Home Help Explore
${searchName} Repositories
${searchName} Users
${searchName} Organizations
English
English 简体中文
Sign In

用户协议

  • 用户(即注册、登录、使用本服务的个人或组织),在使用技术开发方(阿吉特云计算有限公司(澳门)及其相关服务可能存在的运营关联单位,以下统称“技术开发方”)提供的各项服务之前,应仔细阅读本《用户协议》(以下简称“本协议”)。用户一旦登录或使用技术开发方的服务,即视为用户已了解并明示同意本协议各项内容,本协议立即在用户与本技术开发方之间产生法律效力。用户登录、使用本产品服务的全部活动将受到本协议的约束并承担相应的责任和义务。如用户不同意本协议任何内容的,请用户立即停止使用技术开发方所提供的全部服务。
  • 根据中华人民共和国澳门特别行政区法律的规定,同时依据技术开发方与其合作伙伴之间的相关协议,用户必须已明示授权技术开发方合作伙伴(以下简称“合作伙伴”)、在此明示授权并委托技术开发方及其关联公司通过官方或相关实名认证平台、信用信息平台及其它相关平台查询、验证、存储用户的个人信用信息,并输出给合作伙伴对用户的个人信用进行评估与参考使用。用户理解并同意,具体的授权查询、验证、存储及输出的内容以合作伙伴要求查询、验证、存储、输出以及技术开发方及其关联公司实际查询、验证、存储、输出的信息为准。技术开发方及其关联公司会在授权范围内对相关个人信息予以处理(包括但不限于为保护用户个人信息而加密处理、掩码处理等一切为实现相关协议目的而进行的所有必要处理)并仅提供给合作伙伴使用,但用户与合作伙伴之间因授权的有效性、授权内容、授权范围、授权期限等发生的争议纠纷与技术开发方无关。如用户对合作伙伴的上述授权事项有任何异议或争议的,应立即停止使用技术开发方所提供的全部服务。
  • 用户使用本服务的,即表明用户已明示对合作伙伴、技术开发方及其关联公司授权查询、验证、处理、存储、在约定范围内使用其个人信息,并对授权的效力、查询验证的内容、查询验证平台、处理方式、使用范围等相关事项无任何事实或法律上的异议或争议。
  • 鉴于用户须授权合作伙伴并由该合作伙伴告知本服务后方能进入、登录并使用本服务,用户登录或使用本服务时起即视为用户与技术开发方的合作伙伴之间已存在合法的、充分的、必要的、不可撤销的授权,且用户已清楚知晓其授权提供相关信息可能对其造成的相关不利影响,如负面的信用评价等。
  • 为保护用户个人信息,技术开发方会采取合理措施对用户信息进行严格保密,同时督促并要求该特定合作伙伴进行严格保密。未经用户授权,技术开发方及其关联公司不会将用户信息提供给任何其他方。
  • 如用户有违反本协议的任何行为时,技术开发方有权依合理判断,不经通知随时单方限制、中止或终止向用户提供本服务,并有权追究用户的相关责任。
一、 协议主体
  • 本协议是用户与技术开发方关于用户使用本服务所订立的协议。
二、 关于本服务
  • 本服务内容是指技术开发方通过本服务向其合作伙伴及用户提供的相关服务(简称“本服务”)。
  • 对用户使用的本服务,技术开发方会不断丰富用户使用本服务的终端、形式等。
  • 许可的范围:
  • 1.技术开发方授予用户一项个人的、不可转让及非排他性的许可,以使用本服务;
  • 2.本条及本协议其他条款未明示授权的其他一切知识产权权利仍由技术开发方保留。技术开发方如果未行使前述任何权利,并不构成对该权利的放弃。
三、 账号登录
  • 为使用本服务用户可能需要输入个人信息进行登录与使用。用户清楚知晓,其向技术开发方提供的账户仅限本人使用,否则,用户可能会对用户或他人造成侵权。用户承诺并同意,使用同一设备、同一身份证号或账号使用本协议项下服务的,均视为用户本人的行为。
  • 用户应妥善保管自身设备、身份证件及账号密码信息,审慎交由他人使用或使用他人设备、身份证件或账户信息,如用户违反本约定给用户或他人造成损失的,技术开发方不应也不会承担任何法律责任。用户若因此给技术开发方造成损失的,应承担技术开发方所遭受的全部损失。
  • 用户应当如实填写和提交帐号注册与认证资料,完成信息登记,并对资料的真实性、合法性、准确性和有效性承担责任。技术开发方依据用户填写和提交的帐号资料,在法律允许的范围内向第三方展示用户的注册信息。如用户提供服务或内容需要取得相关法律法规规定的许可、进行备案或取得相关合法资质的,用户应当在帐号注册与认证时进行明确说明并提交相应的许可、备案或资质证明。否则,技术开发方有权拒绝或终止提供本服务,并依照本协议对违规帐号进行处罚。因此给技术开发方或第三方造成损害的,用户应当依法予以赔偿。
  • 用户理解并同意:
  • 1.用户用以参与本服务的帐号由用户独立使用、维护、运营并独立承担全部责任。
  • 2.技术开发方自主开发并独立享有本服务技术接口的知识产权等合法权益,用户仅在本服务范围内进行使用;
  • 3.因用户的原因导致的任何纠纷、责任等,以及用户或用户的帐号违反相关法律法规或本协议约定引发的任何后果,均由用户独立承担责任、赔偿损失,与技术开发方无关。如侵害到技术开发方或他人权益的,用户须自行承担全部责任和赔偿一切损失。
四、 应用程序或服务的使用
  • 如果用户从非技术开发方合作伙伴的应用程序或服务或非技术开发方合作伙伴处获取本服务或与本服务名称相同的安装程序,技术开发方无法保证该应用程序或服务能够正常使用,并对因此给用户造成的损失不予负责。
五、 应用程序或服务的更新
  • 为了增进用户体验、完善服务内容,技术开发方将不断努力为用户时时提供应用程序或服务更新(这些更新可能会采取应用程序或服务替换、修改、功能强化、版本升级等形式)。
  • 为了改善用户体验,并保证服务的安全性和功能的一致性,技术开发方有权不经向用户特别通知而对应用程序或服务进行更新,或者对应用程序或服务的部分功能效果进行改变或限制。
六、 用户个人信息保护
  • 保护用户个人信息是技术开发方的一项基本原则,技术开发方将会采取合理的措施保护用户的个人信息。除法律法规规定及用户授权的情形外,未经用户许可技术开发方不会向任何第三方公开、透露用户个人信息。
  • 用户在登录账号或使用本服务的过程中,可能需要填写一些必要的信息。若用户填写的信息不真实或不完整,则可能无法正常使用本服务。
  • 一般情况下,用户可随时浏览、修改自己提交的信息,但出于安全性和身份识别的考虑,用户可能无法修改注册时提供的初始注册信息及其他验证信息。
  • 技术开发方将运用各种安全技术和程序建立完善的管理制度来保护用户的个人信息,以免遭受未经授权的访问、使用或披露。
七、 授权事项及行为规范
  • 授权事项:
  • 1.用户充分理解并同意:用户在使用本服务时,可能需要使用用户终端设备的相关权限、接口及相关设备信息等才能实现相应的功能;
  • 2.用户可以选择不向技术开发方提供用户的某些信息,但因此可能会导致相关服务功能无法实现;
  • 3.为实现本协议目的为合作伙伴及用户提供更加优质、安全的服务,用户同意并明示授权技术开发方及其关联公司对用户的相关个人信息进行查询、验证、存储、处理并在约定范围内使用(提供给用户已授权的合作伙伴对用户进行信用评估及参考使用)。技术开发方及其关联公司对用户的个人信息进行严格保密。本协议项下的授权为不可撤销的授权;
  • 4.用户知晓并明示授权同意技术开发方及其关联公司依据相关法律法规的规定,受合作伙伴委托向第三方征信机构或数据机构等合法查询、验证、审核用户信息,上述信息包括但不限于个人基本信息、特征信息(包括但不限于用户的法院失信信息、网络失信信息、是否曾使用通讯小号及可疑设备信息等)、关联信息(即用户的身份证信息、手机号、手机设备及银行卡之间的关联关系,以判断用户信息是否有异常,该关联关系不涉及具体的个人敏感信息)、公用事业信息、央行征信报告、个人网络数据信息等合作伙伴需要验证或参考使用的相关用户信息。技术开发方具体查询、验证及审核的信息最终以合作伙伴需要验证、需要参考使用及实际验证与使用的信息为准;
  • 技术开发方对所获取的信息,仅在用户与合作伙伴之间有关个人信用信息评估等合作伙伴业务相关工作中使用。技术开发方及其关联公司将对所获取的信息向该合作伙伴进行提供,除此之外,未经用户授权,技术开发方及其关联公司不得也不会向其他机构或个人泄露、披露或提供用户的信息。
  • 用户禁止行为除非法律允许或技术开发方书面许可,用户不得从事下列行为:
  • 1.删除本服务及其副本上关于著作权的信息。
  • 2.对本服务进行反向工程、反向汇编、反向编译,或者以其他方式尝试发现本服务的源代码。
  • 3.对技术开发方拥有知识产权的内容进行使用、出租、出借、复制、修改、链接、转载、汇编、发表、出版等。
  • 4.通过修改或伪造应用程序或服务运行中的指令、数据,增加、删减、变动应用程序或服务的功能或运行效果,或者将用于上述用途的应用程序或服务、方法进行运营或向公众传播,无论这些行为是否为商业目的。
  • 5.自行、授权他人或利用第三方应用程序或服务对本服务及其组件、模块、数据等进行干扰。
  • 6.发布含有软件病毒、蠕虫病毒或其他有害代码的内容。
  • 7.未经本公司明确同意,暗示或声明您隶属本公司或受本公司认可,例如: 声称自己是本公司认证的工程师。
  • 8.发布、传送、传播、储存违反国家法律法规禁止的内容;
  • 9.其他未经技术开发方明示授权的行为。
  • 用户充分了解并同意对自己行为负责,用户必须为自己对合作伙伴的授权(包括但不限于授权方式、授权内容及授权期限等)以及其账户下的相关行为负责。技术开发方会督促合作伙伴获取用户的授权后方能对相关信息进行查询、验证或使用并要求合作伙伴对用户的信息进行严格保密,但用户应对使用本服务时接触到的内容自行加以判断,如对授权相关事项及信息安全有任何异议或争议的,应立即停止使用本服务。
  • 技术开发方无法且不会对用户与合作伙伴之间的任何争议或纠纷而承担责任,用户未按约定要求立即停止使用本服务的,技术开发方对非因技术开发方的原因而产生的任何风险或损失将不承担任何责任。
八、 知识产权声明
  • 技术开发方是本服务的知识产权权利人。本服务的著作权、商标权、专利权、商业秘密等知识产权,以及与本服务相关的所有信息内容(包括但不限于文字、图片、音频、视频、图表、界面设计、版面框架、有关数据或电子文档等)均受中华人民共和国澳门特别行政区法律的规定和相应的国际条约保护,技术开发方依法享有上述相关知识产权,但相关权利人依照法律规定应享有的权利除外。
  • 未经技术开发方或相关权利人书面同意,用户不得为任何商业或非商业目的自行或许可任何第三方实施、利用、转让上述知识产权。
九、 终端安全责任
  • 用户理解并同意,本服务同大多数互联网应用程序、服务一样,可能会受多种因素影响(包括但不限于用户原因、网络服务质量、社会环境等);也可能会受各种安全问题的侵扰(包括但不限于他人非法利用用户资料,进行现实中的骚扰;用户下载安装的其他应用程序或服务或访问的其他网站中可能含有病毒、木马程序或其他恶意程序,威胁用户终端的信息和数据的安全,继而影响本服务的正常使用等)。因此,用户应加强信息安全及个人信息的保护意识,注意密码保护,以免遭受损失。出现上述情况时技术开发方将努力在第一时间与相关方配合,及时进行修复,但是由此给用户造成的损失技术开发方在法律允许的范围内免责。
  • 用户不得制作、发布、使用、传播用于窃取技术开发方账号及他人个人信息、财产的恶意程序。
  • 维护应用程序或服务安全与正常使用是技术开发方和用户的共同责任,技术开发方将按照行业标准合理审慎地采取必要技术措施保护用户的终端信息和数据安全。
  • 在法律允许的范围内,技术开发方对以下情形导致的服务中断或受阻不承担责任:
  • 1.受到计算机病毒、木马或其他恶意程序、黑客攻击的破坏;
  • 2.用户或技术开发方的电脑软件、系统、硬件和通信线路出现故障;
  • 3.用户操作不当;
  • 4.用户通过非技术开发方授权的方式使用本服务。
十、 不可抗力及合理免责
  • “不可抗力”是指在本协议签订后发生的、受影响一方无法预见、无法避免并无法克服的客观情况。此等事件包括但不限于水灾、火灾、旱灾、台风、地震及其它自然灾害、罢工、骚动、暴乱及战争以及政府部门的作为或不作为、法律法规或政策调整、数据来源变更(包括但不限于其服务内容及形式的变更)、国内数据渠道瘫痪、黑客攻击、计算机病毒侵入、新型病毒爆发、因电信运营商问题导致网络中断服务器不可访问、停电、系统故障、传输线路、通信故障等技术开发方无法控制的因素。因受不可抗力影响而不能履行或不能完全履行本协议的不视为违约,不应承担相应违约责任。
十一、 其他
  • 用户使用本服务即视为用户已阅读并同意受本协议的约束。技术开发方有权在必要时修改本协议条款。用户可以在本服务的最新版本中查阅相关协议条款。本协议条款变更后,如果用户继续登录、使用本服务,即视为用户已接受修改后的协议。如果用户不接受修改后的协议,应当停止使用本服务。
  • 本协议的成立、生效、履行、解释及纠纷解决,适用中华人民共和国澳门特别行政区法律。
  • 若用户和技术开发方之间发生任何纠纷或争议,首先应友好协商解决;协商不成的,用户同意将纠纷或争议提交澳门法院管辖。
  • 本协议所有条款的标题仅为阅读方便,本身并无实际涵义,不能作为本协议涵义解释的依据。
  • 本协议条款无论因何种原因部分无效或不可执行,其余条款仍有效,对双方具有约束力。
十二、 如何联系我们
  • 如需咨询常见问题,您可在线联系我们。

User Agreement

  • Before using the services provided by the technology developer (Agit Cloud Computing Limited, Macao, and the related operational units of its related services that may exist, hereinafter collectively referred to as "the technology developer”), the users (i.e., the individual or organization that registers, logs in or uses the service) shall read this User Agreement (hereinafter referred to as "the agreement”) carefully. It is deemed that the user has understood and explicitly agreed to the contents of this agreement as soon as they log in or start to use the services provided by the technology developer, and this agreement immediately takes legal effect between the user and the technology developer. All activities after the user logs in and starts to user the service of this product shall be bound by this agreement and they shall bear corresponding responsibilities and obligations. For any user does not agree with any of the content in this agreement, please stop using any of the services that provided by the technology developer immediately.
  • According to the law of the Macao Special Administrative Region of the People's Republic of China, as well as the related agreements between the technology developer and its cooperative partners, the user must have explicitly authorized the technology developer’s cooperative partner (hereinafter referred to as "the partner"), as well as to authorize and entrust the technology developer and its affiliated companies to query, verify and store the user’s personal information through the official or related real-name authenticated platform, credit information platform and other related platforms, and to output those information to partners as the evaluation and reference of user’s individual credit.
  • The user understands and agrees that the specific content of the authorized query, verification, storage, and output shall be subject to such information demanded by the partner, as well as the technology developer and its affiliates. The technology developer and its affiliates will process (Including but not limited to the encryption or mask processing for protecting the user's personal information, as well as all necessary processing for realizing the target of related agreements) the related personal information within the authorized scale and provide to the partner to use. However, the user’s disputes with the partner regards the effectiveness, content, scale and period, etc. of authorization are irrelevant to the technology developer. If the user has any objections or disputes regards the above authorization matters with the partner, they should immediately stop using all the services provided by the technology developer.
  • If the user starts to use this service, it indicates they have explicitly expressed that they have no factual or legal objections or disputes regarding the inquiry, verification, processing, storage, and use of their personal information by the partner, technology developer and its affiliates within the agreed scope, as well as other related matters such as the validity of authorization, content of verification query, the verification query platform, processing method, scope of use, etc.
  • Taking the fact that the user must authorize the partner and be informed of this service by the partner before they can enter, log in and use the service, an legal, sufficient, necessary, irrevocable authorization is considering existing between the user and the technology developer as soon as they log in or use this service. The user has also been clearly aware of the adverse effect, such as the negative credit evaluation, etc., might be caused by the relevant information they authorized.
  • In order to protect the user's personal information, the technology developer will take reasonable measures to remain the user's information strictly confidential. At the same time, the company will also urge and demand their specific partner to remain such information strictly confidential. Without the user’s prior authorization, the technology developer and its affiliates will not provide the user’s information to any other party.
  • If the user violated any behaviors specified in this agreement, based on reasonable judgement, the technology developer has the right to unilaterally restrict, suspend or terminate providing this service to such user at any time without prior notice, and remains the right to ascertain the relevant responsibilities of the user.
I.Agreement Subject
  • This agreement is an agreement between the user and the technology developer upon the user’s use of this service.
II.About this Service
  • The content of this service refers to the related services provided by technology developer to its partners and users through this service (hereinafter referred to as "this service")
  • For this service used by the user, the technology developer will continue to enrich the terminals, forms, etc. of the user’s use of this service.
  • Scope of permission:
    1. The technology developer grants the user a personal, non-transferable and non-exclusive permission to use this service.
    2. All other intellectual property rights that are not explicitly authorized in this article and other articles of this agreement are still reserved by the technology developer. The technology developer’s failure in exercising any of the aforementioned rights does not constitute a waiver of such rights.
III.Account Login
  • In order to use this service, the user may have to input their personal information for login and use. The user is clear aware of that the account provided to the technology developer is only for the use of the user him/herself. Otherwise the user might constitute a violation of rights of other users and parties. The user promises and agrees that using the same device, the same ID number or account number to use this service under this agreement will all be deemed as the user's own behavior.
  • The user shall keep their own device, identity documents and account information properly, they shall also be careful to provide the device, identity documents and account information to others, so as to use such materials of others. The technology developer shall not and will not bear any legal responsibility if the user violates this agreement and causes losses to others. If the user causes losses to the technology developer, such losses suffered by the technology developer shall all be wholly bear by the user.
  • The user shall fill in and submit the materials for account registration and authentication truthfully for completing the information registration. The user shall take responsibility for the authenticity, legality, accuracy, and validity of such materials. Based on the account information filled and submitted by the user, the technology developer will display the user’s registration information to third parties within the scope permitted by the law. If the service or content provided by the user shall acquire permits, filings or related legal qualifications according to relevant laws and regulations, the user shall declare and submit the corresponding permit, filings and qualifications when registering and verifying the account. Otherwise, the technology developer has the right to refuse or stop providing this service, and conduct penalties to the illegal accounts according to this agreement. If caused related damages to the technology developer and the third party, the user shall make compensation according to the law.
    1. The user understands and agrees that:
    2. The account used by the user for participating this service shall be solely used, maintained, operated by such user, and they shall bear the whole responsibility;
    3. The technology developer develops independently and solely possesses the legal rights such as the intellectual property rights of this service technology interface, etc. The user only uses within the scope of this service;
    4. For any disputes, responsibilities, etc. caused by the user, as well as any consequences caused by the user or the user's violation of the relevant laws and regulations or this agreement, the user shall solely bear the responsibility and compensate for the loss, which is irrelevant to the technology developer. If the rights of the technology developer or others are infringed, the user shall bear all responsibilities and compensate all losses.
IV.Use of Application or Service
  • If a user obtains this service or an installer with the same name as this service from places other than the technical developer partner or the technical developer’s partner, the technical developer cannot ensure that the application or service can be used normally, and bears no responsibility for the user’s possible losses caused by that reason.
V.Update of Application or Service
  • In order to enhance the user’s experience, perfect the service content, the technology developer will continue to put efforts in providing updates of applications or services to the user (such update may include the forms of the substitution of application or service, modification, function enhancement, version update, etc.).
  • In order to improve the user’s experience, and to maintain the consistency of the safety and functions of the service, the technology developer has the right to update the application or service, modify or limit partial functions of the application or service, without giving specific notice to the user.
VI. Protection on the User’s Personal Information
  • Protecting the user's personal information is a basic principle the upheld by the technology developer. The technology developer will take reasonable measures to protect the user's personal information. Other than the circumstances with the authorization of laws and regulations and the user, the technology developer will not publish or disclose the user’s personal information to any third party without the user’s prior permission.
  • The user may have to fill some necessary when logging in or during the use of this service. If such information is not truthful or complete, this service may not be used normally.
  • Generally, the user can browse, modify their submitted information in anytime, however, considering the safety and identity verification, the user may not modify the initial registration information and other verification information provided in registration.
  • The technology developer will protect the user’s personal information from unauthorized access, usage and disclosure through establishing a thorough scheme consists of various safety technologies and programs.
VII.Scope of Authorization and Code of Conduct
  • Scope of Authorization:
    1. The user fully understands and agrees that when using this service, the related permissions, interfaces and device information of the user’s terminal may be demanded for realizing the corresponding functions.
    2. The user can choose not to provide certain information to the technology developer, which may lead to the failure in realizing some functions of this service.
    3. In order to achieve the purpose of this agreement and to provide partners and users with better and safer services, the user agrees and explicitly authorizes the technology developer and its affiliates to inquire, verify, store, process and handle the user's personal information within the agreed scope of use (provide to the partner that authorized by the user for credit evaluation on the user and other reference usage). The technology developer and its affiliates will keep the user's personal information strictly confidential. The authorization under this agreement is irrevocable authorization.
    4. The user is aware of and explicitly authorizes the technology developer and its affiliates to let the third-party credit information agencies or data agencies to query, verify, and review the user’s information that entrusted by the partner in accordance with relevant laws and regulations. The aforementioned information includes but not limited to the basic personal information, feature information (including but not limited to user's untrustworthy information from the court, the untrustworthy information on the Internet, whether the user has used the communication trumpet and suspicious equipment, etc.), associated information (i.e., the associated relationship between the user's ID information, phone number, mobile device and bank card, which are used to determine whether the user information is abnormal, such associated relationship does not involve sensitive information of a specific individual), public utility information, personal network data and other relevant user information that the partner needs to verify or refer to. The specific inquiries, verification and reviewing information of the technology developer is ultimately based on such information that demanded or actual used by the partner.
    5. The information obtained by the technology developer shall only be used in the partner’s duty that related to personal credit evaluation etc. among the user and partner. The technology developer and its affiliates shall provide such obtained information to that partner. Otherwise, without the prior permission by the user, the technology developer and its affiliates shall not and will not leak, disclose or provide the user’s information to other institutions and individuals.
  • Users Prohibited Actions
  • Other than legally allowed or with the written permission by the technology developer, the user is prohibited from the following actions:
    1. Delete the copyright information on this service and its duplicates;
    2. Conduct reverse engineering, disassembling, decompiling on this service, or try to find the source code of this service through any other means;
    3. Use, rent, duplicate, borrow, copy, modify, link, repost, compile, compose, disclose or publish content of the copyrights that possessed by the technology developer;
    4. Modify or falsify the instructions and data during the operation of the application or service, add, delete or change the function or operation effect of the application or service, or operate and disseminate the applications and services based on the above mentioned usages, whether or not these actions are for commercial purposes;
    5. Interfere this service and its components, modules, data, etc. on its own, by authorizing others, or by using third-party applications or services;
    6. Launch content that contains software viruses, worm virus, or other harmful code;
    7. Imply or declare that you are affiliated with the company or recognized by the company without explicit permission of the company. For example: declare that you are a verified engineer in the company;
    8. Publish, deliver, disseminate, store the content that violates the national laws and regulations;
    9. Other acts that not explicitly authorized by the technology developer.
  • The user fully understands and agrees to take responsibilities of their own acts, the users shall take responsibilities of their authorizations to the cooperative partners (including but not limited to the method, content and period of authorization, etc.) and the relevant acts under their account. The technology developer will urge the partner to keep the user's information strictly confidential after obtained the user's authorization for inquiring, verifying or using their relevant information. However, the user shall make their own judgments on the content that could be contacted by this service. If you there are any objections or disputes about authorization-related matters and information security, the user shall stop using this service immediately.
  • The technology developer cannot and will not take any responsibility for any disputes among the user and the partner. For those users who failed to stop using this service immediately, the technology developer takes no responsibility for any risks and losses caused by the reasons that are irrelevant with the technology developer.
VIII.Declaration of Copyrights
  • The technology developer is the owner of the intellectual property right of this service. The intellectual property rights of this service, such as the copyrights, trademarks, patents, trade secret, etc., as well as all content related to this service (including but not limited to text, pictures, audio, video, graphics, interface design, layout framework, related data or electronic documents, etc.) are protected by the laws and regulations of the Macao Special Administrative Region of the People's Republic of China and corresponding international treaties. The technology developer holds the above-mentioned relevant intellectual property rights according to law, except for the relevant rights that shall be held by relevant right holders in accordance with the law.
  • Without the written permission of the technology developer and the relevant right holders, the user shall not, for any commercial or non-commercial purpose, permit or permit any third party to implement, utilize, or transfer the above intellectual property rights.
IX.Terminal Safety Responsibility
  • The user understands and agrees that this service is just like many of other applications and services on the internet, that it could be influenced by multiple factors (including but not limited to factors of user, the network service quality, social environment, etc.); as well as the interference of many safety issues (including but not limited to the illegal use of user’s data for physical harassment; viruses, Trojan horse programs or other malicious programs that may be contained in other applications or services downloaded or installed by the user or other websites they visited, which could threaten the information and data safety of the user’s terminal, and thereby further affecting the normal use of this service, etc.). Therefore, the user shall reinforce the awareness of information safety and the protection of personal information, pay attention to password protection to avoid losses. When the above situation occurs, the technology developer will try their best to cooperate with the relevant parties as soon as possible to repair it in time, but for the loss caused to the user, the technology developer’s responsibility is exempted within the allowed scope of law.
  • The user shall not produce, publish, use, disseminate malicious programs that used to steal technology developer’s account and other people's personal information and property.
  • Maintaining the safety and normal use of applications or services is the joint responsibility of the technology developer and the user. The technology developers will take necessary technical measures to protect the information and data safety of the user’s terminal in a reasonable and prudent manner in accordance with industry standards.
  • Within the allowed scope of law, the technology developer bears no responsibility for service interruption or obstruction caused by:
    1. Damaged by computer viruses, Trojan horses or other malicious programs or hacker attacks.
    2. Malfunctions of the computer software, system, hardware and link of the technology developer and the user.
    3. The user’s improper operation.
    4. The user’s using of this service through the means that unauthorized by the technology developer.
    5. Other situations that the technology developer cannot control or foresee.
X.Force Majeure and Reasonable Exemption
  • "Force majeure" refers to an objective incident that occurs after the signing of this agreement and cannot be foreseen, nor to be avoid or overcame by the affected party. Such incidents include but not limited to floods, fires, droughts, typhoons, earthquakes and other natural disasters, strikes, riots, wars, acts or omissions of government departments, adjustments to laws, regulations or policies, and changes to data sources (including but not limited to the alternation of the service content and form), domestic data paralysis, hacker attacks, intrusion of computer virus, outbreak of new virus, server inaccessibility caused by network interruptions due to telecommunications operator problems, power outages, system failures, transmission lines, communication failures and other technical factors that cannot be controlled by the technology developer. Failure in fulfilling or partially fulling this agreement due to the influence of force majeure shall not be consideration as breach of agreement, the relevant parties shall not be liable for corresponding breach of agreement.
XI.Others
  • The user's use of this service is deemed that the user has read and agreed to be bound by this agreement. The technology developer has the right to modify the terms of this agreement when necessary, and the user can check the relevant agreement terms in the latest version of this service. After the terms of this agreement are modified, the user’s continous logging in and use of this service shall be deemed that the user has accepted the modified agreement. If users do not accept the modified agreement, they should stop using this service.
  • The establishment, taking effect, fulfillment, interpretation and dispute resolution of this agreement shall apply to the laws of the Macao Special Administrative Region of the People's Republic of China.
  • If any dispute or argument occurs between the user and the technology developer, it should be resolved through friendly negotiation firstly; if the negotiation fails, the user agrees to submit the dispute or argument to the jurisdiction of the Macao Court.
  • The headings of all the terms of this agreement are for the convenience of reading, all of which have no actual meaning, and cannot be used as the basis for interpreting the meaning of this agreement.
  • If the provisions of this agreement become invalid or cannot be executable for no matter what reasons, the other provisions remain valid and binding both parties.
XII.How to Contact Us
  • If you need to consult common problems, please reach us online.
© 2023 Agit Cloud Computing, Ltd.
Terms of Service Privacy Statement Open Source Help