User Agreement

User Agreement

Last updated: August 14, 2022

Release date: May 06, 2022

Special reminder

1. Before you start using the software, products and related services we provide, please read and decide whether you agree to the "Ink Color Matching User Service Agreement" (hereinafter referred to as "this Agreement"), "Ink Color Matching Privacy Policy" and other related agreements and business rules . Please be sure to read carefully and fully understand the contents of each clause, especially the clauses on limitation or exemption of liability, and separate agreements for activating or using a certain service. Important contents such as restrictions or exemptions will be highlighted in bold, so please read them carefully.

2. If you object to the tasks of this agreement, or cannot accurately understand these terms, please do not use the software products or services we provide; your viewing, downloading, publishing information, and use of this software product will be deemed as your I have read and agree to be bound by this Agreement and related agreements and rules.

3. If you are a minor under the age of 18 or have other circumstances that do not have the capacity for civil conduct appropriate to the user's behavior, before using the service, you must be accompanied by your parents or guardians to read this Agreement and obtain the consent of your parents or guardians. Agree to, and use the Services as described in this Agreement in the presence of a parent or guardian. In this case, you and your parents or guardians shall bear all consequences arising therefrom in accordance with legal provisions.

1. User information protection

1. We will legally use the collected personal information and other information in accordance with legal provisions and the provisions of this Privacy Policy and to implement the functions of our products and/or services.

2. After collecting your personal information and other information, we may de-identify or anonymize such information through technical means and in accordance with legal provisions as appropriate. De-identified information will not be able to identify the user. Subject, but may be combined with other information to identify the user subject; Anonymized information will not be able to identify the user subject, and the processed information cannot be restored.

3. [Use Authorization] Please note that all personal information and other information you provide when using our products and/or services will be deleted unless you delete it or refuse our collection through system settings. You authorize us to continue using our products and/or services.

4. We will collect statistics on the usage of our products and/or services and may share this information with the public or third parties (including but not limited to communication service providers who send emails or push notifications on our behalf, and those who provide us with location data). Map service providers, financial service providers, etc.) share these statistical information to display the overall usage trends of our products and/or services, or to maintain and improve our services, but these statistical information do not contain any of your identity Identification information.

5. We will only share your personal information and other information for legitimate purposes. At the same time, we will desensitize your information using methods including content replacement and anonymization to protect the security of your personal information and other information.

2. Service content

1. The specific content of the application is provided by "we" according to the actual situation, including but not limited to the inclusion and sharing of it by authorized users. "We" have the right to upgrade or make other adjustments to the services or product forms provided by it. The APP\website content updates will be notified to users, and users will not be notified individually.

2. If the user obtains software or an installation program with the same name as the software from an unauthorized third party, the application cannot guarantee whether the software can be used normally and is not responsible for any losses caused to the user.

3. In order to enhance user experience and improve service content, the application will provide software update services from time to time. This update may take the form of software replacement, modification, function enhancement, version upgrade, etc. After a new version of the software is released, the old version of the software may not be available. Users are advised to download the latest version in time.

4. Users who use the software services provided by the application must prepare their own terminal equipment (such as computers, mobile devices, etc.) related to the relevant services, and bear the required fees (such as network bandwidth fees, mobile phone data fees, etc.).

5. A specific service or function in the software may be provided by a third-party partner. We will mark the information of the third-party partner on the relevant page. Please read and agree to the relevant regulations before using the specific service or function. protocol. If any dispute, loss or damage occurs due to the services provided by a third-party partner, you shall resolve it with the third party yourself.

2. If there are major changes, we will use more prompt methods to inform you, including but not limited to sending emails, letters, phone calls, push notifications, etc. Significant changes referred to in this Privacy Policy include but are not limited to:

  • (1) Major changes in our service model, such as the purpose of processing personal information, the types of personal information processed, the use of personal information, etc.;
  • (2) We have undergone major changes in ownership structure, organizational structure, etc. Such as changes in owners caused by business adjustments, bankruptcy mergers, etc.;
  • (3) The main objects to whom personal information is shared, transferred or publicly disclosed change;
  • (4) Significant changes in your rights to participate in the processing of personal information and the way you exercise them;
  • (5) When our responsible department, contact information and complaint channels for handling personal information security change;
  • (6) When the personal information security impact assessment report indicates that there is a high risk.

3. User Code of Conduct

Users are not allowed to engage in the following behaviors when using application services

1.Publish, transmit, disseminate and store the following illegal information:

  • (1) Opposing the basic principles established by the Constitution;
  • (2) Endangering national security and unity, leaking national secrets, subverting national power, and undermining national unity;
  • (3) Damaging national honor and interests
  • (4) Distorting, vilifying, blaspheming, or denying the deeds and spirit of heroes and martyrs, and insulting, slandering, or otherwise infringing on the names, portraits, reputations, and honors of heroes and martyrs;
  • (5) Promote terrorism or extremism or incite the implementation of terrorist activities or extremist activities;
  • (6) Inciting ethnic hatred, ethnic discrimination, and undermining ethnic unity;
  • (7) Undermining national religious policies and promoting cults and feudal superstitions;
  • (8) Spreading rumors and disrupting economic and social order;
  • (9) Spreading obscenity, pornography, gambling, violence, murder, terror or instigating crimes;
  • (10) Insulting or slandering others, infringing on others’ reputation, privacy and other legitimate rights and interests;
  • (11) Other content prohibited by laws and administrative regulations.

2.Publish, transmit, disseminate and store the following harmful information:

  • (1) Use an exaggerated title, and the content is seriously inconsistent with the title
  • (2) Hyping up scandals, scandals, misdeeds, etc.;
  • (3) Improperly commenting on natural disasters, major accidents and other disasters;
  • (4) With sexual hints, sexual provocations, etc. that can easily lead to sexual associations;
  • (5) Showing blood, horror, cruelty, etc. that cause physical and mental discomfort;
  • (6) Inciting group discrimination, regional discrimination, etc.;
  • (7) Promoting vulgar, vulgar, and kitsch content;
  • (8) May cause minors to imitate unsafe behaviors and violate social ethics, induce minors to have bad habits, etc.;
  • (9) Other content that has a negative impact on the network ecology.

If the user uses this software to engage in the above-mentioned but not limited to the above-mentioned illegal or bad operations, causing corresponding legal or ethical issues, the user shall bear the above-mentioned risks.

4. Intellectual property rights

The intellectual property rights contained in the ink color matching software, including but not limited to software, technology, programs, web pages, etc., belong to us. Users are prohibited from engaging in the following behaviors:

  • 1. Delete the copyright information on the software and its copies;
  • 2. Reverse engineer, reverse assemble, decompile or otherwise try to discover the source code of the software;
  • 3. Use, rent, lend, copy, modify, link, reprint, assemble, publish, publish, establish mirror sites, etc., the intellectual property rights of this software, and use this software and related information to develop without authorization Derivative products, works, services, plug-ins, plug-ins, compatibility, interconnection, etc.;
  • 4. Copy, modify, add, and delete the software or the data released to any terminal memory during the running of the software, the interaction data between the client and the server during the running of the software, and the system data necessary for the running of the software. , hook up and run or create any derivative works, including but not limited to using plug-ins, plug-ins or non-legally authorized third-party tools/services to access software and related systems;
  • 5. Modify or forge the instructions and data during the operation of the software, add, delete, or change the functions or operating effects of the software, or operate or disseminate to the public the software and methods used for the above purposes, regardless of whether the above actions are For business purposes;
  • 6. Conduct any behavior that endangers computer network security, including but not limited to: using unauthorized data or entering unauthorized servers/accounts; entering public computer networks or other people's computer systems without permission and deleting or modifying them , increase stored information; attempt to probe, scan, test the weaknesses of this software system or network without permission, or perform other actions that undermine network security; attempt to interfere with or destroy the normal operation of this software system or website, and deliberately spread malicious programs or viruses and other behaviors that disrupt and interfere with normal network information services; forge TCP/IP packet names or partial names;
  • 7. By modifying or forging the instructions, data, and data packages in the operation of the software work, adding, deleting, or changing the functions or operating effects of the software, and disseminating or operating the software used for the above purposes to the public through information networks ;