Privacy Policy Statement

This agreement is concluded by you and the software. This agreement has the effect of a contract.
The software (hereinafter referred to as "Safeguard") agrees to provide related services based on the Internet, the Internet of Things and the mobile network (hereinafter referred to as "network services") in accordance with the provisions of this agreement and the operating rules issued from time to time. To obtain network services, service users (hereinafter referred to as "users") should agree to all terms of this agreement and follow the prompts on the page to complete all registration procedures.
When the user clicks the "Agree" button during the registration process, the user fully accepts all the terms under this agreement.

1. Services
1.1 This software is used in conjunction with the mobile positioning terminal sold by the security guard to provide functions of the service terminal's trajectory map, remote monitoring and early warning of the terminal, online instant calling and voice communication.
1.2 When using the online instant call function, the mobile positioning terminal needs to be equipped with a SIM card, and the communication fee incurred during the call is charged by the operator.
1.3 When using the software to view the built-in Gaode maps, track points, early warning and other information, the network request traffic fee generated by the server is charged by the operator; when using the mobile positioning terminal sold by the security guard, the location information is reported to the corresponding server. The traffic charges incurred are also charged by the operator. Other than that, no other costs are incurred.
1.4 This software is only applicable to the operating system supported by its official website. If users want to give up their use for any reason after installing this software, they can delete the software according to the corresponding system deletion method.
1.5 Software modification and upgrade, the security guard reserves the right to provide users with the modification and upgrade version of this software at any time. If the data traffic fee generated by the upgrade is updated, the operator will charge it.
1.6 This software does not contain any malicious code aimed at destroying user data and obtaining user privacy information, does not contain any function code for monitoring or monitoring user behavior, will not collect user personal files, documents and other information, and will not disclose user privacy information .

2. Notice to users
2.1 The user should use the software under the premise of observing the law and this agreement. The user has no right to implement the following actions including but not limited to:
· Delete or change all rights management electronic information on this software;
· Intentionally avoid or destroy the technical measures taken by the copyright owner to protect the copyright of this software;
· Use this software to mislead and deceive others;
· Violation of national regulations, the deletion, modification, regular price, and interference of computer information system functions
The computer information system cannot operate normally;
· Enter computer information network or use computer information network resources without permission;
· Unauthorized deletion, modification or addition of computer information network functions;
· Without permission, delete, modify or add data and applications stored, processed or transmitted in the computer information network;
· Destroy the normal operation of the software system or website, intentionally spread destructive programs such as computer viruses;
· Any other actions that endanger the security of computer information networks.
2.2 For the software product downloaded from the non-security guardian designated platform and the software product obtained from the media issued by the non-security guardian, the security guardian cannot guarantee whether the software is infected with a computer virus, whether there is a hidden Trojan horse program or hacking software . The use of such software may cause unpredictable risks at the time, and users are advised not to download, install, or use them easily. Security Guard does not assume any legal responsibility arising therefrom.

3. Rules of use
3.1 Users should not transfer or lend their account numbers and passwords to others for use. If the user finds that his account has been illegally used by others, he should immediately notify the security guard. Due to hacking or negligent storage of the user, the account and password are illegally used by others, and the security guard does not assume any responsibility.
3.2 The user agrees to protect and maintain the interests of the security guard and other users. If the user violates the relevant laws, regulations or any clauses under this agreement and causes damage to the security guard or any other third party, the user agrees to bear the resulting Liability for damages.

4. privacy protection
4.1 Protecting user privacy is a basic policy of the security guardian. The security guardian guarantees not to make public or provide third-party registration information and non-public content stored in the security guardian when users use network services, except for the following circumstances:
· Obtain the user's explicit authorization in advance;
· According to relevant laws and regulations.

5. Disclaimer
5.1 The user expressly agrees that the risks of using this software network service will be entirely borne by himself; all consequences arising from his use of this software network service will also be borne by himself, and the security guard will not bear any responsibility to the user.
5.2 Security Guard does not guarantee that the network service will meet the user's requirements, nor does it guarantee that the network service will not be interrupted, nor does it guarantee the timeliness, security, and accuracy of the network service.
5.3 Security Guard does not guarantee the accuracy and completeness of external links provided for the convenience of users. At the same time, Security Guard does not assume any responsibility for the content on any web pages pointed to by these external links that are not actually controlled by the Security Guard.
5.4 For any interruption of network services or other defects caused by force majeure or reasons beyond the control of the security guardian, the security guardian shall not bear any responsibility, but will try its best to reduce the losses and impacts caused to the user.

6. Agreement modification
6.1 Security Guard reserves the right to modify any terms of this agreement at any time. Once the contents of this agreement are changed, Security Guard will directly publish the revised contents of the agreement on the official website. This announcement is deemed to have notified the user to modify the content. The security guard can also prompt the user to modify the content through other appropriate methods.
6.2 If you do not agree to the changes made by Security Guard to the relevant provisions of this agreement, the user has the right to stop using this software service. If the user continues to use the network service, it is deemed that the user accepts the modifications made by the security guard to the relevant terms of this agreement.

7. Service change, interruption or termination
7.1 In view of the particularity of network services, the user agrees that the security guard has the right to change, interrupt or terminate some or all network services (including paid network services and free network services) at any time. If the changed, interrupted or terminated network service is a free network service, the security guard does not need to notify the user, nor does it need to bear any responsibility for any user or any third party; if the changed, interrupted or terminated network service is a paid network service, the security guard should Before changing, interrupting or terminating, notify the user in advance and provide the affected user with an equivalent alternative toll network service. If the user is unwilling to accept the alternative toll network service, the user has paid the security guard For service fees, the security guard should refund the remaining service fees to the user after deducting the corresponding service fees according to the actual usage of the corresponding charged network service by the user.
7.2 The user understands and confirms that the security guard needs to overhaul or maintain the platform (such as Internet website, mobile network, etc.) or related equipment that provides network services regularly or irregularly. If such a situation causes charged network services within a reasonable time Within the interruption, the security guardian does not need to take any responsibility for this, but the security guardian announces as much as possible in advance.
7.3 If any of the following situations occur, the security guardian has the right to interrupt or terminate the provision of network services under this agreement to users at any time (the network services include but are not limited to paid and free network services, and free network services based on advertising models) Without any responsibility to users or any third party:
· The personal information provided by the user is not true;
· The user violates the rules of use specified in this agreement;
· When users use paid network services, they fail to pay security guards the corresponding service fees as required.
7.4 If the nickname of the software account registered by the user violates laws, regulations or national policies, or violates the legal rights and interests of any third party, the security guard has the right to withdraw the nickname of the account.

8. Service of notice
8.1 All notifications to users under this agreement can be made through web announcements, e-mails, mobile phone text messages, or regular mail transmissions; such notifications are deemed to have been delivered to the recipient on the day they are sent.
8.2 The user's notification of the security guard shall be served through the contact information such as the communication address, fax number, e-mail address, etc. officially announced by the security guard.

9. Sports health information recording and display
9.1 During your use of our watch equipment, we may collect and record information about your sports activities, including your steps, standing activity and duration, exercise mode, cadence, exercise distance, exercise time, altitude, heart rate, stroke Information about water times, stroke frequency, turns, heart rate, and heartbeat. This information will be used to calculate and display the calories consumed by exercise, display training effects, calculate oxygen uptake, sleep time, etc., so that you can better understand your exercise status. This information will be displayed on the watch device and you can view it at any time.
9.2 The results measured by this device are for reference only. You should consult a doctor before you make a medical decision.

10. Permission to use
10.1 Obtaining the location permission is used to compare the location display of the mobile phone and the device. Integrating SDKs such as Baidu Maps, Amap Maps, etc., in order to realize the basic service functions of the map open platform, we may need to collect user related personal information through the application. The collection of such personal information will only be permitted when the application has obtained the permission of the terminal device system. Under the premise: The "location information" obtained by the following types of products/services includes GNSS information, IP addresses, WLAN hotspots, base station information, Bluetooth devices, and other sensor information that can be used for positioning.
10.2 Obtaining camera permission to scan QR code.
10.3 Obtaining storage permissions for image browsing and sharing when personalizing icon settings.
10.4 Obtaining personal information is based on the establishment of a precise message push platform. We collect device identifiers (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to uniquely identify the device in order to push messages to the target device.\n\nGPS365\nFEN HU 10.5 Obtain the recording function permission for two-way voice contact with the device.
10.6 Users of customized photos need to provide, upload, and publish them themselves, in order to allow everyone to customize and improve the user experience.


365GPS/GPS365
FEN HU