Privacy policy

This document constitutes the legal software license agreement between you, as the end user of the software , and the software provider (hereinafter referred to as "we", "us", or "our").

Please read this License Agreement carefully before using the software and related services. By installing or using the software or services on a computer or other hardware device, you acknowledge that you have read this agreement and agree to be bound by its terms, the terms of service, and the privacy policies.


We understand the importance of personal information and will do our best to protect it. We are committed to maintaining your trust by following the principles of consistency between responsibility and authority, clear purpose, choice and consent, minimum necessary use, security assurance, subject participation, openness, and transparency. At the same time, we undertake to adopt appropriate security measures to protect your personal information in accordance with mature industry security standards.

This policy is a basic legal document governing your use of our products and/or services. Please read it carefully and make sure you fully understand it before using the services. We hope you will make appropriate choices based on your own understanding. If we update this policy, we will notify you in a timely manner. Your continued use of our products and/or services after such update means that you agree to the updated policy and consent to our collection, use, storage, disclosure, and transfer of relevant information in accordance with this policy.

This Agreement will help you understand the following:
  1. 1. License Authorization
  2. 2. Use of Content
  3. 3. Distribution of Content
  4. 4. Registration and Privacy Policy
  5. 5. Cross-Border Data Transfers
  6. 6. Software Usage Tracking
  7. 7. Software Updates and Marketing
  8. 8. Copyright Information
  9. 9. Owner's Statement
  10. 10. Disclaimer
  11. 11. Limitation of Liability
  12. 12. Export Declaration
  13. 13. High-Risk Activity Statement
  14. 14. Compensation Statement
  15. 15. Revision and Renewal of the Policy
  16. 16. Termination Clause
  17. 17. How to Contact Us

1. License Authorization
This license permits you to use one copy of the software contained in this package or product on a single personal computer or hardware device. For each software license, the program may be used on only one personal computer or hardware device at any given time.

This license does not permit you to use the software on any hardware device or personal computer that is not owned or controlled by you. You may not distribute the software over a network or make it available to multiple devices over a network at the same time. If the program is to be installed on a network server solely for distribution to other computers, a separate license is required.

You may not modify, translate, reverse assemble, decompile, disassemble, or otherwise attempt to: (i) break, avoid, bypass, delete, disable, or otherwise circumvent any software protection mechanism contained in the software, including mechanisms that restrict or control the software's functions; or (ii) derive or export the source code, or the underlying ideas, algorithms, structure, or organization of the software, except where such activity is expressly prohibited from restriction by applicable law.

You may not use this software for any purpose that is unlawful under the laws applicable in the jurisdiction where you use it.

2. Use of Content
This software is provided only for use with licensed media. You may not use this software for any purpose that infringes any copyright, trademark, patent, trade secret, publicity right, or any other right of a third party.

You are responsible for ensuring that any content or material created, copied, downloaded, compressed, recorded, replayed, published, and/or distributed through this software, including but not limited to text, photos, audio, and video recordings, is properly licensed and does not infringe the rights of others.

You may not attempt to use this software together with any device, program, or service to evade technical measures used to control access to, or rights in, any content, document, or other work protected by copyright law.

3. Distribution of Content
You may use this software only for your personal, non-commercial purposes and may not provide it in any manner as part of any commercial service or application. If you are interested in any other type of use, please contact us.

Copies of content documents, including but not limited to songs and other audio recordings, that are downloaded or reproduced through this software are protected by copyright law and other applicable laws. Such copies are for your personal use only and may not be distributed to third parties or performed outside your normal family and social circle of acquaintances.

4. Registration and Privacy Policy
This section is intended to help you understand:
1. How we collect and use your personal information;
2. How we use, protect, and retain your personal information;
3. How we share your personal information;
4. Your rights;
5. How we handle minors' personal information.

During software registration, purchase, and/or activation, you may be required to provide personal identification information. We do not share or sell such information to any third party unless: (i) you have agreed in advance to such disclosure; (ii) disclosure is necessary to provide the product or service you request; or (iii) disclosure is required for us to comply with legal obligations.

4.1 How We Collect and Use Your Personal Information
Personal information refers to all kinds of information recorded electronically or otherwise that can identify a specific natural person, either alone or in combination with other information, or reflect the activities of a specific natural person. Personal information covered by this policy includes basic information (such as name, date of birth, gender, address, phone number, and email); identity information (such as ID card, officer's card, passport, driver's license, and other identity certificates); location information; network identity information (such as account information, IP address, email address, user name, nickname within the app, password, and related security information); personal internet records (such as browser records, search records, software usage records, and click records); common device information (such as internet service provider, terminal manufacturer, hardware model, MAC address, operating system type, unique device identifiers including IMEI, Android ID, IDFA, Advertising ID, OPENUDID, GUID, UDID, SIM card IMSI, session start and stop time, language, region, time zone, network status such as Wi-Fi, hard disk, CPU, and battery usage); video content containing personal information; and other information including timestamps, application identifiers, application versions, application distribution channels, personal phone numbers, mobile numbers, web browsing records, and precise location information.

Personal sensitive information refers to personal information that, once leaked or tampered with, may have an adverse impact on the personal information subject, including damage to reputation, physical or mental health, or discriminatory treatment. Personal sensitive information covered by this policy includes identity information (such as ID card, officer's card, passport, driver's license, and household registration booklet); network identity information (such as system account, IP address, email address, user name, nickname in this app, password, and related security information); related identity certificates; precise location information; timestamps, application identifiers, application versions, application distribution channels, personal phone numbers, mobile numbers, web browsing records; and video content containing personal sensitive information.

Our products and/or services include core functions such as cloud services and service-based infrastructure, including but not limited to monitoring video preview and device operation and control. In order to provide these functions, we may collect, store, and use certain information about you. If you do not provide such information, we may be unable to provide the corresponding products or services.

Our products and/or services also include additional features, including value-added services such as cloud storage, AI labs, message alerts, device unbinding, and network detection. If you choose to use these additional features, we will collect the personal information necessary for the relevant feature. If you do not provide such information, you may still purchase cloud services and use the basic service-based functions of this software product, but you may not be able to use the corresponding additional features.

In the course of your use of our products and/or services, we collect information that you actively provide or that is generated through your use of the products and/or services in order to provide, optimize, and secure our products and/or services.

4.1.1 Specific Information We Collect and Use
1. When you register an account to use our products and/or services, we collect information such as your user name, password, email address, and mobile phone number. We collect mobile phone numbers to comply with relevant laws and regulations. If you choose to log in by other means, we may obtain your personal information from the relevant third party; however, we may still ask you to provide information that the third party cannot supply. If you refuse to provide such information, you may not be able to use our products and/or services normally.

2. When you search for videos or other information, we collect your search content to facilitate repeated entry and to present information associated with your search. Please note that search keywords alone do not identify you and generally do not constitute personal information. However, where such keywords are combined with other information that can identify you, they will be treated as your personal information during such processing, and your search history will be handled and protected in accordance with this policy.

3. When you use this software's cloud service, you need to bind your camera and other products. We collect the product serial number and product verification code of the product you bind. This information is unique basic product information and is necessary to bind the product and provide basic services such as preview, video storage, and value-added services. When you use the storage capability of this software's cloud service to store videos, those videos are stored on our servers in encrypted form.

4. When you purchase products or services through this software, we collect order information, including the order number, the service information you purchased, the amount paid, and the payment method. We use this information to identify transactions, settle payments, respond to order inquiries, provide customer support and after-sales services, and determine whether transactions are abnormal in order to protect transaction security.

5. When you enable message reminders, we collect the timestamps of images captured by your camera and push messages to you. You may turn off this function in the settings.

6. When you apply to unbind a product, we collect your ID card and other relevant information. We need to review this information as necessary to determine whether you are the lawful user of the product and whether your unbinding request should be approved. If you do not provide this information, we will be unable to provide unbinding services.

7. Our customer service and after-sales functions use your account information, order information, and the product information associated with your account. To protect your account, our customer service personnel may use your account information to verify your identity. When you require customer service or after-sales support relating to your order information, we will review the relevant order information. You may also provide additional information when communicating with our customer service staff, such as requests to change a contact person or phone number. When you require customer service or after-sales support relating to bound product information, we will review the relevant bound product information.

8. In addition, we may use online third-party services. We will not disclose your personal information to such third-party service providers without your permission.

9. If we need to obtain your personal information in situations other than those described above, we will seek your express consent again and fully explain the applicable scenario, as well as the content and scope of the information to be collected, before obtaining that consent.

4.1.2 Rules for Using Your Personal Information
1. We will use your personal information in accordance with this policy and for the purpose of providing our products and/or services.

We may send you commercial electronic messages, including SMS and email, in order to provide you with relevant product or service information. If you do not wish to receive such messages, you may unsubscribe by using the unsubscribe function in the relevant message.

2. Unless you delete the software or reject our collection through your account settings or system settings, all personal information you provide while using our products and/or services will remain authorized for our continued use during your use of the products and/or services. When you cancel your account, we will stop using your information and delete your personal information after 6 months.

3. We may compile statistics regarding the use of our products and/or services and may share such statistics with the public or third parties to show overall usage trends. However, these statistics do not contain information that identifies any individual.

4. When displaying personal information, we will de-identify or anonymize it through methods such as content replacement and anonymous processing in order to protect your information security.

5. In order to optimize our products and provide better services, we may share personal data with suppliers engaged to provide data analysis or similar services. In such cases, those data recipients must comply with our data privacy and security requirements.

6. If we intend to use your personal information for purposes not specified in this policy, or to use information collected for a specific purpose for another purpose, we will seek your prior consent through your voluntary confirmation.

4.1.3 Circumstances Where We May Collect and Use Personal Information Without Authorization
You fully understand that, in the following circumstances, we may collect and use personal information without your authorization or consent to the extent permitted by applicable laws and regulations:
1. Directly related to national security and national defense security.
2. Directly related to public safety, public health, and major public interests.
3. Directly related to criminal investigation, prosecution, trial, and enforcement of judgments.
4. Where it is necessary to protect the vital legitimate rights and interests of the personal information subject or other individuals, such as life or property, and it is difficult to obtain the consent of the individual concerned.
5. Where the personal information involved has been publicly disclosed by the personal information subject.
6. Where personal information is collected from information lawfully disclosed to the public, such as legal news reports or official information disclosures by relevant departments.
7. Where collection is necessary to perform a contract in accordance with your request.
8. Where collection is necessary to maintain the safe and stable operation of the products and/or services provided, such as detecting and handling product and/or service failures.
9. Other circumstances as provided by laws and regulations.

4.2 Use of Cookies and Similar Technologies
1. Cookies
Cookies are mechanisms that support the storage and retrieval of information on a website or client side by the server or script. When you use a product or service, we may send one or more small data files, called cookies, to your computer or mobile device. The cookies assigned to you are unique and can be read only by the web servers that issued them to your domain. Cookies generally contain identifiers, site names, and certain numbers and characters. We use cookies to simplify your login process, store your browsing preferences and other data, provide preference-based functions, help optimize advertising selection and interaction, and help determine login status as well as account and data security.

We promise that information obtained through cookies will be used only to improve service or product quality and optimize user experience. We will not use cookies for any purpose other than those described in this policy. You may manage or delete cookies according to your own preferences. For details, you may refer to AboutCookies.org. You may delete all cookies stored on your computer, and most web browsers automatically accept cookies, although browser settings can usually be changed to reject cookies. You may also clear cookies stored in the software. However, if you do so, you may need to change user settings each time you visit a website or use the software, and information previously recorded may be deleted, which may affect the security of the services you use.

2. Website Beacons and Pixel Tags
In addition to cookies, we may also use website beacons, pixel tags, and other similar technologies on our website. For example, emails sent to you may contain click URLs linked to content on our website. If you click such links, we may track the click to help us understand product preferences and improve customer service. Website beacons are usually transparent images embedded in a website or email. With pixel tags contained in emails, we can determine whether the email has been opened. If you do not wish your activities to be tracked in this manner, you can unsubscribe from our mailing list at any time.

4.3 How We Use, Protect, and Retain Your Personal Information
First, your personal information protection and safety measures.

1. We will make every reasonable effort to protect your personal information. Your personal information will be protected by a dedicated data security department. To prevent unauthorized access, copying, modification, transmission, loss, destruction, processing, or unlawful use, we have adopted and will continue to adopt the following security measures:
1) Our network services adopt encrypted transmission protocols such as HTTPS to ensure the security of user data during the transmission process.
2) Users' personal information is encrypted and stored using encryption technology, and isolated using isolation technology.
3) In scenarios involving the use of personal information, such as personal information display and personal information association computation, we use de-identification technologies to enhance the security of personal information in use.
4) We establish strict data use and access controls and adopt multiple identity authentication mechanisms to protect personal information and prevent unauthorized use. We only allow authorized personnel to access personal information and require them to fulfill corresponding confidentiality obligations.
5) We conduct dedicated data and technical security audits, including log and behavior audit measures.

2. Other security measures to protect personal information:
1) To manage and standardize the storage and use of personal information by establishing data classification systems, data security management standards, and data security development standards.
2) To establish information protection departments and data security emergency response organizations to promote and protect personal information security.
3) To enhance security awareness. We also conduct security and privacy training courses to improve staff awareness of the importance of personal information protection.

3. Despite the reasonable and effective measures described above, and despite compliance with applicable legal standards, we cannot guarantee the absolute security of your personal information when it is transmitted through insecure channels. Accordingly, you should also take positive measures to protect your personal information, such as using complex passwords, changing passwords regularly, and not disclosing account passwords or other personal information to others.

4. There are always risks of information leakage in network environments. In the event of unexpected incidents, force majeure, or other circumstances resulting in information leakage, we will make every effort to control the situation and promptly inform you of the cause of the incident, the security measures we have taken, the measures you may take on your own initiative, and other relevant information.

5. After a personal information security incident occurs, we will inform you in a timely manner as required by law and regulation, including the basic situation and possible impact of the incident, the measures taken or to be taken, suggestions for your own risk prevention and reduction, and available remedial measures. We may notify you by email, letter, telephone, push notification, or other means. Where it is difficult to inform each personal information subject individually, we will issue announcements in a reasonable and effective manner. We will also report relevant incidents to the competent authorities as required by law.

Retention of your personal information.

1. We will store personal information collected from users in accordance with laws and regulations. If your personal information needs to be transmitted abroad, you will be informed and asked for permission.

2. During your use of our products or services, we will retain your personal information as necessary. If you cancel your account or delete your personal information on your own initiative, we will continue to retain your information for 6 months after account cancellation or deletion in accordance with the requirements of the Cybersecurity Law and other applicable laws and regulations.

Legal basis for data processing.

Our legal bases for processing personal data include performance of our contract with you, compliance with mandatory legal disclosure requirements, protection of our legitimate interests such as managing our relationship with you, ensuring service security, and communicating with you regarding products and services, and, where applicable, consent, including for activities such as cookie-based advertising. In some cases, you may need to provide personal data for the above processing so that we can provide all services and enable you to use all functions conveniently.

4.4 How We Share Your Information
1. We share your information only in circumstances known to you, including where:

1) We have obtained your explicit authorization or consent, or that of your guardian.
2) Disclosure is made to judicial or administrative authorities pursuant to statutory procedures.
3) Disclosure is necessary when we initiate litigation or arbitration to protect the legitimate rights and interests of users.
4) Sharing is carried out in accordance with agreements between you and us, such as service agreements or usage rules.
5) Sharing is necessary within the scope permitted by laws and regulations to protect the software, its related parties, software users, or the public interest from harm.
6) Sharing is consistent with an agreement between you and another third party.

2. In addition, we may share your order information, account information, and equipment information with partners and other third parties in order to ensure the smooth completion of the services provided to you. We will share personal information only for lawful, legitimate, necessary, specific, and explicit purposes, and only to the extent necessary to provide services. Our partners do not have the right to use the shared personal information for any other purpose. At present, such partners include technical service providers supporting our functions, such as providers of infrastructure services, payment services, and data processing services. For example, we may need to share your order number and order amount with a third-party payment institution to confirm your payment instructions and complete payment.

3. You may choose to share your own video, location information, identity information, and other information with specific persons through our products and/or services. We are not liable for serious consequences such as information leakage caused by your own sharing behavior.

4. Other
We may also publicly disclose your personal information with your express consent or where required by law, legal process, judicial authorities, or relevant competent authorities.

4.5 Your Rights
Subject to applicable law, you have the right to object to or request restrictions on the processing of your personal data, and to request access to, correction of, deletion of, and portability of your personal data.

Where the use of your information is based on consent, you have the right to withdraw that consent at any time. However, withdrawal of consent does not affect the lawfulness of processing carried out on the basis of consent before such withdrawal.

You may submit your request to us through the built-in "Opinions and Feedback" function.

If you discover any changes or inaccuracies in your information, please notify us so that our records can be updated or corrected. If you believe that our processing of your personal data violates applicable law, you may lodge a complaint with the relevant regulatory authority.

The retention period of your personal data depends on the need to provide services or products to you, or on the requirements of applicable laws, including tax and accounting laws.

In principle, we do not charge for reasonable requests. However, we may charge a certain cost for repeated requests exceeding a reasonable limit. We may refuse requests that are unjustifiably repetitive, require excessive technical effort such as developing new systems or fundamentally changing existing practices, pose risks to the legitimate rights and interests of others, or are highly impractical, such as requests involving backup information stored on tape.

In the following circumstances, we may be unable to respond to your request as required by laws and regulations:
1) Matters related to national security or national defense security;
2) Matters related to public safety, public health, or major public interests;
3) Matters related to criminal investigation, prosecution, trial, or enforcement of judgments;
4) Where there is sufficient evidence of your subjective malice or abuse of rights;
5) Where responding would endanger the legitimate rights and interests of you or other individuals;
6) Where business secrets are involved.

4.6 How We Handle Minors' Personal Information
1. We attach great importance to the protection of minors' personal information. If you are a minor under the age of 18, you should obtain the prior written consent of your parents or legal guardian before using our products and/or services. We protect minors' personal information in accordance with relevant laws and regulations.

2. Where we collect minors' personal information with the consent of their parents or legal guardians, we will use or publicly disclose such information only where permitted by law, expressly consented to by the parents or legal guardians, or necessary for the protection of the minor.

3. If we discover that we have collected personal information from a minor without the prior consent of a verifiable parent or legal guardian, we will attempt to delete the relevant data as soon as possible.

5. Cross-Border Data Transfers
To provide and maintain our services, we may use global cloud infrastructure and technical service providers. As a result, your personal data may be transferred to, and processed in, countries or regions outside your country of residence.

Personal data collected through the application may therefore be transferred across national borders due to the use of cloud infrastructure services and technical service providers.

Such cross-border transfers may occur for purposes including, but not limited to, providing cloud storage services, supporting application functionality, maintaining system operation and security, providing technical support and maintenance, and improving service performance and user experience.

Recipients of transferred personal data may include third-party cloud infrastructure providers, technical service providers, and data processing service providers, including services such as Firebase, AWS, and other third-party cloud infrastructure providers.

When personal data is transferred across borders, we implement appropriate safeguards in accordance with applicable data protection laws. Such safeguards may include contractual arrangements, industry-standard security frameworks, and other legally recognized data protection mechanisms.

We also implement reasonable technical and organizational measures to protect personal data during international transfers, including encrypted data transmission such as HTTPS, encrypted storage where applicable, strict access control mechanisms, and internal security management procedures.

Subject to applicable law, users may have the right to request access to, correction of, or deletion of their personal data, and may also request information about how their personal data is processed or transferred internationally. If you have questions regarding cross-border data transfers, you may contact us using the contact information provided in this Privacy Policy.

6. Software Usage Tracking
You agree that this software may monitor your use of the software for the purpose of improving product availability. In doing so, the software may record usage information regarding the functions of the selected product, the unique machine ID automatically generated when the software is installed, and information about other software products installed on the same machine. Such usage information is not collected together with corresponding personal identification information and remains anonymous.

7. Software Updates and Marketing
This software may automatically connect your computer to the Internet and communicate with us, without additional and/or prior notice, in order to check for available bug fixes, additional features, plug-ins, and new versions (collectively, "software updates"). You agree that the software may also send you information about software updates and special offers provided by the Software Alliance and third-party partners.

8. Copyright Information
The software contained in this package or device is protected by applicable copyright laws, the provisions of international treaties, and all other applicable national laws. The software must be treated in the same manner as other copyrighted materials, such as books and music recordings. This license does not permit rental of the software, and you may not copy any written materials accompanying the software, if any.

9. Owner's Statement
Ownership of, and all intellectual property rights in, the software and its accompanying documents, as well as any copies thereof, remain the sole and exclusive property of the software owner and/or its third-party licensors. You agree to comply with copyright law and all other applicable laws. You acknowledge that the software contains valuable confidential information and trade secrets belonging to the software owner and/or its third-party licensors.

10. Disclaimer
The software and services are provided without warranties of any kind. No express or implied warranties are given, including, without limitation, implied warranties of merchantability, fitness for a particular purpose, or non-infringement of intellectual property rights. The software expressly disclaims all such warranties.

You assume all risks relating to the quality and performance of the software and services. If the software proves defective, you, and not the software provider or any authorized distributor, assume the entire cost of all necessary servicing, repair, maintenance, or correction. Some countries, regions, or jurisdictions do not allow the exclusion of implied warranties, so the above exclusion may not apply to you.

11. Limitation of Liability
Your sole remedy, and the entire liability of this software and its licensor, shall be as set out above. In no event shall this software or its licensors be liable to you or any other person for any damages, including incidental or consequential damages, expenses, loss of profits, loss of savings, or other damages arising from the use of, or inability to use, the software, even if the software or its licensors have been advised of the possibility of such damages. Because some jurisdictions do not permit the exclusion or limitation of consequential or incidental damages, the above limitation may not apply to you.

12. Export Declaration
Without any required license or authorization, you may not export or re-export products containing this software.

13. High-Risk Activity Statement
This software is not fault-tolerant and is not designed or intended for use in hazardous environments requiring fail-safe performance, or in any other application in which software failure could directly result in death, personal injury, or severe physical or property damage (collectively, "high-risk activities"). The software expressly disclaims any express or implied warranty of fitness for high-risk activities.

14. Compensation Statement
You agree to indemnify, defend, and hold harmless this software, and its officers, directors, and employees, from and against any losses, damages, fines, costs, and expenses (including attorneys' fees) arising out of or related to any claim resulting from: (i) your use, viewing, copying, downloading, encoding, compressing, copying, transmitting, or other handling of any material, other than material provided by the software, in connection with the software; or (ii) your violation of any term of this License Agreement.

15. Revision and Renewal of the Policy
We may revise this policy from time to time. Without your explicit consent, we will not reduce the rights you are entitled to under this policy.

We will notify you of any changes to this policy, including major changes, through push notifications, pop-up notices, emails, or other appropriate means.

Major changes include, but are not limited to:
1. Material changes to our service model, such as the purpose of personal information processing, the types of personal information processed, or the manner in which personal information is used.
2. Significant changes to our ownership structure or organizational structure, such as changes caused by business adjustments, bankruptcy, or acquisitions.
3. Changes to the main recipients of personal information sharing, transfer, or public disclosure.
4. Significant changes to your rights to participate in personal information processing.
5. Changes to the department responsible for personal information security, contact methods, or complaint channels.
6. Circumstances where a personal information security impact assessment indicates a high risk.

16. Termination Clause
This agreement remains in full force and effect during your use of the services. You may terminate the services at any time. We may deny or suspend your access to and/or use of the services and/or your account at any time and for any reason, without prior notice. This may result in the forfeiture and destruction of all information associated with your membership.

If you violate any term or condition of this agreement, we may terminate or suspend any and all services and access to the website without prior notice or liability. Upon termination of your account, your right to use the services, access the website, and use any content will cease immediately. All provisions of this agreement other than "1. License Authorization" shall, by their nature, survive termination, including, without limitation, limitation of liability, disclaimers, and claims-related provisions.

17. How to Contact Us
If you have any questions, comments, or suggestions regarding this policy or your personal information, please contact us through the built-in "Opinions and Feedback" function of the software. Under normal circumstances, we will respond within 30 days.