In order to better serve you, please read this "User Terms and Service Agreement Policy" (hereinafter referred to as "this Agreement") carefully. Before you start using the "Seek Esim" software and related services, you must read and fully understand this Agreement, especially the clauses involving exemption or limitation of liability, rights licensing and information use, terms for agreeing to and using special individual services, and legal application and dispute resolution clauses. Among them, important contents such as exemption or limitation of liability clauses will be highlighted in bold to draw your attention, and you should focus on reading them. If you are under 18 years old, please read and fully understand this Agreement under the accompaniment of your legal guardian and obtain their consent before downloading this software.
Unless you fully accept all the contents of this Agreement, you have no right to download, install, register, log in, use (hereinafter collectively referred to as "use") the "Seek Esim" software, or use the "Seek Esim" services in any way, or obtain any services provided by the "Seek Esim" software (collectively referred to as "use" in this Agreement). If you use the "Seek Esim" software and related services, it will be deemed that you have fully understood this Agreement and promise to accept the constraints of this Agreement as a party to it.
1.1 This Agreement is an agreement between you and the owner of "Seek Esim" (hereinafter referred to as "us") regarding your downloading, installing, registering, logging in, and using the "Seek Esim" software, and obtaining the related services provided by the "Seek Esim" software. We have the right to unilaterally decide, arrange, or designate our affiliates, controllers, successors, or third parties recognized by us to continue operating the "Seek Esim" software according to the needs of the "Seek Esim" software and related services or operations. Moreover, for some of the services involved in this Agreement, they may be provided to you by our affiliates, controllers, successors, or third parties recognized by us. You acknowledge and agree that by accepting the relevant service content, you also accept that the relevant rights and obligations are subject to the constraints of this Agreement.
1.2 "User" refers to all users who directly or indirectly obtain and use the "Seek Esim" software and related services, including natural persons, legal persons, and other organizations. In this Agreement, they are referred to as "User" or "you".
1.3 "Seek Esim" refers to the client application named "Seek Esim" that we legally own and operate. We have the right to unilaterally change the application and its name (including but not limited to renaming, adding new features, etc.).
1.4 The content of this Agreement also includes all the related agreements, rules, and other contents about the "Seek Esim" software and related services that we have already published and may continue to publish in the future. Once the aforementioned content is officially published and delivered to users in an appropriate manner (such as website publication, system notifications, etc.), it becomes an integral part of this Agreement, and you should also comply with it.
2.1 You may obtain the "Seek Esim" client application through pre-installation or by downloading from third parties authorized by us to use the "Seek Esim" software and related services. If you have not obtained this software from us or a third party authorized by us, we cannot guarantee that the non-official version of "Seek Esim" software will function properly, and we shall not be liable for any losses you may suffer as a result.
2.2 We may have developed different versions of the application software for different terminal devices. You should obtain, download, and install the appropriate version according to the actual condition of your device.
2.3 You may use the "Seek Esim" software and related services or update the "Seek Esim" version according to your own needs. If you no longer need to use the "Seek Esim" software and related services, you may uninstall it at your discretion.
2.4 In order to better enhance user experience and services, we will periodically provide software updates or changes (including but not limited to software modifications, upgrades, functional enhancements, development of new services, software replacements, etc.). To ensure the security of the "Seek Esim" software and related services and to improve user services, after the software and related services are updated or certain service contents are updated, we will notify users in possible ways, including but not limited to system prompts, announcements, and internal messages. Users have the right to choose to accept the updated version or service. If users do not accept, some functions will be restricted or no longer available.
2.5 Unless expressly authorized by us in writing in advance, you shall not engage in any unauthorized access or use of the "Seek Esim" software and related services, including but not limited to adaptation, copying, dissemination, mirroring, or trading.
2.6 You understand that to use the "Seek Esim" software and related services, you need to prepare terminal devices related to the software and services (such as computers, mobile phones, etc.) on your own. Once you open the "Seek Esim" software on your terminal device, it will be deemed that you are using the "Seek Esim" software and related services. To fully realize all the functions of "Seek Esim", you may need to connect your terminal device to the Internet. You understand that you bear the costs required (such as data charges, Internet access fees, etc.).
2.7 We grant you a personal, non-transferable, non-exclusive, and non-commercial license to legally use the "Seek Esim" software and related services. All other rights not expressly authorized in this Agreement are reserved by us. You must obtain our separate written permission to exercise these rights. Furthermore, our failure to exercise any of the aforementioned rights shall not be construed as a waiver of such rights.
2.8 You need to register to start using the "Seek Esim" software and related services. At the same time, you also understand that in order for you to better use the "Seek Esim" software and related services and to ensure the security of your account, certain functions and/or certain individual service items, such as recharge services, may require you to provide real identity information for real-name registration and login according to the relevant laws and regulations of the country/region where you are located before you can use them.
2.9 If you find any content in the "Seek Esim" software and website that infringes upon your rights, please immediately notify us through customer service and provide preliminary evidence of your relevant rights. We will handle your complaint in a timely manner according to local laws and regulations.
3.1 "Seek Esim" provides a registration channel for users, who have the right to choose a legal combination of characters as their account name and set a password that meets security requirements. The account and password set by the user serve as credentials for logging in and using the "Seek Esim" software and related services as a registered user.
3.2 You understand and agree that the account you set up must not violate any laws and regulations of any country or region, nor our relevant rules. Your account name, avatar, profile, and other registration information, as well as other personal information, must not contain illegal or inappropriate content. Without the permission of others, you must not use the names of others (including but not limited to impersonating others' names, titles, trade names, avatars, etc., in a way that is likely to cause confusion) to open an account. You must not maliciously register for "Seek Esim" accounts (including but not limited to frequent registration, batch registration of accounts, etc.). During the account registration and usage process, you must comply with relevant laws and regulations and must not engage in any actions that harm national interests, infringe upon the legal rights of other citizens, or are detrimental to social morals and customs. We have the right to review the registration information you submit.
3.3 The ownership and relevant rights of the account you register in "Seek Esim" belong to us. After completing the registration procedures, you only have the right to use the account. Your account is for your personal use only. Without our written consent, you are prohibited from gifting, lending, renting, transferring, selling, or otherwise permitting others to use the account in any form. If we discover or have reasonable grounds to believe that the user is not the original registrant of the account, we have the right to suspend or terminate the provision of services to the registered account without notice to you and to cancel the account without bearing any legal liability to the user who registered the account.
3.4 You are responsible for maintaining the security and confidentiality of your personal account and password and shall bear full legal responsibility for all activities conducted under your registered account name, including but not limited to any data modifications, statements made, payments made, etc., on "Seek Esim". You should place great importance on the confidentiality of your account and password and must not disclose your account and password to others under any circumstances. If you discover that others are using your account without permission or if any other security breach occurs, you should notify us immediately.
3.5 If you lose your account or forget your password, you may follow our complaint process to promptly request the recovery of your account or password. You understand and acknowledge that our password recovery mechanism only requires the identification of the information filled in on the complaint form to be consistent with the records in our system, and it cannot identify whether the complainant is the true authorized user of the account. We particularly remind you to properly keep your account and password. After use, you should log out securely. Any consequences resulting from improper custody, such as account theft or password loss, shall be borne by you.
3.6 When registering, using, and managing your account, you should ensure the authenticity of the identity information provided during account registration. Please use true, accurate, legal, and valid identity proof materials and necessary information (including your name, email address, contact phone number, mailing address, etc.) when registering and managing your account. In accordance with the laws and regulations of the country/region where you are located, to use this software and service, you are required to provide true identity information. Please complete real-name authentication in accordance with relevant legal provisions and pay attention to updating the above information in a timely manner. If the materials you submit or the information you provide is inaccurate, untrue, or illegal, or if we have reason to suspect that the information is erroneous, untrue, or illegal, we have the right to refuse to provide you with related services, or you may not be able to use the "Seek Esim" software and related services, or some functions may be restricted during use.
3.7 In addition to registering your own "Seek Esim" account, you may also choose to log in and use the "Seek Esim" software and related services through authorization using other software user accounts that you legally own, including but not limited to accounts from us and/or our affiliates, as well as real-name registered third-party software or platform user accounts, except where restricted or prohibited by the third-party software or platform. When you log in using the aforementioned existing accounts, you should ensure that the accounts have undergone real-name registration and agree to the relevant provisions of this Agreement.
3.8 You understand and agree that in addition to logging in and using the "Seek Esim" software and related services, you may also use your "Seek Esim" account to log in and use other software and services provided by us, our affiliates, or other partners. When you log in and use the aforementioned services with your "Seek Esim" account, you will also be subject to the "User Agreement" and other terms of service of the other software and service providers.
3.9 You acknowledge that you will be solely responsible for any account theft, loss, or other consequences resulting from malicious attacks by others, your own actions, or other force majeure events. We shall not bear any responsibility.
3.10 You understand that to make full use of account resources, if you do not log in for the first time after registration or if your account remains unused for more than two consecutive months, we reserve the right to reclaim your account at any time.
4.1 We, together with our users, are committed to the protection of user personal information (i.e., information that can independently or in combination with other information identify a user's identity). Protecting user personal information is one of our fundamental principles. Without your consent, we will not disclose your personal information to any organization or individual outside of us, except as otherwise provided by laws and regulations or this Agreement.
4.2 We will employ security technologies and other security measures commensurate with the "Seek Esim" software and related services, and establish a comprehensive management system to protect your personal information.
4.3 You may browse and modify your submitted personal identity information at any time. You understand and agree that for security and identity verification considerations (such as account or password recovery complaint services, etc.), you may not be able to modify the initial registration information and other verification information provided during registration.
4.4 We will not transfer or disclose your personal information to third parties, unless:
(1) We have obtained your explicit authorization in advance;
(2) The information you share;
(3) As required by relevant laws and regulations or in accordance with the requirements of judicial, administrative, or other state organs;
(4) To achieve the necessary purpose of providing services to you, we share the personal information necessary for providing services with our affiliates and partners. We and our affiliates and partners shall not use the shared personal information for any other purpose;
(5) For the purpose of maintaining public interest or academic research;
(6) To maintain the legitimate rights and interests of other users of "Seek Esim", us, our affiliates, controllers, or successors, such as finding, preventing, and handling issues related to fraud or security;
(7) We initiate litigation or arbitration against users to protect our legitimate rights and interests;
(8) In the event of a merger, division, acquisition, asset transfer, or similar transaction, if it involves the transfer of personal information, we will require the new holder of your personal information, whether it be a company or organization, to continue to be bound by this Privacy Policy. Otherwise, we have the right to require that organization to obtain your authorization again;
(9) In accordance with the provisions of the relevant terms of this Agreement.
4.5 Please be aware not to disclose your various financial accounts, bank cards, credit cards, third-party payment accounts, and corresponding passwords, and other important information while using the "Seek Esim" software and related services. Any losses incurred as a result will be borne by you. You should not publish, upload, or disseminate personal information through "Seek Esim".
5.1 User Conduct Requirements
You are responsible for your use of this product and related services. Unless permitted by law or with our prior written consent, you must not engage in the following behaviors when using the "Seek Esim" software and related services:
5.1.1 Using any plugins, extensions, systems, or third-party tools without our authorization or permission to interfere with, disrupt, modify, or otherwise affect the normal operation of the "Seek Esim" software and related services.
5.1.2 Engaging in any activities that endanger computer network security in relation to or targeting the "Seek Esim" software and related services, including but not limited to:
(1) Illegally intruding into others' networks, disrupting the normal functions of others' networks, stealing network data, and other activities that endanger network security;
(2) Providing programs or tools specifically designed for engaging in activities that intrude into networks, disrupt the normal functions and protective measures of networks, steal network data, and other activities that endanger network security;
(3) Knowing that others are engaging in activities that endanger network security, providing technical support, advertising promotion, payment settlement, and other assistance;
(4) Using data without permission or accessing servers/accounts without authorization;
(5) Entering public computer networks or others' computer systems without permission and deleting, modifying, or adding stored information;
(6) Attempting to probe, scan, test the vulnerabilities of the "Seek Esim" system or network or otherwise engaging in activities that endanger network security without permission;
(7) Attempting to interfere with or disrupt the normal operation of the "Seek Esim" system or website, intentionally spreading malicious programs or viruses, and other behaviors that destroy or interfere with normal network information services;
(8) Forging TCP/IP packet names or parts of names.
5.1.3 Reverse engineering, decompiling, disassembling, or otherwise attempting to discover the source code of the "Seek Esim" software.
5.1.4 Maliciously registering "Seek Esim" accounts, including but not limited to frequent and bulk account registrations.
5.1.5 Any other actions that violate laws and regulations, this Agreement, our relevant rules, and infringe upon the legal rights and interests of others.
In any case, if we have reason to believe that any of your actions violate or may violate the above agreements, we may independently make judgments and take actions, and at any time have the right to terminate the provision of services to users without any prior notice and pursue relevant responsibilities.
5.2 Information Content Standards
5.2.1 After users complete real-name authentication as required, they can log in to "Seek Esim" with their registered accounts or "Seek Esim" cooperative platform accounts to post content, make comments, etc.
5.2.2 We are committed to making the comment section a civilized, rational, friendly, and high-quality platform for opinion exchange. While promoting the development of the comment business, we continuously strengthen our information security management capabilities, improve self-discipline in comments, and earnestly fulfill our social responsibilities, complying with the laws and regulations of any country/region, respecting citizens' legal rights, and respecting social ethics and customs.
5.2.3 The content created, commented on, posted, and disseminated by users (including but not limited to private videos uploaded to the "Seek Esim" platform that are not publicly available) should consciously comply with the laws and regulations of the country/region where they are located, the socialist system, national interests, citizens' legal rights, social public order, moral standards, and the authenticity of information, which are the "seven bottom lines" requirements. Otherwise, we will immediately take corresponding measures. Users must not post the following information:
(1) Opposing the basic principles established by the Constitution;
(2) Endangering the national security of any country, or leaking any national secrets;
(3) Overthrowing the government of any country, subverting the socialist system, inciting the secession of any country, or undermining the unity of any country;
(4) Damaging the honor and interests of any country;
(5) Promoting terrorism or extremism;
(6) Inciting ethnic hatred, ethnic discrimination, or undermining ethnic unity;
(7) Inciting regional discrimination or regional hatred;
(8) Undermining any country's religious policies, promoting cults or superstitions;
(9) Fabricating and spreading rumors, false information, disrupting social order, or undermining social stability;
(10) Disseminating or spreading obscene, pornographic, gambling, violent, murderous, or terrorist content, or inciting criminal activities;
(11) Endangering network security, using the network to engage in activities that harm the national security, honor, and interests of any country;
(12) Insulting or defaming others, infringing upon the legal rights and interests of others;
(13) Threatening others with violence, intimidation, or conducting doxxing;
(14) Involving the privacy, personal information, or data of others;
(15) Spreading vulgar or obscene language, damaging social ethics and customs;
(16) Infringing upon the privacy rights, reputation rights, portrait rights, intellectual property rights, and other legitimate rights and interests of others;
(17) Spreading commercial advertisements, or similar commercial solicitation information, excessive marketing information, and spam;
(18) Using languages other than the commonly used language of this website for comments;
(19) Completely unrelated to the information being commented on;
(20) Posting information that is meaningless, or deliberately using character combinations to evade technical review;
(21) Infringing upon the legitimate rights and interests of minors or harming their physical and mental health;
(22) Taking photos or recording others without permission, infringing upon their legal rights;
(23) Containing content that is terrifying, violent, bloody, highly dangerous, or harmful to the physical and mental health of the performer or others, including but not limited to the following situations:
Any content involving violent and/or self-harming behavior;
Any content that threatens life and health, using dangerous instruments such as knives to perform acts that endanger one's own or others' personal and/or property rights;
Content that incites or induces others to participate in dangerous or illegal activities that may cause personal injury or lead to death.
(24) Other information that violates laws and regulations, policies, and social ethics, interferes with the normal operation of "Seek Esim", or infringes upon the legitimate rights and interests of other users or third parties.
6.1 Without our written permission, users shall not independently or authorize, permit, or assist any third party to engage in the following behaviors regarding the information content in this Agreement's "Seek Esim" software and related services:
(1) Copying, reading, or adopting the information content of "Seek Esim" software and related services for commercial purposes, including but not limited to publicity, increasing reading volume, page views, etc.;
(2) Editing, organizing, or arranging the information content of "Seek Esim" software and related services and displaying it on channels other than the source pages of "Seek Esim" software and related services;
(3) Using any form of identification methods, including but not limited to special marks, special codes, etc., to independently or assist third parties in generating traffic, reading volume guidance, diversion, hijacking, or other adverse effects on the information or content of "Seek Esim" software and related services;
(4) Any other illegal acquisition of the information content of "Seek Esim" software and related services.
6.2 After obtaining our written permission, when users share or forward the information and content of "Seek Esim" software and related services, they should also comply with the following norms:
(1) For any data related to retention rate, payment, registration volume, etc., obtained through crawling, statistics, or other means, without our prior written consent, the above data shall not be disclosed, provided, or leaked to any third party in any way;
(2) No modifications of any kind shall be made to "Seek Esim" software and related services, including but not limited to the recharge entry of "Seek Esim" software and related services, nor shall any obstruction be made to the display of the source pages of "Seek Esim" software and related services in any form, such as covering, inserting, pop-ups, etc.;
(3) Effective, secure, and stringent measures shall be taken to prevent the information content of "Seek Esim" software and related services from being illegally obtained by third parties through any means, including but not limited to "spider" programs;
(4) The data content shall not be used for purposes beyond the scope of our written permission, for any form of sales or commercial use, or disclosed, provided, or permitted for use by third parties in any way;
(5) When users share, forward, or copy the information content of "Seek Esim" software and related services to any third party, they should also comply with other norms and standards established by us for this purpose.
7.1 In response to your actions that violate this Agreement or other service terms, we have the right to independently judge and take measures such as preliminary warnings, short-term prohibition of speech, restriction of account functions in part or in whole, or permanent account closure, depending on the situation. We have the right to announce the results of the handling and decide whether to restore usage based on the actual situation. For actions suspected of violating laws and regulations or involving criminal offenses, we will keep relevant records and report to the competent authorities as required by law, and cooperate with the investigation. We have the right to not return any deleted content.
7.2 If your violation of this Agreement or other service terms leads to complaints or litigation claims from third parties, you shall bear full legal responsibility on your own. If your illegal or breach of contract behavior causes us and our affiliates, controllers, or successors to compensate any third party or suffer penalties from state organs, you shall also fully compensate us and our affiliates, controllers, or successors for all losses suffered thereby.
7.3 We respect and protect the intellectual property rights, reputation rights, name rights, privacy rights, and other legitimate rights and interests of legal persons and citizens. You guarantee that the text, videos, audio, and other content uploaded when using the "Seek Esim" software and related services do not infringe upon any third party's intellectual property rights, reputation rights, name rights, privacy rights, or other rights and legitimate interests. Otherwise, we have the right to remove the allegedly infringing content upon receiving a notice from the rights holder or relevant party. You shall bear full legal responsibility for all rights claims made by third parties; if your infringing actions cause us and our affiliates, controllers, or successors to suffer losses (including but not limited to economic and reputational losses), you shall also fully compensate us and our affiliates, controllers, or successors for all losses suffered thereby.
8.1 You understand and agree that the "Seek Esim" software and related services provided by us are offered as is, subject to the current state of technology and conditions. We will make our best efforts to provide you with services, ensuring the continuity and security of the services. You understand that we cannot always foresee and prevent legal, technical, and other risks, including but not limited to force majeure, viruses, trojans, hacker attacks, system instability, flaws in third-party services, and various security issues that may lead to service interruptions, data loss, and other losses and risks.
8.2 You understand and agree that for the overall operation of the services, we have the right to modify, interrupt, suspend, or terminate the "Seek Esim" software and related services after public notice, without being responsible to users or bearing any compensation liability.
9.1 During the use of the "Seek Esim" software and related services, you fully understand and agree that this service may include information, advertising, and brand promotion services that we offer to individuals or enterprises. You agree that we have the right to display commercial advertisements, promotions, or information (including commercial or non-commercial information) related to "Seek Esim" software and related services, as well as those of third-party suppliers and partners, within the "Seek Esim" software and related services.
9.2 If you do not agree with the advertisement, you have the right to choose to close the advertisement information; for "Seek Esim" push notification services, you have the right to turn off the service or stop using the "Seek Esim" software and related services.
9.3 We fulfill our obligations related to advertising and promotion in accordance with the law. You should independently judge the authenticity and reliability of the advertisement or promotional information and be responsible for your own judgments. Except as expressly provided by law, any purchases, transactions, or damages or losses suffered by you due to the advertisement or promotional information shall be borne by you, and we shall not be liable.
10.1 The intellectual property rights of the content we provide in the "Seek Esim" software and related services (including but not limited to software, technology, programs, web pages, text, images, graphics, audio, video, charts, layout designs, electronic documents, etc.) belong to us. The copyright, patents, and other intellectual property rights of the software on which we rely to provide this service all belong to us. Without our permission, No one may use them without authorization (including but not limited to using any robots, spiders, or other programs or devices to monitor, copy, disseminate, display, mirror, upload, or download content from the "Seek Esim" software and related services).
10.2 You understand and agree that any text, images, videos, audio, and other content you post and upload while using the "Seek Esim" software and related services are either created by you or have been legally authorized (including sublicensed). Any content you upload and post through "Seek Esim" is owned by you or the original copyright holder.
10.3 You acknowledge, understand, and agree that any content you post and upload through "Seek Esim" (including but not limited to text, images, videos, audio, music works, sounds, dialogues included in videos and/or audio, etc.) grants us and our affiliates, controllers, and successors a worldwide, royalty-free, non-exclusive, sublicensable (through multiple tiers) right (including but not limited to the rights of reproduction, translation, compilation, information network dissemination, adaptation, and creation of derivative works), with the scope of use including but not limited to current or other websites, applications, products, or terminal devices. You hereby confirm and agree that the grant of the aforementioned rights includes the use of the content (in whole or in part) in any promotion, advertising, marketing, and/or publicity related to the content, "Seek Esim", us, and/or our brands. To avoid doubt, you agree that the grant of the aforementioned rights includes the right and permission to use, reproduce, and display your personal image, portrait, name, trademarks, service marks, names, logos, and our marks (if any) as well as any other brand, marketing, or promotional assets that you own or are licensed to use and that are embedded in the content.
10.4 You confirm and agree to authorize us to enforce the intellectual property rights of the content you upload and post on your behalf, either in our own name or by entrusting professional third parties. The forms of enforcement include but are not limited to: monitoring infringement, sending cease and desist letters, initiating lawsuits or arbitrations, mediating, and settling. We have the right to make decisions regarding enforcement matters and to implement them independently.
10.5 We provide technical support for the development and operation of "Seek Esim" and have all rights to all data and information generated in the process of developing and operating "Seek Esim" software and related services.
10.6 Please do not use any of our trademarks, service marks, trade names, domain names, website names, or other distinctive brand features (collectively referred to as "marks") without authorization, including but not limited to "Seek Esim". Without our prior written consent, you may not display, use, or apply to register the aforementioned marks as trademarks, register domain names, or engage in any behavior that implies or suggests to others that you have the right to display, use, or otherwise handle these marks. If you violate this agreement and use our trademarks or marks, causing losses to us or others, you shall bear full legal responsibility.
"Seek Esim" places great importance on the protection of user information. Before using the "Seek Esim" software and related services, we may collect and use certain information related to you. Please read this privacy policy carefully. By choosing to use the "Seek Esim" software and related services, you agree that we may collect, use (including for commercial cooperation), store, and share your relevant information in accordance with this privacy policy.
11.1 Scope and Methods of Information Collection
11.1.1 When we provide services, we may collect, store, and use the following information related to you. If you do not provide the relevant information, you may not be able to register as a user of "Seek Esim" or enjoy some of our services, or the services may not achieve the intended effects.
11.1.2 You understand and agree that when you use the "Seek Esim" software and related services, the information you fill in and/or provide may include personal information such as name, gender, contact details, etc., which can be used alone or in combination to identify user identity. You may choose not to provide one or more pieces of information, but this may prevent you from using certain special services of "Seek Esim".
11.2 Information Obtained Through the Use of "Seek Esim" Software and Related Services
11.2.1 Log Information
(1) When you use "Seek Esim" products or services, to provide you with a more convenient access experience, we may use various technologies to collect and store information, during which we may send one or more cookies or anonymous identifiers to your device. This is done to understand your usage habits, so that you do not have to repeat the steps of entering registration information, or to help judge the security of your account.
(2) When you use "Seek Esim" products or services, we may use cookies and similar technologies to collect your information to understand your preferences, conduct consultations or data analysis, improve product services and user experience, enhance advertising effectiveness, and promptly detect and prevent security risks, providing better services for users and partners.
(3) We will not use cookies for any purpose other than those stated in this privacy policy. You can retain or delete cookies according to your preferences. You can clear all cookies saved in the software or web pages, and once you manually clear them, your relevant information will be deleted.
11.2.2 Device or Application Information: Certain mobile devices or applications contain unique application numbers. For example, the configuration information provided by the mobile device, browser, or other programs you use to access "Seek Esim" services, device version numbers, and device identification codes, IP addresses, etc.
To provide better services and improve user experience, we may record information such as hardware model, operating system version number, International Mobile Equipment Identity (IMEI), network device hardware address (MAC), etc.
11.2.3 Location Information: When you enable device location functions and use "Seek Esim" services based on location, the system will automatically process the device's location information through GPS or WLAN, etc., so that you do not have to manually enter your geographical coordinates to obtain related services. You can stop "Seek Esim" software from collecting your geographical location information by turning off the location function (most mobile devices will allow you to turn off location services; for specific advice, please contact your mobile device service provider or manufacturer).
11.3 Use of Information
11.3.1 By using the collected information, we will be able to provide you with personalized services and improve existing services.
11.3.2 By using the collected information, we will provide you with more relevant advertisements instead of universally broadcasted advertisements.
11.3.3 We may share your personal information with "Seek Esim" affiliates, controllers, and other partners to jointly provide you with the services or content you request. In cases where the service or content is essential for that product/service, you agree that we may share your personal information with them, and we will endeavor to ensure that such third parties also comply with this privacy policy as well as other confidentiality and security obligations when using your personal information.
11.3.4 We do not publicly disclose or provide users' personal information to third parties, except in the following circumstances:
(1) With your prior explicit authorization;
(2) Information you share;
(3) In accordance with relevant laws and regulations or as required by judicial, administrative, or other state organs;
(4) To achieve the reasonable use of your personal information or to fulfill the provisions of this agreement or the obligations and exercise our rights under this privacy policy, we share your personal information with our affiliates, partners, or third parties acting on our behalf (for example, telecommunications service providers who send push notifications on our behalf);
(5) For the purpose of maintaining public interest or academic research;
(6) To maintain the legitimate rights and interests of other users of "Seek Esim", us, our affiliates, controllers, or successors, such as finding, preventing, and handling issues related to fraud or security;
(7) We initiate litigation or arbitration against users to protect our legitimate rights and interests;
(8) In the event of a merger, division, acquisition, asset transfer, or similar transaction, if it involves the transfer of personal information, we will require the new holder of your personal information, whether it be a company or organization, to continue to be bound by this privacy policy. Otherwise, we have the right to require that company or organization to obtain your authorization again;
(9) In accordance with the provisions of the relevant terms of this user agreement.
11.4 Information Security
11.4.1 We place great emphasis on information security. We strive to provide security for your information to prevent it from being improperly used or accessed, used, or disclosed without authorization.
11.4.2 We will use various security protection measures within a reasonable and safe level, such as encryption technology (e.g., SSL), anonymization processing, and other means to protect your personal information.
11.4.3 We have established a dedicated data security department, security management systems, and processes to ensure the security of your personal information. We implement strict data usage and access systems and conduct special data and technology security audits. In the event of a personal information leak or other security incidents, we will activate emergency response plans to prevent the incident from escalating and notify you in forms such as push notifications and announcements.
11.4.4 Although we have taken the above reasonable and effective measures and have complied with the standards required by relevant laws and regulations, please understand that due to the limitations of technology and the existence of various malicious means, in the internet industry, even if we do our utmost to strengthen security measures, it is impossible to ensure the absolute security of information at all times. You should be aware that the systems and communication networks you use to access our services may be subject to problems due to factors beyond our control. Therefore, you should take active measures to protect the security of your personal information, such as regularly changing passwords and not disclosing your account passwords and other personal information to others. You acknowledge that the personal information protection measures provided by "Seek Esim" only apply to the "Seek Esim" platform. Once you leave "Seek Esim" and browse or use other websites, services, and content resources, "Seek Esim" has no ability or obligation to protect any personal information you submit on websites outside of "Seek Esim", regardless of whether you access or browse the aforementioned websites based on links or guidance from "Seek Esim".
11.5 This privacy policy does not apply to the following situations:
11.5.1 Information collected by third-party services (including any third-party applications and websites) accessed through the "Seek Esim" software and related services;
11.5.2 Information collected by other entities or organizations that provide advertising services within the "Seek Esim" software and related services.
11.6 Our services may include or link to information or other services (including websites) provided by third parties. These third-party services may be operated by the relevant third parties. Your use of such third-party services (including any personal information you provide to such third parties) is subject to the service terms and privacy policies of those third parties (not this privacy policy), and you should carefully read their terms. Please protect your personal information properly and only provide it to others when necessary. This privacy policy only applies to the information we collect, store, and use and does not apply to any services provided by third parties or the rules of third-party information usage. We assume no responsibility for any use of information provided by you to third parties.
12.1 You understand and agree that the "Seek Esim" software and related services may be affected or interfered with by various factors. We do not guarantee (including but not limited to):
12.1.1 That we will fully meet the usage requirements of users;
12.1.2 That we will be free from interference, timely, secure, reliable, or error-free; that any software, services, or other materials obtained by users through us will meet their expectations;
12.1.3 That any errors in the software will be corrected.
12.2 For information involving loans or other property-related network information, account passwords, advertisements, or promotional information, users should exercise caution and make their own judgments. Based on the aforementioned reasons, if you suffer losses such as profits, business reputation, data loss, or other tangible or intangible losses, we will not bear any direct, indirect, incidental, special, consequential, or punitive liability.
12.3 Users understand and agree that during the use of the "Seek Esim" software and related services, they may encounter force majeure factors (force majeure refers to objective events that cannot be foreseen, overcome, or avoided), including but not limited to government actions, natural disasters, network issues, hacker attacks, wars, or any other similar events. In the event of force majeure, we will strive to repair the situation as soon as possible. However, if users suffer losses due to force majeure, users agree that we will not be held responsible.
12.4 We reserve the right to handle illegal or non-compliant content in accordance with the terms of this agreement, but this right does not constitute our obligation or commitment. We cannot guarantee the timely discovery of illegal activities or corresponding handling.
12.5 Users clearly understand and agree that regarding this service, we do not provide any kind of express or implied warranty or condition, including but not limited to merchantability, fitness for a particular purpose, etc. You must bear the corresponding risks for your use of this software and related services under this agreement.
12.6 Users clearly understand and agree that this agreement is made to ensure compliance with national laws and regulations, to maintain public order and good morals, and to protect the legitimate rights and interests of others. We will make the best efforts within our capabilities to make judgments in accordance with relevant laws and regulations, but we do not guarantee that our judgments will be completely consistent with those of judicial or administrative authorities. Users understand and agree to bear the consequences thereof.
13.1 The "Seek Esim" software and related services include information or information content links that we obtain through various legal means, as well as other individual services that we and our affiliates operate legally. These services may exist in "Seek Esim" in the form of separate sections. We have the right to increase, decrease, or change the settings and services of these special sections from time to time.
13.2 You can enable and use the above individual service functions within the "Seek Esim" software. Some individual services may require you to also accept agreements or other rules specifically formulated for that service, which will govern the relationship between you and the service provider. We will provide these agreements and rules in a conspicuous manner for your review. Once you start using the aforementioned services, it means that you are also subject to the relevant agreements and rules of the individual services.
13.3 If you use software and related services provided by third parties within the "Seek Esim" software, in addition to complying with this agreement and the relevant rules of "Seek Esim", you must also comply with the agreements and rules of the third parties. Any disputes, losses, or damages arising from third-party software and related services shall be resolved between the user and the third party.
14.1 If the user is a minor under the age of 18, they should read this agreement and use the "Seek Esim" software and related services under the supervision, guidance, and with the consent of their guardian.
14.2 We place great importance on the protection of minors' personal information. When filling in personal information, minor users should enhance their awareness of personal protection and exercise caution. Please use the "Seek Esim" software and related services correctly under the guidance of a guardian.
14.3 Minor users understand that if you violate laws and regulations or the content of this agreement, you and your guardian shall bear all consequences in accordance with the law.
14.4 Special Notes for Minor Users
14.4.1 Adolescents using the "Seek Esim" software and related services should do so under the supervision and guidance of their guardians, learning to use the internet correctly within a reasonable scope, avoiding addiction to virtual cyberspace, and developing good internet habits.
14.4.2 To better protect the privacy rights of minors, we remind users to post content containing minors with caution. Once posted, it is considered that the user agrees to allow "Seek Esim" to display information, images, and voices of minors, and permits "Seek Esim" to use and process such content related to minors in accordance with this agreement.
15.1. If any part of this agreement is unenforceable under the law, then that part shall be effective to the maximum extent permitted by law, and the remaining parts shall remain fully valid and effective.
15.2. This agreement is governed by the laws of Hong Kong. You hereby irrevocably submit to the exclusive jurisdiction of the courts of Hong Kong.
15.3. In the event of any claim, lawsuit, or demand arising from or related to your use or alleged use of this website or its content, or your breach of this agreement, including but not limited to reasonable legal and accounting fees, you agree to defend, indemnify, and hold us, our officers, directors, employees, and agents harmless.
15.4. This agreement is governed by the laws of Hong Kong. You hereby irrevocably submit to the exclusive jurisdiction of the courts of Hong Kong.
16.1. "We" refers to Swift Esim Limited
If you need more information about these terms of use, wish to provide feedback, or make a complaint, you can contact our team at any time through the following methods: