360 Security Software License and Service Agreement
Welcome to 360 Security for Android!
By accepting this Agreement, you acknowledge and agree that the security technology used by this Software will scan your Internet usage in an anonymized manner to detect and prevent damage from malware. As used in this Agreement, "malware" is a general term to refer to software that is used or designed to gain access to private device systems, gather private data, or disrupt device operation, and includes computer viruses, worms, trojans, backdoors, spyware, adware, and other rogue security software or malicious programs or websites.
1) Intellectual Property Statement
a) 360 owns and retains all right, title, and interest in and to the Software, including all copyrights and other intellectual-property rights. All intellectual property, trademark rights and patent rights in the Software and all information related to the Software, are under the protection of national or regional intellectual property laws and regulations.
b) 360 owns and retains all right, title and interest in and to use the 360 name, the logo and the product names associated with the web site and the services in connection with the Software, and does not grant you any right or license to use them except in accordance with this Agreement.
c) Except as expressly provided in this Agreement, you do not acquire any rights in the Software.
2) Software License
a) The Software is a free product. 360 hereby grants you and only you a limited license to download, install, use and copy the Software on a single device for commercial or non-commercial use and without limitation on number of uses. Each copy of the Software that is copied, distributed and/or transferred by you must be complete, accurate and authentic, including all of software, electronic documents, copyright and trademark related to the Software and this Agreement. You may not modify the Software, incorporate any components of the Software into other software or redistribute the Software to third-parties without the written permission of 360.
b) The Software will automatically deactivate when you uninstall the Software, and you will not be entitled to receive any feature or content update to the Software after you uninstall it.
c) All rights not expressly granted herein are reserved by 360. You must obtain separate written approval from 360 to obtain rights not expressly granted herein. Unless applicable law gives you more rights than contained herein, you may only use the Software as expressly permitted in this Agreement.
3) User Conduct and Compliance with Laws
a) Use of the Software is subject to all applicable local, state, federal and international laws and regulations. You agree to comply with such laws and regulations.
b) You agree not to:
i) use the Software for any illegal purposes;
ii) reverse engineer, decompile, disassemble or otherwise attempt to modify any internal resources of the Software or the compiled program files (including without limitation any related malware signatures and malware detection routines), or create derivative works of any of the foregoing, except to the extent that the foregoing restriction is expressly prohibited by applicable law;
iii) sell, modify or redistribute the Software, including but not limited to software sales, pre-installation and software bundling, without the written consent of 360;
iv) use any parts or components of the Software separately for any purpose except as provided in this Agreement because this Software is licensed to be used as a single product;
v) intentionally circumvent or destroy any technical measures taken to protect the Software's copyright, or delete or modify any electronic rights management data or information of the Software;
vi) intentionally mislead or deceive other people by using this Software;
vii) falsify or delete any author attributions, legal or other proper notices or proprietary designations or labels of the origin or source of software or other material contained in a file that is uploaded;
viii) use the Software to either access a computer/mobile network or use any computer/mobile information network resources without proper authorization;
ix) use the Software to delete, modify or augment the function of any computer or mobile network without permission;
x) use the Software to delete, modify or increase the data and/or applications stored, processed or transferred in any computer/mobile network without permission;
xi) use the Software to perform any other act intended to harm the security of any computer/mobile network;
xii) use the Software to disrupt of the normal operation of other software on the device, the 360 website, or propagate any malware.
4) User Guide
a) Software Scan Modes.
i) Quick Scan. The Software will perform a quick scan of the system when you click the 'Quick Scan' button (a "Quick Scan"). During a Quick Scan, the Software will utilize the built-in supported vector machine ("QVM") and Cloud Scan (as described below) engines to scan the system's built-in storage only for malware, vulnerabilities and privacy issues before a determination is made relating to the safety status of the device.
ii) Full Scan. The Software will perform a full scan of the system when you click the 'Full Scan' button (a "Full Scan"). During a Full Scan, the Software will utilize the built-in QVM and Cloud Scan engines to scan both the system's built-in storage and external SD card for malware, vulnerabilities and privacy issues before a determination is made relating to the safety status of the device.
b) Software Features. The Software provides the functions described below. When using the Software, your personal information may be collected and/or uploaded for the sake of realizing the basic functions of the Software.
i) Cloud Scan. Upon initiation of either a Quick Scan or Full Scan, the Software will also perform a Cloud Scan. During a Cloud Scan, certain information will be collected from your installed apps, package name, app name and version, developer and the code signing certificate of the installed apps. This information will be sent to the server to analyze the safety status of each app on your device and address any concerns appropriately. Cloud Scan is always performed when either a Quick Scan or a Full Scan is performed. You may deactivate Quick Scan or Full Scan mode if you do not want to effect a Cloud Scan.
ii) Vulnerability Fixing. The Software will perform a vulnerability scan in either Quick Scan or Full Scan mode, as selected by you. During a vulnerability scan, your system will be scanned for any vulnerabilities that the Software is able to detect. You will be alerted if the Software locates any vulnerabilities on your device and you will be prompted whether you would like the Software to clean or fix the vulnerabilities found. Personal data is neither collected nor uploaded during a vulnerability scan.
iii) Memory Boost. The Software will scan the memory usage of your device, and if the available memory is too low, you will be advised to perform a memory cleanup. The memory cleanup process will free system memory by terminating nonessential processes running in the background. Memory Boost allows you to close these processes one by one or you can add these processes to an ignore list, thus improving the performance of your device. Additionally, you can choose to enable lock screen power saver to clean up your system when your device is idle and save battery and processing power.
iv) Floating Window. The Software will display a floating bar on the side of the screen if the Floating Window feature is enabled. The floating bar will pop out and change into a floating window on which you may access certain control toggles and a one-tap button to activate the Memory Boost feature.
v) Multifunctional Notification (for Android 4.0 and up). The Software will display a menu within the drop-down notification drawer from which you may set alarm clocks, turn on the flashlight, enter the recent apps screen and improve the performance of your device with a one-tap button to activate Memory Boost.
vi) Shake and Cleanup. The Software will detect if you shake your device while it’s unlocked and the launcher is open. Once a shake is detected, the Software will improve your device's performance (by activating Memory Boost), and calculate a score to evaluate the effect of the shake, taking the amount of memory cleaned and other factors into consideration.
vii) Call & SMS Blocker. The Software provides smart call & SMS blocking services based on a black list and a white list created by you.
viii) Clean & Optimize. The Software scans system caches and any other app caches, Internet browsing history (including cookies) and useless Android application package ("APK") files, and allows you to clean either all of these with a single click or one by one.
ix) App Manager. The Software allows you to easily uninstall/backup user apps and system apps (requires root permission). App Manager also allows you to manage APK files and move apps between phone memory and your SD card.
x) Contacts Backup. The Software allows you to back up your contacts, messages, calendar events and the black list in 360 Security to your SD card for future recovery. The backup file is encrypted and saved only on the installed SD card and will not be sent to any other system.
xi) Find My Phone. This feature includes a SIM card change alert, remote data deletion, phone location tracking, a remote alarm function and remote locking of your mobile device, among other features. To use the anti-theft function, a user's 360 account information, IMEI number and phone number must be collected.
xii) Data Usage. This feature includes a Data Usage Monitor and a Mobile Data Firewall. The Data Usage Monitor monitors and records data usage to provide statistics and reminders about your data usage. The Mobile Data Firewall allows you to control networking actions of selected software so that you may configure each app as needed to allocate and save data usage.
xiii) Privacy Advisor. The Privacy Advisor feature contains two privacy protection tools. One tool is a private message and call log keeper which allows you to designate certain of your phone contacts as "private contacts". Messages and all call logs with these private contacts are encrypted and stored in this keeper. The other tool is an app lock, which allows you to lock access to an app selected by you with a graphical password.
d) The Software functions only in the supported operating systems listed on the 360 website. You may uninstall the Software when it is no longer needed. 360 disclaims any and all liability that may result from uninstalling the Software.
e) Additional details about the function of the Software and how it protects your private information can be found on the 360 website ( http://www.360securityapps.com/en-us/about/privacy ).
f) Downloads. You should download and install the licensed software from our official website, Google Play( https://play.google.com/store/apps?hl=en )or another trusted website.
5) Support Services and Upgrades
a) 360 Security Center may provide you with support services related to the Software ("Support Services").
i) Software Support. Certain technical support features may be offered by 360 for the Software and may include live chat with a technical support consultant and/or assistance from a technical support consultant via remote access. Any such technical support shall be provided in 360's sole discretion without any guaranty or warranty of any kind. 360 reserves the right to refuse, suspend or terminate any of the technical support at its sole discretion. You are solely responsible for backing up of all your existing data, software and programs before accessing any technical support.
b) Modification and Upgrade. 360 reserves the right to modify and upgrade the Software at any time with or without notifying you.
i) The licensed software includes an auto update feature to keep the virus definition database updated to recognize the latest malware. The auto update feature is optional. You may enable/disable auto update in the settings of the Software. If there is a new version of the Software, a window may pop up allowing you to immediately update the Software or update later.
ii) To determine the specific virus database version and compatible software version needed by your device, the model of your device, the version of the Software installed and the virus definition database installed may be sent to the server. The data collected will only be used to determine the model of your device, the version of the Software installed and the virus definition database only but will not be used to determine your identity.
a) Customer Experience Improvement Program. If you participate in the 360 Customer Experience Improvement Program, 360 will collect usage statistics regarding the Software, including frequency of use statistics for each participating user. Upon analysis of this data, 360 may improve the quality of the products and release helpful security services to users. The statistics are only taken in connection with 360's products, and contain no Personal User Information. The 360 Customer Experience Improvement Program is a voluntary program. Upon installation of the Software, by default you will be participating in the 360 Customer Experience Improvement Program, but you can choose to opt out at your discretion in the settings of the Software.
b) The Software contains neither malicious code aimed at undermining your device data and obtaining private information nor code that tracks and monitors your device. The Software will not (1) collect any information about use of software or documents unrelated to the Software; or (2) disclose any of your private data to any other person.
7) Legal Liability and Disclaimer
a) THE SOFTWARE HAS BEEN THOROUGHLY TESTED, BUT 360 CANNOT GUARANTEE THAT IT IS FULLY COMPATIBLE WITH YOUR DEVICE. IF YOU ENCOUNTER AN INCOMPATIBILITY WITH YOUR DEVICE, PLEASE CONTACT 360 SECURITY CENTER FOR TECHNICAL SUPPORT. YOU SHOULD UNINSTALL THE SOFTWARE IF THE COMPATIBILITY PROBLEM PERSISTS.
b) IN NO EVENT WILL 360 BE LIABLE FOR ANY DAMAGE TO YOU CAUSED BY ANY CONFLICTS WITH SOFTWARE PREVIOUSLY INSTALLED ON YOUR DEVICE OR BY OPERATION OF THE SOFTWARE INCLUDING BUT NOT LIMITED TO THE DIRECT OR INDIRECT PERSONAL LOSS, LOSS OF BUSINESS PROFITS, SUSPENSION OF TRADE, LOSS OF THE BUSINESS INFORMATION OR ANY OTHER PECUNIARY LOSS, EXCEPT FOR THE REPAIR OF MANUFACTURING DEFECTS OF THE SOFTWARE.
c) 360 SHALL NOT BE LIABLE FOR ANY LOSSES TO YOU DUE TO A THIRD PARTY'S COMMUNICATION ERROR, TECHNICAL PROBLEM, NETWORK OR DEVICE FAILURE, SYSTEM INSTABILITY, OR OTHER FORCE MAJEURE EVENTS.
d) IF YOU VIOLATE THIS AGREEMENT OR THE RELATED TERMS OF SERVICE, RESULTING IN ANY CLAIM, DAMAGE OR LOSS TO 360, 360 MAY TAKE MEASURES INCLUDING BUT NOT LIMITED TO DISCONTINUING THE SOFTWARE LICENSE, TERMINATING PROVISION OF SERVICES, RESTRICTING USE OF THE SOFTWARE AND/OR TAKING ANY NECESSARY LEGAL OR ADMINISTRATIVE ACTIONS.
e) 360 CANNOT GUARANTEE THAT THE SOFTWARE IS NOT INFECTED BY OR BUNDLED WITH DISGUISED MALWARE IF THE SOFTWARE IS DOWNLOADED FROM A SOURCE OTHER THAN THE 360 WEB SITE. 360 WILL NOT BE LIABLE FOR DIRECT OR INDIRECT DAMAGE CAUSED BY COPIES OF THE SOFTWARE OBTAINED FROM THIRD PARTIES.
f) 360 HEREBY EXPRESSLY DISCLAIMS ANY IMPLIED WARRANTIES AND CONDITIONS, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, LOSS OF DATA, DEVICE FAILURE OR MALFUNCTION, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NON-INTERFERENCE, ACCURACY OF DATA, INTEGRATION, NON-INFRINGEMENT OF THIRD PARTY RIGHTS BY FILTERING, DISABLING, OR REMOVING SUCH THIRD PARTY'S SOFTWARE, SPYWARE, ADWARE, COOKIES, EMAILS, DOCUMENT, ADVERTISEMENTS, OR THE LIKE, WHETHER ARISING BY STATUTE, LAW, COURSE OF DEALING, CUSTOM AND PRACTICE, OR TRADE USAGE. THE FOREGOING PROVISIONS SHALL BE ENFORCEABLE TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW.
g) 360 DOES NOT WARRANT THAT THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE OR THAT ANY ERRORS WILL BE CORRECTED. 360 DOES NOT WARRANT THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT 360 DISCLAIMS ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, WITH RESPECT TO THE SOFTWARE, ENHANCEMENTS, MAINTENANCE OR SUPPORT RELATED THERETO, OR ANY OTHER MATERIALS (TANGIBLE OR INTANGIBLE) OR SERVICES SUPPLIED BY THEM.
h) SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATIONS OR EXCLUSIONS MAY NOT APPLY TO YOU. IN NO CASE SHALL 360'S LIABILITY EXCEED THE PURCHASE PRICE PAID BY YOU FOR THE SOFTWARE.
i) IF YOU ARE DISSATISFIED OR HARMED BY 360 OR ANY PORTION OF THE 360 WEB SITE, YOU MAY UNINSTALL 360’S PRODUCT, CLOSE YOUR 360 ACCOUNT OR DISCONTINUE USING THE 360 WEB SITE, AND SUCH DISCONTINUANCE SHALL BE YOUR SOLE AND EXCLUSIVE REMEDY.
j) As a condition of use of the Software you agree to indemnify 360, its affiliates, partners, officers, directors, employees and agents from and against any and all actions, claims, losses, damages, liabilities and expenses (including reasonable attorneys' fees) arising from your violation of any term of this Agreement. This defense and indemnification obligation will survive termination of this Agreement and your use of the Software.
8) Applicable Law and Disputes
a) The Agreement shall be governed by the law of the state of New York, excluding its conflicts of laws rules.
b) For any dispute you have with 360, you agree to first contact us and attempt to resolve the dispute with us informally. If 360 has not been able to resolve the dispute with you informally, we each agree to resolve any claim, dispute, or controversy (excluding claims for injunctive or other equitable relief) arising out of or in connection with or relating to this Agreement by binding arbitration by the American Arbitration Association ("AAA") under the Commercial Arbitration Rules and Supplementary Procedures for Consumer Related Disputes then in effect for the AAA, except as provided herein. Unless you and 360 agree otherwise, the arbitration will be conducted in the state of New York. Each party will be responsible for paying any AAA filing, administrative and arbitrator fees in accordance with AAA rules, except that 360 will pay for your reasonable filing, administrative, and arbitrator fees if your claim for damages does not exceed $5000 and is non-frivolous (as measured by the standards set forth in Federal Rule of Civil Procedure 11(b)). The award rendered by the arbitrator shall include costs of arbitration, reasonable attorneys' fees and reasonable costs for expert and other witnesses, and any judgment on the award rendered by the arbitrator may be entered in any court of competent jurisdiction. Nothing in this Section shall prevent either party from seeking injunctive or other equitable relief from the courts for matters related to data security, intellectual property or unauthorized access using the Software.
c) ALL CLAIMS MUST BE BROUGHT IN THE PARTIES' INDIVIDUAL CAPACITY, AND NOT AS A PLAINTIFF OR CLASS MEMBER IN ANY PURPORTED CLASS OR REPRESENTATIVE PROCEEDING, AND, UNLESS WE AGREE OTHERWISE, THE ARBITRATOR MAY NOT CONSOLIDATE MORE THAN ONE PERSON'S CLAIMS. YOU AGREE THAT, BY ENTERING INTO THESE TERMS, YOU AND 360 ARE EACH WAIVING THE RIGHT TO A TRIAL BY JURY OR TO PARTICIPATE IN A CLASS ACTION.
a) This Agreement constitutes the entire agreement between you and 360 governing your use of the Software. You may also be subject to additional and separate terms and conditions that apply when you use or purchase other 360 products, services, or affiliate services, or third-party content or software.
b) If any provision of this Agreement is determined to be illegal, invalid or unenforceable, the provision so determined to be illegal, invalid or unenforceable shall be severable without affecting the enforceability of any of the remaining provisions.
c) 360 may modify the terms of this Agreement in accordance with any changes to relevant laws and regulations, or in accordance with any changes to 360 or its business. We will notify you of all modifications to this Agreement on our webpage ( http://www.360securityapps.com/ ) and attach with the latest version of the Software. You may uninstall the Software if you do not agree to the modified content of the Website or the Network Services. Your continued use of the Software shall be regarded as your acceptance of the modification to this Agreement.
d) This Agreement, and any rights and licenses granted hereunder, may not be transferred or assigned by you except as explicitly provided in this Agreement, but may be assigned by 360 without restriction.
e) 360 may be required to send you legal notices and other communications about the Software, services or our use of the information you provide us ("Communications"). 360 will send Communications via in-product notices or via email to the primary user's registered address, or will post Communications on the 360 web site. By accepting this Agreement, you consent to receive all Communications through these electronic means only and acknowledge and demonstrate that you can access Communications on the 360 web site.