User Services Agreement
Update time: April 22, 2023
Effective date: April 22, 2023
If you have any questions, comments or suggestions, please contact us through the following contact information: Email: lihao@zmvr.cn
Thank you for trusting and using Duokai Clone Hidden Master (formerly Hidden Application Master) software. Changsha Zhimeng Experience Technology Co., Ltd. (hereinafter referred to as "we"), as the operator of "Duokai Clone Hidden Master (formerly Hidden Application Master)", We are fully aware of the importance of personal information to you and will do our best to protect the safety and reliability of your personal information. We are committed to maintaining your trust in us and abiding by the following principles to protect your personal information: principle of consistency of rights and responsibilities, principle of clear purpose, principle of choice and consent, principle of minimum necessity, principle of ensuring security, principle of subject participation, principle of openness and transparency, etc. In order to better serve you, please carefully read and fully understand this agreement, especially the terms involving exemption or limitation of liability, before starting to use the "Duokai Clone Hidden Master (formerly Hidden Application Master)" software and related services. , rights licensing and information use terms, terms for agreeing to activate and use special individual services, legal application and dispute resolution terms, etc. Among them, important contents such as exemption or limitation of liability clauses will be highlighted in bold and you should read them carefully.
basic requirements
If you are under 18 years old, please carefully read and fully understand this agreement accompanied by your legal guardian, and use the "Duokai Clone Hidden Master (formerly Hidden Application Master)" software and related services with the consent of your legal guardian.
Multi-open clone hidden master (original hidden application master) software and related services
2.1 When you use the "Multi-open Clone Hidden Master (formerly Hidden Application Master)" software and related services, you can obtain the "Multi-open Clone Hidden Master (Hide Application Encryption Master)" client application through authorized third-party downloads from the application market. program or visit the website related to Duokai Clone Hidden Master (Hide Application Encryption Master). If you do not obtain the "Multi-open Clone Hidden Master (Hide Application Encryption Master)" software from the company or a third party authorized by the company, the company cannot guarantee the unofficial version of the "Multi-open Clone Hidden Master (Hide Application Encryption Master)" software It can be used normally, and the loss you suffer has nothing to do with the company.
2.2 You can start using the "Multi-Open Avatar Hidden Master (formerly Hidden Application Master)" software and related services without registration, but some functions or services may be affected.
3. About "Account"
3.1 "Duokai Hidden Master (formerly Hidden Application Master)" software and related services provide you with a registration channel. You have the right to choose a legal character combination as your account and set a password that meets security requirements. The account and password set by the user are the credentials used by the user to log in and use the "Duokai Clone Hidden Master (formerly Hidden Application Master)" software and related services as a registered user.
3.2 Account cancellation When you need to terminate the use of the "Multiple Clone Hidden Master (former Hidden Application Master)" account service, you can apply to cancel your "Multiple Clone Hidden Master (Hide Application Encryption Master)" account if the following conditions are met:
(1) You can only apply to cancel your own account and cancel according to the process of "Open Multiple Avatar Hidden Masters (Original Hidden Application Master)";
(2) After successful cancellation, account records, functions, etc. will not be restored or provided.
4. Protection of user personal information
Protecting users' personal information is one of the company's basic principles. Users must properly protect the passwords they set; we have used security protection measures that comply with industry standards to protect the personal information you provide and prevent data from unauthorized access and public disclosure. , use, modification, damage or loss. We will take all reasonably feasible measures to protect your personal information. For example, AES encryption, etc. For more information about the protection of your personal information, please refer to the "Duokai Clone Hidden Master (formerly Hidden Application Master) Privacy Policy".
5. User Code of Conduct
5.1 User behavior requires you to be responsible for your use of the "Duokai Clone Hidden Master (formerly Hide Application Master)" software and related services. Unless permitted by law or with the company's prior written permission, you may not use "Duokai Clone Hidden Master (formerly Hide Application Master)" to Application Master)" software and related services shall not engage in the following behaviors:
5.1.1 Use any plug-ins, plug-ins, systems or third-party tools that are not authorized or permitted by the company to interfere with, destroy, modify or impose restrictions on the normal operation of the "Duokai Clone Hidden Master (formerly Hidden Application Master)" software and related services. Other effects.
5.1.2 Use or target the "Duokai Clone Hidden Master (former Hidden Application Master)" software and related services to conduct any behavior that endangers computer network security, including but not limited to: (1) Illegal intrusion into the network, interference with normal network functions, and theft Network data and other activities that endanger network security;
(2) Providing programs and tools specifically used to invade the network, interfere with the normal functions and protective measures of the network, steal network data and other activities that endanger network security;
(3) Knowing that others are engaged in activities that endanger network security, provide them with technical support, advertising promotion, payment and settlement and other assistance;
(4) Use unauthorized data or enter unauthorized servers/accounts;
(5) Entering public computer networks or other people’s computer systems without permission and deleting, modifying, or adding stored information;
(6) Attempt to explore, scan, and test the weaknesses of the "Multi-open Clone Hidden Master (formerly Hidden Application Master)" system or network without permission, or perform other acts that undermine network security;
(7) Attempting to interfere with or destroy the normal operation of the "Duokai Hidden Master (formerly Hidden Application Master)" system or website, intentionally spreading malicious programs or viruses and other behaviors that disrupt and interfere with normal network information services;
(8) Forge TCP/IP packet name or part of the name;
(9) Reverse engineer, reverse assemble, compile or otherwise try to discover "Multi-open Clone Hidden Master (former Hidden Application Master)" software and related services Source code for software and related services;
(10) Malicious registration of "Multiple Avatar Hidden Master (formerly Hidden Application Master)" accounts, including but not limited to frequent and batch registration of accounts;
(11) Violate laws, regulations, this agreement, the company's relevant rules and other behaviors that infringe on the legitimate rights and interests of others.
5.2 Information content display and specifications
5.2.1 The information you create, share, publish, and disseminate (including but not limited to unpublished private videos shot or uploaded to the "Duokai Clone Hidden Master (formerly Hidden Application Master)" platform) should consciously abide by laws and regulations, The "seven bottom lines" requirements include the socialist system, national interests, citizens' legitimate rights and interests, social public order, morals and information authenticity, otherwise the company has the right to immediately take corresponding measures. You agree and promise not to produce, copy, publish, or disseminate the following information:
(1) Opposing the basic principles established by the Constitution;
(2) Endangering national security and leaking state secrets;
(3) Subverting state power, overthrowing the socialist system, inciting to split the country, and undermining national unity;
(4) Damaging national honor and interests;
(5) Promote terrorism and extremism;
(6) Promoting ethnic hatred and discrimination and undermining ethnic unity;
(7) Inciting regional discrimination and hatred;
(8) Undermining national religious policies and promoting cults and feudal superstitions;
(9) Fabricating and spreading rumors and false information to disrupt economic and social order and undermine social stability;
(10) Spread or disseminate obscenity, pornography, gambling, violence, murder, terror or instigate crimes;
(11) Endangering network security or using the network to endanger national security, honor and interests;
(12) Insulting or defaming others and infringing upon others’ legitimate rights and interests;
(13) Intimidating and threatening others with violence, and conducting human flesh searches;
(14) Involving other people’s privacy, personal information or data;
(15) Spreading obscene words and damaging public order and good morals;
(16) Content that infringes on other people’s privacy rights, reputation rights, portrait rights, intellectual property rights and other legitimate rights and interests;
(17) Disseminate commercial advertisements, or similar commercial solicitation information, excessive marketing information and spam information;
(18) Comments in languages other than those commonly used on this website;
(19) Has nothing to do with the information being commented on;
(20) The information published is meaningless, or character combinations are deliberately used to evade technical review;
(21) Violating the legitimate rights and interests of minors or harming the physical and mental health of minors;
(22) Secretly photographing or recording others without their permission, infringing upon others' legitimate rights;
(23) Content that contains horror, violence, gore, high risk, and endangers the physical and mental health of the performer or others, including but not limited to the following situations:
Any violent and/or self-destructive content;
Any content that threatens life and health, uses knives and other dangerous instruments to perform and endangers the personal and/or property rights of yourself or others;
iii. Content that encourages or induces others to participate in dangerous or illegal activities that may cause personal injury or death;
(24) Other information that contains content that violates laws, regulations, policies, public order and good customs, interferes with the normal operation of "Duokai Clone Hidden Master (former Hidden Application Master)" or infringes upon the legitimate rights and interests of other users or third parties.
6.Breach of contract handling
6.1 In response to your violation of this agreement or other terms of service, the company has the right to independently judge and take advance warning, refuse to publish, immediately stop transmitting information, delete content or comments, ban the publication of content for a short period of time, or restrict some or all functions of the account as appropriate. The company does not assume any responsibility for the consequences of measures such as terminating the provision of services and permanently closing your account, which may cause you to be unable to use your account and related services normally, or to obtain the assets or other rights and interests in your account.
7. Subscription instructions:
The following subscription methods are provided (only for iOS version): Annual VIP, Quarterly VIP, Monthly VIP
1. Subscription fee will be charged after confirmation of purchase, and the fee will be automatically deducted from iTunes.
2. If you want to cancel the subscription, please cancel before the VIP time expires, otherwise the subscription will be automatically renewed at the price of the original package.
3. The renewal fee will be automatically deducted before the expiration of the VIP period you selected, and you do not need to pay manually.
4. Unless automatic renewal is turned off at least 24 hours in advance before the end of the current subscription period, the subscription will automatically renew at the same price and duration as the original package. 5. Users can manage subscriptions. If the subscription is not closed at least 24 hours before the end of the subscription period, the subscription will be automatically renewed.
6. Any unused portion of the free trial period (if provided) will be forfeited when the user purchases the VIP subscription service. If you have any questions, comments or suggestions about this personal information protection policy, you can contact us by contacting the online customer service in the software or writing an email.
Contact us: lihao@zmvr.cn