Before using the services provided by the technology developer (Agit Cloud Computing Limited, Macao, and the related operational units of its related services that may exist, hereinafter collectively referred to as "the technology developer”), the users (i.e., the individual or organization that registers, logs in or uses the service) shall read this User Agreement (hereinafter referred to as "the agreement”) carefully. It is deemed that the user has understood and explicitly agreed to the contents of this agreement as soon as they log in or start to use the services provided by the technology developer, and this agreement immediately takes legal effect between the user and the technology developer. All activities after the user logs in and starts to user the service of this product shall be bound by this agreement and they shall bear corresponding responsibilities and obligations. For any user does not agree with any of the content in this agreement, please stop using any of the services that provided by the technology developer immediately.
According to the law of the Macao Special Administrative Region of the People's Republic of China, as well as the related agreements between the technology developer and its cooperative partners, the user must have explicitly authorized the technology developer’s cooperative partner (hereinafter referred to as "the partner"), as well as to authorize and entrust the technology developer and its affiliated companies to query, verify and store the user’s personal information through the official or related real-name authenticated platform, credit information platform and other related platforms, and to output those information to partners as the evaluation and reference of user’s individual credit.
The user understands and agrees that the specific content of the authorized query, verification, storage, and output shall be subject to such information demanded by the partner, as well as the technology developer and its affiliates. The technology developer and its affiliates will process (Including but not limited to the encryption or mask processing for protecting the user's personal information, as well as all necessary processing for realizing the target of related agreements) the related personal information within the authorized scale and provide to the partner to use. However, the user’s disputes with the partner regards the effectiveness, content, scale and period, etc. of authorization are irrelevant to the technology developer. If the user has any objections or disputes regards the above authorization matters with the partner, they should immediately stop using all the services provided by the technology developer.
If the user starts to use this service, it indicates they have explicitly expressed that they have no factual or legal objections or disputes regarding the inquiry, verification, processing, storage, and use of their personal information by the partner, technology developer and its affiliates within the agreed scope, as well as other related matters such as the validity of authorization, content of verification query, the verification query platform, processing method, scope of use, etc.
Taking the fact that the user must authorize the partner and be informed of this service by the partner before they can enter, log in and use the service, an legal, sufficient, necessary, irrevocable authorization is considering existing between the user and the technology developer as soon as they log in or use this service. The user has also been clearly aware of the adverse effect, such as the negative credit evaluation, etc., might be caused by the relevant information they authorized.
In order to protect the user's personal information, the technology developer will take reasonable measures to remain the user's information strictly confidential. At the same time, the company will also urge and demand their specific partner to remain such information strictly confidential. Without the user’s prior authorization, the technology developer and its affiliates will not provide the user’s information to any other party.
If the user violated any behaviors specified in this agreement, based on reasonable judgement, the technology developer has the right to unilaterally restrict, suspend or terminate providing this service to such user at any time without prior notice, and remains the right to ascertain the relevant responsibilities of the user.
I.Agreement Subject
This agreement is an agreement between the user and the technology developer upon the user’s use of this service.
II.About this Service
The content of this service refers to the related services provided by technology developer to its partners and users through this service (hereinafter referred to as "this service")
For this service used by the user, the technology developer will continue to enrich the terminals, forms, etc. of the user’s use of this service.
Scope of permission:
The technology developer grants the user a personal, non-transferable and non-exclusive permission to use this service.
All other intellectual property rights that are not explicitly authorized in this article and other articles of this agreement are still reserved by the technology developer. The technology developer’s failure in exercising any of the aforementioned rights does not constitute a waiver of such rights.
III.Account Login
In order to use this service, the user may have to input their personal information for login and use. The user is clear aware of that the account provided to the technology developer is only for the use of the user him/herself. Otherwise the user might constitute a violation of rights of other users and parties. The user promises and agrees that using the same device, the same ID number or account number to use this service under this agreement will all be deemed as the user's own behavior.
The user shall keep their own device, identity documents and account information properly, they shall also be careful to provide the device, identity documents and account information to others, so as to use such materials of others. The technology developer shall not and will not bear any legal responsibility if the user violates this agreement and causes losses to others. If the user causes losses to the technology developer, such losses suffered by the technology developer shall all be wholly bear by the user.
The user shall fill in and submit the materials for account registration and authentication truthfully for completing the information registration. The user shall take responsibility for the authenticity, legality, accuracy, and validity of such materials. Based on the account information filled and submitted by the user, the technology developer will display the user’s registration information to third parties within the scope permitted by the law. If the service or content provided by the user shall acquire permits, filings or related legal qualifications according to relevant laws and regulations, the user shall declare and submit the corresponding permit, filings and qualifications when registering and verifying the account. Otherwise, the technology developer has the right to refuse or stop providing this service, and conduct penalties to the illegal accounts according to this agreement. If caused related damages to the technology developer and the third party, the user shall make compensation according to the law.
The user understands and agrees that:
The account used by the user for participating this service shall be solely used, maintained, operated by such user, and they shall bear the whole responsibility;
The technology developer develops independently and solely possesses the legal rights such as the intellectual property rights of this service technology interface, etc. The user only uses within the scope of this service;
For any disputes, responsibilities, etc. caused by the user, as well as any consequences caused by the user or the user's violation of the relevant laws and regulations or this agreement, the user shall solely bear the responsibility and compensate for the loss, which is irrelevant to the technology developer. If the rights of the technology developer or others are infringed, the user shall bear all responsibilities and compensate all losses.
IV.Use of Application or Service
If a user obtains this service or an installer with the same name as this service from places other than the technical developer partner or the technical developer’s partner, the technical developer cannot ensure that the application or service can be used normally, and bears no responsibility for the user’s possible losses caused by that reason.
V.Update of Application or Service
In order to enhance the user’s experience, perfect the service content, the technology developer will continue to put efforts in providing updates of applications or services to the user (such update may include the forms of the substitution of application or service, modification, function enhancement, version update, etc.).
In order to improve the user’s experience, and to maintain the consistency of the safety and functions of the service, the technology developer has the right to update the application or service, modify or limit partial functions of the application or service, without giving specific notice to the user.
VI. Protection on the User’s Personal Information
Protecting the user's personal information is a basic principle the upheld by the technology developer. The technology developer will take reasonable measures to protect the user's personal information. Other than the circumstances with the authorization of laws and regulations and the user, the technology developer will not publish or disclose the user’s personal information to any third party without the user’s prior permission.
The user may have to fill some necessary when logging in or during the use of this service. If such information is not truthful or complete, this service may not be used normally.
Generally, the user can browse, modify their submitted information in anytime, however, considering the safety and identity verification, the user may not modify the initial registration information and other verification information provided in registration.
The technology developer will protect the user’s personal information from unauthorized access, usage and disclosure through establishing a thorough scheme consists of various safety technologies and programs.
VII.Scope of Authorization and Code of Conduct
Scope of Authorization:
The user fully understands and agrees that when using this service, the related permissions, interfaces and device information of the user’s terminal may be demanded for realizing the corresponding functions.
The user can choose not to provide certain information to the technology developer, which may lead to the failure in realizing some functions of this service.
In order to achieve the purpose of this agreement and to provide partners and users with better and safer services, the user agrees and explicitly authorizes the technology developer and its affiliates to inquire, verify, store, process and handle the user's personal information within the agreed scope of use (provide to the partner that authorized by the user for credit evaluation on the user and other reference usage). The technology developer and its affiliates will keep the user's personal information strictly confidential. The authorization under this agreement is irrevocable authorization.
The user is aware of and explicitly authorizes the technology developer and its affiliates to let the third-party credit information agencies or data agencies to query, verify, and review the user’s information that entrusted by the partner in accordance with relevant laws and regulations. The aforementioned information includes but not limited to the basic personal information, feature information (including but not limited to user's untrustworthy information from the court, the untrustworthy information on the Internet, whether the user has used the communication trumpet and suspicious equipment, etc.), associated information (i.e., the associated relationship between the user's ID information, phone number, mobile device and bank card, which are used to determine whether the user information is abnormal, such associated relationship does not involve sensitive information of a specific individual), public utility information, personal network data and other relevant user information that the partner needs to verify or refer to. The specific inquiries, verification and reviewing information of the technology developer is ultimately based on such information that demanded or actual used by the partner.
The information obtained by the technology developer shall only be used in the partner’s duty that related to personal credit evaluation etc. among the user and partner. The technology developer and its affiliates shall provide such obtained information to that partner. Otherwise, without the prior permission by the user, the technology developer and its affiliates shall not and will not leak, disclose or provide the user’s information to other institutions and individuals.
Users Prohibited Actions
Other than legally allowed or with the written permission by the technology developer, the user is prohibited from the following actions:
Delete the copyright information on this service and its duplicates;
Conduct reverse engineering, disassembling, decompiling on this service, or try to find the source code of this service through any other means;
Use, rent, duplicate, borrow, copy, modify, link, repost, compile, compose, disclose or publish content of the copyrights that possessed by the technology developer;
Modify or falsify the instructions and data during the operation of the application or service, add, delete or change the function or operation effect of the application or service, or operate and disseminate the applications and services based on the above mentioned usages, whether or not these actions are for commercial purposes;
Interfere this service and its components, modules, data, etc. on its own, by authorizing others, or by using third-party applications or services;
Launch content that contains software viruses, worm virus, or other harmful code;
Imply or declare that you are affiliated with the company or recognized by the company without explicit permission of the company. For example: declare that you are a verified engineer in the company;
Publish, deliver, disseminate, store the content that violates the national laws and regulations;
Other acts that not explicitly authorized by the technology developer.
The user fully understands and agrees to take responsibilities of their own acts, the users shall take responsibilities of their authorizations to the cooperative partners (including but not limited to the method, content and period of authorization, etc.) and the relevant acts under their account. The technology developer will urge the partner to keep the user's information strictly confidential after obtained the user's authorization for inquiring, verifying or using their relevant information. However, the user shall make their own judgments on the content that could be contacted by this service. If you there are any objections or disputes about authorization-related matters and information security, the user shall stop using this service immediately.
The technology developer cannot and will not take any responsibility for any disputes among the user and the partner. For those users who failed to stop using this service immediately, the technology developer takes no responsibility for any risks and losses caused by the reasons that are irrelevant with the technology developer.
VIII.Declaration of Copyrights
The technology developer is the owner of the intellectual property right of this service. The intellectual property rights of this service, such as the copyrights, trademarks, patents, trade secret, etc., as well as all content related to this service (including but not limited to text, pictures, audio, video, graphics, interface design, layout framework, related data or electronic documents, etc.) are protected by the laws and regulations of the Macao Special Administrative Region of the People's Republic of China and corresponding international treaties. The technology developer holds the above-mentioned relevant intellectual property rights according to law, except for the relevant rights that shall be held by relevant right holders in accordance with the law.
Without the written permission of the technology developer and the relevant right holders, the user shall not, for any commercial or non-commercial purpose, permit or permit any third party to implement, utilize, or transfer the above intellectual property rights.
IX.Terminal Safety Responsibility
The user understands and agrees that this service is just like many of other applications and services on the internet, that it could be influenced by multiple factors (including but not limited to factors of user, the network service quality, social environment, etc.); as well as the interference of many safety issues (including but not limited to the illegal use of user’s data for physical harassment; viruses, Trojan horse programs or other malicious programs that may be contained in other applications or services downloaded or installed by the user or other websites they visited, which could threaten the information and data safety of the user’s terminal, and thereby further affecting the normal use of this service, etc.). Therefore, the user shall reinforce the awareness of information safety and the protection of personal information, pay attention to password protection to avoid losses. When the above situation occurs, the technology developer will try their best to cooperate with the relevant parties as soon as possible to repair it in time, but for the loss caused to the user, the technology developer’s responsibility is exempted within the allowed scope of law.
The user shall not produce, publish, use, disseminate malicious programs that used to steal technology developer’s account and other people's personal information and property.
Maintaining the safety and normal use of applications or services is the joint responsibility of the technology developer and the user. The technology developers will take necessary technical measures to protect the information and data safety of the user’s terminal in a reasonable and prudent manner in accordance with industry standards.
Within the allowed scope of law, the technology developer bears no responsibility for service interruption or obstruction caused by:
Damaged by computer viruses, Trojan horses or other malicious programs or hacker attacks.
Malfunctions of the computer software, system, hardware and link of the technology developer and the user.
The user’s improper operation.
The user’s using of this service through the means that unauthorized by the technology developer.
Other situations that the technology developer cannot control or foresee.
X.Force Majeure and Reasonable Exemption
"Force majeure" refers to an objective incident that occurs after the signing of this agreement and cannot be foreseen, nor to be avoid or overcame by the affected party. Such incidents include but not limited to floods, fires, droughts, typhoons, earthquakes and other natural disasters, strikes, riots, wars, acts or omissions of government departments, adjustments to laws, regulations or policies, and changes to data sources (including but not limited to the alternation of the service content and form), domestic data paralysis, hacker attacks, intrusion of computer virus, outbreak of new virus, server inaccessibility caused by network interruptions due to telecommunications operator problems, power outages, system failures, transmission lines, communication failures and other technical factors that cannot be controlled by the technology developer. Failure in fulfilling or partially fulling this agreement due to the influence of force majeure shall not be consideration as breach of agreement, the relevant parties shall not be liable for corresponding breach of agreement.
XI.Others
The user's use of this service is deemed that the user has read and agreed to be bound by this agreement. The technology developer has the right to modify the terms of this agreement when necessary, and the user can check the relevant agreement terms in the latest version of this service. After the terms of this agreement are modified, the user’s continous logging in and use of this service shall be deemed that the user has accepted the modified agreement. If users do not accept the modified agreement, they should stop using this service.
The establishment, taking effect, fulfillment, interpretation and dispute resolution of this agreement shall apply to the laws of the Macao Special Administrative Region of the People's Republic of China.
If any dispute or argument occurs between the user and the technology developer, it should be resolved through friendly negotiation firstly; if the negotiation fails, the user agrees to submit the dispute or argument to the jurisdiction of the Macao Court.
The headings of all the terms of this agreement are for the convenience of reading, all of which have no actual meaning, and cannot be used as the basis for interpreting the meaning of this agreement.
If the provisions of this agreement become invalid or cannot be executable for no matter what reasons, the other provisions remain valid and binding both parties.
XII.How to Contact Us
If you need to consult common problems, please reach us online.