Скидка 40% на Премиум! С Рождеством и Новым годом! Узнайте больше.

Лицензия и договор на обслуживание

Welcome to 360 Total Security for Mac!

Before using 360 Total Security for Mac (the "Software"), please carefully read the terms and conditions of this Software License and Service Agreement, including the 360 Privacy Policy ( https://www.360totalsecurity.com/privacy/ , as described below) (collectively referred to hereinafter as this "Agreement"). Beijing Qihu Keji Co. Ltd. ("360," "we," or "us") is willing to license the software to you only on the condition that you accept all of the terms and conditions of this Agreement. This is a legal and enforceable contract between you and 360. By clicking "I Agree" before installing, using or copying the Software, you confirm that you are at least 13 years of age, and that you agree to be bound by the terms and conditions of this Agreement. If you do not accept this Agreement, you must not install, use or copy this Software.

Intellectual Property Statement

  1. 360 owns and retains all right, title, and interest in and to the Software, including all copyrights and other intellectual-property rights. All intellectual property, trademark rights and patent rights in the Software and all information related to the Software, are under the protection of national or regional intellectual property laws and regulations.
  2. 360 owns and retains all right, title and interest in and to use the 360 name, the logo and the product names associated with the web site and the services in connection with the Software, and does not grant you any right or license to use them except in accordance with this Agreement.
  3. Except as expressly provided in this Agreement, you do not acquire any rights in the Software.

Software License

  1. The Software is a free product. 360 hereby grants you and only you a limited license to download, install, use and copy the Software on a single device for commercial or non-commercial use and without limitation on number of uses. Each copy of the Software that is copied, distributed and/or transferred by you must be complete, accurate and authentic, including all of software, electronic documents, copyright and trademark related to the Software and this Agreement. You may not modify the Software, incorporate any components of the Software into other software or redistribute the Software to third-parties without the written permission of 360.
  2. The Software will automatically deactivate when you uninstall the Software, and you will not be entitled to receive any feature or content update to the Software after you uninstall it.
  3. All rights not expressly granted herein are reserved by 360. You must obtain separate written approval from 360 to obtain rights not expressly granted herein. Unless applicable law gives you more rights than contained herein, you may only use the Software as expressly permitted in this Agreement.

User Conduct and Compliance with Laws

  1. Use of the Software is subject to all applicable local, state, federal and international laws and regulations. You agree to comply with such laws and regulations.
  2. You agree not to:
    1. use the Software for any illegal purposes;
    2. reverse engineer, decompile, disassemble or otherwise attempt to modify any internal resources of the Software or the compiled program files (including without limitation any related malware signatures and malware detection routines), or create derivative works of any of the foregoing, except to the extent that the foregoing restriction is expressly prohibited by applicable law;
    3. sell, modify or redistribute the Software, including but not limited to software sales, pre-installation and software bundling, without the written consent of 360;
    4. use any parts or components of the Software separately for any purpose except as provided in this Agreement because this Software is licensed to be used as a single product;
    5. intentionally circumvent or destroy any technical measures taken to protect the Software's copyright, or delete or modify any electronic rights management data or information of the Software;
    6. intentionally mislead or deceive other people by using this Software;
    7. falsify or delete any author attributions, legal or other proper notices or proprietary designations or labels of the origin or source of software or other material contained in a file that is uploaded;
    8. use the Software to improperly access a computer or mobile network or use any computer or mobile network resources without permission;
    9. use the Software to delete, modify or augment the function of any computer or mobile network without permission;
    10. use the Software to delete, modify or increase the data and/or applications stored, processed or transferred in any computer or mobile network without permission;
    11. use the Software to perform any other act intended to harm the security of any computer or mobile network; or
    12. use the Software to disrupt of the normal operation of other software on the device, the 360 website, or propagate any malware.

User Guide

  1. Function of the Software: The Software has various functions, including the computer optimization, cleanup and protection. New features of the software will be released continuously in order to fulfill user's need and to help a user to manage computer and protect users from internet security risk. The functions of the software including but not limited to: virus searching and killing, remove unneeded cache, log, trash, and download files from the computer, uninstall applications, protect users from Phishing and Trojan embedded websites, and check a user's Mac hardware parameters.
  2. Junk Cleaner: Junk Cleaner is a customizable function that allows the user to clear unwanted cache files, log files, and any files in the Trash. It scans and cleans those files that waste disk space and slow down your computer. No personal information is scanned or accessed when using the Junk Cleaner function.
  3. Virus Scan. Virus Scan protects against and eliminates malware. It allows the user to choose different scan modes: Full Scan, Quick Scan and Custom Scan. Virus scan only scan the files in local system. No Personal User Information will be uploaded to 360's servers in the process. The Software will perform a scan of the system when you click a scan mode button.
    1. Full Scan: The software will perform a full scan of the system from the root directory.
    2. Quick Scan: During a Quick Scan, the software will scan the important files. For example, the startup items, dock bar, desktop and etc.
    3. Custom Scan: The user can customize the scanning location, directory and item.
  4. Cloud Scan. As a protective measure against malware and viruses, the Software will automatically perform a cloud scan when you click a scan mode button or select a file to be scanned. During a cloud scan, certain information will be collected from the scanned documents, including the device serial number, device version, system version, Software version, the SHA1 of the scanned files. This information will be sent to the server to analyze the safety status of each document on your device and address any concerns appropriately. You may deactivate Quick Scan or Full Scan mode if you do not want to perform a cloud scan. Only the SHA1 will be collected, the content of the file will not be collected.
  5. Uninstall Software: Users can choose batch uninstall to uninstall application.
  6. Web Protection: The URLs of websites that you visit will be uploaded to 360 Cloud Security Center servers for phishing and online fraud analysis. Any Personal User Information will be removed from the URLs before they are uploaded. The information is processed with encryption before the upload. You may disable Web Protection by sliding Web Protection into the "off" mode.
  7. Hardware Information: Users can check Mac hardware parameters, name of CPU, available memory, display card, hard disk status, Bluetooth power and display. This function runs locally and will not collect and upload any information.

Support Services and Upgrades

  1. 360 Security Center may provide you with support services related to the Software ("Support Services").
    1. Technical Support: Certain technical support features may be offered by 360 for the Software and may include live chat with a technical support consultant and/or assistance from a technical support consultant via remote access. Any such technical support shall be provided in 360's sole discretion without any guaranty or warranty of any kind. 360 reserves the right to refuse, suspend or terminate any of the technical support at its sole discretion. You are solely responsible for backing up of all your existing data, software and programs before accessing any technical support.
  2. Modification and Upgrade: 360 reserves the right to modify and upgrade the Software at any time with or without notifying you.
    1. The Software will automatically update its list of trusted and malicious URLs to detect suspicious websites and its virus database to detect malware. You agree to receive, and permit 360 to download and install, new updates to the Software. You may uninstall the Software if you do not agree to the download and installation of new updates.
    2. Upgrades of the Software are prompted in tips and you may choose to update or not when the tips are prompted. If there is no need for you to receive Software update tips, you may customize this preference in the "Preferences" section of the Software.

360 Privacy Policy

  1. The Software contains neither malicious code aimed at undermining your computer data and obtaining private information nor code that tracks and monitors your computer. The Software will not (1) collect any information about use of software or documents unrelated to the Software; or (2) disclose any of your private data to any other person.
  2. You agree to 360's use of your data in accordance with the 360 Privacy Policy ( https://www.360totalsecurity.com/privacy/ ), which is incorporated herein by reference. For information about 360's data protection and collection practices, please read the 360 Privacy Policy.

Legal Liability and Disclaimer

  1. THE SOFTWARE HAS BEEN THOROUGHLY TESTED, BUT 360 CANNOT GUARANTEE THAT IT IS FULLY COMPATIBLE WITH YOUR DEVICE. IF YOU ENCOUNTER AN INCOMPATIBILITY WITH YOUR DEVICE, PLEASE CONTACT 360 SECURITY CENTER FOR TECHNICAL SUPPORT. YOU SHOULD UNINSTALL THE SOFTWARE IF THE COMPATIBILITY PROBLEM PERSISTS.
  2. IN NO EVENT WILL 360 BE LIABLE FOR ANY DAMAGE TO YOU CAUSED BY ANY CONFLICTS WITH SOFTWARE PREVIOUSLY INSTALLED ON YOUR DEVICE OR BY OPERATION OF THE SOFTWARE INCLUDING BUT NOT LIMITED TO THE DIRECT OR INDIRECT PERSONAL LOSS, LOSS OF BUSINESS PROFITS, SUSPENSION OF TRADE, LOSS OF THE BUSINESS INFORMATION OR ANY OTHER PECUNIARY LOSS, EXCEPT FOR THE REPAIR OF MANUFACTURING DEFECTS OF THE SOFTWARE.
  3. 360 SHALL NOT BE LIABLE FOR ANY LOSSES TO YOU DUE TO A THIRD PARTY'S COMMUNICATION ERROR, TECHNICAL PROBLEM, NETWORK OR COMPUTER FAILURE, SYSTEM INSTABILITY, OR OTHER FORCE MAJEURE EVENTS.
  4. IF YOU VIOLATE THIS AGREEMENT OR THE RELATED TERMS OF SERVICE, RESULTING IN ANY CLAIM, DAMAGE OR LOSS TO 360, 360 MAY TAKE MEASURES INCLUDING BUT NOT LIMITED TO DISCONTINUING THE SOFTWARE LICENSE, TERMINATING PROVISION OF SERVICES, RESTRICTING USE OF THE SOFTWARE AND/OR TAKING ANY NECESSARY LEGAL OR ADMINISTRATIVE ACTIONS.
  5. 360 CANNOT GUARANTEE THAT THE SOFTWARE IS NOT INFECTED BY OR BUNDLED WITH DISGUISED MALWARE IF THE SOFTWARE IS DOWNLOADED FROM A SOURCE OTHER THAN THE 360 WEB SITE. 360 WILL NOT BE LIABLE FOR DIRECT OR INDIRECT DAMAGE CAUSED BY COPIES OF THE SOFTWARE OBTAINED FROM THIRD PARTIES.
  6. 360 HEREBY EXPRESSLY DISCLAIMS ANY IMPLIED WARRANTIES AND CONDITIONS, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, LOSS OF DATA, DEVICE FAILURE OR MALFUNCTION, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NON-INTERFERENCE, ACCURACY OF DATA, INTEGRATION, NON-INFRINGEMENT OF THIRD PARTY RIGHTS BY FILTERING, DISABLING, OR REMOVING SUCH THIRD PARTY'S SOFTWARE, SPYWARE, ADWARE, COOKIES, EMAILS, DOCUMENT, ADVERTISEMENTS, OR THE LIKE, WHETHER ARISING BY STATUTE, LAW, COURSE OF DEALING, CUSTOM AND PRACTICE, OR TRADE USAGE. THE FOREGOING PROVISIONS SHALL BE ENFORCEABLE TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW.
  7. 360 DOES NOT WARRANT THAT THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE OR THAT ANY ERRORS WILL BE CORRECTED. 360 DOES NOT WARRANT THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT 360 DISCLAIMS ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, WITH RESPECT TO THE SOFTWARE, ENHANCEMENTS, MAINTENANCE OR SUPPORT RELATED THERETO, OR ANY OTHER MATERIALS (TANGIBLE OR INTANGIBLE) OR SERVICES SUPPLIED BY THEM.
  8. SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATIONS OR EXCLUSIONS MAY NOT APPLY TO YOU. IN NO CASE SHALL 360'S LIABILITY EXCEED THE PURCHASE PRICE PAID BY YOU FOR THE SOFTWARE.
  9. IF YOU ARE DISSATISFIED OR HARMED BY 360 OR ANY PORTION OF THE 360 WEB SITE, YOU MAY UNINSTALL 360’S PRODUCT, CLOSE YOUR 360 ACCOUNT OR DISCONTINUE USING THE 360 WEB SITE, AND SUCH DISCONTINUANCE SHALL BE YOUR SOLE AND EXCLUSIVE REMEDY.
  10. As a condition of use of the Software you agree to indemnify 360, its affiliates, partners, officers, directors, employees and agents from and against any and all actions, claims, losses, damages, liabilities and expenses (including reasonable attorneys' fees) arising from your violation of any term of this Agreement. This defense and indemnification obligation will survive termination of this Agreement and your use of the Software.

Applicable Law and Disputes

  1. The Agreement shall be governed by the law of the state of New York, excluding its conflicts of laws rules.
  2. For any dispute you have with 360, you agree to first contact us and attempt to resolve the dispute with us informally. If 360 has not been able to resolve the dispute with you informally, we each agree to resolve any claim, dispute, or controversy (excluding claims for injunctive or other equitable relief) arising out of or in connection with or relating to this Agreement by binding arbitration by the American Arbitration Association ("AAA") under the Commercial Arbitration Rules and Supplementary Procedures for Consumer Related Disputes then in effect for the AAA, except as provided herein. Unless you and 360 agree otherwise, the arbitration will be conducted in the state of New York. Each party will be responsible for paying any AAA filing, administrative and arbitrator fees in accordance with AAA rules, except that 360 will pay for your reasonable filing, administrative, and arbitrator fees if your claim for damages does not exceed $5000 and is non-frivolous (as measured by the standards set forth in Federal Rule of Civil Procedure 11(b)). The award rendered by the arbitrator shall include costs of arbitration, reasonable attorneys' fees and reasonable costs for expert and other witnesses, and any judgment on the award rendered by the arbitrator may be entered in any court of competent jurisdiction. Nothing in this Section shall prevent either party from seeking injunctive or other equitable relief from the courts for matters related to data security, intellectual property or unauthorized access using the Software.
  3. ALL CLAIMS MUST BE BROUGHT IN THE PARTIES' INDIVIDUAL CAPACITY, AND NOT AS A PLAINTIFF OR CLASS MEMBER IN ANY PURPORTED CLASS OR REPRESENTATIVE PROCEEDING, AND, UNLESS WE AGREE OTHERWISE, THE ARBITRATOR MAY NOT CONSOLIDATE MORE THAN ONE PERSON'S CLAIMS. YOU AGREE THAT, BY ENTERING INTO THESE TERMS, YOU AND 360 ARE EACH WAIVING THE RIGHT TO A TRIAL BY JURY OR TO PARTICIPATE IN A CLASS ACTION.

Miscellaneous

  1. This Agreement constitutes the entire agreement between you and 360 governing your use of the Software. You may also be subject to additional and separate terms and conditions that apply when you use or purchase other 360 products, services, or affiliate services, or third-party content or software.
  2. If any provision of this Agreement is determined to be illegal, invalid or unenforceable, the provision so determined to be illegal, invalid or unenforceable shall be severable without affecting the enforceability of any of the remaining provisions.
  3. 360 may modify the terms of this Agreement in accordance with any changes to relevant laws and regulations, or in accordance with any changes to 360 or its business. We will notify you of all modifications to this Agreement on our webpage ( https://www.360totalsecurity.com ) and attach with the latest version of the Software. You may uninstall the Software if you do not agree to the modified content of the Website or the Network Services. Your continued use of the Software shall be regarded as your acceptance of the modification to this Agreement.
  4. This Agreement, and any rights and licenses granted hereunder, may not be transferred or assigned by you except as explicitly provided in this Agreement, but may be assigned by 360 without restriction.
  5. 360 may be required to send you legal notices and other communications about the Software, services or our use of the information you provide us ("Communications"). 360 will send Communications via in-product notices or via email to the primary user's registered address, or will post Communications on the 360 web site. By accepting this Agreement, you consent to receive all Communications through these electronic means only and acknowledge and demonstrate that you can access Communications on the 360 web site.

Поддержка пользователей

Поддержка

Партнерство

partnership@360safe.com

Офис

Building 2, 6 Haoyuan, Jiuxianqiao Road, Chaoyang District, Beijing, P.R.C. 100015