Geekom PC Manager Terms of Use

Last updated: May, 2025

Preamble

Welcome to Geekom PC Manager !

This Geekom PC Manager Terms of Use (hereinafter referred to as “this Agreement”) is a binding legal agreement between you and Geekom LIMITED (hereinafter referred to as “Geekom PC Manager” , “Software”, “we”, “us”, or ”our”) regarding the license and the operation management service of Geekom PC Manager. We hereby remind you to read This Agreement carefully and fully understand the terms and conditions herein, especially the Disclaimers, Limitation of Liabilities, Privacy Policy, Usage Rules, Applicable Law, Dispute Resolution and other sections which may have been highlighted in bold or in capital letters for your attention. You must have reached the age of majority for the legal jurisdiction that you reside in to access and sign this Agreement. If you have not reached the age of majority, your guardian must agree to or sign this Agreement and you shall not use Geekom PC Manager or relevant services unless your guardian has given explicit consent.

You agree that by clicking the “Agree” button on the webpage/pop-up window or accessing or using Geekom PC Manager and its services, you are deemed to have read, understood and agreed to be bound by this Agreement. If you do not agree with this agreement, please do not use Geekom PC Manager or its service.

If you have any questions or comments regarding this Agreement, please contact us via the contact information stipulated in this Agreement. We will be happy to answer your questions.

Contact information: [email protected]

1. General Terms

1.1 The Service under this Agreement: refers to the services that we provide you via Geekom PC Manager, such services including but not limited to device connect, PC optimization and PC cloner..

1.2 Scope of this Agreement. This Agreement applies to all the

 

products and services provided by Geekom PC Manager, including applications, mini-programs, websites, SDK for third-party websites or applications, APIs and other forms that may have in the future, and please refer to the specific services provided by Geekom PC Manager.

1.3 Protection of minors. If you are under the age of 18 (or under the age of majority in the jurisdiction where you use Geekom PC Manager and Service), you represent that you have reviewed this Agreement with your parent or legal guardian and that you and your parent or guardian understand and consent to this Agreement. If you are a parent or guardian permitting a Minor to use the Geekom PC Manager and the Services, you agree to: (i) supervise the Minor’s use of the Geekom PC Manager and Service; (ii) assume all risks associated with the Minor’s use of Geekom PC Manager and Service, including the transmission of content to and from third parties via the Internet; (iii) assume any liability resulting from the Minor’s use of Geekom PC Manager and Service; (iv) ensure the accuracy and truthfulness of all information submitted by the Minor; and (v) assume responsibility and are bound by this Agreement for the Minor’s access and use of Geekom PC Manager and Service.

1.4 Updates of this Agreement. In order to improve your user experience or enhance product safety performance, we will continue to work hard to develop new software and services, and provide you in a timely manner with software updates (including but not limited to software version upgrades, modifications, and functional perfection) or repairs. We reserve the right to modify this Agreement as necessary in accordance with applicable laws and regulations. The updated Agreement will shall supersede the original Agreement and shall come into effect after the expiration of the period stipulated by applicable law. If there is no special provision in applicable laws, the Agreement shall become effective on the date of renewal. The updated Agreement will be announced on Geekom PC Manager for your reference at any time. Your continued access or use of Geekom PC Manager or Service

 

will be deemed as you have read and agreed to be bound by the updated Agreement. If you do not accept the updated Agreement, please stop using Geekom PC Manager or Service.

2. Permitted License Uses

Subject to the terms and conditions of this Agreement, Geekom PC Manager grants you a non-exclusive, non-sublicensable, personal, revocable, limited license to access and use this Software and Service. You may install, use, display, and run the Software and Service on your legally owned device for non-commercial purposes. We reserve all rights not expressly authorized to you regarding Geekom PC Manager in this Agreement. If you wish to obtain other rights with regard to the use of Geekom PC Manager, you shall separately obtain a formal written permission from us.

3. Geekom PC Manager and its Services

3.1 Geekom PC Manager is an application independently developed by us to provide service. The Services provided by Geekom PC Manager includes:

(1) PC optimization:Detect device status, hardware driver anomaly information, provide repair functions, computer cleanup, performance experience optimization, etc.

(2) PC cloner: migrate basic data (files, pictures, videos) from the old device to the new device according to your instructions.

Please understand and acknowledge that our services may be adjusted and updated from time to time according to your demands or our operational needs. Please refer to the real-time display of our service and features in the webpage of Geekom PC Manager or other service interfaces (if any).

3.2 You understand and agree that we may send you relevant information, advertisements or brand promotion services for you during your use of this Software and related Services, we will also display commercial advertisements, promotions or information (commercial or non-commercial) regarding this Software and Service and/or third-party providers or business partners. If you do not wish to receive personalized advertisement notifications,

 

you can turn off such personalized advertisement notification, but you may still receive non-personalized advertisements in our App. If you receive advertisements via emails or text messages, you have the right to unsubscribe them.

3.3 You understand and agree that the Software and Service may be suspend ed or stopped by us based on our own business development or as required by judicial, regulatory and supervisory authorities.

3.4 Unless permitted by applicable law and with our written authorization, you may not use or otherwise export or re-export this Software and Service.

4. Restrictions on the use of This Software and Service

4.1 You shall not take any of the following actions when using this Software and Service, including but not limited to:

4.1.1 Releasing, transmitting, spreading or storing contents which violate laws and regulations, policies, public order and good custom, and social ethics, such as insults, defamation, violence, or violation of religion, etc; releasing, transmitting, spreading or storing fabricated information or advertising information for the purpose of misleading or deceiving others;

4.1.2 Renting, lending, copying, modifying, linking, reprinting, compiling, issuing or publishing this Software and similar acts;

4.1.3 Jailbreaking, reverse engineering, disassembling, decompiling, or otherwise attempting to destroy this Software; or, accessing or disturbing this Software by the use of plug-ins, add-ons, or third-party tools/services that are not authorized by us;

4.1.4 Copying, modifying, adding, deleting, operating in the form of mounting, or creating any derivative works of data of the Software, data released into any terminal memory in the course of the operation of the Software, interactive data of the client and server side in the course of the operation of the Software, and system data necessary for the operation of the Software; or adding, deleting or changing the functions or operative effect of software by modifying or fabricating the instructions and data that occur in the course of the operation of the software; or

 

operating or publicly diffusing the software and method used for the above purposes, whether commercially or otherwise;

4.1.5 Carrying out other acts which violate laws and regulations, policies, public order and good custom, and social ethics or acts which are not authorized by us in writing.

4.2 You may not, and you agree not to or enable others to, copy (except as expressly permitted by this Agreement), decompile, reverse engineer, disassemble, attempt to derive the source code of, decrypt, modify, or create derivative works of Geekom PC Manager or any services provided by Geekom PC Manager or any part thereof (except as and only to the extent any foregoing restriction is prohibited by applicable law or by licensing terms governing the use of open-source components that may be included with Geekom PC Manager). You agree not to remove, obscure, or alter any proprietary notices (including trademark and copyright notices) that may be affixed to or contained within Geekom PC Manager.

5. Intellectual Property; Ownership

We reserve the intellectual property rights to this Software and Service and all related information content (including but not limited to UI interface design, pictures, fonts, audio, etc.) and all rights not expressly granted to you. The above intellectual property rights, including but not limited to copyright, trademark and patent rights, are protected by applicable intellectual property rights, anti-unfair competition and other respective laws, regulations and relevant international treaties. For matters not expressly authorized in this Agreement, such as commercial sales, reproduction, and permission for any third party to use this Software, you should separately obtain formal written permission from us.

6. Considerations on Your Use of This Software and Service

6.1 You fully understand and agree: when you use a specific service of this Software, relevant permissions and interfaces of your device may be required in order to achieve the corresponding features, while a separate user agreement may

 

also be required for certain services. Please read the afore-mentioned relevant agreements and rules carefully before using this service;

6.2 We have the right to display all kinds of information to you in the process of providing this Service, including but not limited to prompts for authorization, advertising information and promotional information, etc. The information may appear in the form of system messages or pop-up windows. If you do not agree to receive certain information, you can cancel the relevant service, which may eventually lead to unavailability of the relevant service function;

6.3 You understand and agree: We will make commercially reasonable efforts to protect your data storage security during your use of this Service, but we cannot provide a complete guarantee, including but not limited to the following situations:

6.3.1 To the maximum extent permitted by law, we are not responsible for your deletion or storage failure of relevant data in this Software and Service;

6.3.2 We will retain the data according to the minimum retention period required for business development, unless you agree to extend the retention period or otherwise permitted by law. We also have the right to decide at our discretion the maximum storage space of data in Geekom PC Manager. You may back up relevant data in this Software and Service by yourself according to your own needs;

6.4 When you use this Service, the specific content displayed may differ depending on the version of the Software you use. You understand and agree: when you are using a certain version of this Software or entering the relevant pages of an application developed by us, in order to provide you with a better service experience, the necessary information such as the installation location, size, and UI interface of the installed application on your terminal device may be adjusted, depending on the actual version provided by us.

6.5 You fully understand and agree that, if you need to register an

 

account when using this Software, you will be responsible for keeping the security of the registered account information and account password properly, and you will be responsible for all acts that occur under the account you registered, including any contents that you publish and any consequences arising therefrom.

6.6 You shall judge by yourself the contents that you access while using this Service and bear the risks arising from the use of such contents, including risks arising from the dependence upon the correctness, completeness or practicability of the contents. We are unable to and will not bear any responsibility for any loss or damage suffered by you due to the above risks.

6.7 If we find or receives a report from others that you violated the terms of this Agreement, we shall have the right at any time without notice to: delete and shield relevant contents; suspend or terminate your use of the corresponding account or all of the Service; investigate legal responsibility and take other measures. If you violate any terms of this Agreement, thus causing damage to any third party, you shall solely bear all responsibilities arising therefrom and compensate us for any losses suffered by us arising therefrom (including but not limited to possible administrative penalties, lawyer fees, and investigation and evidence collection fees).

7. Updates

In order to better provide you with relevant Service and to guarantee the security of this Software, we may update this Software and relevant Services from time to time (including but not limited to software modification, software upgrades, partial function disabling, function strengthen, new service development, software replacement and function improvement). You may choose whether to upgrade to the corresponding version based on your needs. In order to facilitate your experience of a better service of Geekom PC Manager, and in compliance with applicable laws, this Software may enable automatic upgrade and update function for you by default. You can choose whether to

 

enable this function in software settings. In case of such updates, we will notify you in an appropriate manner (including but not limited to system notifications, site messages, announcements, application store update notifications, etc.), and you have the right to choose whether to accept the updated version. Updating to the latest version may improve your user experience. If you decide not to accept the updated version provided by Geekom PC Manager, you understand that you may place the Software under serious security risk or cause the Software to be unusable or unstable. Failure to update the software may cause some of the functions of the Software to be limited or rendered unusable.

8. Software and Services Provided by Third Parties

8.1 In order to facilitate your use of Geekom PC Manager, this Software or this Service may use third-party software or services, and the results of such use and access are provided by the third party (including but not limited to the services and contents provided by the third party that you jump to through this Software, this Service, or accessed by said third party through Geekom PC Manager‘s open platform). In addition to the terms of this Agreement, you shall comply with the user agreements of third parties in using software or services provided by third parties. We cannot guarantee the security, accuracy and validity of the services and contents provided by third parties and other uncertain risks, and to the fullest extent permitted by applicable law, you shall solely bear relevant risks and responsibilities arising therefrom.

8.2 Whether the third-party software or services are pre-installed in Geekom PC Manager or activated or subscribed by yourself, you understand and agree that we disclaims all express or implied warranties with respect to the security, accuracy and validity of the services and contents provided by third parties and other uncertain risks.

8.3 Any dispute between you and the above third-party software and services providers shall be settled by you and such third party with you taking relevant responsibilities, if any.

 

9. Fees and Advertisement

You understand and agree that although this Software and Service are currently offered to you free of charge, however, along with the continuous renewal of our Service, you may need to pay for some part of the Software or Service provided by Geekom PC Manager. We reserve the right to add fee-charging features and functionalities in future Service. We also reserve the right to display advertisements in connection with the Software and Service to you. We will clearly notify you in case of any paid software and service in this Software before your use and you may choose whether to accept or use such paid software or service. At that time, please use such paid software or service according to our instructions (including but not limited to service fee standards, payment terms and service rules). You can use such paid software and services once you have explicitly agreed to the relevant agreement and are willing to pay the fees.

Your use of this Software and Service will consume your device, bandwidth, traffic and other resources. Fees for the above resources such as Internet access fees, SMS fees, and payment for the Software’s value-added services shall be borne by yourself.

10. Privacy Policy

When you are using Geekom PC Manager and Services, we may need to collect personal data to provide you the Services. we pay great attention to the protection of your personal data and has made Geekom PC Manager Privacy Policy, which states the detailed information of the way Geekom PC Manager collects, uses, stores, transfers, and discloses your personal data. You may refer to the details of the “Privacy Policy” at “Settings&Feedback” > “My” > “Privacy Policy” , which forms an integral part of this Agreement. By downloading, installing or using the Services, you agree to be bound by the terms of this Agreement and its Privacy Policy, and we will protect your privacy in accordance with this Privacy Policy.

11. Termination and Breach of Contract

We have the right to judge whether your behavior complies with

 

the terms of this Agreement. If you are deemed to have violated relevant laws and regulations or fail to comply with any terms and conditions of this Agreement or related rules, based on the severity of your violation, Geekom PC Manager and our licensors shall have the right to delete the content in violation, to limit, to suspend or to terminate your use of this Software and Service without notice, and to take other measures that we consider appropriate. And you will be held liable for your incompliance behavior. Once it is terminated, we will continue to retain the information you stored in Geekom PC Manager according to requirements of applicable laws and regulations and delete the information generated during your use of this Software in our database in a reasonable period. You agree that, to the fullest extent permitted by applicable law, we shall not be liable to you for such deletion. .

12. Indemnification

You will indemnify, release and hold harmless us, our licensors, agents, and all senior managements, directors, employees thereof from and against any and all third party claims, actions, liabilities, losses, damages, judgments, costs and expenses, including reasonable attorneys’ fees (collectively, “Claims”) arising out of (i) any use of the Services or products appearing on the Services by you or by any person that is not in accordance with the terms of this Agreement; (ii) any breach of this Agreement by you or by any person that you allow to use the Services; or (iii) any violation of any laws, regulations or the rights of any third party by you or by any person that you allow to use the Services or products appearing on the Services.

13. DISCLAIMERS

DISCLAIMER OF WARRANTIES. TO THE MAXIMUM EXTENT PERMITTED BY LAW, THE SOFTWARE AND SERVICES ARE PROVIDED “AS IS” AND “AS AVAILABLE” WITHOUT ANY WARRANTIES OR GUARANTEES OF ANY KIND OR NATURE, EITHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING, BUT NOT LIMITED TO, ANY (IF ANY) IMPLIED WARRANTIES, DUTIES OR CONDITIONS

 

OF MERCHANTABILITY, OF FITNESS FOR A PARTICULAR PURPOSE, OF ACCURACY OR COMPLETENESS OF RESPONSES, OF RESULTS, OF WORKMANLIKE EFFORT, OF LACK OF VIRUSES, AND OF LACK OF NEGLIGENCE, ALL WITH REGARD TO THIS SOFTWARE AND SERVICE.

THIS SOFTWARE DOES NOT CONTAIN ANY MALICIOUS CODE DESIGNED TO DESTROY YOUR DEVICE DATA OR TO OBTAIN YOUR PRIVACY INFORMATION. WE WILL ALSO DO OUR UTMOST TO ENSURE THE SAFE, PROMPT, EFFECTIVE, ACCURATE, RELIABLE AND CONTINUOUS OPERATION OF THIS SOFTWARE AND SERVICE, BUT WITH THE LIMITATION OF THE EXISTING TECHNOLOGY, THIS SOFTWARE AND RELATED SERVICE MAY BE AFFECTED BY VARIOUS UNSTABLE FACTORS, WE MAKE NO WARRANTIES OR REPRESENTATIONS THAT THE SOFTWARE IS COMPATIBLE WITH ALL SOFTWARE AND HARDWARE SYSTEMS, OR IS ERROR-FREE, CAN OPERATE WITHOUT INTERRUPTION OR THAT ANY ERRORS IN THE SOFTWARE OR RELATED SERVICE CAN BE CORRECTED. IN CASE OF CIRCUMSTANCES SUCH AS INCOMPATIBILITY OR SOFTWARE MALFUNCTION, PLEASE CONTACT US FOR TECHNICAL SUPPORT. IF THE COMPATIBILITY PROBLEM CANNOT BE SOLVED, YOU CAN DELETE THIS SOFTWARE. WITHIN THE MAXIMUM SCOPE PERMITTED BY APPLICABLE LAWS, WE ARE EXEMPT FROM ANY OF YOUR LOSSES CAUSED HEREIN.

14. LIMITATION OF LIABILITIES

TO THE EXTENT NOT PROHIBITED BY APPLICABLE LAW, IN NO EVENT SHALL US, OUR AFFILIATES, SENIOR MANAGEMENT, DIRECTORS, EMPLOYEES OR AGENTS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR EXEMPLARY DAMAGES, INCLUDING BUT NOT LIMITED TO DAMAGES FOR LOSS OF PROFITS, GOODWILL, USE, DATA, BUSINESS INTERRUPTION OR ANY OTHER INTANGIBLE DAMAGES OR LOSSES, ARISING OUT OF THE FOLLOWING REASONS, HOWEVER CAUSED, REGARDLESS OF THE THEORY OF LIABILITY (CONTRACT, TORT OR OTHERWISE) AND EVEN IF WE HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES: (1) YOUR USE

 

OR INABILITY TO USE THE SERVICE;(2) THE UNAUTHORIZED ACCESS TO OR ALTERATION OF YOUR TRANSMISSIONS OR DATA; (3) THE DELETION OF, CORRUPTION OF, OR FAILURE TO USE YOUR TRANSMISSIONS OR DATA ON OR THROUGH THE SERVICE; (4) STATEMENTS OR CONDUCT OF ANY THIRD PARTY ON THE SERVICE; AND (5) ANY OTHER MATTER RELATING TO THE SERVICE. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR PERSONAL INJURY, OR OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION MAY NOT APPLY TO YOU.

AT THE SAME TIME, OUR MAXIMUM COMPENSATION FOR ALL YOUR LOSSES SHALL NOT EXCEED THE AMOUNT YOU PAID FOR USING/PURCHASING THE CORRESPONDING SOFTWARE OR SERVICES (IF PAID SERVICE IS INVOLVED) WITHIN 12 MONTHS BEFORE THE DATE OF INITIATING THE CLAIM. IF THE LAW OF YOUR REGION DOES NOT ALLOW THE LIMITATION OF LIABILITY THROUGH AN AGREEMENT. IN THIS CASE, THE APPLICABLE LAWS AND REGULATIONS SHALL APPLY.

15. Miscellaneous

15.1 Heading. The headings of all terms of this Agreement are for reference purpose only, have no actual meanings themselves, and shall not be used as a basis for interpreting the meanings of this Agreement.

15.2 Severability. If any term or provision of this Agreement is held to be invalid or unenforceable by any judicial or administrative authority for any reasons, such determination shall not affect the validity of enforceability of the remaining terms and provisions of the Agreement hereof, and the remaining provisions of this Agreement shall remain in full effect and shall be construed in accordance with its terms.

15.3 Languages. If this Agreement is made in English, Arabic and other languages. In case of any discrepancy, the English version hereof shall prevail.

15.4 No Waiver. Our failure to enforce at any time any of the provisions of Geekom PC Manager Services, or our failure to

 

require at any time performance by you of any of the provisions of Geekom PC Manager Services, shall in no way be construed to be a present or future waiver of such provisions, nor in any way affect our right to enforce such provision thereafter. Our express waiver of any provision, condition or requirement of the Geekom PC Manager Services shall not constitute a waiver of any future obligation to comply with such provision, condition or requirement.

15.5 Entire Agreement. This Agreement constitutes the entire agreement between you and us governing your use of the Software and supersedes any prior agreements between you and us relating to the use of Geekom PC Manager. You may also be subject to additional terms and conditions that may apply when you use or purchase open-source software, third-party content, or other services.

 

Updated on: May 20, 2025

Effective Date: May 20, 2025

Version Number: 20250520V1.0

GEEKOM (hereinafter referred to as “Geekom PC Manager,” “we,” “us,” or “our”) is the provider and operator of Geekom PC Manager application software and services (hereinafter referred to as “the Software”). We fully respect your privacy and make every effort to protect your personal information. In the process of providing the products or services (collectively referred to as “the Services”), we may collect and use your personal information with your consent or as required by applicable laws. The Privacy Policy (hereinafter referred to as “the Policy”) is intended to help you understand how we collect, use, disclose, process, and protect the personal information you provide when you are using Geekom PC Manager products or services, your rights to such personal information, and how we safeguard your rights. The Policy applies to all Geekom PC Manager products and services, including applications, mini programs, and webpages for PCs and mobile intelligent terminals, software development kits (SDKs) and application programming interfaces (APIs) for third-party websites and applications, and those that may emerge in other forms in the future.

It shall be specially noted that the Policy is not applicable to the services offered to you by third parties. You may receive content or network links from third parties. Please be cautious about whether to access the links, content, products, and services provided by third parties. Before submitting your personal information to any third party, please carefully review its privacy policy.

To ensure that you fully understand the Policy and make your own decisions, we will explain the Policy as clearly as possible by underlying or highlighting the critical information (especially in bold, capital, underlined, and other forms). Moreover, when you use our services for the first time, prompts will pop up, reminding you to pay attention to and understand the core content of the Policy.

Please read the Policy carefully to understand our practices with respect to your personal information before using our products or services, submitting personal information to us, or granting us consent to collect your personal information, and please visit often to stay informed of updates to the Policy. We will post changes to the Policy (if any) through relevant products or websites to keep you informed of the same. By accessing our services after such notice, you agree to the updated privacy policy. You can view the “Update Date” at the top of the Privacy Policy page to confirm the latest update time.

If you have any questions, please feel free to contact us via

 

[email protected]

You can also access the Policy via:

Geekom PC Manager > Settings & Feedback > Privacy Policy

The Privacy Policy will help you understand the following:

I. How We Collect and Use Your Personal Information

II. How We Store and Protect Your Personal Information

III. How We Share, Transfer and Disclose Your Personal Information

IV. How Is Your Personal Information Transferred Across Borders

V. Your Rights to Your Personal Information

VI. How We Process Children’s Personal Information

VII. Third-party Service Providers and Their Services

VIII. Supplements and Updates to the Policy

IX. Joint Controller

X. How to Contact Us

I. How We Collect and Use Your Personal Information

i. Overview

Geekom PC Manager believes that fundamental privacy rights must apply equally regardless of where you live. That’s why Geekom PC Manager treats any information that relates to an identified or identifiable individual as “personal information” no matter where that individual may live, particularly name, identity, location, online identifier or physical, physiological, genetic, mental, or any other related characteristics that can reasonably be used to identify the individual.

We only collect the information necessary for special, specific, explicit, and legitimate purposes and shall ensure that your information will not be further processed for any other purposes. We will request your consent again if we intend to use your personal information for any purposes not specified herein.

We will collect your personal information, including 1) the information you provide directly (such as the nickname, avatar, name, and telephone number you provide when you sign in to the account and sign up for our marketing activities); 2) the information generated during your use of the Software (such as device information and service log information), which will be automatically collected by us; and 3) the information we acquire from other sources.

You have the right to decide whether to provide your personal information when using our products or services or when requested by us. You are not obliged to provide us with your personal information, but in some cases, if you decide not to provide your personal information, we may be unable to offer you the relevant products or services, nor respond to or resolve the problems you might encounter with. We will only collect and use your personal information for the purposes stated herein.

 

ii. Other Situations where Your Information May Be Collected

Where permitted by laws, we may collect your personal information from other individuals, business entities, public channels, or other third parties indicated by you, other partners who help us provide our products or services or assist us in ensuring information security and preventing frauds, and other legitimate avenues. We will inform you and collect your information with your consent.

We may also collect other information about you, your device, or your use of the Services in other ways that will be described to you at the time of collection for your consent.

To improve our product layout and offer you better services, we may carry out researches, statistical analyses, and predictions on the collected information in an anonymized manner (including machine learning or model algorithm training based on anonymized data). We will take technical measures and other necessary actions to process the collected personal information so that such information cannot identify any individual person and cannot be recovered. As permitted by applicable laws and regulations, we do not need to inform you separately for your consent for the use of such anonymized data.

II. How We Store and Protect Your Personal Information

1. How we store your personal information

We will store your personal information that we collected upon your consent in accordance with the relevant national laws and regulations concerning personal privacy and data protection. We may also store the personal information we collect in countries or regions other than the country in which we do business, provided that local laws and regulations do not prohibit such storage.

At present, the Geekom PC Manager may store your personal information in the United States, Germany, France and Canada. Specifically:

The personal information we collect and generate in the course of our operations in the United States and Australia will be stored on servers located in the United States.

The personal information we collect and generate in the course of our operations in Germany and the United Kingdom will be stored on servers located in Germany.

The personal information we collect and generate in the course of our operations in France, Spain and Italy will be stored on servers located in France.

The personal information we collect and generate in the course of our operations in Canada will be stored on servers located in Canada.

We may use the servers in other areas or countries depending on our business development, and in such cases, we will update the Policy

 

accordingly.

Whether personal information is stored in the country where we do business or in another country or region without violating the law, we will store it in accordance with the relevant laws and regulations regarding data storage. We will take necessary security measures considering the characteristics, scope, purposes of personal information processing, the possible risks in processing personal information, and the serious consequences in case of any damages. For example, we will encrypt and de-identify the collected personal information before storage. We will store the information only necessary for our business development within the minimum retention period unless otherwise permitted by laws or you agree to extend the retention period. We will delete or take other appropriate measures to delete data that exceeds the retention period or that you request us to delete, provided that this does not violate the relevant laws and regulations.

2. How we protect your personal information

We will also take other necessary measures to protect your personal information from misuse, unauthorized access, modification, disclosure, or destruction.

We implement security measures designed to protect your personal information and regularly monitor our systems for possible vulnerabilities and attacks, and we use administrative, technical and physical safeguards to protect your personal information by considering the nature, processing methods, and security of the personal information. We will continuously strive to improve these measures to keep your personal data secure.

It should be noted that no measures can absolutely guarantee the avoidance of data storage security incidents. In the event of a security breach, we will report to the appropriate regulator in accordance with the requirements of relevant laws and regulations, and provide the type of personal data involved in the data breach, the number of data subjects, the possible consequences of the data breach, and the remedial measures we intend to take in accordance with the requirements of the supervisory authorities. We will take all possible measures to remedy or mitigate the damages and consequences caused by a data breach. If permitted or required by laws, we will promptly inform you of the consequences or significant damage that may be caused to you as a result of a data breach, so that you can take appropriate measures to protect your rights to the greatest extent.

Since no website, Internet transmission, computer system, or wireless connection is absolutely secure, in addition to the necessary security measures we take, users need to be more aware of privacy and security risks. For example, if you are redirected to a third party’s website, link,

 

product, or service through our service, please be careful and read the terms of agreement of such website, link, product, or service carefully for the security of any data information collected by such website, link, product or service, and we will not be liable for any data security issues caused by such third party. If you find that certain content, advertisements, or features of our website, products, or services may be provided by third parties and may endanger your privacy and security, please contact us promptly and we will give priority to dealing with them in accordance with the law.

III. How We Share, Transfer and Disclose Your Personal Information

We will share, transfer, and disclose your personal information to the minimum extent and only when it is necessary for operations or required by laws. We will not share, transfer, or disclose your personal information unless otherwise required or permitted by applicable laws and regulations in the following circumstances:

1. How we share your personal information

We do not sell any personal information to third parties. To offer you timely services, we may share your personal information with our affiliates. We will only share your information with our affiliates for lawful purposes clearly stated and only as necessary to provide the Services subject to the purposes stated in the Privacy Policy. For any purposes not covered herein, we will make explicit statements in the privacy policy or notice for the specific product or service.

We may share necessary personal information with authorized third-party partners (including data storage service providers) to perform certain functions or provide you with better service and user experience. Our data storage service providers provide us with cloud storage services to ensure the normal operation. We will share that information to the minimum extent and only when it is necessary for operations or required by law. Before sharing, we will sign stringent confidentiality agreements with our authorized partners, requiring them to take relevant confidentiality and security measures to process personal information in accordance with the Policy and the applicable laws of your jurisdiction. Moreover, we will require them to provide data security functions and information security qualifications (such as classified protection assessment, information security management system, etc.).

In the event of a merger, acquisition or bankruptcy and liquidation, transfer of assets, or other related transactions involving the transfer of personal information, we will require by agreement or other appropriate measures that the company or organization newly holding your personal information continues to be bound by the Policy and that such subject takes confidentiality and security measures no less stringent than those required

 

by the Policy to handle personal information.

2. How we transfer your personal information

Geekom PC Manager will not transfer your information to any other parties without:

(1) Your express consent is obtained.

(2) Posting a prominent notice via email and/or our website or by means of another appropriate method to inform you of any changes in your ownership of, rights to, and choices regarding your personal information when Geekom PC Manager is involved in a merger, acquisition, or sale of all or part of its assets that may affect your personal information.

(3) The transfer has been stated in the Privacy Policy or otherwise notified to you.

3. How we disclose your personal information

Geekom PC Manager may disclose your personal information as required by law, due process, litigation, and/or government departments and authorities. We may also disclose your personal information if the disclosure is necessary or appropriate for national security, law enforcement, or other matters of public importance.

In addition, we may share your personal information with the following people:

(1) our lawyers, accountants, auditors, or similar consultants, when we request them to provide professional advice.

(2) investors and other related third parties, if actual or potential sales or other transactions with another company occur and are related to entities within the Geekom group.

(3) other third parties, for example, when specific information is disclosed to them under your authorization.

IV. How Is Your Personal Information Transferred Across Borders

For the purposes described in the Privacy Policy, we may transfer your personal information to the resources or servers mentioned in Section III of the Policy for storage or processing, and we may also transfer your personal information to third-party service providers and business partners, and therefore your data may be transferred to other countries or regions, subject to compliance with applicable laws and regulations in your region and with your authorized consent. The privacy laws in these countries or regions may differ, and the jurisdictions in which these servers are located may or may not protect personal information to the same extent as those in your jurisdiction. However, we will still strive to protect your personal information based on our Privacy Policy and carry out the cross-border transfer and other processing of corresponding information as required by the laws of the country or region where the personal information is located.

If we transfer personal information outside of your jurisdiction, whether to

 

our affiliates or to a third-party service provider, we will comply with the relevant applicable laws. We will take appropriate security and protection measures to ensure that all such transfers are subject to the requirements of applicable local data protection laws.

V. Your Rights to Your Personal Information

As a data subject, you have a number of rights with respect to personal information such as confirmation, access, correction, deletion, withdrawal of consent, complaints (hereinafter referred to as “requests”), etc. We fully understand and respect these rights, which are also subject to specific exclusions and exceptions in accordance with applicable law. We will also take active steps to ensure that your rights are effectively guaranteed. However, please understand and note that for security reasons, we may need to verify your identity before processing your request. In principle, we charge no fees for your legitimate requests. However, for repeated requests exceeding reasonable limits, we will charge a reasonable fee to the extent permitted by applicable laws based on actual administrative costs as appropriate. We may deny requests that are unwarrantedly repetitive, require excessive technical means (for example, requiring the development of new systems or fundamental changes in current practices), pose a risk to the legal rights of others or are highly impractical, or violate mandatory legal requirements.

1. Right to confirm and access:We inform you of how we collect and process your personal information via this Privacy Policy or through privacy policies or notices for specific product service scenarios. You have the right to confirm or reject such collection and processing by checking the box or via other methods. However, if you reject the service, some functions that require your express authorized consent before use may no longer be available. The personal information you have provided to us can be accessed directly from the interface of our products or services. In case of failure to access, you can email us at [email protected], and we will deal with it promptly.

2. Right to correct and delete:When your personal information changes, or when you find that the information we collected and processed is inaccurate or incomplete, you have the right to request that we make corrections or additions. For some of your personal information, you can correct and amend it directly on the relevant function page of the product or service. You have the right to request us to delete your personal information when we have achieved the purpose of collecting your personal information or it is no longer necessary, or when you find that we have collected or processed your personal information in violation of the provisions of laws and regulations or the terms of the Privacy Policy. For any information that you have no access to correct or delete, you can email us

 

at [email protected] to request for correction or deletion.

However, your deletion request may not be approved in some special cases, for example, when the Geekom PC Manager is legally obliged to retain relevant records for compliance with applicable local laws. Please also note that if you request the deletion of your information from our products and services, due to certain applicable local laws and technical limitations, we may not immediately delete the corresponding information from our backup systems, but we will securely store your personal information and prevent its further processing until the backup systems are updated and your information can be deleted or anonymized.

3. Right to withdraw consent:For our different products or services to perform the corresponding functions, we will require the necessary personal information in accordance with the applicable local laws. This is described in “How We Collect and Use Your Personal Information” of the Privacy Policy. You may withdraw consent previously granted to us for specific purposes, including the collection, use, and/or disclosure of your personal information in our possession or control, by disabling the functionality of the device or withdrawing the consent request. You can email us at [email protected] for relevant operations. We will process your request within a reasonable time after you send it, and then will not collect, use, and/or disclose your personal information according to your request.

If you withdraw your consent, you may not continue to have access to some and/or all of the features of Geekom PC Manager products and services. The withdrawal of your consent or authorization will not affect the validity of our previous processing activities based on your consent.

4. Right to complain: You have the right to email us at [email protected] for a complaint. We will respond promptly to your complaint. If you are not satisfied with our response, especially if our personal information processing practices have harmed your legitimate rights and interests, you may also file a complaint or report to the local statutory personal data protection authority, or file a lawsuit with a court of competent jurisdiction.

5. Right to control your privacy settings

You retain the right to control your privacy settings, and by doing so, you can restrict us from collecting, using, disclosing, or processing your personal information. If you have previously enabled permissions or agreed to our use of your personal information based on the aforementioned business scenario and wish to make a change to the permissions, please contacting us at [email protected].

6. Right in some jurisdictions

Please pay attention that you may have the following data subject rights

 

under applicable laws in certain jurisdictions:

(1) Right to restriction of processing. You have the right to request our restriction on your personal information processing. We will review the reasons for your request. If the reasons are in accordance with applicable data protection laws, we will process your personal information only to the extent permitted by such laws and will notify you before lifting the restriction on processing.

(2) Right not to be subject to automated decision-making. You have the right to refuse automated processing of your information, including performance analysis and other automated processing that may have a legal or similar impact on you.

(3) Right to data portability. You have the right to request the transfer of your personal information to another data controller in a structured and commonly used format.

While we also have the right to refuse to process your request, we may reject some of your requests where an exemption applies or where we comply with applicable laws. For example, some requests are manifestly unfounded or excessive or require disclosure of third-party information.

VI. How We Process Children’s Personal Information

We do not provide products and services for children under the age of 14 or the equivalent legal age under the law in your jurisdiction (the legal definition of a child varies from country to country, and we will define a child based on the laws and regulations of the country or region in which we do business). We do not actively collect personal data from children and do not use it for marketing purposes. If you find that you have transferred information about such children to us, email us at support@geekompc.com, and we will remove the information as soon as possible. If we find that we have collected children’s personal information, we will also remove the relevant content as soon as possible.

VII. Third-party Service Providers and Their Services

When using Geekom PC Manager products or services (such as life service and online customer service), you may receive links to third-party websites or content and services provided by third parties other than us, and some products or services may be provided in the form of SDKs or other means. You can choose whether to access or accept websites, products, and services provided by third parties based on your judgment. Our Privacy Policy does not apply to products and services provided by any third party. Since we do not have substantial control over a third party, we cannot be responsible for the collection and processing of your personal information by that third party. When you submit any information to that third party, please be aware of that third party’s privacy policy and take care to protect your personal information.

 

VIII. Supplements and Updates to the Policy

We reserve the right to update or modify the Policy from time to time as our business, technology, applicable laws, and operations change. In the event the Policy is modified, we will publish the latest version here (on this page) or notify you separately through other means. Please regularly check this page or the notifications we send you to stay informed of updates to the Privacy Policy. The Privacy Policy is subject to change, but we will not diminish your rights under the Policy without your express consent.

We will seek your express consent as required by applicable laws before we collect other information from you or use or disclose your information for a new purpose. If you continue to use products and services on the website, mobile device, and/or any other devices, you will be bound by the updated Privacy Policy.

The content of Geekom PC Manager products or services stated in the Agreement may change depending on the type of product and system version you are using, or the requirements of local laws and regulations.

IX. Joint Controller

Shenzhen Jiteng Network Technology Co., Ltd. will be responsible for processing your personal information together with us as joint controllers. GEEKOM and Shenzhen Jiteng Network Technology Co., Ltd. have clarified their respective responsibilities for joint processing under applicable laws, including the GDPR. To contact us for more information about joint control, please see Section X How to Contact Us.

X. How to Contact Us

If you have any suggestions, questions, or concerns about our Privacy Policy or practices regarding the protection of personal information, contact us at:

Email: [email protected] (Note: The email is used for receiving emails related to our Privacy Policy or our information protection only)

We will review your request regarding privacy or personal information as soon as possible and reply to you within 15–30 days after verifying your user identity. If your request involves complex or significant issues, we may ask you for further information.

If you are not satisfied with our response, especially if your legitimate interests have been violated by us, you can seek a solution from the relevant data protection supervisory authority in your jurisdiction. If you make the above inquiry to us, we will provide you with information on the relevant complaint channels that may apply to your case.

Thank you for your time to read our Privacy Policy!

My Cart
Recently Viewed
Product Series
Categories