【Important Notice】
[SPY Technology Co., Ltd.] (hereinafter referred to as "SPY" or "WE") hereby reminds users to carefully read and fully understand this "Software License and Service Agreement" (hereinafter referred to as "this Agreement"). Users should carefully read and fully understand the terms of this agreement, especially those related to the exclusion or limitation of SPY's liability, dispute resolution and applicable laws. The terms of the exclusion or limitation of liability will be marked in bold and you need to read them carefully. Please read carefully and choose to accept or not to accept this agreement (minors should be accompanied by legal guardians to read). Your download, installation, use of this software, and account acquisition and login will be deemed acceptance of this agreement, and you agree to be bound by the terms of this agreement.
SPY reserves the right to revise this agreement, and the updated terms of the agreement will be posted on the official website or software and will take effect from the date of publication. Users can download and install this software again or check the latest version of the terms of the agreement on the website. After Ninebot revises the terms of this agreement, if the user does not accept the revised terms, please stop using the "SPY ALARM" software and services provided by SPY immediately, and the user will continue to use the "SPY ALARM" software and services provided by SPY. to have accepted the revised agreement.
1. General
1.1. This agreement is between you (hereinafter also referred to as "user") and SPY and its operating cooperative units (hereinafter referred to as "cooperating units") regarding the user's downloading, installation and use of SPY "SPY ALARM" software (hereinafter referred to as "this software"). ”) and the agreement for the use of SPY related services.
1.2. The software and services are software and services provided by SPY and installed on mobile smart terminal devices, including but not limited to, to provide users using the smart terminal with connecting vehicles, viewing vehicle information, setting vehicle parameters, and upgrading vehicles. SPY's services, etc.
1.3. The ownership and operation of the Software and Services are owned by SPY.
2. Scope of software authorization
2.1. SPY grants User a personal, non-transferable, non-sublicensable and non-exclusive license to the Software.
2.2. Users can install, use, display and run the software on a single mobile terminal device for non-commercial purposes. However, the user shall not install, use or run this software for commercial operation purposes, and shall not copy, Change, modify, hook into operation or create any derivative works, including but not limited to using plug-ins, plugins or unauthorized third-party tools/services to access the Software and related systems. For commercial sale, reproduction and distribution, such as software pre-installation and bundling, written authorization and permission from SPY must be obtained.
2.3. Users are not allowed to install this software on other terminal devices that are not expressly approved by SPY, including but not limited to set-top boxes, game consoles, televisions, DVD players, etc. without the permission of SPY.
2.4. The User may make one copy of the Software for the purpose of using the Software and the Services for backup purposes only. The backup copy must contain all copyright information contained in the original software.
2.5. Except as expressly authorized in this "Agreement", SPY does not authorize other rights to users, if users use other rights, they must obtain SPY's written consent.
3. Software acquisition, installation and upgrade
3.1. Users should download and install this software product according to SPY's designated website or designated method. Beware of downloading this software from non-designated websites, so as to prevent mobile terminal equipment from being infected with malicious programs that can destroy user data and obtain user privacy information. If the user obtains the software or the installation program with the same name as the software from a third party not authorized by SPY, SPY cannot guarantee the normal use of the software, and will not be responsible for any loss caused to you.
3.2. The user must select the version of the software that matches the installed terminal device, otherwise, any software problem, device problem or damage caused by the mismatch between the software and the device model shall be borne by the user.
3.3. In order to improve the user experience and improve the service content, SPY has the right to provide you with replacement, modification and upgrade versions of this software from time to time, and also has the right to charge fees for the replacement, modification or upgrade, but the fees will be charged in advance with your consent. This software enables the "upgrade prompt" function for the user by default. Depending on the software version used by the user, SPY provides the user to choose whether to enable this function. After a new version of the software is released, SPY does not guarantee the continued availability of the old version of the software.
Fourth, the use of norms
4.1. The user can use the software and services in accordance with this "Agreement" under the premise of abiding by the law and this "Agreement", and the user shall not perform the following acts:
4.1.1. Delete all copyright information on this software and other copies, and modify, delete or avoid the technical measures set by this software to protect intellectual property rights;
4.1.2. Reverse engineering the software, such as disassembly, decompilation or other attempts to obtain the source code of the software;
4.1.3. By modifying or falsifying the instructions and data in the operation of the software, adding, deleting, changing the functions or operating effects of the software, or operating or disseminating the software and methods used for the above-mentioned purposes to the public, regardless of these whether the conduct is for commercial purposes;
4.1.4. Use this software to conduct any acts that endanger network security, including but not limited to: using unlicensed data or entering unlicensed servers/accounts; accessing public networks or other people's operating systems without permission and deleting them , modify, increase the stored information; attempt to probe, scan, test the weaknesses of the software's system or network or other behaviors that damage network security without permission; attempt to interfere with or destroy the normal operation of the software system or website, and intentionally spread malicious programs Or viruses and other behaviors that disrupt and interfere with normal network information services; forge TCP/IP packet names or partial names;
4.1.5. Users log in to or use the software and services through third-party compatible software and systems not developed, authorized or recognized by SPY, or create, publish, and disseminate the above tools;
4.1.6. Without the written consent of SPY, the user conducts the software and the information in it without authorization, including but not limited to the following behaviors: use, rent, lend, copy, modify, link, reprint, compile, publish, publish, build mirrors Website, develop derivative products, works, services, plug-ins, plug-ins, compatibility, interconnection, etc. related to this software without authorization;
4.1.7. Use this software to publish, transmit, disseminate, and store content that violates your local laws; if you are a user in the mainland of the People's Republic of China, use this software to publish, transmit, disseminate, and store content that violates national laws and endangers the country. Security, national reunification, social stability, public order and good customs, or any inappropriate, defamatory, obscene, violent and any content that violates national laws, regulations and policies;
4.1.8. Use this software to publish, transmit, disseminate and store content that infringes upon the intellectual property rights, trade secrets and other legal rights of others;
4.1.9. Use this software to publish, transmit, and disseminate advertising information and spam in batches;
4.1.10.Other use the Software and other services provided by SPY in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with the use of this Agreement;
4.2. Information Release Specifications
4.2.1. You can use this software to publish your original opinions, data, text, information, user names, pictures, photos, personal information, audio, video files, links and other information content that are original or you have the right to publish. You must ensure that you own the intellectual property rights of the information you upload or have obtained legal authorization, and that your use of the software and services does not infringe the legitimate rights and interests of any third party.
4.2.2. When you use this software, you must abide by local laws and regulations. If you are a user in the mainland of the People's Republic of China, you should especially abide by Chinese laws and regulations, the socialist system, national interests, legitimate rights and interests of citizens, social and public order, morality and authenticity of information. Sex and other "seven bottom lines" requirements.
4.2.3. When using this software, you shall not use this software to engage in the following behaviors, including but not limited to:
4.2.3.1. To produce, reproduce, publish, disseminate, and store content that violates local laws and regulations, if you are a user in the mainland of the People's Republic of China, engage in the following behaviors (1)-(11):
(1) Those who oppose the basic principles established by the Constitution;
(2) Endangering national security, divulging state secrets, subverting state power, and undermining national unity;
(3) Damage to national honor and interests;
(4) Inciting ethnic hatred, ethnic discrimination, or undermining ethnic unity;
(5) Undermining the state's religious policy and promoting cults and feudal superstitions;
(6) Spreading rumors, disturbing social order, and undermining social stability;
(7) Spreading obscenity, pornography, gambling, violence, murder, terror or instigating crimes;
(8) Insulting or slandering others and infringing on the legitimate rights and interests of others;
(9) Inciting illegal assemblies, associations, processions, demonstrations, and gatherings to disrupt social order;
(10) Acting in the name of an illegal non-governmental organization;
(11) Contains other content prohibited by laws and administrative regulations.
4.2.3.2. Publish, transmit, disseminate, and store content that infringes upon the legal rights of others such as reputation, portrait, intellectual property, and trade secrets;
4.2.3.3. Fabricate facts, conceal the truth to mislead or deceive others;
4.2.3.4. Publish, transmit, and disseminate advertising information and spam;
4 . 2 . 3 .5 . Engage in other conduct that violates local laws and regulations.
4.2.4. Without the permission of SPY, you are not allowed to conduct any commercial activities such as publishing advertisements and selling goods in this software.
4.3 You understand and agree that:
4.3.1. SPY will determine whether the user is suspected of violating the above-mentioned usage specifications, and will suspend or terminate your license or take other restrictive measures that can be taken in accordance with this agreement according to the determination result;
4.3 .2. SPY will directly delete the information that is suspected of illegal or suspected of infringing the legal rights of others or violated this agreement when the user uses the licensed software;
4.3.3. If the user's violation of the above-mentioned usage specifications causes damage to a third party, you shall bear the legal responsibility independently in your own name, and shall ensure that SPY is free from any loss or increased cost;
4.3.4. If the user violates the relevant legal provisions or agreements, causing SPY to suffer losses, or to be claimed by a third party, or punished by the administrative authority, the user shall compensate SPY for the losses and/or expenses incurred, including reasonable lawyers Fees, investigation and evidence collection fees.
V. Privacy Policy and Personal Information Protection
5.1. The protection of your personal information is important to SPY. In order to provide the functionality of the software and improve the user experience, SPY will collect the following types of data:
5.1.1. Device related information: Information related to your device hardware, performance, status, applications, etc. Examples include system version, device manufacturer information, model name, device ID, installed and used applications. When connected to Bluetooth, the device's speed and mileage information, device serial number, device firmware version number, battery information, vehicle light information, etc. will be obtained through Bluetooth.
5.1.2. Information we designate about you: We may collect and use information such as your SPY account number.
5.1.3. Network usage information: We may collect network types, network signals, etc. related to certain features of the SPY software you use.
5.2. We will collect, use and protect your data in accordance with our Privacy Policy. You can find information about the Privacy Policy at the following website.
6. Service Risks and Disclaimer
6.1. Users must equip their own mobile terminal equipment to access the Internet and use the equipment required for telecommunications value-added services, and bear the communication fees, information fees, etc. charged by personal mobile terminal equipment to access the Internet or by third parties (including but not limited to telecommunications or mobile communication providers). related fees. If it involves telecom value-added services, we recommend that you confirm the relevant fees with your telecom value-added service provider.
6.2. SPY and its partners are not responsible for all losses suffered by users due to third parties such as communication line failures, technical problems, network, mobile terminal equipment failures, system instability and other force majeure reasons.
6.3. This software, like most Internet software, is affected by factors including but not limited to user reasons, network service quality, social environment and other factors, and may be disturbed by various security issues, such as the use of user information by others to cause real life problems. Other software downloaded and installed by users or other websites visited contain viruses such as "Trojan horses", which threaten the security of user's terminal equipment information and data, and then affect the normal use of this software, etc. Users should strengthen the awareness of information security and user data protection, and pay attention to strengthening password protection to avoid losses and harassment.
6.4. When the user uses the software or requests SPY to provide specific services, the software may call a third-party system or third-party software to support the user's use or access, and the results of the use or access are provided by the third party. SPY shall not be liable for any disputes and damages arising from the security, accuracy, validity and other uncertain risks of the results achieved by third-party systems or third-party software support.
6.5. SPY especially reminds users that, in order to protect the company's autonomy in business development and adjustment, SPY has the right to modify or interrupt the service at any time without notifying the user. The third party is responsible.
6.6. Except as clearly stipulated by laws and regulations, we will do our best to ensure that the software and the technology and information involved are safe, effective, accurate and reliable, but limited by the existing technology, users understand that SPY cannot guarantee this.
6.7. Personal injury or incidental, indirect economic damages, including but not limited to loss of profits, loss of data, damages for business interruption or other commercial damages, arising out of or in connection with any of the following circumstances; The loss shall be borne by the user: (1) the use or failure to use the licensed software; (2) the unauthorized use of the software by a third party or the modification of the user's data; (3) the expenses and losses arising from the behavior of the user using the software ; (4) User's misunderstanding of the software; (5) Other losses related to the software not caused by SPY.
6.8. Any personal or economic injury or loss caused or likely to be caused by the behavior between the user and other users of the software through the software due to your being misled or deceived shall be borne by the faulty party in accordance with the law.
7. Intellectual Property Statement
7.1. SPY is the intellectual property owner of the Software. All copyrights, trademarks, patents, trade secrets and other intellectual property rights of this software, as well as all information content related to this software (including but not limited to text, pictures, audio, video, graphics, interface design, layout framework, relevant data or electronic documents, etc.) are protected by local laws and regulations and corresponding international treaties, SPY enjoys the above intellectual property rights.
7.2 Without the written consent of SPY, the user shall not implement, utilize or transfer the above intellectual property rights by himself or by any third party for any commercial or non-commercial purpose, and SPY reserves the right to pursue legal responsibility for the above acts.
8. Change of agreement
8.1. SPY has the right to modify the terms of this agreement when necessary. Once the terms of the agreement are changed, the revised terms of the agreement will be announced on the relevant page. If you do not agree with the changed content, the user should cancel the service actively. If the user continues to use the service, it is deemed to accept the changes in the terms of the agreement.
8.2. SPY Company and its partner companies have the right to modify or change the charging services, charging standards, charging methods, service fees and terms of service provided as necessary. When SPY provides services, it may start to charge certain fees to users of some services now or in the future. If users refuse to pay such fees, they cannot continue to use related services after the charging starts. SPY and partner companies will use their best efforts to notify users of modifications or changes by email or other means.
9. Applicable Law and Dispute Resolution
9.1. The validity and interpretation of the terms of this agreement shall be governed by the laws of the mainland of the People's Republic of China. In the absence of relevant legal provisions, reference will be made to international business practices and/or business practices.
9.2. The place where this agreement is signed is Zhongshan City, Guangdong Province.
9.3. The user and SPY agree that any disputes arising from this service should be resolved through negotiation. If the negotiation fails, either party may submit a lawsuit to the court with jurisdiction in the place where this agreement is signed.
10. Others
10.1. When a user uses a specific service of the software, the service may have a separate agreement, relevant business rules, etc. (hereinafter collectively referred to as "separate agreement"). Before using the service, please read and agree to the relevant separate agreement.
10.2. The effective date of this Agreement is May 219, 202.
10.3. The titles of all clauses in this agreement are for reading convenience only, have no actual meaning in themselves, and cannot be used as the basis for the interpretation of the meaning of this agreement.
10.4. Regardless of the reasons for partial invalidity or unenforceability of the terms of this Agreement, the remaining terms remain valid and binding on both parties.
SPY technology co., Ltd
NO.9 Yongcheng North Rd, Xiaolan Industrial Base,PRC,528415
One-stop Sourcing. Competitive Price. Short Lead Time. OEM/ODM Service. Contact Us.
Follow Our Live Broadcast
Leave your contact information, our staff will contact you soon.
Get Company Brochure After Submitting
Get Free Products Catalog After Submitting
Short Lead Time
Efficient digital and automatic production ensures short lead time.
Flexible Customization
Can be customized and developed according to customer needs.
Strict quality management
ISO 9001, ISO 14001, European RoHS Certification & strict quality tests ensure the high quality.
Laboratory
A set of CNAS laboratory.
Superior Customer Service
Experienced engineers and technicians are available to answer questions and offer personalized service for jobs large and small to help ensure you get the right parts for your needs.
Superior Customer Service
Experienced engineers and technicians are available to answer questions and offer personalized service for jobs large and small to help ensure you get the right parts for your needs.
Laboratory
A set of CNAS laboratory.
Strict quality management
ISO 9001, ISO 14001, European RoHS Certification & strict quality tests ensure the high quality.
Flexible Customization
Can be customized and developed according to customer needs.
Short Lead Time
Efficient digital and automatic production ensures short lead time.
27 Years Of Experience
Established in 1994, leading manufacturer and supplier of car security systems
20,000 Square Meters Of Factory
High-speed SMT machines, automatic input lines, and ICT robots
One-stop OEM/ODM Service
Your brand. Your name. We Produce.
Strict quality management
ISO 9001, ISO 14001, European RoHS Certification & strict quality tests ensure the high quality.
Short Lead Time
Efficient digital and automatic production ensures short lead time.