User Agreement
Please read and fully understand the entire Face Search User Privacy Agreement ("Agreement") before using the Face Search software. If you have any questions about this Agreement or the information on this page, please do not proceed to the next step. You click on the page or other means to confirm that you have agreed to this Agreement.
I. Basic Statement
1.This software can be used to distinguish the unique facial features of natural individuals.
2.The Company does not store all the video or photo information of the search, all the comparison data come from Internet search, and does not store the photos uploaded by the users.
3. Face search technology support: the technology uses face recognition technology, the face recognition engine provided by the Company. The Company has specifically developed various types of face recognition detection technology to ensure the safety and reliability of its verification.
4.According to the "Regulations on Ecological Governance of Network Information Contents" issued by the State, this website requires users to use face search engine to search for the user's own avatar only, which is used to prevent the user's portrait from being infringed upon or abused. Do not use face search for human flesh search, otherwise all the consequences will be borne by the user.
Functions of the product
1.The use of the face recognition function is mainly used to search for user's photo information. We will collect your uploaded photo feature value information within the scope permitted by law, when and only when you use the above function, in order to match the data with the Internet search. This information is necessary to provide the above features. If you refuse to provide us with your face photo information, we will not be able to provide you with the above services.
2.Please follow the instructions to complete the photo upload process. When uploading face photos, please try your best to ensure that there is sufficient light when taking photos, that the line of sight is even with the camera, that the photos are not blocked, and that the features of facial information are clear and recognizable.
Personal Information Confidentiality Statement
1.Face Search will not collect your personal information, and we will not record your IP address, browser type, citation address, and other technical data in the course of using Face Search software. Images uploaded by users will be automatically deleted after the search is completed. We do not download, browse or copy the images uploaded by users to protect their privacy.
2.We promise that we will make information security protection to the industry-leading level of security. In order to protect your information security, we are committed to using a variety of security technologies and supporting management system to minimize the risk of leakage, damage, misuse, unauthorized access, unauthorized disclosure and alteration of your information. For example: secure encrypted means of transmission of user data, encrypted storage of information, strict restrictions on access to data centers, the use of dedicated network channels and network agents. At the same time, we have set up a department responsible for the protection of personal information, and established relevant internal control systems for staff who may have access to your information. We adopt the principle of minimum sufficient authorization; systematically monitor the behavior of our staff in handling your information, and continuously train our staff on relevant laws and regulations, privacy and security standards and security awareness.
3.We have prepared an emergency response plan for personal information security incidents, and regularly organize internal emergency response training and emergency drills for relevant personnel to enable them to master their duties and responsibilities and emergency response strategies and procedures. In the unfortunate event of a personal information security incident, we will, in accordance with. In accordance with the requirements of laws and regulations, we will promptly inform you of: the basic situation and possible impact of the security incident, the measures we have taken or will take to deal with the incident, the suggestions you can independently prevent and reduce the risk, and the remedial measures for you. We will promptly inform you of the incident by means of push notification through small programs, sending emails/short messages, etc. When it is difficult to inform individual information subjects one by one, we will publish announcements in a reasonable and effective manner. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities. If your legitimate rights and interests are jeopardized, we will bear the corresponding legal responsibility.
Limitation of Liability
1. Face Search shall protect the effective and normal operation of the face search software on the basis of the existing technical capability, and make reasonable efforts to improve the accuracy of the search verification results. However, due to the fact that the collection of facial features is susceptible to variable factors such as expression, make-up, ambient light, etc., and the limited scope of information that can be captured by Face Search on the Internet, and that the level of technology and means of authentication are still undergoing continuous improvement, it is not possible to guarantee the absolute accuracy of the search results for the time being.
2. We are committed to achieving industry-leading levels of information security protection. In order to protect your information security, we are committed to using a variety of security technologies and supporting management system to minimize the risk of leakage, damage, misuse, unauthorized access, unauthorized disclosure and alteration of your information. For example: secure encrypted means of transmission of user data, encrypted storage of information, strict restrictions on access to data centers, the use of dedicated network channels and network agents. At the same time, we have set up a department responsible for the protection of personal information, established relevant internal control systems for staff who may have access to your information. We adopt the principle of minimum sufficient authorization; systematically monitor the behavior of our staff in handling your information, and continuously train our staff on relevant laws and regulations, privacy and security standards, and strengthen security awareness.