• Sat - Thu : 8.00 am - 5.00 pm

Q-IOT  User Agreement

 

Before using the product, please read carefully the rights and restrictions stipulated in the User License Agreement (hereinafter referred to as “the Agreement”).

Infotech solution trading services (registered address: #703, 7th floor, Pearl Tower, Umm ghuwailina, Doha, Qatar, hereinafter referred to as “we”) has always respected and strictly protect the legitimate rights and interests on users will not be violated in any way when using our product (including user privacy, user data, etc.).

This Agreement (including the privacy policy in the last part of this article) is the final, complete and exclusive agreement between the user (including the natural person, legal person or other organization that obtains this product through various legal channels, hereinafter referred to as “user” or “you”) and us on matters related to this product, and replaces and merges the discussions and agreements between the parties on the above matters before.

The agreement will be legally binding on the user’s use of the product , and you have promised and guaranteed that you have the right and ability to enter into the agreement. Users who start using the product will be deemed to have accepted the agreement. Please read and understand the terms in the agreement carefully, including the exemption and limitation of our disclaimers and restrictions on the rights of users (minors should be accompanied by legal guardians when reviewing ), if you cannot accept all the terms of the agreement, please do not start using the product .

Use Account

Please promise and guarantee:

  1. The use of the product must be legal

The product will retain or terminate your account in accordance with the “modification and termination” of the agreement. You must promise to keep your login information confidential, do not to be obtained and used by others, and be responsible for all your actions under this account. You must notify the product of any unauthorized use or suspected unauthorized use that may violate the law immediately. The product will not be liable for any loss caused by your failure to comply with the above requirements.

 

End User Agreement License

According to the provisions of this agreement, this product will grant you the following non transferable and non exclusive licenses:

  1. The right to use the product;
  1. The right to download, install and use the product on all your network communication devices, computer devices and mobile communication devices.

Restrictive Clause

Your authorization under the agreement will be limited as follows:

  1. You shall not license, sell, lease, transfer, distribute or use the product in any form for other commercial purposes;
  1. Unless such restrictions are prohibited by law, you shall not modify, translate, adapt, merge, utilize, decompose, transform or reverse compile, reverse engineer, etc. any part of the product or derivative products;
  1. Use the product for the purpose of creating identical or competing services is forbidden;
  1. Unless expressly stipulated by law, you shall not produce, reproduce, distribute, sell, download or display any part of the product in any form or method;
  1. Remove or destroy any copyright notices or other proprietary notices contained in the product is forbidden.

Fee

You should bear the cost of purchasing the product , as well as communication fees, information fees and other related fees charged by personal Internet access or third parties (including but not limited to telecommunication or mobile communication providers). If telecommunication value-added services are involved, we suggest that you confirm the relevant fees with the value-added service provider.

Version

Any updated or future versions, updates or other changes to the product will be governed by the agreement.

Abide by The Law

Please note, however, that We may need to retain certain information when we have a legal obligation or lawful basis to do so.Under certain circumstances, the Company may be required to disclose Your Personal Data if required to do so by law or in response to valid requests by public authorities (e.g. a court or a government agency).In any case, if we have reason to believe that any of your actions, including but not limited to any of your remarks and other actions violate or may violate any of the above laws and regulations, this may terminate providing services to you at any time without any prior notice.

User Content

  1. User content refers to all content generated when the user downloads, publishes or otherwise uses the product (for example, your information, pictures, music or other content).
  1. You are the sole responsible person for your user content, and you will bear the risk that you or any third party will be identified as a result of your operation and disclosure of your user content.
  1. You agree that your user content is subject to rights restrictions (see “Restrictions on Rights”)

Restriction of Rights

 

You have agreed to use the relevant services in the product by sharing or other means, and during the use process, you will assume all legal responsibilities arising from the risks caused by your actions as follows:

  1. Violating the basic principles established by the Constitution;
  1. Endangering national security, divulging state secrets, subverting state power, or undermining national unity;
  1. Damage to national honor and interests;
  1. Inciting ethnic hatred, ethnic discrimination, or undermining ethnic unity;
  1. Those who undermine the national religious policy and propagate heresy and feudal superstition;
  1. Spreading obscenity, pornography, gambling, violence, murder, terror or instigating crimes;
  1. Insulting or slandering others and infringing on the legitimate rights and interests of others;
  1. Contains other content prohibited by laws and administrative regulations.

You have agreed not to use the product to:

  1. Release or share computer viruses, worms, malicious code, software that intentionally destroys or alter computer systems or data;
  1. Collect information or data of other users, such as email addresses, etc. without authorization;
  1. Malicious use of the product in an automated manner, causing excessive burden on the server or otherwise interfering with or damaging the website server and network links;
  1. Attempt to access the server data or communication data of the product without authorization;
  1. Interfere with or destroy the use of other users of the product .

 

Modification and Termination

 

Modification

Changes are permitted in the agreement. If there are any substantial changes in the agreement, we will notify you by email or display on the product . After the change notice, if you continue to use the product , you are aware of such changes and agree to be bound by the terms;

We reserve the right to modify, retain or close any service of the product at any time without notice;

You agree that we have the right to modify, retain or close any services of the product ;

You agree that we shall not be liable to you or a third party for any modification, retention or closure of any services on the product .

Termination

The agreement shall come into force on the date of your acceptance and continue to be valid during your use of the Product until terminated in accordance with the agreement;

Notwithstanding the above provisions, if you use this product earlier than the time you accept this agreement, you hereby acknowledge and agree that this agreement takes effect when you accept this agreement, and you hereby acknowledge and agree that this agreement takes effect when you first use this product, unless terminated in advance according to this Agreement;

We may reserve your right to use the product or this account as required by law; with or without notice, we will terminate the agreement at any time for any reason, including in good faith belief that you have violated our acceptable use policy or other provisions of the agreement;

Not subject to the provisions of the preceding paragraph, if the user infringes the copyright of a third party and we receive a notice from the copyright owner or the copyright owner’s legal representative, we reserve the right to terminate the agreement;

Once this agreement is terminated, your right to use the Product will be terminated. You should be aware that discontinuation of your product means that your User Content will be removed from our activity database. We have no liability to you for termination of the agreement, including termination of your user account and deletion of your User Content.

Third Party

You already know or agree that some of our services are obtained based on third-party technical support;

You acknowledge that the agreement is entered into between you and us, not between you and the third party mentioned above. We are solely responsible for the content, maintenance, support services, warranties and lawsuits arising out of the product . You have agreed to comply with and authorize the product to limit your conditional use of the product ‘s services.

Third Party Information and Services

  1. The product contains part of the information and services of third parties. We do not control and are not responsible for the information and services of third parties;
  1. We only provide such information and services for the purpose of your convenience or for the needs of third parties to promise and guarantee;
  1. Users shall bear legal responsibility for the risks arising from the use of third-party information and services;
  1. When users access third-party information and services, the third-party’s terms and policies apply.
  1. We will embed the partner’s software tool development kit (hereinafter referred to as ‘SDK’) or other similar applications, we will carry out strict security testing on the SDK or other similar applications, and require partners to take strict data Protective measures to effectively protect your legitimate rights and interests.

Compensation

You have agreed to use the product harmlessly and to avoid any complaints, lawsuits, losses, damages, liabilities, costs and expenses (including attorneys’ fees) from third parties arising out of or related to:

  1. User’s behavior of using the product ;
  1. User Content of users;
  1. User’s violation of the agreement.

We reserve the exclusive right of defense and compensation

You have agreed that, except with our written consent, you may not unilaterally settle an action you and us bring against a third party.

We will use reasonable efforts to inform you of such litigation, litigation behavior or process.

In no case shall the product be liable to you or any third party for any indirect, consequential, punitive, incidental, special or punitive damages arising out of the agreement. The risk of damaging the computer system or mobile communication equipment data caused by accessing and using this product will be borne by you personally.

Applicable Law

If there is a dispute between the two parties, it should be settled through friendly negotiation; If the negotiation fails, a lawsuit shall be brought to the people’s court for settlement.

Independence

Some provisions of the agreement are inapplicable for any reason, which will not affect the continued application of other provisions of this agreement, and the inapplicable provisions will be modified so that they can be applied according to law.

Integrity

the agreement (including the Privacy Policy) is the final, complete, and exclusive agreement between you and the Product with respect to matters related to the Product, and supersedes and merges the previous parties with respect to such matters (including the previous End User License, Terms of Service) and Privacy Policy) discussions and agreements;

The titles of each section are for convenience of reading only and have no legal or contractual obligations;

You may not assign your rights and obligations under the agreement unless we agree in writing. Any attempted assignment in violation of the foregoing shall be null and void.

 

Q-IOT Tag Privacy Policy

Before you start to use our product (hereinafter referred to as “the product “), please be sure to read and understand the “Privacy Policy” (hereinafter referred to as “this Policy”) carefully.

We have always respected and will strictly protect the legitimate rights and interests of users (including user privacy, user data, etc.) when using the product . We strive to be clear about how we collect, use, disclose, transfer and store your information. While this policy applies to all of our services, we also have certain explicit privacy supplements for specific services that contain additional information about our information processing practices. When we carry out other data collection and processing activities, we will obtain your consent again.

Please be sure to read this privacy policy carefully, because as long as you use the product , you agree to the practices described in the privacy policy and supplementary provisions, if you do not agree with the practices described in the privacy policy, you will not be able to use the product .

You can use the product in many different ways. For this purpose, we will explain to you how we collect and use information and what you can do to protect your privacy.

Our Privacy Policy covers the following areas:

 

What information we collect

 

How we collect and use information

 

How you can access and control your personal information

 

Information Sharing, Security, and Scope of Use and Changes to the Privacy Policy

 

What information we collect

Shared information you provide to other parties through the product , and information collected during your use of the product ;

In addition to the information you provide, we may also collect information about your use of the product , such as device information, log information, location information, etc., through the software in your device and other means;

 

How we collect and use information

 

Collection and Use of Personal Information

When you interact with us and our affiliates, you may be asked to provide certain personal information necessary for your consent to use our services based on the product . This personal information may be combined with other information and used to improve our products or services, etc.

Below are some examples of the types of personal information we may collect and how we may use that information:

  1. We will collect your personal information when you create an APP account, participate in online surveys or participate in other interactions with us.

Use of Personal Information

We will use your personal information strictly in accordance with this Privacy Policy and its updates. Your personal information will only be used for the purpose identified at the time of collection and with your consent. For any other purpose, we will obtain your consent in advance.

  1. When providing services to you: provide maintenance services for your equipment; conduct free sweepstakes, contests or promotions, etc. as permitted by law;

 

Use of personal information

For identity verification, customer service, security compliance, fraud detection, archiving and backup purposes when we provide services, to ensure the security of the products and services we provide to you;

  1. To help us design new services, improve our existing services, software certification or manage software upgrades, etc., to allow you to participate in surveys about our products and services;

Collection and Use of Non-Personal Information

At the same time, in order to operate and improve our technology and services, we will collect and use your non-personal information by ourselves, which will help us provide you with a better user experience and improve service quality.

 

Collection of Non-Personal Information

Log information, when you use the product , our server will automatically record certain log information. Such server log information may include information such as: IP address, browser type, browser language, referring source page, operating system, date/time stamp, and clickstream data.

 

Scanning service

In order to facilitate you to quickly enter the device address by scanning the Mac QR code of the device, the Scan Kit scanning process needs to obtain your camera permission. The whole process is completely processed on the device side, and we will not upload and save any personal data and image data.

 

How you can access and control your personal information

 

We will do everything possible to take appropriate technical means to ensure that you can access, update and correct your registration information or other personal information provided when using the product . When accessing, updating, correcting and deleting the aforementioned information, we may require you to authenticate to ensure account security.

Information Sharing, Security, and Scope of Use and Changes to the Privacy Policy

How we share information

Except for the limited sharing stated in this Privacy Policy, we will keep your personal information strictly confidential. We will not disclose your information to third parties for their respective independent marketing or commercial purposes without your consent. You hereby authorize that we will share your personal information with third parties without your consent in the following situations:

business partner. We may also share your information with trusted business partners, including wireless carriers, but these trusted business partners are limited to those related to the product . These entities may use your information to provide the services you request, make predictions about your preferences, and may provide you with promotional materials, advertisements, and other materials.

service provider. We may also disclose your information to companies that perform services for us or on our behalf, such as companies that assist us with billing or send emails on our behalf, but these entities may only use your information to provide services for us.

Other parties as required by law or necessary to protect our services. In some cases we may disclose your information to other parties;

Comply with the law or obey mandatory legal process (such as a search warrant or other court order);

To confirm or enforce compliance with our service policies; and to protect the rights, property or safety of us and our various affiliates, business partners or customers;

other parties in connection with the affairs of the company. We may disclose your information to third parties in the course of a company merger, transfer or bankruptcy;

other parties with your consent. In addition to the disclosures described in this policy, we may also share your information with third parties when you agree to share or make a request to share;

How we keep your information safe

Your account has security protection functions, please keep your account and password information properly. We only retain your personal information for the period necessary for the purposes described in this Privacy Policy and for the time limit required by laws and regulations;

We use a variety of security technologies and procedures to prevent loss, misuse, unauthorized access or disclosure of information. For example, in some services, we will use encryption technology (such as SSL) to protect the personal information you provide. However, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% information security.

You need to understand that the system and communication network you use to access our services may have problems due to factors beyond our control;

We will only allow access to personal information to those employees who need to know this information in order to help us process it, those authorized to process service companies on their behalf, and who are required to perform strict contractual confidentiality obligations, if they fail to do so, they may will be held legally liable or terminated from its relationship with us;

The security of your information is very important to us. Therefore, we will continue to strive to ensure the security of your personal information, and implement safeguards such as full encryption of storage and transmission to prevent your information from being accessed, used or disclosed without authorization. At the same time, no one has the right to access the specific content of some encrypted data except the user himself.

 

Collection and Use of Children’s Personal Information

We recommend that children under the age of 13 use the products and related services under the permission and guidance of their legal guardians.

We will not collect their personal information when knowing that the other party is a child, nor will we disclose their personal information to any third party. The company deletes the ward’s personal information. If we become aware that we have collected personal information from a child under the age of 13, we will take steps to delete such information as quickly as possible.

Alteration

We may revise the terms of this Privacy Policy from time to time, and such revisions form part of this Privacy Policy. If such amendments result in a substantial reduction of your rights under this Privacy Policy, we will notify you by placing a prominent notice on the homepage or sending you an email or otherwise before the amendments take effect. In this case, if you continue to use our services, you agree to be bound by this revised Privacy Policy.

Contact Us

If you have any questions about these Q-IOT User Agreement , You can contact us: