Sekyo Products, Services & App Privacy Policy

Sekyo (“we,” “our,” or “us”) understand the importance of your personal information, we will protect it in accordance with laws and regulations. We have made this Privacy Policy (“this policy”and specifically advise that read and understand this Policy carefully before you use Sekyo and related services (“our services”) to make appropriate choices.

This policy will help you understand:
  • We collect and use your information in accordance with the policy, However, we will not collect it in a package as a way to force bundles even if you agree this Policy.
  • When you use the services or turn on features, we collect and use the necessary information for the functionality and services. You may refuse to provide and it do not affect other features or services unless necessary to achieve basic business functions or as required by law and regulation. We will itemize what is necessary in the Policy.
  • If your account is not signed in, We will guarantee the basic function of information push by using the device’s corresponding identifier information. If you log in to your account, we will implement information push based on account information.
  • Contacts, precise geographic locations, cameras, microphones, photo album permissions are not turned on by default, only when you are authorized to use them for specific features or services, or you can withdraw authorization. In particular, we do not collect your information when the relevant features or services are not required, even if we have obtained these sensitive permissions with your authorization.
  • This Policy applies to your access to and use of our services through Sekyo applications, Sekyo software development Kit (SDK) and application Programming Interface (API) for third-party websites and applications.

The following will help you learn more about how we collect, use, store, transfer, share, transfer (if applicable) and protect personal information, and understand how to query, access, delete, correct, and withdraw authorized personal information. Among them, the important content of the terms about your personal information interests we have been prompted in bold form, please pay particular attention to this part.

  1. How we collect and use personal information
  2. Additional information for permission to use
  3. Additional information on the use of third-party (SDK / API / H5) access rights
  4. How we use similar technologies like cookies
  5. How we share, transfer, and publicly disclose personal information
  6. How we store personal information
  7. How we protect the security of personal information
  8. Manage your personal information
  9. Terms of use for minors
  10. Changes and notifications of the Policy
  11. Contact us

1. How we collect and use personal information

We collect information you provide to us directly when you use the Services.:

1.1 Sign up, log in, authenticate

1.1.1 Sign up and Login

  1. When you Sign up and log in to our services, to create an account, you must provide the relevant network identification information (avatar, nickname, password). You can choose to fill in your gender, birthday, region, and personal profile to complete your information. At the time, we also store your user account preferences and settings. 
  2. You may also use a third-party account to log in and use Sekyo, and you will authorize us to obtain public information (avatars, nicknames and other information that you authorize) registered on the third-party platform for binding to Sekyo account so that you can log in directly and use our services.

1.1.2 Authenticate

When you use a feature or service for authentication (Parenting or Counselor), according to relevant laws and regulations, You may need to provide your real identity information (phone number) or relevant certificate (psychologist qualification) to complete the verification. This information is sensitive to personal information that you may refuse to provide, but you may not be able to access the services without affecting the normal use of other features and services. 

1.2 Information Browsing

  1. Sekyo may recommend information that you are interested in, and we may collect the necessary log information to achieve this feature.
  2. The log information used for information display includes:

Actions you take when using the Services: click, follow, favorite, search, browse, forward

Information you provide on your initiative: feedback, post, like, comment

Geographical information: Sensor information such as GPS information, Wi-Fi access points, Bluetooth and base stations

c . The above information we collect and use is de-identified, and data analysis corresponds only to specific, unrelated codes that do not directly relate to your identity and is not associated with your real identity.

1.3 Function and Interaction

1.3. 1 Function

a . When you use features related to uploading images, WeChat, and video chat, we will ask you to authorize your camera, photo, microphone. If you refuse, you will not be able to use this feature, but it will not affect the normal use of other features.

b . When you use ” IoT SIM card” for real-name authentication according to the requirements of laws and regulations, you need to verify your identity through “face recognition” . In the process, the Third Party Certification Agency requires you to provide real name, ID number and facial feature value information. This information is sensitive to personal information that you can refuse to provide without affecting the normal use of other features. This information is only for real-name authentication and purposes specified by laws and regulations and it will not be used for other purposes without your express authorization. 

1.3. 2 Release Information

  1. When you post content, comments, questions or answers, we will collect information about your posts and display your nicknames, avatars, and published content.

b . When you post and select a display location, we will ask you to authorize geographic location permissions and collect location information related to this service. If you refuse to provide accurate geographic location information, you will not be able to use this feature, but it will not affect the normal use of other features.

c .We collect information you provide to us when you use the services (such as information related to you in comments, messages, post graphics, audio and video).

1.3. 3 Interactive Communication

  1. When you actively follow and interact with the accounts and circles that you are interested in, and browse, comment, collect, like or forward content, we collect the accounts you follow and show you what you care about.
  2. When you add contacts by using the Phone Book, Receipt Address feature, we will request contacts permission and encrypt the information in the address book with an encryption algorithm. Contacts information is sensitive personal information, if you refuse to provide, it will only prevent you from using the Quick Add feature, use of other features on Sekyo would not affect.

    1.4 Search

    When you use the search service on Sekyo, we will collect your search keyword information and log records. To provide you an efficient search service, some of the information is temporarily stored on your local storage device and shows you the results and history what’s been searched.

    1.5 Safe Operation

    1.5.1 Security Features

    We are committed to providing you a safe, trusted product and environment, and providing quality and reliable service, and it is our core goal. Information collected to achieve security features is essential.

    1.5.2 Device Information and Log Information

    1. To keep your software and services running securely, we collect your hardware model, operating system version number, international mobile device identification number, unique device identifier, network device hardware address, IP address, Wi-Fi access point, Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, Use, service logs.
    2. To prevent malicious programs and secure operations, we collect installed application information or process information that is running, the overall operation of the application, usage and frequency, application crashes, overall installation usage, performance data, application sources.
    3. We may use your account information, device information, service log information, and information that our affiliates and partners may use to determine account security, authenticate, detect, and prevent security incidents when you are authorized or legally available to you.

    1.6 Changes in the Purpose of Collecting and Using Personal Information

    Please be aware that as our business grows, changes may be made to the functionality and services provided by us. In principle, when new features or services are relevant to the features or services we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. We collect and use your personal information in a situation where there is no direct or reasonable association with the original processing purpose, and we will inform you again and re-obtain your consent.

    1.7 Exemption From Obtaining Consent To Collect and Use Personal Information

    Please understand that in accordance with laws and regulations and relevant national standards, we collect and use your personal information without your authorization in the following cases :

    1. Those Directly related to national security, national defense security;

    b.Those Directly related to public safety, public health, and major public interests;

    c.Those Directly related to criminal investigation, prosecution, trial and enforcement of sentences;

    d.Those For the purpose of safeguarding the personal information subject or other personal life, property and other important legal rights and interests which is difficult to obtain an individual’s consent;

    1. Those The personal information we collect is that you disclose to the public by yourself;
    2. Those Personal information collected from legally publicly disclosed information, such as legitimate news reports, government information disclosure, etc.;
    3. Those Necessary to enter or perform a contract according to your request.;
    4. Those Necessary to maintain the safe and stable operation of the software and related services, such as the detection, disposal of software and related service failures;
    5. Those Necessary for legal news reporting;
    6. Those Academic research institutions need to carry out statistical research or academic research based on the public interest, and de-identifying the personal information contained in the results when the results of academic research or description are provided to the outside world;
    7. Those Other situations as required by laws and regulations.

    Please remind that if the information cannot be personally identified individually or in conjunction with other information, it does not belong to your personal information in the legal; When it can or we will be able to use data that cannot be linked to any particular personal information in conjunction with other personal information,It will be processed and protected as your personal information in accordance with this Policy during we combined these information.

    2. Additional information for permission to use

    This is a summary description of the permissions that might be used by Sekyo related features.

    2.1 Address Book Permissions

    Features that use this permission: phone book, shipping address contact import function.

    2.2 Call Permissions

    Features that use this permission: call function.

    2.3 location Permissions

    Features that use this permission: map function, post function, personal center profile settings function.

    2.4 Camera Permissions

    Features that use this permission: Scan QR code function, audio and video call function, personal center profile settings function, device user information settings function.

    2.5 Album Permissions

    Features that use this permission: Remote photo function, WeChat (send photos) function, Screen saver settings function, posting function, personal center profile settings function, device user information settings function.

    2.6 Microphone Permissions

    Features that use this permission: voice reminder function, WeChat function, video call function.

    3 . Additional information on the use of third-party (SDK / API / H5) access rights

    In order to provide you a better experience, we would access high-quality third parties. And we will carefully evaluate the purpose of the use of shared information by related parties and third parties, conduct a comprehensive assessment of the security from them, and require them to comply with the Cooperative Legal Agreement. We will conduct strict security monitoring on software tool that partners obtain information, like software development kits (SDK), application program interfaces (API), and H5 to protect data security. And sharing your personal information with our affiliates and third parties through your authorization and consent, unless the shared personal information is de-identified information, and the natural person subject who shared the third party cannot re-identify such information. If related parties and third parties use it beyond the scope of the original authorized consent, they need to re-obtain your consent.

    1. 1 Affiliate Advertising (SDK)

    Permissions are required as follows:

    1. Obtain carrier information;
    2. Access to Wi-Fi network information;
    3. Read your phone’s current status;
    4. Access to network permissions;
    5. Write / read external storage device;
    6. Location;
    7. Installation;
    8. Obtain task information;
    9. Power management operation.

    3 . 2 Mobile Payment (SDK)

    Permissions are required as follows:

    1. Access to network ;
    2. Obtain network status;
    3. Obtain Wi-Fi status;
    4. Read your phone’s current status;
    5. Write external storage devices;
    6. Modify sound setting.

    3.3 Push System  (SDK)

    Permissions are required as follows:

    1. Access to network;
    2. Write external storage devices ;
    3. Obtain network status ;
    4. Obtain Wi-Fi status ;
    5. Read your phone’s current status ;
    6. Installation ;
    7. Obtaining task information;

          8. OPPO mobile message (only for OPPO mobile phones);

    1. MEIZU mobile phone message (only for Phone model MEIZU).

    3.4 Video Call (SDK)

    Permissions are required as follows:

    1. Open camera device;
    2. Change network status (e.g. whether you can access the network );
    3. Modify sound settings;
    4. Recording;
    5. Access to network ;
    6. Write external storage device;
    7. Obtain network status ;
    8. Obtain Wi-Fi status ;
    9. Read your phone’s current status;
    10. Read external storage devices ;
    11. Wake lock .

    3.5 Himalayan (SDK)

    Permissions are required as follows:

    1. Write external storage device
    2. Access to network
    3. Recording
    4. Obtain network status
    5. Obtain Wi-Fi status
    6. Use the front desk notification service
    7. Camera

    3.6 Fengfeng school (H5)

    Permissions are required as follows:

    1. Encrypted order data synchronization permission

    4. How we use similar technologies like cookies

    Cookies and similar technologies are commonly used on the Internet. When you use our services, We may use the technology to send one or more cookies or anonymous identifiers to your device to collect and store information about your access to and use Sekyo. We promise we do not use cookies for any purpose other than the purposes described in this policy. We use cookies and similar technologies primarily to achieve the following features or services:

    4.1 Ensure the Safe and Efficient Operation of Products and Services

    We may set a cookie or anonymous identifier for authentication and security to enable us to confirm whether you are safely logged into the Services or have encountered theft, fraud, and other wrongdoing.These technologies will also help us improve service efficiency and sign-in and response times.

    4 .2 Help You Get Easier Access Experience

    Using such technologies can help you avoid the steps and processes of filling out your personal information and entering your search (such as record search, form filling).

    4 .3 Recommend, Present, Push Content or Accounts You May Be Interested in

    We may use cookies and similar technologies to know your preferences and usage habits, then conduct data analysis to improve product services, recommend information or features that you are interested in, and optimize your choices of ads.

    4 .4 Clear cookies

    Most browsers and mobile applications provide users the ability to clear the browser’s cached data, and you can do the appropriate data clearing in the browser or application’s corresponding settings. If you do, you may not be able to use the services or corresponding functions provided by Sekyo that rely on cookies due to these modifications.

    5. How we share, transfer, and publicly disclose personal information

    5 .1 Sharing

    5 .1.1 sharing principles

    1. Authorization Agreement: Sharing your personal information with our affiliates and third parties through your authorization and consent, unless the shared personal information is de-identified information, and the natural person subject who shared the third party cannot re-identify such information. If they use information beyond the scope of the original authorized consent, they need to receive your consent again.
    2. Principles of Legitimacy and Minimum Necessity: Data shared with related parties and third parties must be for legitimate purposes and the data shared to the extent necessary to achieve the purpose. 
    3. Principles of Safety and Prudence: We will carefully evaluate the purpose of the use of shared information by related parties and third parties, conduct a comprehensive assessment of the security from them, and require them to comply with the Cooperative Legal Agreement. We will also conduct strict security monitoring on software tool that partners obtain information, like software development kits (SDK), application program interfaces (API) to protect data security. 

    5 .1.2 Shared Information for Function or Service Implemented

    1. We will share the de-identified personal information with our related parties and third parties when you use the features provided by them, or when software service providers, smart device providers, system service providers join forces with us to provide services to you. And we will conduct comprehensive statistics and algorithmic analysis of features and preferences to create indirect crowd portraits to recommend, display, or push information that you may be interested in, or specific features, services, or commercials that are more appropriate for you.

    b . Login to a third-party account: When you use Sekyo account to log in to a third-party product, We will share your nickname, profile picture, and other information that you authorize with the third-party products you log in.

    c . Location services: When you use location related services, we share GPS information with our location service provider (AutoNavi) so that we can return location results to you. GPS information is sensitive personal information, if you refuse to provide, it only affect the location service, other functions still work.

    d . Payment: The payment function is provided by a third-party payment agency that cooperates with us. Third-party payment agencies may need to collect your name, bank card type and card number, expiration date, and mobile phone number. The bank card number, expiration date, and mobile phone number are sensitive personal information. These information are necessary for payment. If you refuse to provide, it only affect the payment function, other functions still work.

    5 .1.3 Controlling Advertising and Analytics

    1. Push Ads: We may share information with partners who entrust us with promotion and advertising, but we do not share information (name, mobile phone number) that can identify you, and only provide them with indirect image tags and de-identified or anonymized information to help them increase ad’s effective reach without personally identifying.
    2. Advertising Statistics: We may share analytics de-identified statistics that are difficult to relate to your identity information with service providers, suppliers, and other partners of the business, which will help us analyze and measure the effectiveness of advertising and related services.

    5 .1.4 Shared Information for Security and Analytics

    1. Use Safety: We take account and service security seriously. And we may share the necessary equipment, account and log information with our affiliates or service providers to protect your and other users’ accounts and property from unlawful infringement of your legitimate rights and interests.
    2. Analyzing Product Usage: To analyze the usage of our services and enhance the user experience, we may share statistical data on product usage (crash, flashback) that are difficult to personally identify combined with other information with related parties or third parties.

    5 .1.5 Marketing and Promoting

    When you participate in relevant marketing activities organized by us and our affiliates or third parties, you may be required to provide information such as your name, address, contact details, etc. This information is sensitive to personal information and if you refuse,it may affect your participation in related activities, but other features still work. Only with your consent will we share this information with a related party or third party to ensure that you receive a consistent experience in activities or to entrust a third party to redeem your reward in time.  

    5 .2 Transfer

    1. We will not transfer your personal information to any other third party without your expressly consent.
    2. As our business grows, we will be able to conduct mergers, acquisitions, asset transfers, and your personal information may be transferred. In the event of the above changes, we will continue to protect your personal information in accordance with laws and regulations and security standards not lower than those set in this Policy, otherwise we will require the recipient to re-obtain your authorization and consent.

    5 .3 Disclosure

    1. We will not disclose your information publicly unless we comply with national laws and regulations or receive your consent. If we do,we will use security measures that comply with industry standards.
    2. We will disclose relevant account information when we announce penalties for illegal account and fraud.

    5 .4 Exemption From Obtaining Consent To Share,Transfer, Publicly Disclose of Personal Information

    Please understand that in the following cases, we can share, transfer and publicly disclose your personal information without your authorization in accordance with laws, regulations and national standards:

    a.Those Directly related to national security, national defense security;

    b.Those Directly related to public safety, public health, and major public interests;

    c.Those Directly related to criminal investigation, prosecution, trial and enforcement of sentences;

    d.Those For the purpose of safeguarding you or other personal life, property and other important legal rights and interests which is difficult to obtain an individual’s consent;

    e.Those Personal information that you disclose to the public;

    f.Those Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

    6. How we store personal information

    6 .1 Storage location

    In accordance with laws and regulations, we store your personal information collected and generated during domestic operations in India or Singapore. At present, We will not transfer the above information abroad, and if we do, we will comply with the relevant national regulations or receive your consent.

    6 .2 Storage period

    We retain your personal information only for the period necessary to provide our service: information you post, comments, likes and related information, and we retain them until you have withdrawn, deleted or cancelled your account. After that, we will delete or anonymize your personal information, unless otherwise provided by law and regulation.

    7.How we protect the security of personal information

    1. We take the security of your personal information seriously and will strive to take reasonable security measures( both technical and administrative) to protect your personal information from improper use or unauthorized access, public disclosure, use, modification, damage, loss or disclosure of the personal information provided by you.
    2. We will use encryption, anonymization and other reasonable and feasible means to protect your personal information with encryption technology no less than our industry peers, and use security mechanisms to protect your personal information from malicious attacks.
    3. We will establish a professional security management system, data security processes to ensure the security of your personal information. We have a strict data usage and access system to ensure that only authorized personnel have access to your personal information and the data and technology are audited securely at the right time.
    4. Despite the reasonable and effective measures described above and the standards required by the relevant legal requirements, please understand that it is impossible to ensure 100-percent-security of information at all times in the Internet industry, even if we do anything possible to strengthen security measures due to technical limitations and possible malicious means. Anyway,we will do our best to ensure the security of the personal information you provide to us.
    5. You understand that the systems and communication networks you use to access our services may cause problems due to factors beyond our control. Therefore, we strongly recommend that you take positive measures to protect the security of your personal information, including but not limited to, using complex passwords, changing passwords periodically,not disclosing your account password and related personal information to others.
    6. We develop contingency plans and will initiate it in the event of user information security incidents in an effort to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage, loss) occurs, We will promptly inform you of the basic circumstances and possible impact of the security incident, the actions we have taken or will take, the proposals that you can take precautions and reduce risk, and the remedies you may remedy. We will inform you about the incident in push notifications, text messages, and related forms in time. When it is difficult to notify one by one, we will take a reasonable and effective way to make announcements. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.
    7. Once you jump from our services to three parties for browsing or using other websites, services and content resources,we do not have the capacity or direct obligation to protect any personal information you submit on them,whether you log in, browse or use the software described above, or whether the website is based on links or guidance from Sekyo.

    8. Manage your personal information

    We attach great importance to managing your personal information, and do our best to o protect your rights to your personal information inquiries, access, modification, deletion, withdrawal of consent authorizations, cancellation of accounts, complaints reporting, and privacy features to enable you to protect your privacy and information security.

    8 .1 Self-selecting Personalized Recommendation Information

    8 .1 Self-control of receiving information

    Self-determined to receive push information: Our information recommendation functions may be based on automated decision-making mechanisms, including information systems and algorithms. While we constantly improve and explore the recommended system optimization program, we adopt a strict audit strategy at the audit level. In particular, to protect your autonomy in receiving information, when you are not interested in the information we push or want to reduce certain information recommendations, you can click the “X” in the push information bar to block it. 

    8 .2 Access, Delete and Correct Your Personal Information

    8 .2.1 Accessing personal account information

    You can query, access your profile picture, username, profile, gender, birthday, region, and you can query and access to it in Sekyo Personal Center-Edit Profile.

    8 .2.2 Query,access, correct, cancel following account

    Enter into “Me>Follow” to query, access and unfollow the account you follow in the watch list.

    8 .3.3 Query and access collections, reading records, search history

    1. Click “Me>Favorites” to query, access, delete;
    2. You can delete the reading history by clicking “System Settings”>clicking “Clear Cache”.
    3. Click on the search bar>delete the search history;

    8 .3.4 Delete published content, forwarded content, comments

    1. Delete posts or forward content: enter into “me”>click on “Personal Page” >click “Dynamic” or “Articles” to find the corresponding post or article to delete.
    2. Comments: find the appropriate location (article or post) for posting comments, click the “Delete” button to delete.
    3. In particular, please notice that you may not be able to modify some of the initial registration information submitted when you registered,For security and identification reasons, such as the Number Appeal service. If you do need to modify such information, please contact us according to the contact details set in this policy.

    8 .4 Cancel Account

    You can request to cancel your account in Sekyo Online Help. We will verify your personal identity, security status, device information, etc. before you log out. See the sign-out instructions for the process and content of the logout. You need to understand that the cancellation request is irreversible and if you have done, we will delete or anonymize the information about you, unless otherwise provided by law and regulation.

    8 .5 Complaints and Reports

    You can make complaints or reports according to our publicity system. If you think your rights to personal information may be infringed, or find clues (such as our collection of your personal information is contrary to the law or agreed upon by both parties), you can follow the Sekyo WeChat account (WeChat ID: aqsh12345) and send the problem to customer service, we will feedback your complaints and reports in time after checking and verifying your user identity.

    8 .6 Access

    1. You can view the full contents of this Policy on the registration page or by logging into your personal account “System Settings”>”About Us”.
    2. Please understand that our services described in this Policy may be going to be different depending on the device you are using, like phone model, system version, software application version, mobile client, etc. The final products and services are based on the software you use.

    8 .7 Stop Operation Notice

    If we cease operations, we will stop collecting your personal information in a timely manner, notifying you of the suspension notification in the form of one-by-one delivery or announcement, and delete or anonymize the personal information we have got your personal information.

    9.Terms Of Use For Minors

    a. If you are a minor under the age of 18, you should read and agree this Policy under the supervision and guidance of your parent or other guardian before using our services.

    1. We protect the personal information of minors according to the relevant laws and regulations of the State and will collect, use, store, share, transfer or disclose the personal information of minors only permitted by law, as expressly consented by parents or other guardians or if necessary to protect them. If we find that personal information of a minor has been collected without prior confirmation of Parental consent, we will try to delete it as soon as possible.
    2. If you are the guardian of a minor, and you have any questions about the personal information of the minor under your guardianship, please contact us through the contact information disclosed in the policy.

    10. Changes And Notifications Of This Policy

    1. To provide you better services, our services will be updated and changed from time to time, We will make timely amendments to this Policy, which are form part of this Policy and are equivalent to this Policy, and we will reserve your rights under this Policy in effect as currently in force without your express consent.
    2. If we have updated, we will issue an updated version in Sekyo before the updated terms take effect,provide you with additional notice (such as adding a statement to announcements, the front page of the Services or sending you a notification). We encourage you to review the Policy whenever you access or use our services or otherwise interact with us to stay informed about our information practices and the ways you can help protect your privacy.

    11. Contact Us

    If you have complaints, suggestions, questions about personal information protection issues, you can follow Sekyoon social network or mail to, we will promptly feedback your complaint and report after verifying your identity.

    Copyright© 2020 Sekyo Innovations Pvt Ltd. All rights reserved.



    Sekyo Product, Services and App User Agreement


    1.    Introduction

    Welcome to use the software and related services provided by Sekyo Innovations Pvt Ltd (“Sekyo” “we” or “us“) .

    The software and related services(“our services”)provide to you refer to the client application which is labeled “Sekyo” by we owned legally and operated, including but not limited to the Core functions, such as location queries, video call, chat messages, remote management of equipment, personalized recommendations, posting information, interactive communication, as well as other functions, Sekyo is a tool-based application and content service platform for home users. Sekyo User Agreement (“This Agreement”) is an agreement between you and us regarding your registration, login, use (collectively, “use”) our services.

    In order to provide you better services, please carefully read and fully understand this Agreement before using , in particular, the clauses involved of excluding or limiting liability, licensing and using information, agreeing to activate and use special single service, applicable laws and disputing resolution, etc. Among them, you should focus while reading the clauses in bold such as excluding or limiting liability. If you are under the age of 18, please read and fully understand this agreement with your legal guardian, and use our services before receiving verifiable consent from them.

    By accessing or using our Services, you agree to be bound by these Terms. If you do not, you may not access or use our Services. If you agree or use our services , It is deemed that you have already read and agreed to be bound by this Agreement and services Agreement and Rules of other related software, including but not limited to the Privacy Policy.

    2.    Sekyo And Related Services

    2.1You can obtain our client application through pre-installation, downloading by authorized third parties, etc. when you are going to use our services. If you did not obtain the software from the ways we mentioned, we cannot guarantee the unofficial software version can be used normally, and the loss you have suffered is irrelevant to us.

    2.2We may develop different application versions for different terminal devices. You should obtain, download, and install the appropriate version according to the actual device status. If you no longer use our services, you can uninstall the corresponding application.

    2.3 For providing a good user experience, we will update or change our services (including but not limited to software modifications, upgrades, functional enhancements, development of new services, software replacement, etc.) from time to time, You can update the corresponding version depending on your needs.

    In order to ensure the security of our services and enhance user services, after the partial or full updating of our services, we will remind you in a proper way including but not limited to system prompts , announcements, website letters, etc.and you have the right to choose whether to accept the updated version. If not, some functions of our services will be restricted or cannot be used normally.

    2.4 Unless authorized in writing by us in advance, you can not make unauthorized access or use of our services in any form including but not limited to adaptation, reproduction, dissemination, vertical search, mirroring or trading, etc.

    2.5 You need to prepare your own terminal devices (such as mobile phones, tablets, etc.) for using our services. Once you open it in the terminal device, It is deemed that you used our services. To realize the full function of software, you may need to connect the terminal equipment to the network, and you shall afford the required costs (such as data charges, Internet access charges, etc.).

    2.6 We grant you a personal, non-transferable, non-exclusive,non-commercial,limited license to use and access the Services solely as permitted by these Terms. We reserve all rights not expressly granted to you by these Terms. Except as permitted through the Services or as otherwise permitted by us in writing,your license does not include the right that we do not mention. At the same time, if we fail to exercise any of aforementioned rights, it does not constitute a waiver of this right.

    2.7 You do not need to register when using our services, but the main functions or services will be affected. Meanwhile, hope you understand, to make you use our services better , protect your account security, and certain features and / or individual services (such as comments service) will require you to provide real identity information and register in real name in accordance with the relevant national laws and regulations before you use it.

    3. Your Account

    3.1 Our services provide you a registration channel. You have the right to choose a legal character combination as your account and set your own password that meets security requirements. The account and password you set are the credentials for you to log in and use our services.

    3.2 You understand that the account you set up must not violate national laws and regulations and our relevant rules , and you must not conduct any actions that infringing the national interests, damaging the legal rights and interests of other citizens, and harming social morality. Make sure your username, avatar and profile and other individuals information is legal,and do not use someone’s name without getting permission (including but not limited to impersonating someone else’s real name, image, etc. in a manner that causes confusion) .You cannot register your account maliciously (including but not limited to frequent and bulk registration,etc.).We reserve the right to review the information you submit.

    3.3 Only you can access your Sekyo account,It is prohibited to give, borrow, rent, transfer, sell or otherwise permit others to use the account without our prior written approval.If we find or have reasonable grounds for suspecting that you were not the initial registrant of the account, to protect the account security, we have the right to suspend or terminate providing services to the registered account, or cancel the account immediately.

    3.4 You are solely responsible for the information associated with Your Account and anything that happens related to Your Account,Including but not limited to any data modification, comment posted, payment and other actions. You must maintain the security of your Account and promptly notify us if you discover or suspect that someone has accessed your Account without your permission.

    3.5 When you have forgotten your password, you can follow the prompts to retrieve your password. We just want to remind you it is preferred to use mobile number verification, which is followed by the security issue. You must keep your account and password properly,If it hacked or lost for your own reasons, We take no responsibility for that.

    3.6 When use your account, you should keep in mind the relevant information you filled in (such as account number, password, security questions, etc.) . In accordance with the relevant national laws and regulations, you may need to fill in real identity information ( such as identity authentication ) for using some functions of our services, and pay attention to update the relevant information in a time. If the materials you submit or the information you provide are not standardized or non-compliant, we have the right to refuse providing you related functions, you may not access or use our Services.

    3.7 In addition to registering Sekyo, you are also authorized to use other software which is legal , including but not limited to us and / or our affiliate software, and third-party software user accounts registered with real names to log in and use Sekyo, except where third-party software or platforms have restrictions or prohibitions on that. When you log in with the aforementioned existing account, you shall ensure that the corresponding account has been registered in real name, and the same applies to this agreement.

    3.8 Not only can you log in and use Sekyo, you can also use its account log in other software and services provided by our affiliated companies. We need to remind you when you log in and use the aforementioned services with your Sekyo account, you will be bound by the User Agreement and other agreement terms from the actual provider .

    3.9 To increase your content exposure and publish efficiency, we are authorized that automatically publishing all content created by your account or corresponding account on this software / website to other software and websites operated by us and / or our affiliates. The operations you publish, modify, and delete on this software / website will be synchronized to other software and web sites mentioned above. When you register or log in products and websites operated by us and / or our affiliated companies (if any) through a registered account or a third-party software user account, you should comply with the software and website’s own “User Agreement” and other agreement terms.

    3.10 After completed registration, login, and reasonable and necessary identity verification of Sekyo, you can browse and modify the personally identifiable information submitted by you at any time. You may not be able to modify the initial registration information and other verification information provided when you registered due to security and identity considerations (such as account or password recovery services, etc.) . You can request to deleted your account,and we will assist you after completing reasonable and necessary verification of personal identity, security status, device information etc. , except as otherwise provided by laws and regulations.

    3.11 To make full use of account resources , If you fail to log in for the first time in time after registration or you have not used your account for more than six months, we will recover your account.


    4. User Personal Information Protection

    We work with you to protect your personal information (that can identify a user independently or in combination with other information).For us,protecting users’ personal information is one of basic principles. In order to provide you a better service and corresponding technical support, you may need to provide your personal information (including but not limited to name, phone number, location information, etc.) when you use Sekyo. We will use encryption technology, anonymization, other technical measures and security measures that are compatible with Sekyo to protect your personal information. Certain other information about yourself as set forth in the Privacy Policy.

    5. User Code Of Conduct

    5.1 User behavior requirements

    You will be responsible for anything that happens related to Your Account when using the our services. Except as permitted through the Services or as otherwise permitted by us in writing, your license does not include the right to:

    5.1.1 Use any plug-in, system, or third-party tool that is not authorized or licensed by us to interfere with, destroy, modify, or exert some influence on the normal operation of our services.

    5.1.2 Do anything against our services that endangering computer network security, including but not limited to:

    (1) Illegal intrusion into other people’s networks, interference with other people’s normal functions, stealing network data, and other acts that endanger network security;

    (2) Provide programs and tools which is specially designed for network-intrusive, interfering with normal network functions and protection measures, and stealing network data, etc.

    (3) You have known that others are engaged in actions that endanger network security, still provide assistance with technical support, advertising promotion, payment settlement , etc.;

    (4) Use unauthorized data or access to unauthorized servers / accounts;

    (5) Enter public computer networks or other people’s computer systems without permission and delete, modify, and increase stored information;

    (6) Without permission, attempt to detect, scan, and test the weaknesses of the “Sekyo” system or network, or other actions that undermine network security;

    (7) Attempt to interfere with or disrupt the normal operation of “Sekyo” system or website, intentionally spreading malicious programs or viruses, and other actions that disrupt and interfere with normal network information services;

    (8) Fake TCP / IP packet name or partial name;

    (9) Reverse engineer, disassemble, compile, or otherwise attempt to find out the source code of our services;

    (10) Maliciously register accounts for our services, including but not limited to frequent and bulk registration;

    (11) Violate of laws and regulations, this agreement, our relevant rules, and other actions that infringe on the legal rights and interests of others.

    5.1.3 If we have reason to believe that your actions violate or may violate the agreement above, we can judge and handle it independently, and have the right to terminate the service for you without prior notice and pursue related legal responsibilities.

    5.2 Content Specification

    5.2.1 When you complete the registration in accordance with the regulations , you can log in Sekyo with your registered account or our partner platform account to publish content, follow comments, etc.

    5.2.2 We are committed to making the release of information and follow-up comments a civilized, rational, friendly and high-quality.While promoting the development of information release, interactive communication, and post comment business, we will continue to strengthen the corresponding information security management capabilities, improve the self-discipline of information release, post comments, and effectively fulfill social responsibilities, comply with national laws and regulations, respect the legitimate rights and interests of citizens, and social order.

    5.2.3 The content that you comment, release and post should obey these requirements consciously,such as laws, regulations, social order, social morality, socialist system, national interests, legitimate rights and interests of citizens, moral customs and authenticity of information,etc. And you agree and promise that you will not produce, copy, publish, or disseminate the following information which is prohibited by laws and regulations:

    (1) Those Fighting against the basic principles established by the Constitution;

    (2) Those Endangering national security and leaking state secrets;

    (3) Those Subverting state power, overthrow the socialist system, incite secession, and undermine national unity;

    (4)Those Damaging national honor and interests;

    (5) Those supporting terrorism and extremism;

    (6) Those supporting national hatred, national discrimination, and destruction of national unity;

    (7)Those Inciting regional discrimination, regional hatred;

    (8) Those Destroying national religious policies and promoting cults and superstitions;

    (9)Those Fabricating and spreading rumors and false information, disrupting economic and social order, and social stability;

    (10) Those Spreading violence, obscenity, pornography, gambling, homicide, terror or instigating crime;

    (11)Those Violating the legal rights and interests of minors or damaging the physical and mental health of minors;

    (12)Those Unauthorized photographing or recording others without permission, infringing on the legal rights of others;

    (13)Those Containing horror, violence, high risk, endangering one’s own or others’ physical and mental health;

    (14) Those Endangering network security, using the network to endanger national security, honor and interests;

    (15) Those Insulting or slandering others, infringing on their legal rights;

    (16)Those Violent intimidation, threats, and human flesh searches against others;

    (17)Those Involving personal privacy, information or data;

    (18) Those Spreading dirty words, damaging social order;

    (19)Those Infringing on the privacy, reputation, portrait rights, intellectual property rights,etc.;

    (20)Those Disseminating commercial advertisements or similar commercial solicitations, over-marketing messages and spam;

    (21)Those Commenting in a language other than commonly used on this site;

    (22) Those Having nothing to do with the information being commented on;

    (23) Those publishing meaningless information or Using character combinations to escape technical audits deliberately;

    (24)Those Violating laws, regulations, policies,social order , interfering with our normal operation or violating the legitimate rights and interests of others or third parties.

    5.3 We have established a public complaint and reporting platform. You can make a complaint to us according to our public complaint reporting system, such as all kinds of illegal actions, illegal communication actions, illegal and harmful information, etc.. We will promptly accept and handle your feedback to jointly create a clean network environment.

    6.Information Content Specification

    6.1 Without our written approval, you can not authorize, permit, or assist any third party to do in any of the following actions on the information content in our services of this agreement:

    (1) Copy, fetch, and use the information content from Sekyo for commercial purposes,including but not limited to publicity, increased reading, and page views;

    (2) Edit, organize, typeset the information content from Sekyo without permission, and display it on channels other than the source page of our services;

    (3) Adopt identification methods,Including but not limited to any form of special identification,code, etc. for assisting third parties or doing it on your own to affect the information content of our services,such as guiding readings, transferring and hijacking our traffic;

    (4) Other illegally actions of obtaining or using the information content from Sekyo.

    6.2 With our written approval, Your actions that shares and forwards the information content from Sekyo should meet the following specifications:

    (1) Relevant data obtained through crawling and statistics,such as hot words, hit rates, categories, searches, hits, readings,etc.,without our prior written approval,you cannot publicize, provide, or disclose them to any third party in any way.

    (2) You can not make any changes to the source pages of our services, including but not limited to the link to homepage (profile page), and advertising system. It is also not allowed to obstruct, insert, pop up, etc. in any form for the display the source pages of our services;

    (3) Safe, effective and strict measures should be taken to prevent the information content from our services being illegally obtained by third parties through any form, including but not limited to “spider” programs;

    (4) Do not use relevant data content for purposes beyond the scope of our written permission, such as sales and commercial use, or disclosing, providing or allowing third parties to use in any way;

    (5) The action of sharing, forwarding, and copying our service information content to any third party should comply with other codes and standards established by us.

    7. Default Handling

    7.1 For your breach of this agreement or other terms of service, we have the right to judge independently and take measures like advance warnings, refusing to publish, stop transmitting information immediately, deleting follow-ups, forbidding short-term speaking, and restricting some or all functions of the account until it is permanently closed. We have the right to announce the results of processing, and decide whether to resume the relevant account of users according to the actual situation. We will report the records that suspected violations of laws and regulations and suspected crimes to the relevant competent authorities according to law and cooperate with relevant competent authorities for investigation.

    7.2 If you violate the provisions of this agreement or other terms of service and cause a third party complaint or litigation claim, you are solely responsible for that. If we and our affiliates compensate any third party or are punished by a state authority because of your illegal, infringing or breaching contract, you should fully compensate us and the affiliates for any losses we suffered.

    7.3 Sekyo respects and protects the users rights to Intellectual property, reputation, name, privacy and other legal rights. You must guarantee that the texts, pictures, videos, audios, links, etc. uploaded while using our services do not infringe any third party’s rights to Intellectual property,reputation,name, privacy,other legitimate rights and interests. Otherwise, We have the right to remove the allegedly infringing content upon receiving notification from the rights or related parties. For all claims made by third parties, you are solely responsible for that; if we and our affiliates suffer any losses (including economic, business reputation, etc.) due to your tort,you should fully compensate us and the affiliates for any losses we suffered.

    8.Services Changes, Interruptions and Termination

    8.1 Hope you understand, our services are provided in accordance with existing technologies and conditions. We will do our best to provide you continuity and security of services. But we cannot foresee and prevent other risks that may cause service interruptions, failure to use our services, and other losses and risks at any time, including but not limited to force majeure, network, third-party service defects, third-party websites and others.

    8.2 To meet the needs of platform operation security,according to specific conditions,we have the right to determine the service / function settings and scope, modify, interrupt, suspend or terminate our services.


    9.1 During using our services,we may push you relevant information, advertisements or branding services, and will display the commercial and promotional or information (including commercial or non-commercial information) from our software and related to and / or third-party vendors, partners on Sekyo .

    9.2 When using Sekyo, we will push you programmatic ads based on preferences, interests, etc. You can turn off programmatic advertising in Sekyo settings. If you do, the ads you see would remain the same, but the relevant ads will decrease, Read more in the Privacy Policy.

    9.3 We will advertise and promote related obligations in accordance with the law, and you should judge the authenticity and reliability of the advertisement or promotion information and be responsible for that. Except as expressly provided by laws and regulations, you are solely responsible for any purchases, transactions or damages or losses suffered due to the advertising or promotional information , and we are not responsible for that.

    10. Intellectual Property

    10.1 The Intellectual property rights of the content provided on our services (including but not limited to software, technology, programs, web pages, text, pictures, images, audio, video, graphics, layout, electronic documents, etc.) belongs to us. The copyright, patent rights and other intellectual property rights of the software which we provides services also belong to us. Without our permission, no one can use the contents of our services (including but not limited to monitoring, re-production,disseminating, displaying, mirroring, uploading, downloading through any robot or spider program or device).

    10.2 The uploaded texts, pictures, videos, audios, etc. released when using our services are originally created by you or legally authorized. The intellectual property rights in any content you upload or post through Sekyo belong to you or the original copyright owner.

    10.3 In order to continuously improve and provide you better services,you agree that the content you upload, publish, transmit or disseminate (including but not limited to texts, pictures, images, audios or music, sound, dialogue in videos and / or audios) on our services authorized to us and our affiliates,controlled companies,successor company,and we have the rights which is world wide, free, non-exclusive, sublicensable (through multiple levels) ,Including but not limited to, the rights of reproduction, information network transmission, adaptation, compilation, modification, translation, derivative works, performances, and display). Use range includes, but is not limited to, current or other websites, applications, products or terminal devices, etc. You hereby confirm and agree that the granting of the above rights includes the following rights and licenses:the content,any promotion, advertising and / or related marketing related to Sekyo and / or company brand and developed content in other ways (in whole or in part). To make you clear, you agree that the authorization of the above rights includes the permitted use, reproduction, display, transmission of personal image, portrait, name, trademark, service mark, brand, name, logo, Company logo and other materials, etc.

    10.4 You agree to authorize us to act on in our own name or entrust a professional third party to infringe on the intellectual property rights that you upload and publish, including but not limited to: monitoring infringements, sending protection letters, filing lawsuits or For arbitration, mediation, reconciliation, etc., we have the right to make decisions on rights protection matters and implement them independently

    10.5 We provide technical support for the development and operation of Sekyo, and have all rights within the scope permitted by laws and regulations on all data and information generated during the development and operation of our services..

    11. Disclaimers

    11.1 Our services may be affected or interfered by various factors, and we cannot guarantee (including but not limited to):

    11.1.1 Out services are fully adapted to all user requirements;

    11.1.2 Our services are uninterrupted, timely, secure, reliable or free from errors; any software, services or other materials you obtain from us meet your expectations;

    11.1.3 Any errors in our services will be corrected.

    11.2 If there are suspected loans or other property-related network information, account passwords, advertisements or promotions, please consider seriously and make a judgment,we take no responsibility for the profits, business reputation, data loss or other tangible or intangible losses your suffered .

    11.3 During using our services, you may encounter factors such as force majeure (it means objective events that cannot be foreseen,overcome and avoided), including but not limited to natural disasters (such as floods, earthquakes, typhoons, etc.), government actions, wars, strikes, riots, etc. If happens, we will try to repair it in time as soon as possible, while the losses due to force majeure, we will be exempted from liability within the scope of laws and regulations.

    11.4            We obtain the right to deal with illegal content according to the agreement. This right does not constitute our obligation or commitment. We cannot guarantee we will find illegal actions in time or deal with them accordingly.

    11.5 About our services,we do not provide any kind of express or implied warranties or conditions, including but not limited to commercial availability, suitability for specific uses, etc. You alone are responsible for the corresponding risk when using Sekyo.

    11.6 This agreement is to ensure compliance with national laws and regulations, maintain social order, and protect the legitimate rights and interests of others,we will do our best efforts to make judgments in accordance with relevant laws and regulations within its capacity.However, it does not guarantee that our judgments are completely consistent with those of the judicial and administrative organs.if so, you alone must bear the consequences.

    11.7 In any case, we assume no responsibility for any damage indirect, consequential, punitive, incidental, special, including the loss you suffered when using our services. No matter what the reason, the full responsibility we take will never exceed the cost (if any) you paid to us for using our services during the membership period.

    12.Special Agreements On Single And Third-Party Services

    12.1 Our services contain information or links to information content obtained by Sekyo in various legal ways, as well as other single services legally operated by us and / or our affiliates.You can enable and use the individual services described above in SeTracke.Some individual services may require you to accept agreements specially formulated for this purpose or other rules that bind you and the individual service provider, if necessary, these agreements and rules are provided to you in a prominent way when you plan to use the service mentioned above for your review and consent. Once you start using the services above, it is deemed that you accept the constraints of the relevant agreements and rules regarding the individual services. If terms of use is not indicated, or”permanent”, “infinite” or “unlimited”, then terms of use of these products or services is from the date when user starts using the product or service to the date when the product or service is offline in Sekyo.

    12.2 When you use our services provided by a third party on Sekyo, in addition to complying with this agreement and the relevant rules from us, you may also need to agree and comply with the third party’s agreement, privacy policy, and relevant rules.If the dispute, loss or damage caused by the third-party software and related services is resolved by you and the third party, we are not responsible for you and third-party.

    13. Terms Of Use For Minors

    13.1 If you are a minor under the age of 18, you should read this agreement carefully with the guardian’s supervision, guidance, and receive verifiable consent from your parent or legal guardian before using our services.

    13.2 We attach importance to the protection of personal information under the age of 18, minors should strengthen their awareness of personal protection and treat them seriously when filling in personal information, and use our services when instructed by their guardians.

    13.3 Minors understand that if you violate laws and regulations or the content of this agreement, you and your guardian would bear the all legal liabilities that may arise.

    13.4 Special tips for minor users:

    13.4.1 Teenagers use our services that would be supervised by their guardians, and they should learn to use the Internet within a reasonable range, avoid indulging in virtual internet, and have good habits when surfing the web.

    13.4.2 Minors must obey the National Youth Convention on the Network Civilization:

    (1) Be good at learning online and not browse bad information;

    (2) Communicate honestly and not insulting others;

    (3) Enhance self-protection awareness and do not date online friends casually;

    (4) Maintain network security without disrupting network order;

    (5) Keep physical and mental health without indulging in virtual internet.

    13.5 To protect the privacy rights of minors better, we must remind you to be careful about posting content that contains minor material.Once released, it is deemed that you agree our services display minor information, portraits, sounds, etc. And also allow us to use and process the minor-related content according to this agreement.

    14. Other

    14.1 The agreement that is established , become effective, carried out, and disputed resolution shall be governed by the laws of Singapore or India. If any provision of this agreement is invalid or unenforceable due to conflicts with the laws of Singapore or India, these terms will be re-analyzed as close as possible to the original provisions of this agreement, and the other provisions of this agreement remain in full force and effect.

    14.2 This agreement was signed in Singapore or India. If you have any disputes with us due to this agreement, both sides should try to resolve them with friendly negotiation; if fails,you will agree that the relevant disputes shall be submitted to the people’s court in the place where this agreement is signed to litigate.

    14.3 To provide you better services, our services will be updated and changed from time to time due to national laws and regulations and policy adjustments, we will modify this agreement as appropriate, and these amendments form are the part of this Agreement. If it has been updated, we will issue an updated version of Sekyo and notify you the updated content before the updated terms take effect , then you can know the latest version of this agreement in time. You can also check the latest version”Terms of agreement”on the software settings page. If you continue to use our services, you agree to accept the contents of this revised agreement.

    If you have any objections to the revised terms of the agreement, please immediately stop logging in or use our services. If you continue to log in or use it, it is deemed that you have acknowledged and accepted the revised terms of the agreement.

    14.4 The headings in this agreement are only for convenience and reading and do not affect the meaning or interpretation of any provisions in this agreement.

    14.5            We both are independent subject and in no event do this Agreement constitute any form of express or implied warranty or condition of our representation or interest in the user, nor do the parties constitute an agent, partnership, joint venture or employment relationship. 

    Copyright© 2020 Sekyo Innovations Pvt. Ltd. All Rights Reserved.