Welcome to the iScan!!
Please read and understand all rights and limitations set forth in this User Agreement (the Agreement). Unless you accept the terms of this Agreement, you have no right to download, install or use the Software or the related Services. By installing or otherwise using the Software Products, you agree to be bound by the terms of this Agreement. If you do not agree to the terms of this Agreement, please do not install or use the software.
All intellectual property rights of the Software and all content related to the Software, including but not limited to text expression and combination, ICONS, images, colors, interface design, layout frame, relevant data, additional programs or electronic documents, are owned by the Company and protected by copyright laws, international copyright treaties and other intellectual property laws and regulations.
Download, install, and use:The software is free of charge, and users may download, install and use the software in non-commercial and unlimited quantities.
Distribution and dissemination:Users may distribute and disseminate the Software products in non-commercial, unlimited quantities. However, we must ensure that every distribution and dissemination is complete and true, including all software, electronic documents, Copyrights and trademarks related to the software products, including this Agreement.
Do not Reverse Engineer, Decompile, or Disassemble this software product. Users are not allowed to reverse engineer, decompile, or disassemble this software product. They are not allowed to alter any resources compiled within the program files. Unless the above activities are expressly permitted by laws and regulations, the user must abide by the restrictions of this Agreement.
Component segmentation : This software product is licensed for use as a single product and users may not separate the parts for any purpose.
Individual license : Any commercial sale, reproduction, distribution, including but not limited to software sales, pre-installation, bundling, etc., must obtain the Company's written authorization and license.
Reserved Rights : Other rights not expressly authorized herein remain in the possession of the Company, and Users must obtain the written consent of the Company to use other rights.
The software provides users with data storage, management and other services. Secret Board reserves the right to adjust the service content and mode from time to time.
This software is applicable to the iPhone or Android operating system. If the user wants to give up the software for any reason after installation, the software can be deleted from the system.
Software modification and upgrade: The Company reserves the right to provide users with the modified and upgraded version of the software. Software updates will generate corresponding data traffic fees, which will be charged by the carrier.
The software does not contain any malicious code aimed at destroying user data and obtaining user privacy information, does not contain any functional code for monitoring and monitoring users, will not collect user personal files, documents and other information, will not disclose user privacy.
Users shall use the software in compliance with the law and this Agreement. The user has no right to perform the following actions, including but not limited to:
(1) Deliberately avoiding or destroying the copyright Technical measures taken to protect the copyright of the software.
(2) Using the software to mislead and deceive others.
(3) Delete, modify, add or interfere with the functions of the computer information system in violation of state regulations, causing the computer information system to fail to operate normally.
(4) Enter the computer information network or use the computer information network resources without permission.
(5) Delete, modify or add functions of computer information network without permission.
(6) Delete, modify or add data and applications stored, processed or transmitted in a computer information network without permission.
(7) Damage the normal operation of the software system or website, deliberately spread computer viruses and other destructive programs.
(8) Any other behavior that endangers the security of computer information network, etc.
For the Software products downloaded from sites other than our designated sites and obtained from media other than our distribution, the Company cannot guarantee that the software is not infected with computer viruses, hidden Trojan horses or hacker software in disguise, the use of such software may lead to unpredictable risks, It is recommended that users do not download, install, use, the company does not assume any legal liability arising therefrom.
Any pictures or videos (hereinafter referred to as "Content") uploaded or stored through the services provided by the crypto, whether transmitted publicly or privately, are the responsibility of the uploader. Users should be independently responsible for their own actions on the grid.
Any content uploaded or stored by the user using the secret box shall comply with the relevant provisions of the current national laws and regulations, and shall not contain the following contents:
(1) violating the basic principles defined in the Constitution; It contains other contents prohibited by laws or administrative regulations.
(2) endangering national security, revealing state secrets, subverting state power or destroying national unity.
(3) Those that harm the honor and interests of the State or attack the Party, the government and its leaders.
(4) inciting ethnic hatred, ethnic discrimination and destroying national unity.
(5) sabotages national religious policies and promotes cult and feudal superstition.
(6) violating the traditional virtues of the Chinese nation, social morality, ethics, and socialist spiritual civilization.
(7) Speech or news that promotes racial discrimination and damages national, ethnic and regional unity.
(8) Contents that infringe the copyright of a third party.
(9) Other contents prohibited by laws, administrative regulations or state provisions.
Privacy protection.
(1) The use of the secret box product requires the user to log in and submit the relevant information of the account. This information will only be used to verify service usage and will not be used for any other purpose.
(2) The data stored by the company are processed in blocks and stored in encryption, which technically ensures the confidentiality of the data.
(3) Encryption function: With this function, the company will not collect any information about users.
Third party material.
(1) You may have access to materials operated by a third party as part of a iScan asset. You agree that such materials cannot be policed by UnAGI and that you access them at your own risk.
(2) You acknowledge that all information, data, text, software, music, sound, photographs, graphics, videos, messages, tags and/or other materials accessed through the iScan Asset, whether publicly posted or privately disseminated, are the sole responsibility of the party generating such content. This means that you are fully responsible for all content that you import, upload, publish, email, transmit, or otherwise make available.
Service subscription fee.
(1) The subscription fee for secret member is charged on a monthly or yearly basis depending on the scheme. If required, we also offer a one-time payment service in addition to the existing subscription plan.
(2) The subscription payment will be charged to the iTunes account when the purchase is confirmed.
(3) The subscription will be automatically renewed unless the automatic renewal is turned off at least 24 hours before the end of the period, the account will be charged for the renewal within 24 hours before the end of the period, and the renewal fee will be determined. The user can manage the subscription and can turn off the automatic renewal in the itunes account Settings after purchase.
App Stores .
(1) You acknowledge and agree that the availability of the Application and the Services is dependent on the third party from whom you received the Application license, e.g., the Apple iPhone or Android app stores (“App Store”).
(2) You acknowledge and agree that the Terms are between you and iScan only, and not with the App Store.
(3) In order to use the Application, you must have access to a wireless network, and you agree to pay all fees associated with such access. You also agree to pay all fees (if any) charged by the App Store in connection with the Cuntu Properties, including the Application. You agree to comply with, and your license to use the Application is conditioned upon your compliance with, all applicable third- party terms of agreement (e.g., the App Store’s terms and policies) when using the Cuntu Properties, including the Application. You acknowledge that the App Store (and its subsidiaries) are third-party beneficiaries of the Terms and will have the right to enforce them.
This Agreement is governed by the laws of the People's Republic of China.
Any dispute arising out of or in connection with this Agreement shall be settled by the parties through friendly negotiation. If no agreement can be reached through negotiation, either party may submit the relevant dispute to the court of the defendant's domicile for settlement.
If any provision of this Agreement is invalid or unenforceable, in whole or in part, for any reason whatsoever, or violates any applicable law, such provision shall be deemed deleted, but the remaining provisions of this Agreement shall remain valid and binding.
The Company has the right to interpret and modify this Agreement within the scope of legal provisions.
If you have any comments or suggestions on the secret and this privacy policy, please contact us at any time.
Feedback Email: zerozhou10086@gmail.com
In order to ensure our efficient handling of your problems and timely feedback to you, you need to submit proof of identity, effective contact information, written request and relevant evidence, we will verify your identity and process your request.