This document constitutes the legal software license agreement between you, as the end user of the software
, and the software provider
CLOSELI TECHNOLOGY HOLDING LIMITED
(hereinafter referred to as "we", "us", or "our").
Please read this License Agreement carefully before using the software
and related services. By installing or using the software or services on a
computer or other hardware device, you acknowledge that you have read this
agreement and agree to be bound by its terms, the terms of service, and the
privacy policies.
We understand the importance of personal information and will do our
best to protect it. We are committed to maintaining your trust by
following the principles of consistency between responsibility and
authority, clear purpose, choice and consent, minimum necessary use,
security assurance, subject participation, openness, and transparency.
At the same time, we undertake to adopt appropriate security measures to
protect your personal information in accordance with mature industry
security standards.
This policy is a basic legal document governing your use of our
products and/or services. Please read it carefully and make sure you
fully understand it before using the services. We hope you will make
appropriate choices based on your own understanding. If we update this
policy, we will notify you in a timely manner. Your continued use of
our products and/or services after such update means that you agree to
the updated policy and consent to our collection, use, storage,
disclosure, and transfer of relevant information in accordance with
this policy.
This Agreement will help you understand the following:
- 1. License Authorization
- 2. Use of Content
- 3. Distribution of Content
- 4. Registration and Privacy Policy
- 5. Cross-Border Data Transfers
- 6. Software Usage Tracking
- 7. Software Updates and Marketing
- 8. Copyright Information
- 9. Owner's Statement
- 10. Disclaimer
- 11. Limitation of Liability
- 12. Export Declaration
- 13. High-Risk Activity Statement
- 14. Compensation Statement
- 15. Revision and Renewal of the Policy
- 16. Termination Clause
- 17. How to Contact Us
1. License Authorization
This license permits you to use one copy of the software contained in
this package or product on a single personal computer or hardware device.
For each software license, the program may be used on only one personal
computer or hardware device at any given time.
This license does not permit you to use the software on any hardware
device or personal computer that is not owned or controlled by you. You
may not distribute the software over a network or make it available to
multiple devices over a network at the same time. If the program is to
be installed on a network server solely for distribution to other
computers, a separate license is required.
You may not modify, translate, reverse assemble, decompile,
disassemble, or otherwise attempt to: (i) break, avoid, bypass, delete,
disable, or otherwise circumvent any software protection mechanism
contained in the software, including mechanisms that restrict or control
the software's functions; or (ii) derive or export the source code, or
the underlying ideas, algorithms, structure, or organization of the
software, except where such activity is expressly prohibited from
restriction by applicable law.
You may not use this software for any purpose that is unlawful under
the laws applicable in the jurisdiction where you use it.
2. Use of Content
This software is provided only for use with licensed media. You may not
use this software for any purpose that infringes any copyright,
trademark, patent, trade secret, publicity right, or any other right of
a third party.
You are responsible for ensuring that any content or material created,
copied, downloaded, compressed, recorded, replayed, published, and/or
distributed through this software, including but not limited to text,
photos, audio, and video recordings, is properly licensed and does not
infringe the rights of others.
You may not attempt to use this software together with any device,
program, or service to evade technical measures used to control access
to, or rights in, any content, document, or other work protected by
copyright law.
3. Distribution of Content
You may use this software only for your personal, non-commercial
purposes and may not provide it in any manner as part of any commercial
service or application. If you are interested in any other type of use,
please contact us.
Copies of content documents, including but not limited to songs and
other audio recordings, that are downloaded or reproduced through this
software are protected by copyright law and other applicable laws. Such
copies are for your personal use only and may not be distributed to
third parties or performed outside your normal family and social circle
of acquaintances.
4. Registration and Privacy Policy
This section is intended to help you understand:
1. How we collect and use your personal information;
2. How we use, protect, and retain your personal information;
3. How we share your personal information;
4. Your rights;
5. How we handle minors' personal information.
During software registration, purchase, and/or activation, you may be
required to provide personal identification information. We do not share
or sell such information to any third party unless: (i) you have agreed
in advance to such disclosure; (ii) disclosure is necessary to provide
the product or service you request; or (iii) disclosure is required for
us to comply with legal obligations.
4.1 How We Collect and Use Your Personal Information
Personal information refers to all kinds of information recorded
electronically or otherwise that can identify a specific natural person,
either alone or in combination with other information, or reflect the
activities of a specific natural person. Personal information covered by
this policy includes basic information (such as name, date of birth,
gender, address, phone number, and email); identity information (such as
ID card, officer's card, passport, driver's license, and other identity
certificates); location information; network identity information (such
as account information, IP address, email address, user name, nickname
within the app, password, and related security information); personal
internet records (such as browser records, search records, software
usage records, and click records); common device information (such as
internet service provider, terminal manufacturer, hardware model, MAC
address, operating system type, unique device identifiers including
IMEI, Android ID, IDFA, Advertising ID, OPENUDID, GUID, UDID, SIM card
IMSI, session start and stop time, language, region, time zone, network
status such as Wi-Fi, hard disk, CPU, and battery usage); video content
containing personal information; and other information including
timestamps, application identifiers, application versions, application
distribution channels, personal phone numbers, mobile numbers, web
browsing records, and precise location information.
Personal sensitive information refers to personal information that,
once leaked or tampered with, may have an adverse impact on the personal
information subject, including damage to reputation, physical or mental
health, or discriminatory treatment. Personal sensitive information
covered by this policy includes identity information (such as ID card,
officer's card, passport, driver's license, and household registration
booklet); network identity information (such as system account, IP
address, email address, user name, nickname in this app, password, and
related security information); related identity certificates; precise
location information; timestamps, application identifiers, application
versions, application distribution channels, personal phone numbers,
mobile numbers, web browsing records; and video content containing
personal sensitive information.
Our products and/or services include core functions such as cloud
services and service-based infrastructure, including but not limited to
monitoring video preview and device operation and control. In order to
provide these functions, we may collect, store, and use certain
information about you. If you do not provide such information, we may be
unable to provide the corresponding products or services.
Our products and/or services also include additional features, including
value-added services such as cloud storage, AI labs, message alerts,
device unbinding, and network detection. If you choose to use these
additional features, we will collect the personal information necessary
for the relevant feature. If you do not provide such information, you
may still purchase cloud services and use the basic service-based
functions of this software product, but you may not be able to use the
corresponding additional features.
In the course of your use of our products and/or services, we collect
information that you actively provide or that is generated through your
use of the products and/or services in order to provide, optimize, and
secure our products and/or services.
4.1.1 Specific Information We Collect and Use
1. When you register an account to use our products and/or services, we
collect information such as your user name, password, email address, and
mobile phone number. We collect mobile phone numbers to comply with
relevant laws and regulations. If you choose to log in by other means,
we may obtain your personal information from the relevant third party;
however, we may still ask you to provide information that the third
party cannot supply. If you refuse to provide such information, you may
not be able to use our products and/or services normally.
2. When you search for videos or other information, we collect your
search content to facilitate repeated entry and to present information
associated with your search. Please note that search keywords alone do
not identify you and generally do not constitute personal information.
However, where such keywords are combined with other information that
can identify you, they will be treated as your personal information
during such processing, and your search history will be handled and
protected in accordance with this policy.
3. When you use this software's cloud service, you need to bind your
camera and other products. We collect the product serial number and
product verification code of the product you bind. This information is
unique basic product information and is necessary to bind the product
and provide basic services such as preview, video storage, and
value-added services. When you use the storage capability of this
software's cloud service to store videos, those videos are stored on our
servers in encrypted form.
4. When you purchase products or services through this software, we
collect order information, including the order number, the service
information you purchased, the amount paid, and the payment method. We
use this information to identify transactions, settle payments, respond
to order inquiries, provide customer support and after-sales services,
and determine whether transactions are abnormal in order to protect
transaction security.
5. When you enable message reminders, we collect the timestamps of
images captured by your camera and push messages to you. You may turn
off this function in the settings.
6. When you apply to unbind a product, we collect your ID card and
other relevant information. We need to review this information as
necessary to determine whether you are the lawful user of the product
and whether your unbinding request should be approved. If you do not
provide this information, we will be unable to provide unbinding
services.
7. Our customer service and after-sales functions use your account
information, order information, and the product information associated
with your account. To protect your account, our customer service
personnel may use your account information to verify your identity. When
you require customer service or after-sales support relating to your
order information, we will review the relevant order information. You
may also provide additional information when communicating with our
customer service staff, such as requests to change a contact person or
phone number. When you require customer service or after-sales support
relating to bound product information, we will review the relevant bound
product information.
8. In addition, we may use online third-party services. We will not
disclose your personal information to such third-party service providers
without your permission.
9. If we need to obtain your personal information in situations other
than those described above, we will seek your express consent again and
fully explain the applicable scenario, as well as the content and scope
of the information to be collected, before obtaining that consent.
4.1.2 Rules for Using Your Personal Information
1. We will use your personal information in accordance with this policy
and for the purpose of providing our products and/or services.
We may send you commercial electronic messages, including SMS and email,
in order to provide you with relevant product or service information. If
you do not wish to receive such messages, you may unsubscribe by using
the unsubscribe function in the relevant message.
2. Unless you delete the software or reject our collection through
your account settings or system settings, all personal information you
provide while using our products and/or services will remain authorized
for our continued use during your use of the products and/or services.
When you cancel your account, we will stop using your information and
delete your personal information after 6 months.
3. We may compile statistics regarding the use of our products and/or
services and may share such statistics with the public or third parties
to show overall usage trends. However, these statistics do not contain
information that identifies any individual.
4. When displaying personal information, we will de-identify or
anonymize it through methods such as content replacement and anonymous
processing in order to protect your information security.
5. In order to optimize our products and provide better services, we
may share personal data with suppliers engaged to provide data analysis
or similar services. In such cases, those data recipients must comply
with our data privacy and security requirements.
6. If we intend to use your personal information for purposes not
specified in this policy, or to use information collected for a specific
purpose for another purpose, we will seek your prior consent through
your voluntary confirmation.
4.1.3 Circumstances Where We May Collect and Use Personal Information Without Authorization
You fully understand that, in the following circumstances, we may
collect and use personal information without your authorization or
consent to the extent permitted by applicable laws and regulations:
1. Directly related to national security and national defense
security.
2. Directly related to public safety, public health, and major public
interests.
3. Directly related to criminal investigation, prosecution, trial, and
enforcement of judgments.
4. Where it is necessary to protect the vital legitimate rights and
interests of the personal information subject or other individuals, such
as life or property, and it is difficult to obtain the consent of the
individual concerned.
5. Where the personal information involved has been publicly disclosed
by the personal information subject.
6. Where personal information is collected from information lawfully
disclosed to the public, such as legal news reports or official
information disclosures by relevant departments.
7. Where collection is necessary to perform a contract in accordance
with your request.
8. Where collection is necessary to maintain the safe and stable
operation of the products and/or services provided, such as detecting
and handling product and/or service failures.
9. Other circumstances as provided by laws and regulations.
4.2 Use of Cookies and Similar Technologies
1. Cookies
Cookies are mechanisms that support the storage and retrieval of
information on a website or client side by the server or script. When
you use a product or service, we may send one or more small data files,
called cookies, to your computer or mobile device. The cookies assigned
to you are unique and can be read only by the web servers that issued
them to your domain. Cookies generally contain identifiers, site names,
and certain numbers and characters. We use cookies to simplify your
login process, store your browsing preferences and other data, provide
preference-based functions, help optimize advertising selection and
interaction, and help determine login status as well as account and data
security.
We promise that information obtained through cookies will be used only
to improve service or product quality and optimize user experience. We
will not use cookies for any purpose other than those described in this
policy. You may manage or delete cookies according to your own
preferences. For details, you may refer to AboutCookies.org. You may
delete all cookies stored on your computer, and most web browsers
automatically accept cookies, although browser settings can usually be
changed to reject cookies. You may also clear cookies stored in the
software. However, if you do so, you may need to change user settings
each time you visit a website or use the software, and information
previously recorded may be deleted, which may affect the security of the
services you use.
2. Website Beacons and Pixel Tags
In addition to cookies, we may also use website beacons, pixel tags,
and other similar technologies on our website. For example, emails sent
to you may contain click URLs linked to content on our website. If you
click such links, we may track the click to help us understand product
preferences and improve customer service. Website beacons are usually
transparent images embedded in a website or email. With pixel tags
contained in emails, we can determine whether the email has been opened.
If you do not wish your activities to be tracked in this manner, you can
unsubscribe from our mailing list at any time.
4.3 How We Use, Protect, and Retain Your Personal Information
First, your personal information protection and safety measures.
1. We will make every reasonable effort to protect your personal
information. Your personal information will be protected by a dedicated
data security department. To prevent unauthorized access, copying,
modification, transmission, loss, destruction, processing, or unlawful
use, we have adopted and will continue to adopt the following security
measures:
1) Our network services adopt encrypted transmission protocols such as
HTTPS to ensure the security of user data during the transmission
process.
2) Users' personal information is encrypted and stored using encryption
technology, and isolated using isolation technology.
3) In scenarios involving the use of personal information, such as
personal information display and personal information association
computation, we use de-identification technologies to enhance the
security of personal information in use.
4) We establish strict data use and access controls and adopt multiple
identity authentication mechanisms to protect personal information and
prevent unauthorized use. We only allow authorized personnel to access
personal information and require them to fulfill corresponding
confidentiality obligations.
5) We conduct dedicated data and technical security audits, including
log and behavior audit measures.
2. Other security measures to protect personal information:
1) To manage and standardize the storage and use of personal
information by establishing data classification systems, data security
management standards, and data security development standards.
2) To establish information protection departments and data security
emergency response organizations to promote and protect personal
information security.
3) To enhance security awareness. We also conduct security and privacy
training courses to improve staff awareness of the importance of
personal information protection.
3. Despite the reasonable and effective measures described above, and
despite compliance with applicable legal standards, we cannot guarantee
the absolute security of your personal information when it is
transmitted through insecure channels. Accordingly, you should also take
positive measures to protect your personal information, such as using
complex passwords, changing passwords regularly, and not disclosing
account passwords or other personal information to others.
4. There are always risks of information leakage in network
environments. In the event of unexpected incidents, force majeure, or
other circumstances resulting in information leakage, we will make every
effort to control the situation and promptly inform you of the cause of
the incident, the security measures we have taken, the measures you may
take on your own initiative, and other relevant information.
5. After a personal information security incident occurs, we will
inform you in a timely manner as required by law and regulation,
including the basic situation and possible impact of the incident, the
measures taken or to be taken, suggestions for your own risk prevention
and reduction, and available remedial measures. We may notify you by
email, letter, telephone, push notification, or other means. Where it
is difficult to inform each personal information subject individually,
we will issue announcements in a reasonable and effective manner. We
will also report relevant incidents to the competent authorities as
required by law.
Retention of your personal information.
1. We will store personal information collected from users in accordance
with laws and regulations. If your personal information needs to be
transmitted abroad, you will be informed and asked for permission.
2. During your use of our products or services, we will retain your
personal information as necessary. If you cancel your account or delete
your personal information on your own initiative, we will continue to
retain your information for 6 months after account cancellation or
deletion in accordance with the requirements of the Cybersecurity Law
and other applicable laws and regulations.
Legal basis for data processing.
Our legal bases for processing personal data include performance of
our contract with you, compliance with mandatory legal disclosure
requirements, protection of our legitimate interests such as managing
our relationship with you, ensuring service security, and communicating
with you regarding products and services, and, where applicable,
consent, including for activities such as cookie-based advertising. In
some cases, you may need to provide personal data for the above
processing so that we can provide all services and enable you to use all
functions conveniently.
4.4 How We Share Your Information
1. We share your information only in circumstances known to you,
including where:
1) We have obtained your explicit authorization or consent, or that of
your guardian.
2) Disclosure is made to judicial or administrative authorities pursuant
to statutory procedures.
3) Disclosure is necessary when we initiate litigation or arbitration to
protect the legitimate rights and interests of users.
4) Sharing is carried out in accordance with agreements between you and
us, such as service agreements or usage rules.
5) Sharing is necessary within the scope permitted by laws and
regulations to protect the software, its related parties, software
users, or the public interest from harm.
6) Sharing is consistent with an agreement between you and another third
party.
2. In addition, we may share your order information, account
information, and equipment information with partners and other third
parties in order to ensure the smooth completion of the services
provided to you. We will share personal information only for lawful,
legitimate, necessary, specific, and explicit purposes, and only to the
extent necessary to provide services. Our partners do not have the right
to use the shared personal information for any other purpose. At
present, such partners include technical service providers supporting
our functions, such as providers of infrastructure services, payment
services, and data processing services. For example, we may need to
share your order number and order amount with a third-party payment
institution to confirm your payment instructions and complete
payment.
3. You may choose to share your own video, location information,
identity information, and other information with specific persons
through our products and/or services. We are not liable for serious
consequences such as information leakage caused by your own sharing
behavior.
4. Other
We may also publicly disclose your personal information with your
express consent or where required by law, legal process, judicial
authorities, or relevant competent authorities.
4.5 Your Rights
Subject to applicable law, you have the right to object to or request
restrictions on the processing of your personal data, and to request
access to, correction of, deletion of, and portability of your personal
data.
Where the use of your information is based on consent, you have the
right to withdraw that consent at any time. However, withdrawal of
consent does not affect the lawfulness of processing carried out on the
basis of consent before such withdrawal.
You may submit your request to us through the built-in "Opinions and
Feedback" function.
If you discover any changes or inaccuracies in your information, please
notify us so that our records can be updated or corrected. If you
believe that our processing of your personal data violates applicable
law, you may lodge a complaint with the relevant regulatory authority.
The retention period of your personal data depends on the need to
provide services or products to you, or on the requirements of
applicable laws, including tax and accounting laws.
In principle, we do not charge for reasonable requests. However, we may
charge a certain cost for repeated requests exceeding a reasonable
limit. We may refuse requests that are unjustifiably repetitive, require
excessive technical effort such as developing new systems or
fundamentally changing existing practices, pose risks to the legitimate
rights and interests of others, or are highly impractical, such as
requests involving backup information stored on tape.
In the following circumstances, we may be unable to respond to your
request as required by laws and regulations:
1) Matters related to national security or national defense
security;
2) Matters related to public safety, public health, or major public
interests;
3) Matters related to criminal investigation, prosecution, trial, or
enforcement of judgments;
4) Where there is sufficient evidence of your subjective malice or abuse
of rights;
5) Where responding would endanger the legitimate rights and interests
of you or other individuals;
6) Where business secrets are involved.
4.6 How We Handle Minors' Personal Information
1. We attach great importance to the protection of minors' personal
information. If you are a minor under the age of 18, you should obtain
the prior written consent of your parents or legal guardian before using
our products and/or services. We protect minors' personal information in
accordance with relevant laws and regulations.
2. Where we collect minors' personal information with the consent of
their parents or legal guardians, we will use or publicly disclose such
information only where permitted by law, expressly consented to by the
parents or legal guardians, or necessary for the protection of the
minor.
3. If we discover that we have collected personal information from a
minor without the prior consent of a verifiable parent or legal
guardian, we will attempt to delete the relevant data as soon as
possible.
5. Cross-Border Data Transfers
To provide and maintain our services, we may use global cloud
infrastructure and technical service providers. As a result, your
personal data may be transferred to, and processed in, countries or
regions outside your country of residence.
Personal data collected through the application may therefore be
transferred across national borders due to the use of cloud
infrastructure services and technical service providers.
Such cross-border transfers may occur for purposes including, but not
limited to, providing cloud storage services, supporting application
functionality, maintaining system operation and security, providing
technical support and maintenance, and improving service performance and
user experience.
Recipients of transferred personal data may include third-party cloud
infrastructure providers, technical service providers, and data
processing service providers, including services such as Firebase, AWS,
and other third-party cloud infrastructure providers.
When personal data is transferred across borders, we implement
appropriate safeguards in accordance with applicable data protection
laws. Such safeguards may include contractual arrangements,
industry-standard security frameworks, and other legally recognized data
protection mechanisms.
We also implement reasonable technical and organizational measures to
protect personal data during international transfers, including
encrypted data transmission such as HTTPS, encrypted storage where
applicable, strict access control mechanisms, and internal security
management procedures.
Subject to applicable law, users may have the right to request access
to, correction of, or deletion of their personal data, and may also
request information about how their personal data is processed or
transferred internationally. If you have questions regarding
cross-border data transfers, you may contact us using the contact
information provided in this Privacy Policy.
6. Software Usage Tracking
You agree that this software may monitor your use of the software for
the purpose of improving product availability. In doing so, the software
may record usage information regarding the functions of the selected
product, the unique machine ID automatically generated when the software
is installed, and information about other software products installed on
the same machine. Such usage information is not collected together with
corresponding personal identification information and remains anonymous.
7. Software Updates and Marketing
This software may automatically connect your computer to the Internet
and communicate with us, without additional and/or prior notice, in
order to check for available bug fixes, additional features, plug-ins,
and new versions (collectively, "software updates"). You agree that the
software may also send you information about software updates and
special offers provided by the Software Alliance and third-party
partners.
8. Copyright Information
The software contained in this package or device is protected by
applicable copyright laws, the provisions of international treaties, and
all other applicable national laws. The software must be treated in the
same manner as other copyrighted materials, such as books and music
recordings. This license does not permit rental of the software, and you
may not copy any written materials accompanying the software, if any.
9. Owner's Statement
Ownership of, and all intellectual property rights in, the software and
its accompanying documents, as well as any copies thereof, remain the
sole and exclusive property of the software owner and/or its third-party
licensors. You agree to comply with copyright law and all other
applicable laws. You acknowledge that the software contains valuable
confidential information and trade secrets belonging to the software
owner and/or its third-party licensors.
10. Disclaimer
The software and services are provided without warranties of any kind.
No express or implied warranties are given, including, without
limitation, implied warranties of merchantability, fitness for a
particular purpose, or non-infringement of intellectual property rights.
The software expressly disclaims all such warranties.
You assume all risks relating to the quality and performance of the
software and services. If the software proves defective, you, and not
the software provider or any authorized distributor, assume the entire
cost of all necessary servicing, repair, maintenance, or correction.
Some countries, regions, or jurisdictions do not allow the exclusion of
implied warranties, so the above exclusion may not apply to you.
11. Limitation of Liability
Your sole remedy, and the entire liability of this software and its
licensor, shall be as set out above. In no event shall this software or
its licensors be liable to you or any other person for any damages,
including incidental or consequential damages, expenses, loss of
profits, loss of savings, or other damages arising from the use of, or
inability to use, the software, even if the software or its licensors
have been advised of the possibility of such damages. Because some
jurisdictions do not permit the exclusion or limitation of consequential
or incidental damages, the above limitation may not apply to you.
12. Export Declaration
Without any required license or authorization, you may not export or
re-export products containing this software.
13. High-Risk Activity Statement
This software is not fault-tolerant and is not designed or intended for
use in hazardous environments requiring fail-safe performance, or in any
other application in which software failure could directly result in
death, personal injury, or severe physical or property damage
(collectively, "high-risk activities"). The software expressly disclaims
any express or implied warranty of fitness for high-risk activities.
14. Compensation Statement
You agree to indemnify, defend, and hold harmless this software, and
its officers, directors, and employees, from and against any losses,
damages, fines, costs, and expenses (including attorneys' fees) arising
out of or related to any claim resulting from: (i) your use, viewing,
copying, downloading, encoding, compressing, copying, transmitting, or
other handling of any material, other than material provided by the
software, in connection with the software; or (ii) your violation of any
term of this License Agreement.
15. Revision and Renewal of the Policy
We may revise this policy from time to time. Without your explicit
consent, we will not reduce the rights you are entitled to under this
policy.
We will notify you of any changes to this policy, including major
changes, through push notifications, pop-up notices, emails, or other
appropriate means.
Major changes include, but are not limited to:
1. Material changes to our service model, such as the purpose of
personal information processing, the types of personal information
processed, or the manner in which personal information is used.
2. Significant changes to our ownership structure or organizational
structure, such as changes caused by business adjustments, bankruptcy,
or acquisitions.
3. Changes to the main recipients of personal information sharing,
transfer, or public disclosure.
4. Significant changes to your rights to participate in personal
information processing.
5. Changes to the department responsible for personal information
security, contact methods, or complaint channels.
6. Circumstances where a personal information security impact assessment
indicates a high risk.
16. Termination Clause
This agreement remains in full force and effect during your use of the
services. You may terminate the services at any time. We may deny or
suspend your access to and/or use of the services and/or your account at
any time and for any reason, without prior notice. This may result in
the forfeiture and destruction of all information associated with your
membership.
If you violate any term or condition of this agreement, we may
terminate or suspend any and all services and access to the website
without prior notice or liability. Upon termination of your account,
your right to use the services, access the website, and use any content
will cease immediately. All provisions of this agreement other than "1.
License Authorization" shall, by their nature, survive termination,
including, without limitation, limitation of liability, disclaimers, and
claims-related provisions.
17. How to Contact Us
If you have any questions, comments, or suggestions regarding this
policy or your personal information, please contact us through the
built-in "Opinions and Feedback" function of the software. Under normal
circumstances, we will respond within 30 days.