Special reminder to users: when using the Internet, they must comply with relevant national policies and laws, such as the Criminal Law, the National Security Law, the Confidentiality Law, the Computer Information System Security Protection Regulations, the Intellectual Property Law, etc., to protect national interests and national security. Users shall bear full responsibility for all responsibilities arising from illegal use of the Internet.
1. Users shall not use this software to violate national laws and regulations;
2. This software, like most Internet software, is susceptible to various security issues, including but not limited to:
1) Other software downloaded and installed contains viruses such as "Trojan horses", which threaten the security of information and data on personal computers or mobile phones, thereby threatening the use of this software.
2) When browsing and visiting certain malicious web pages, the mobile phone or computer may be infected or damaged,
3) Due to reasons such as the provider of the downloaded file or the network, it cannot be used normally
3. Users should strengthen their awareness of protecting their personal mobile phone data to avoid unnecessary harassment to their personal lives.
4. Stealing other people's user numbers or using network communications to harass others are illegal. Users shall not use any illegal means such as testing and deception to steal other users' numbers and harass others.
5. Please download and install this software product according to our company's designated website or designated method. Be careful not to download this software on non-designated websites to avoid computers or mobile phones being infected with malicious programs that can damage user computer data and obtain user privacy information.
6. We attach great importance to the privacy protection of users and ensure that this software product does not contain any functional code that tracks or monitors the user's computer and/or operating behavior, and will not monitor the user's online and offline behavior or leak the user's privacy.
7. Users shall not conduct any behavior that damages the rights and interests of the company. Users shall not carry out the following behaviors (including but not limited to): delete all copyright information on this software and other copies; reverse engineer this software, such as disassembly, decompilation, etc.; modify or destroy the original state of this software.
8. If the user fails to comply with any of the terms of this Agreement, the Company has the right to terminate this Agreement immediately and reserves the right to pursue legal liability.
9. If commercial sales, copying and distribution are required, such as pre-installation and bundling of software, written authorization and permission from the Company must be obtained.
10. Users using this software should prepare the conditions required for the operation of this software product, and users must ensure that they have the right to use window/Android operating system and Microsoft IE components, etc. To the maximum extent permitted by applicable law, the Company shall not be liable for compensation for special, accidental, direct or indirect infringement or loss caused by the user's use or inability to use this software product under any circumstances. Even if the possibility of such damage has been notified in advance.
11. Users must understand that the use of this software product involves Internet services, which may be affected by unstable factors in various links. Therefore, there is a risk of service interruption or failure to meet user requirements due to force majeure, computer mobile phone viruses or hacker attacks, system instability, user location, user information and any other technical: Internet, communication line reasons, etc. Users must bear the above risks and the Company does not provide any guarantee.
12. The company attaches great importance to the privacy protection of users and guarantees that this software product does not contain any functional code that tracks or monitors the user's computer and/or operating behavior, and will not monitor the user's online or offline behavior or leak the user's privacy.
13. The information content defined by the company includes: text, software, data, photos, pixels, and all content in advertisements;
14. The final right of interpretation of the software belongs to the company.