to obtain your authorization to provide your personal information:
(1) Related to national security, public safety, and major social interests;
(2) Related to criminal investigation, prosecution, trial and execution of judgments, or public security, procuratorate, law, the court, the Administration for Industry and Commerce and other competent authorities request to provide;
(3) In order to protect the life, property and other major legal rights of the personal information subject or other individuals, but it is difficult to get the consent;
(4) The personal information collected is disclosed to the public by the subject of personal information on his own;
(5) Your personal information collected from legally publicly disclosed information, such as legal news reports, Government information disclosure and other channels;
(6) Necessary for signing a contract according to your requirements;
(7) Other circumstances stipulated by laws and regulations.
\3. How we store personal information
3.1 Storage method
In accordance with the laws and regulations of various countries, we store your personal information collected and generated during overseas operations on a secure server and protected in a controlled facility.
3.2 Storage period
We only retain your personal information for the period necessary to provide the company's products and services. After exceeding the necessary period stipulated by law, we will delete or anonymize your personal information, except as otherwise provided by laws and regulations.
\4. How do we protect personal information
4.1 We have taken reasonable and feasible measures and technical measures to protect the collected information related to the service. But please note that although we have taken reasonable measures to protect your information, no website, Internet transmission, computer system or wireless connection is absolutely secure.
4.2 We have used safety protection measures that comply with industry standards to protect the personal information you provide to prevent unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonable and feasible measures to protect your personal information.
4.3 After a personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and what you can independently prevent and reduce risks Suggestions, remedies for you, etc. We will promptly inform you of the relevant situation of the incident by email, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will adopt a reasonable and effective way to issue an announcement. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.
\5. How do we deal with the personal information of minors
Except as required by applicable laws, we will not knowingly collect personal information of minors (under the age of 18). Minors should not provide us with personal information without the consent of their guardians.
\6. Third-party products or services
Our products may contain links to third-party websites, products and services. You need to understand that we have no control over third parties and such links are only provided to improve user experience and facilitate users. We also do not provide any express or implied guarantees for the content of the links; we also have no control over the privacy or data protection policies of third parties, and such third parties are not bound by this policy. In the process of operating third-party products or services, you may be asked to provide personal information. You should understand that the subject of information collection at this time is not our company. Before submitting your personal information to third parties, please carefully read and understand the privacy policies of these third parties.
\7. How to update this policy
We may sometimes update the privacy policy. Without your explicit consent, we will not detract from your rights under this privacy policy. If there are major changes to this privacy policy, we will also provide a more obvious notice, such as using a pop-up window when you use our products, or sending you an email directly. Major changes to this privacy policy may include major changes to the purpose of processing personal information, the types of personal information processed, and the way you use personal information, as well as your rights to personal information or the way you exercise your rights.