DW Compressor (DW-ENC4K16) - End User License Agreement
-----------------------------------
Last Edit: May 7, 2024
-----------------------------------
The following document refers to the EULA notice that displays during the initial setup of the 16-channel 4K UHDoC IP Signal Encoder (DW-ENC4K16). The purpose of this information is to openly disclose and notify customers of the policies and limitations when using the product.
Click Here to download a PDF copy of the article below.
Supported/Affected Devices:
- DW-ENC4K16
IMPORTANT – Please Read Carefully
We fully respect your privacy, so we hereby prepare this Application Privacy Statement (hereinafter referred to as \"this statement\") so that you can understand how we collect, use, disclose, protect, store, and transmit your personal data. Please read this statement carefully. If you have any questions, please let us know.
Defining Personal Information
“Personal information” refers to all kinds of information recorded electronically or otherwise that can verify the personal identity of a natural person, either independently or in combination with other information. This statement describes how we process your personal information but does not cover all scenarios. The products or services discussed, mentioned, and introduced in this statement are not all available to everyone or in all geographical locations. How specific products or services process your personal information is published by us in a special privacy notice or supplemental statement for that product or service. In addition to this statement, it is recommended that you read the privacy notice or supplementary statement when using specific products or services.
This statement applies only to personal and enterprise products, including computer applications, mobile Internet applications, software, toolkits, and services that display or refer to this statement.
This statement will help you understand the following:
I. How we collect and use personal information.
II. How we use cookies and similar technologies.
III. How we entrust others to process, share, transfer, and publicly disclose your personal information.
IV. How we protect your personal information.
V. How to manage your personal information.
VI. How we process the personal information of minors.
VII. Third-party links and our obligations.
VIII. How your personal information is transferred worldwide.
I. How We Collect and Use Personal Information
(I) How Personal Information is Collected
You may need to provide your personal information when using our services. You do not have to provide us with your personal information. However, in some cases, if you choose not to do so, we will not be able to provide you with relevant services, nor will we be able to respond to or solve the problems you encounter.
We will only collect and use your personal information for the purposes stated in this statement. Below are examples of personal information we may collect:
1. Information that you provide to us
When you enjoy certain functions or services, we will ask you to provide corresponding personal information, such as your name, email address, and mobile number.
2. Information we obtain during your use of a service
We will collect information about your device and how you and your device interact with the service, including:
- Device and application information – such as the device name, device identification code (IMEI, ESN, MEID, MAC, and SN), device activation time, hardware model, operating system version, application version, software identification code, and device and application settings (such as the region, language, time zone, and font).
- Mobile network information – such as the public land mobile network (PLMN) provider ID, geographical location (identification information of the signal tower in the area where the device is located), and Internet Protocol (IP) address.
- Log information – when you use our services or view the contents provided by us, we will automatically collect some information and store it in logs, such as the service access time, access times, access IP address, and event information (such as errors, crash, restart, and upgrade).
3. Third-party source information
We may collect other information about you, your device, or service usage by other means, which will be explained to you at the time of collection or with your consent.
4. Exceptions with authorization consent
We do not need your authorization consent to collect and use your personal information in the following circumstances:
- The information collected and used is related to national security and national defense security.
- The information collected and used is related to public safety, public health, and major public interests.
- The information collected and used is related to criminal investigation, prosecution, trial, and execution of sentences.
- It is difficult to obtain your consent for the purpose of safeguarding the subject of personal information or other important legal rights and interests such as personal life and property.
- The personal information collected is disclosed to the public by the subject of personal information.
- Your personal information is collected from legally disclosed information, such as legal news reports, disclosed government information, and other channels.
- The information collected and used is required for signing a contract according to your requirements.
- The information collected and used is necessary to maintain the secure and stable operation of the products and/or services provided, such as finding and handling the faults of products and/or services.
- The information collected and used is necessary for legal news reporting.
- The information collected and used is necessary for academic research institutions to carry out statistical or academic research based on the public interest and to externally provide the results of academic research or description in which the personal information contained is unmarked.
- Other circumstances stipulated by laws and regulations.
5. Collection and use of non-identifying information
“Non-identifying information” refers to information that cannot be used to determine personal identity, such as website visits, application download, and product sales. We collect summarized statistics to understand how users use our services. In this way, we can improve our services and better meet the needs of users. We may decide to collect, use, disclose, and transfer non-identifying information for other purposes.
(II) How Personal Information is Used
We will use your personal information for the following purposes:
1. Register and activate the products and services you purchase.
2. Deliver, activate, or verify the services you request, or make changes to and provide technical support and after-sales services to the products and services at your request.
3. Send you notifications of application updates and installation.
4. Provide you with personalized user experience and contents.
5. Contact you, send you information about services that you may be interested in, invite you to participate in promotional activities and market research, or send you marketing information when you explicitly agree or at your request. If you do not want to receive such information, you can unsubscribe at any time.
6. Carry out internal audit, data analysis and research, analyze business operation efficiency, and measure market share to improve our services.
7. Troubleshoot errors if you choose to send us error details.
8. Synchronize, share, and store the data you upload or download and the data you need to perform the upload and download.
9. Improve our anti-damage and anti-fraud programs.
10. Other purposes with your consent.
II. How We Use Cookies and Similar Technologies
Our devices, mobile applications, and Windows applications may use local storage technologies such as cookies, pixel tags, and website beacons. We regard information collected through cookies and similar technologies as non-personal information. However, if local laws treat IP addresses or similar identification marks as personal information, we also treat such identification marks as personal information.
(I) Cookie
Cookie – a plaintext file stored on a computer or mobile device by a network server. The contents of a cookie can only be retrieved or read by the server that creates it. Each cookie is unique to your web browser or mobile application. Cookies usually contain identifiers, site names, and some numbers and characters.
We sometimes store cookies on computers or mobile devices. Cookies are enabled to improve user experience, including:
- Login and authentication. When you log in to a website using your account, you can jump directly from one page of the website to another without having to log in again on each page with the help of a cookie.
- Storage of your preferences and settings. Websites can save settings such as the language of a computer or mobile device, font size, shopping cart, and other browsing preferences by means of cookie.
- Statistical analysis. With cookies, we can collect information about your use of our website and other applications, such as recording a single visit (by using a session cookie) or multiple visits (by using a permanent cookie) by a user.
We will not use cookies for any purpose other than that stated in this statement. You can manage or delete cookies according to your preferences. For details, see AboutCookies.org. You can clear all cookies stored on your computer. Most web browsers can block cookies. To learn more about how to change browser settings, visit the following links: <Internet Explorer>, <Google Chrome>, <Mozilla Firefox>, <Safari>, and <Opera>.
If you clear the cookie, you need to change the user settings each time you visit our website. Please also note that some of our services may have to use cookies, and disabling cookies may affect all or part of your use of these services.
(II) Website Beacon and Pixel Tag
Besides cookies, we and some third parties will also use website beacons and pixel labels on the website. A website beacon is an electronic image embedded in a website or email that can be used to identify a cookie on your device when you view a webpage or email. Pixel tags allow us to send emails in a format you can read and let us know if an email is open.
We and some third parties use this technology for a variety of purposes, including analyzing service usage (with cookies) and providing contents and advertisements that better meet your needs. For example, the email we send you may contain a clickable URL that links to the contents of the website. If you click the URL, we will track this click to help us understand your preferences and improve customer service. If you do not want your activities to be tracked in this way, you can withdraw from our mailing list at any time.
(III) Other Local Storage
We and some third parties may use other local storage technologies in some services, such as local shared objects (also called Flash cookie) and HTML5 local storage. These technologies are like the cookie described above. They are also stored in your device and can be used to record some information about your activities and preferences. However, these technologies may not use the same devices as the standard cookie, so you may not be able to control them by using standard browser tools and settings. For instructions on disabling or deleting the information contained in the Flash cookie, click here.
(IV) Do Not Track
Many web browsers have the Do Not Track function, which can issue a Do Not Track request to the website. At present, major Internet standards organizations have not set up relevant policies to specify how websites should respond to such requests. If your browser has Do Not Track enabled, all our websites will respect your choice.
III. How We Entrust to Process, Share, Transfer, and Publicly Disclose Personal Information
(I) Entrust to Process
In some cases, we will entrust other companies to process your personal information on our behalf. For example, companies that handle hotlines, send emails, and provide technical support on our behalf can only use your personal information to provide services to you on our behalf.
We will sign a strict confidentiality agreement or personal information processing clause with the entrusted parties, requiring them to process personal information in accordance with this statement and relevant confidentiality and security measures.
(II) Sharing
In the event we provide personal information to other personal information controllers, where both parties have independent control over the personal information, we will not share your personal information externally, except in the following cases:
1. Sharing with explicit consent:
After obtaining your explicit consent, we will share the information within your authorization to the third party you specify.
2. Sharing under legal circumstances:
We may share your personal information externally according to laws and regulations, litigation and dispute resolution requirements, or requirements posed by administrative and judicial organs according to law.
3. Sharing to our affiliates:
Your information may be shared within our affiliates. We will only share your information within our subsidiaries for specific, explicit, and legitimate purposes, and only share the information necessary to provide services. For example, to avoid duplicate account registration, we need to check the global uniqueness of the account to be registered.
4. Sharing to business partners:
We may share your order information, account information, equipment information, and location information with partners and other third parties to ensure smooth completion of the services provided to you. However, we will only share your personal information for legal, legitimate, necessary, specific, and explicit purposes, and only share the personal information necessary to provide services. Our partners include:
- Third-party sellers and developers: Some of our services are provided directly to you by a third party, and we must share transaction-related information with the third party to fulfill your need to buy goods or services from a third party. For example, when you buy goods from other developers in the application market, we must share necessary information of you to the developers before the transaction can be completed.
- Suppliers of goods or technical services: We may share your personal information with third parties that support our functions, including third parties that supply goods or provide infrastructure technical services, logistics distribution services, payment services, and data processing services. The purpose of sharing such information is to implement service functions. For example, we must share your order information with the logistics service provider to arrange delivery, or we need to share your order number and order amount to a third-party payment agency to confirm your payment order and complete the payment.
Under items 3 and 4 above, we will sign strict confidentiality agreements with companies, organizations, and individuals that share personal information, and require them to process personal information in accordance with this statement and take relevant confidentiality and security measures.
(III) Transfer
“Transfer” refers to the process of transferring control of personal information from us to another personal information controller. We will not transfer your personal information to any company, organization, or individual, except in the following cases:
1. After obtaining your explicit consent, we will transfer your personal information to other parties.
2. If personal information transfer is involved in a merger, acquisition, or bankruptcy liquidation, we will continue to require the new company or organization holding your personal information to abide by this statement. Otherwise, we will ask the company or organization to re-seek authorization from you.
(IV) Public Disclosure
We will only publicly disclose your personal information in the following circumstances:
1. After obtaining your explicit consent.
2. Public disclosure based on legal or reasonable grounds. In such cases, we may publicly disclose your information if required by law, legal procedures, litigation, or public and government authorities.
(V) Exceptions Requiring Prior Authorization to Share, Transfer, and Publicly Disclose Personal Information
In the following cases, your prior authorization is not required to share, transfer, and publicly disclose your personal information:
1. Related to national security and national defense security.
2. Related to public safety, public health, and major public interests.
3. Related to criminal investigation, prosecution, trial, and execution of sentences.
4. It is difficult to obtain your consent for protecting the lives, properties, and other important legal rights of you and other persons.
5. Personal information you disclose to the public.
6. Channels for collecting personal information from legally disclosed information, such as legal news reports and disclosed government information.
According to law, sharing and transferring unmarked personal information while ensuring that the data receiver cannot recover and re-identify the subject of the personal information is not an act of externally sharing, transferring, and publicly disclosing the personal information. You will not be notified and your consent will not be obtained for the preservation and processing of such data.
IV. How We Protect Your Personal Information
We attach importance to the safety of personal information and adopt industry standard practices to protect your personal information from unauthorized access, disclosure, use, modification, damage, or loss. To this end, we take the following measures:
- We take all reasonable and feasible measures to ensure the minimum collection of personal information and have not collected personal information unrelated to achieving the purpose. We will only retain your personal information for the period required to achieve the purpose stated in this statement unless the retention period needs to be extended or permitted by law.
- We will use encryption technology to ensure confidentiality of data transmission and storage. We will use a trusted protection mechanism to protect data and servers storing data from malicious attacks.
- We will deploy access control mechanisms to ensure that only authorized persons can access personal information; control the number of authorized persons and manage their permissions in different levels according to business needs and personnel levels; and record logs on access to personal data and assign administrators to audit the logs regularly.
- We will strictly select business partners and service providers and incorporate the requirements of personal information protection into the business contracts of both parties or into activities such as auditing and assessment.
- We will provide training courses on security and privacy protection and conduct testing and publicity activities to enhance employees' awareness of the importance of personal information protection.
In short, we will try our best to protect your personal information. However, no measure is perfect, and not all of products and services, websites, data transmission, computer systems, and network connections are secure.
To deal with the possible risks of personal information disclosure, damage, and loss, we have developed systems and control measures, defined the classification and processing of security incidents and vulnerabilities, and set up special security notices and warning pages. We have also set up a special emergency response team for security incidents. According to security incident handling regulations, we have launched security plans for different security incidents to stop losses, perform analysis and locating, formulate remedial measures, and cooperate with related departments to carry out backtracking and strikes.
In cases where a personal information security incident occurs, we will inform you of the following information as required by laws and regulations: basic situation and possible impact of the security incident, handling measures we have taken or will take, suggestions that help you guard against and reduce risks, and remedial measures for you. We will inform you of the incident by email, text message, and notification push. When it is difficult to inform the subjects of personal information one by one, we will issue an announcement in a reasonable and effective way. We will also report the disposition of personal information security incidents in accordance with the requirements of regulatory authorities.
V. How to Manage Your Personal Information
(I) Access, Correct, and Delete
Among the many countries or regions where we provide products and services, some countries or regions have laws stipulating that the subject of personal information has the right to access, correct, and delete the relevant personal information that we keep. In such situations, the subject of personal information or its agent may request us to access, correct, and delete the relevant personal information we keep (hereinafter collectively referred to as \"request\").
- Way and Channel to Make the Request
The request made by the subject of personal information must be in written form. The request is also valid even if the requester does not specify the regulations on which the request is based. Access requests made orally are invalid. If the legislation of some countries also recognizes the validity of oral requests, we will follow such rules.
If the subject of personal information makes relevant requests through hotlines, service mailboxes, online customer service, service stores, and other channels, we will guide the subject of personal information to make a formal plea through the proper channels to facilitate communication and feedback on the handling progress and results. We set up a special request channel for the subject of personal information, to protect the subject's legitimate interests, ensure our normal operation, and protect the right of personal information requesting from embezzlement or abuse.
- Validity of the Request
Most laws require the subject of personal information to comply with specific requirements when making the request. This statement requires the subject of personal information to do the following:
(1) Provide us with enough information to verify their identity (to ensure that the person making the request is the subject of personal information or a person authorized by the subject).
(2) The request is specific and executable.
- Request Handling Period
We will do our best to ensure that a reply is made within one month after the access request by the subject of personal information. Considering the complexity and quantity of requests, this period may be extended by another two months if necessary. In case of a delay in providing information, we will inform the subject of personal information of the situation and the reason for the delay. If the time limit set in this paragraph conflicts with local laws and regulations, the local laws and regulations shall prevail.
- Results of the Request
After a request is made by the subject of personal information, the following results may appear:
(1) Request rejected.
In some cases, the request made by the subject of personal information may be rejected, for reasons including but not limited to:
a. Local laws do not give the subject of personal information relevant rights.
b. The identity of the person making the request cannot be verified.
c. The requirements put forward by the subject of personal information cannot be verified and exceed the scope, especially in the case of repeated requests.
d. Disclosure of the information is likely to harm our interests if the information involved is related to the compensation to be made or obtained in the dispute.
e. The information is retained for statistical and research purposes only, and publication of the statistics and research results will not disclose personal identity.
f. Other legal situations.
If we reject the access request made by the subject of personal information, we will formally explain the reason to the requester.
(2) Request successful.
If the situation in (1) does not occur, we will satisfy the request made by the subject of personal information. To improve the possibility of request success, please provide as much detailed information as possible when making the request, such as the category and specific content of the request, relevant information about the information holder (such as our service name you use), time frame for information generation or processing (the smaller the time frame, the greater the possibility of success).
5. Special statement
(1) No one has the right to access the personal information of others unless he/she is an authorized person or guardian.
(2) Most laws and regulations specify that organizations may not provide data to the subject of personal information. These situations include the following: providing data will undermine the power to fight terrorism; the subject of personal information has repeatedly applied many times; or obtaining and providing information will consume disproportionate resources.
(3) In principle, we will not provide the following information:
a. Information about other persons — The data requested by the subject of personal information may involve other persons than the subject. We will not provide such information unless the individuals involved agree.
b. Repeated application — The requester makes the same or similar requests specific to the same subject of personal information, the data has not changed in the past period of time, and we have provided the data, in which case we will not provide a copy of the data. In addition, we have no obligation to provide information that has already been made public.
c. Views given under confidentiality — If the information about the subject of personal information is given under confidentiality, we have no obligation to provide such information.
d. Special documents — Any special information we keep will not be disclosed in reply to the access request made by the subject of personal information. Generally speaking, special information includes any confidential documents (such as direct communication between clients and their lawyers) and information for obtaining or giving corresponding legal opinions (whether the information is involved in litigation or court proceedings).
(II) Withdrawal of Consent
You can change the scope of your authorization for us to continue collecting personal information or withdraw your authorization by deleting information, disabling device functions, and making privacy settings in our terminal devices or applications. In our account-related business, you can also cancel your account to withdraw all our authorizations to continue to collect your personal information through account-related business.
Please understand that each business function requires some basic personal information to be completed. After you withdraw your consent or authorization, we cannot continue to provide you with the services corresponding to the withdrawal of your consent or authorization, nor will we process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the previous personal information processing based on your authorization.
How to withdraw your consent in a specific service will be issued by us in a special privacy notice or supplementary statement.
VI. How We Process the Personal Information of Minors
Our personal and household equipment is mainly for adults. However, for minors who use equipment and services, we are very clear about the importance of taking extra precautions to protect their privacy and security. We regard anyone under the age of 18 (or the age stipulated by local laws) as a minor.
For the personal information of minors collected with the consent of the guardian, we will only use or disclose the information if the law permits, the guardian expressly agrees, or the information is necessary for the protection of minors. If the guardian needs to access, modify, or delete personal information related to the minor at any time, please contact us in the manner described in \"IV. How we protect your personal information\".
If we find ourselves collecting personal information of minors without the prior consent of a verifiable guardian, we will try to delete the relevant contents as soon as possible.
VII. Links to Third Parties and Our Obligations
Links to third-party websites may be included in our application software, products, and services. Our products and services may also use or provide services from third parties, such as third-party applications on the market.
All links containing third-party websites and providing services are provided only for the convenience of users. We have no control over such third parties and cannot provide any express or implied guarantee for the linked content, nor do such links be regarded as our recommendation or authorization for the linked content. We also have no control over the privacy or data protection policies of third parties, and such third parties are not bound by this statement.
You need to independently judge your interaction with such links. Read and refer to the privacy policies of these third parties before submitting your personal information to them. We do not assume any responsibility for this.
VIII. How Your Personal Information is Transferred Worldwide
We provide services through resources and servers all over the world. This means your personal information may be transferred to or accessed from other jurisdictions outside the country where you use our services. Such jurisdictions may have different data protection laws, or even no relevant laws. In such cases, we will ensure that your data is adequately and equally protected by all applicable laws and regulations. For example, we will request your consent to cross-border transfer of personal information or take security measures such as data anonymity before cross-border transfer.
Major changes referred to in this policy include but are not limited to:
(I) Significant changes have taken place in our service model, such as the purpose of processing personal information, the type of personal information processed, and the way personal information is used.
(II) We have made significant changes in the ownership structure and organizational structure. Such as the change of owner caused by business adjustment, bankruptcy merger and acquisition, etc.
(III) The main objects of personal information sharing, transfer, or public disclosure have changed.
(IV) Your right to participate in personal information processing and the way you exercise the right have changed significantly.
(V) The department responsible for handling personal information security, its contact information, and complaint channels have changed.
(VI)A high risk is indicated by the Personal Information Security Impact Assessment Report.
**IMPORTANT NOTE: Due to local laws and language differences, the local language version of the Application Privacy Statement may be different from this version. If there are any differences, refer to the local language version.