1. Copyright Statement
All intellectual property rights of the software, as well as all other information, including but not limited to literal expression and combinations, icons, illustrations, charts, colors, interface design, layout framework, data, printed materials and electronic documents, are the exclusive property of Shenzhen Yushengchang Technology Co.,Ltd, and are subject to protections in accordance with the domestic and international laws and regulations, the International Copyright Treaty and other applicable laws and regulations.
Download, installation, and use: this is a free software. Unlimited number of downloads and installations for non-commercial use.
3. Prohibited Conducts
Reverse engineering, decompiling or disassembly of the software.
Disseminating the software, which is not permitted for the purposes above, by the public by anymeans, including but not limited to modifying or forging instructions, data and packets of the software, or adding, deleting and changing the functions orrunning effects of the software.
This software is meant for family use only. Any unlawful and illegal purposes are forbidden.
Authorization: offering to sell, copy, distribute, including but not limited to, software sales, pre-installation, bundling, etc. for commercial purposes must obtain written authorization and permission from Shenzhen Yushengchang Technology Co.,Ltd
Rights reserved: allrights not expressly authorized in this agreement are still owned by Shenzhen Yushengchang Technology Co.,Ltd. Users must obtain written consent from Shenzhen Yushengchang Technology Co.,Ltd in order to exercise the rights.
5. User Guidelines
This software is bundled to use with the Kids i-Tracker device sold by Shenzhen Yushengchang Technology Co.,Ltd The services include but not limited to map positioning, location monitoring, calling, messaging, fitness tracking, reminders, and notifications.
The software uses the built-in Google map for navigation and alert warnings.
5.3 Using the Kids i-Tracker devices by Shenzhen Yushengchang Technology Co.,Ltd will regularly report location information to Shenzhen Yushengchang Technology Co.,Ltd servers. This will incur corresponding data usage and charges by mobile operators. The real-time navigation and tracking modes and communications features will also incur data usage.
This software requires pairing with Kids i-tracker device for navigation: Once the first initialization or pairing is completed, Kids i-tracker device will start to send location tracking data and communications history to servers in a timely manner.
This software includes automatic notifications. Kids i-Tracker will keep track of the locations and send predefined notifications.
The software applies only to the selected operating system indicated on the official website. If the user decides to delete the software for any reasons, he/she can do so by using the methods supported by the operating system.
The product support of the software is provided by Shenzhen Yushengchang Technology Co.,Ltd.
5.8 Software updates or upgrades: Shenzhen Yushengchang Technology Co.,Ltd reserves the right to update or upgrade the software at any time. Mobile data charges by your operator might apply for the time required to download an update.
6. Users shall comply with the applicable laws and this agreement under the premise of the use of this software. Users shall not conduct the following, including but not limited to:
Deleting the information and contents regarding copyright in the software;
Reverse engineering, decompiling or disassembly the software;
Using this software in any unlawful manner or in any other manner inconsistent with this agreement, for any illegal purpose;
The use of this Software must comply with the applicable laws and policies, safeguard the national interests and national security, and be in compliance with this agreement;
Using unlicensed data or access to unauthorized servers;
Unauthorized access to device networks or other device systems to delete, modify or add information stored;
Without consent, attempt to probe, scan or test the software system or network or other acts that will endanger network security;
Attempt to interfere or disrupt the normal operations of the software system or network orintentionaly spread malicious programs or viruses to interfere or disrupt normal network information services;
Other actsendangering network security.