Welcome to 360 Total Security!
Intellectual Property Statement
- 360 owns and retains all right, title, and interest in and to the Software, including all copyrights and any other intellectual-property rights. All intellectual property, trademark rights and patent rights in the Software and all information related to the Software, are under the protection of national or regional intellectual property laws and regulations.
- 360 owns and retains all right, title and interest in and to use the Qihoo 360 name, the logo and the product names associated with the web site and the services in connection with the Software, and does not grant you any right or license to use them except in accordance with this Agreement.
- Except as expressly provided in this Agreement, you do not acquire any rights in the Software.
- The Software is a free product. 360 hereby grants you and only you a limited license to download, install, use and copy the Software on a single device for non-commercial use and without limitation on number of uses. Each copy of the Software that is copied, distributed and/or transferred by you must be complete, accurate and authentic, including all of software, electronic documents, copyright and trademark related to the Software and this Agreement.
- The Software will automatically deactivate when you uninstall the Software, and you will not be entitled to receive any feature or content update to the Software thereafter.
- All rights not expressly granted herein are reserved by 360. You must obtain separate written approval from 360 to obtain rights not expressly granted herein. Unless applicable law gives you more rights than contained herein, you may only use the Software as expressly permitted in this Agreement.
User Conduct and Compliance with Laws
- Use of the Software is subject to all applicable local, state, federal and international laws and regulations. You agree to comply with such laws and regulations.
- You agree not to:
- use the Software for any illegal purposes;
- reverse engineer, decompile, disassemble or otherwise attempt to modify any internal resources of the Software or the compiled program files (including without limitation any related malware signatures and malware detection routines), or create derivative works of any of the foregoing, except to the extent that the foregoing restriction is expressly prohibited by applicable law;
- sell, copy or distribute the Software for any commercial purpose, including but not limited to software sales, pre-installation and software bundling, without the written consent of 360;
- use any parts or components of the Software separately for any purpose except as provided in this Agreement because this Software is licensed to be used as a single product;
- intentionally circumvent or destroy any technical measures taken to protect the Software's copyright, or delete or modify any electronic rights management data or information of the Software;
- intentionally mislead or deceive other people by using this Software;
- falsify or delete any author attributions, legal or other proper notices or proprietary designations or labels of the origin or source of software or other material contained in a file that is uploaded;
- use the Software to improperly access a computer or mobile network or use any computer or mobile network resources without permission;
- use the Software to delete, modify or augment the function of any computer or mobile network without permission;
- use the Software to delete, modify or increase the data and/or applications stored, processed or transferred in any computer or mobile network without permission;
- use the Software to perform any other act intended to harm the security of any computer or mobile network; or
- use the Software to disrupt of the normal operation of other software on the device, the 360 website, or propagate any malware.
- The Software includes ( but is not limited to) the following functions:
- examine the overall condition and safety of your computer and repair its system vulnerabilities ("360 PC Examination");
- protect against and eliminate malware from your computer ("360 Virus Scan");
- clear and delete your computer's history, such as your browsing history, browser plug-ins, system backup, Windows history and Office history ("360 Cleanup");
- enhance your computer's system performance optimization ("360 Speedup"); and
- manage your application software ("360 Software Management").
- 360 Active Protection uses cutting-edge detection technology to prevent many different types of threats to your computer, and will send you a report when it detects a security risk. 360 Active Protection provides:
- protection when a user is web browsing, watching online videos or shopping online, checking email, conducting frequent or default searches or setting/using homepage ("360 Internet Protection");
- protection from network security vulnerabilities, the hacking of your camera or keyboard, protection for drivers, files, processes, and registries ("360 Privacy Protection");
- protection when a user is chatting, downloading files, inserting "USB" disks, from computer hacking and LAN protection capabilities ("360 System Protection"); and
- a tool to isolate suspicious programs and perform router security checks and more ("360 Sandbox")
- 360 Internet Protection. The URLs of websites that you visit will be uploaded to 360 Cloud Security Center servers for phishing and online fraud analysis. Any Personal User Information will be removed from the URLs before they are uploaded. The information is processed with encryption before the upload. You may opt out 360 Internet Protection by unchecking the "URL filtering" option in Software settings.
- System Protection. The Software includes System Protection. By default, the Software will automatically delete or quarantine any malware it detects to prevent damage to your computer and further spread of the malware. Pop-up windows will inform you of any deletion and quarantine unless you are in the "Do Not Disturb Mode" (described below). You may restore the automatic operation of any malware files by changing the Software's settings.
- Silent Mode. When you are in the Silent Mode, the Software will (1) reduce usage of system resources, (2) block pop-up emergency windows, and (3) delay planned upgrading and scanning tasks, thereby reducing disturbance to games and other full-screen tasks. You may activate Silent Mode manually by setting activation conditions. You may also customize Silent Mode in the "Setting" dialog box. Your choice to enter Silent Mode shall be regarded as acceptance to automatically launch the deletion and quarantine functions under Active Protection.
- Facebook Login. A user may also access 360 Total Security via their Facebook account. This benefit is made possible by interfacing with the Facebook API. To access this benefit, a user must log into Facebook by entering their Facebook username and password. 360 will neither have access to nor store a user's Facebook username and password during this process.
- Sandbox. When an application is running in Sandbox, it will be isolated from the operating system to ensure the safety of both. All the files the application generated will be in Sandbox only, and will be erased when Sandbox is deactivated. It is recommended to backup these files if needed. If you choose to let the relevant application auto-run always run in Sandbox, the relevant application will automatically run in Sandbox even started outside Sandbox unless such setting being amended.
- DUMP Files Upload. The Software will upload the DUMP files generated when Software crashes to 360 Cloud Security Center for failure analysis and quality improvement purposes. DUMP files are generated by the operating systems (e.g. Windows) when a program crashes, and contain the program execution status of the crash, including the time of crash and system information. Personal information may be included in a DUMP file, and you may opt out DUMP files upload by unchecking the "Automatically send crash reports to 360" option in Software settings.
- The Software incorporates some functions of the document compression tool "7-Zip." This incorporation was authorized by GNU General Public License. For more details please visit the website (http://www.7-zip.org) The Software functions only in the supported operating systems listed on the 360 website. You may uninstall the Software when it is no longer needed. 360 disclaims any and all liability that may occur either during or after the course of uninstalling the Software.
- Toolbox. This function provides users with extra utilities for users to optimize performance of their computer. Users can also vote for any functions they would like to have in the future.
- Instant Setup. By using scripts and commands, this function allows fully automated installation of any third party software or applications (“Third Party App”) selected by users and helps users to download and install the software at the same time when users click “Install” button. You acknowledge and understand that 360 is not the owner nor the technical service provider of any Third Party App. 360 will have no obligation whatsoever under this Agreement to support or maintain any such Third Party App, nor will 360 have any liability under this Agreement arising out of the Third Party App, regardless of the nature of the claim or the nature of the claimed or alleged damages, including, without limitation, direct, indirect, incidental, consequential or punitive damages, for any claim arising from or related to users’ use or distribution of the Third Party App, and 360 disclaims any and all representations and warranties, express, implied or statutory, with respect to any and all such Third Party App, including without limitation, any warranties of merchantability, fitness for a particular purpose, system integration, data accuracy, title, non-infringement, quiet enjoyment, and/or non-interference.
- Accounts and security: You may create an account by providing us with your email address or mobile number and creating a password. You are entirely responsible for maintaining the confidentiality of the information you hold for your account, including your password, and for any and all activity that occurs under your account as a result of your failing to keep this information secure and confidential. We will not be liable for any loss or damage arising from your failure to provide us with accurate information or to keep your account Information secure and confidential. If you discover any unauthorized use of your account Information or suspect that anyone may be able to access your private content without authorization, you should immediately change your account or password and notify our Support team at email@example.com.
- Auto-renewal Service: You may select the period for the Paid Service on a yearly basis, or on other periodic basis as we may offer. You may also select the auto-renewal service for each described billing circle. By selecting the Auto-renewal Service, you agree that your Paid Service will be automatically renewed for successive renewal terms at the specified license price before it expires, and you agree to authorize and permit cleverbridge to bill renewal fee for the Paid Service to the credit card, debit card or PayPal account which you have provided with cleverbridge until you terminate the automatic renewal service, or cleverbridge terminates the automatic renewal and cancels the billing option. Your subscription period begins on the date of your most recent purchase.
You may cancel auto-renewal for the Paid Service no later than ten days before the first day of the next renewal period. The request will be dealt with upon our receipt of your cancellation and after we have confirmed that you are entitled to propose such request.
- Refund: You may request a refund of your whole payment for the current billing circle within 30 days after the date of your purchase (“Qualified Refund”). When you request a Qualified Refund, you also need to confirm whether to cancel or keep the subsequent auto renewal service. Non-Qualified Refunds may be considered, in the sole discretion of 360, only if a subscriber can demonstrate that 360 has charged you through auto renewal service for the next billing period although you have sent a request to 360 to cancel the auto-renewal 10 days prior to the first day of the next renewal period. If you would like to request a Qualified Refund, please send an email to firstname.lastname@example.org with your request to us.
- 360 Cloud Analysis Plan. 360 Cloud Analysis Plan provides the following functions:
- Networked Detection of File Security. When using the virus scanning and killing function of this Software, 360 Cloud Analysis Plan will upload certain executable program files (excludes users’ files, diagrams, photos, videos and other privacy-related non-program files and information (such as names, phone numbers, residential addresses, E-mail addresses and account information) to 360 Cloud Security Center, and compare the file names, file paths and file fingerprints with an online Trojan virus blacklist database and a whitelist database for the files already proven as secure stored by 360 Cloud Security Center. 360 will post back suspicious executable programs (i.e. programs which are executable and files which can be called by other programs) to 360 Cloud Security Center for analysis as samples after obtaining your consent.
- Networked Detection of Webpage Security. When using the webpage protection feature of 360 Security Shield or use 360 Secure Browser to visit websites or click on links on webpages, 360 will send the URL websites to 360 Cloud Security Center for networked security detection. 360 Cloud Analysis Plan will compares the viruses with an online Trojan virus blacklist database stored by 360 Cloud Security Center. By using this function, if you open a Trojan-containing website or a website with a link to a Trojan-containing website, 360 Shield will promptly intercept the Trojan viruses in the webpages or a warning window will pop up to prevent Trojan viruses from entering your computer.
- Reporting of Suspicious File Samples. A “Suspicious File Sample” refers to an executable file sample neither in the Trojan virus database, nor in the whitelist database, and posing certain threats. Most of the suspicious files sample are unknown Trojans and viruses, and will cause huge security threats to users’ computers.
360 will obtain your consent before we post back the suspicious files sample. All the suspicious file samples posted back are executable files, which will not involve your personal information.
- Networked Query about Software Information. 360 Cloud Security Center has set up a comprehensive software information database, covering software versions, software feature introductions, software categories, roles of files in software, and users’ rating of and comments on software.
When using the “Firewall” or “Startup Booster” or any other functions that requiring the display of program and file information in this Software, the relevant function will, through the file names and the file fingerprints, be networked with 360 Cloud Security Center to seek queries about the security attributes of processes and software in your computer and the descriptions of program features, and display the information results in the relevant software list. In the networked query with the software database, the data to be posted back only include file names, file paths and file fingerprints of the software. The data to be posted back do not include the information which can trace and position users (such as users’ IDs and computer names) and do not include users’ files, diagrams, photos, videos and other privacy-related non-program files and information (such as names, phone numbers, residential addresses, E-mail addresses, account No. and passwords).
You can cancel your participation in 360 Cloud Analysis Plan at any time, so as to no longer automatically report suspicious programs to 360 Cloud Security Center. Meanwhile, the details of all the files reported by your computer can be viewed through “Reporting Files” on the 360 virus scanning interface, so as to specifically learn about which files have been uploaded, whether the files are secure, the uploading time and the file popularity indicators.
- 360 Virtual Vault. If you using Bitcoin, Ethereum or any other block chain-based currency (“Virtual Currency”), an encrypted backup of certain information associated with the Virtual Currency or the Virtual Currency wallet will be stored by 360 Virtual Vault. 360 Virtual Vault will create private key pair to the data so that you may use the key pair through phone or mail verification to decrypt your Virtual Currency wallet.
This software provides the service of wallet backup encryption for free, and therefore, we take no responsibility or liability to you for any loss incurred from any use of 360 Virtual Vault, including but not limited to any losses, damages or claims arising from: (a) user error such as forgotten passwords, incorrectly constructed transactions, or mistyped Virtual Currency addresses; (b) failure of the service under the Software or data loss, crack or damage; (c) corrupted encrypted backup data or files; (d) unauthorized access to applications; (e) any unauthorized third party activities, including without limitation the use of viruses, phishing, hack, brute forcing or other means of attack against the 360 Virtual Vault. If the encrypted data are damaged, your Virtual Currency wallet data cannot be decrypted or restored with 360 Virtual Vault. It is recommended for you to back up the data or file(s) outside of 360 Virtual Vault. If you do not maintain a backup of your Virtual Currency wallet data outside of 360 Virtual Vault, you may not be able to access Virtual Currency wallet in the event that we discontinue or depreciate the 360 Virtual Vault function or the Software. We may suspend or terminate your access to 360 Virtual Vault in our sole discretion, immediately and without prior notice, and delete or deactivate your wallet data and all related information and files in such without cost to you, including, for instance, in the event that you breach any of these terms. In the event of termination, your access to funds will depend on your access to your backup of your wallet data.
We do not receive or store your password associated with the Virtual Currency wallet. Therefore, we cannot assist you with the password retrieval. 360 Virtual Vault provide you with tools to help you store your encrypted backup data associated with the Virtual Currency wallet, but 360 Virtual Vault cannot generate a new password for your Virtual Currency wallet. You are solely responsible for remembering your Virtual Currency wallet password.
Virtual Currency is an intangible, digital asset. They exist only by virtue of the ownership record maintained in the relevant virtual currency network. 360 Virtual Vault do not store, send or receive Virtual Currency. Any transfer of title that might occur in any Virtual Currency shall occur on the decentralized ledger within the Virtual Currency network and not within the Software.
- Additional details about the function of the Software and how it protects your private information can be found on the 360 website (https://www.360totalsecurity.com/privacy/).
Support Services and Upgrades
- 360 Security Center may provide you with support services related to the Software ("Support Services").
- Technical Support: Certain technical support features may be offered by 360 for the Software and may include live chat with a technical support consultant and/or assistance from a technical support consultant via remote access. Any such technical support shall be provided in 360's sole discretion without any guaranty or warranty of any kind. 360 reserves the right to refuse, suspend or terminate any of the technical support at its sole discretion. You are solely responsible for backing up of all your existing data, software and programs before accessing any technical support.
- Modification and Upgrade: 360 reserves the right to modify and upgrade the Software at any time with or without notifying you.
- The software will automatically update its malware definition database to detect and neutralize the latest malware. You agree to receive and permit 360 to download and install new updates and versions of the Software. You may customize how frequently the malware definitions database is updated in the Update Settings of the Software.
- Upgrades of functional modules of the Software are prompted in tips instead of performing an automatic update. You may choose to update or not when the tips are prompted. If there is no need for the tips of Software upgrading, you may customize it in the Update Settings of the Software.
- The Upgrade module of the Software uses peer-to-peer ("P2P") technology to improve upgrade speed and efficiency of your bandwidth usage. The P2P technology will cause data to be uploaded, including program modules and the Software's malware definition database, which are used as components of the Software. Your private data will not be uploaded.
- The Software does not contain any malicious code aimed at undermining your computer data and obtaining private information, nor code that tracks and monitors your computer. The Software will not (1) collect any information about use of software or documents unrelated to the Software; or (2) disclose any of your private data to any other person.
Legal Liability and Disclaimer
- THE SOFTWARE HAS BEEN THOROUGHLY TESTED, BUT 360 CANNOT GUARANTEE THAT IT IS FULLY COMPATIBLE WITH YOUR DEVICE. IF YOU ENCOUNTER AN INCOMPATIBILITY WITH YOUR DEVICE, PLEASE CONTACT 360 SECURITY CENTER FOR TECHNICAL SUPPORT. YOU SHOULD UNINSTALL THE SOFTWARE IF THE COMPATIBILITY PROBLEM PERSISTS.
- IN NO EVENT WILL 360 BE LIABLE FOR ANY DAMAGE TO YOU CAUSED BY ANY CONFLICTS WITH SOFTWARE PREVIOUSLY INSTALLED ON YOUR DEVICE OR BY OPERATION OF THE SOFTWARE INCLUDING BUT NOT LIMITED TO THE DIRECT OR INDIRECT PERSONAL LOSS, LOSS OF BUSINESS PROFITS, SUSPENSION OF TRADE, LOSS OF THE BUSINESS INFORMATION OR ANY OTHER PECUNIARY LOSS, EXCEPT FOR THE REPAIR OF MANUFACTURING DEFECTS OF THE SOFTWARE.
- 360 SHALL NOT BE LIABLE FOR ANY LOSSES TO YOU DUE TO A THIRD PARTY'S COMMUNICATION ERROR, TECHNICAL PROBLEM, NETWORK OR COMPUTER FAILURE, SYSTEM INSTABILITY, OR OTHER FORCE MAJEURE EVENTS.
- IF YOU VIOLATE THIS AGREEMENT OR THE RELATED TERMS OF SERVICE, RESULTING IN ANY CLAIM, DAMAGE OR LOSS TO 360, 360 MAY TAKE MEASURES INCLUDING BUT NOT LIMITED TO DISCONTINUING THE SOFTWARE LICENSE, TERMINATING PROVISION OF SERVICES, RESTRICTING USE OF THE SOFTWARE AND/OR TAKING ANY NECESSARY LEGAL OR ADMINISTRATIVE ACTIONS.
- 360 CANNOT GUARANTEE THAT THE SOFTWARE IS NOT INFECTED BY OR BUNDLED WITH DISGUISED MALWARE IF THE SOFTWARE IS DOWNLOADED FROM A SOURCE OTHER THAN THE 360 WEB SITE. 360 WILL NOT BE LIABLE FOR DIRECT OR INDIRECT DAMAGE CAUSED BY COPIES OF THE SOFTWARE OBTAINED FROM THIRD PARTIES.
- 360 HEREBY EXPRESSLY DISCLAIMS ANY IMPLIED WARRANTIES AND CONDITIONS, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, LOSS OF DATA, DEVICE FAILURE OR MALFUNCTION, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NON-INTERFERENCE, ACCURACY OF DATA, INTEGRATION, NON-INFRINGEMENT OF THIRD PARTY RIGHTS BY FILTERING, DISABLING, OR REMOVING SUCH THIRD PARTY'S SOFTWARE, SPYWARE, ADWARE, COOKIES, EMAILS, DOCUMENT, ADVERTISEMENTS, OR THE LIKE, WHETHER ARISING BY STATUTE, LAW, COURSE OF DEALING, CUSTOM AND PRACTICE, OR TRADE USAGE. THE FOREGOING PROVISIONS SHALL BE ENFORCEABLE TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW.
- 360 DOES NOT WARRANT THAT THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE OR THAT ANY ERRORS WILL BE CORRECTED. 360 DOES NOT WARRANT THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT 360 DISCLAIMS ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, WITH RESPECT TO THE SOFTWARE, ENHANCEMENTS, MAINTENANCE OR SUPPORT RELATED THERETO, OR ANY OTHER MATERIALS (TANGIBLE OR INTANGIBLE) OR SERVICES SUPPLIED BY THEM.
- SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATIONS OR EXCLUSIONS MAY NOT APPLY TO YOU. IN NO CASE SHALL 360'S LIABILITY EXCEED THE PURCHASE PRICE PAID BY YOU FOR THE SOFTWARE.
- IF YOU ARE DISSATISFIED OR HARMED BY 360 OR ANY PORTION OF THE 360 WEB SITE, YOU MAY UNINSTALL 360'S PRODUCT, CLOSE YOUR 360 ACCOUNT OR DISCONTINUE USING THE 360 WEB SITE, AND SUCH DISCONTINUANCE SHALL BE YOUR SOLE AND EXCLUSIVE REMEDY.
- As a condition of use of the Software, you agree to indemnify 360, its affiliates, partners, officers, directors, employees and agents from and against any and all actions, claims, losses, damages, liabilities and expenses (including reasonable attorneys' fees) arising from your violation of any term of this Agreement. This defense and indemnification obligation will survive termination of this Agreement and your use of the Software.
Applicable Law and Disputes
- The Agreement shall be governed by the law of the state of New York, excluding its conflicts of laws rules.
- For any dispute you have with 360, you agree to first contact us and attempt to resolve the dispute with us informally. If 360 has not been able to resolve the dispute with you informally, we each agree to resolve any claim, dispute, or controversy (excluding claims for injunctive or other equitable relief) arising out of or in connection with or relating to this Agreement by binding arbitration by the American Arbitration Association ("AAA") under the Commercial Arbitration Rules and Supplementary Procedures for Consumer Related Disputes then in effect for the AAA, except as provided herein. Unless you and 360 agree otherwise, the arbitration will be conducted in the state of New York. Each party will be responsible for paying any AAA filing, administrative and arbitrator fees in accordance with AAA rules, except that 360 will pay for your reasonable filing, administrative, and arbitrator fees if your claim for damages does not exceed $5000 and is non-frivolous (as measured by the standards set forth in Federal Rule of Civil Procedure 11(b)). The award rendered by the arbitrator shall include costs of arbitration, reasonable attorneys' fees and reasonable costs for expert and other witnesses, and any judgment on the award rendered by the arbitrator may be entered in any court of competent jurisdiction. Nothing in this Section shall prevent either party from seeking injunctive or other equitable relief from the courts for matters related to data security, intellectual property or unauthorized access using the Software.
- ALL CLAIMS MUST BE BROUGHT IN THE PARTIES' INDIVIDUAL CAPACITY, AND NOT AS A PLAINTIFF OR CLASS MEMBER IN ANY PURPORTED CLASS OR REPRESENTATIVE PROCEEDING, AND, UNLESS WE AGREE OTHERWISE, THE ARBITRATOR MAY NOT CONSOLIDATE MORE THAN ONE PERSON'S CLAIMS. YOU AGREE THAT, BY ENTERING INTO THESE TERMS, YOU AND 360 ARE EACH WAIVING THE RIGHT TO A TRIAL BY JURY OR TO PARTICIPATE IN A CLASS ACTION.
- This Agreement constitutes the entire agreement between you and 360 governing your use of the Software. You may also be subject to additional and separate terms and conditions that apply when you use or purchase other 360 products, services, or affiliate services, or third-party content or software.
- If any provision of this Agreement is determined to be illegal, invalid or unenforceable, the provision so determined to be illegal, invalid or unenforceable shall be severable without affecting the enforceability of any of the remaining provisions.
- 360 may modify the terms of this Agreement in accordance with any changes to relevant laws and regulations, or in accordance with any changes to 360 or its business. We will notify you of all modifications to this Agreement on our webpage (https://www.360totalsecurity.com) and attach with the latest version of the Software. You may uninstall the Software if you do not agree to the modified content of the Website or the Network Services. Your continued use of the Software shall be regarded as your acceptance of the modification to this Agreement.
- This Agreement, and any rights and licenses granted hereunder, may not be transferred or assigned by you except as explicitly provided in this Agreement, but may be assigned by 360 without restriction.
- 360 may be required to send you legal notices and other communications about the Software, services or our use of the information you provide us ("Communications"). 360 will send Communications via in-product notices or via email to the primary user's registered address, or will post Communications on the 360 web site. By accepting this Agreement, you consent to receive all Communications through these electronic means only and acknowledge and demonstrate that you can access Communications on the 360 web site.