Privacy Policy
Corneton Privacy Policy
Our privacy policy was updated on August 1, 2025.
Xiamen Kelitong Hearing Technology Co., Ltd. (hereinafter referred to as "Kelitong" or "we") attaches great importance to the privacy and personal information protection of users. When you use our services, we may collect and use your relevant information. We hope to explain to you through this privacy policy our policies and measures for obtaining, managing and protecting users' personal information. By agreeing to or voluntarily providing your personal information, you agree that we may use, manage and store your personal information in accordance with the purposes and methods described in these terms.
We understand the importance of your personal information and will do our utmost to protect its security and reliability. We are committed to maintaining your trust in us and adhere to the following principles to protect your personal information: the principle of consistency between rights and responsibilities.
We adhere to principles such as clear purpose, consent, minimal unnecessary requirements, security, active participation, and transparency. Furthermore, we pledge to protect your personal information by implementing appropriate security measures in accordance with established industry standards.
By using our products and/or services, or by continuing to use them after this policy is updated, you are deemed to have read, understood, and agreed to this policy and its updated version. If you do not agree to any terms of this policy, you have the right to immediately stop using our products and/or services.
This policy will help you understand the following:
1. What information will we collect?
2. How do we use information?
3. How do we share, transfer, and publicly disclose information?
4. How we store and protect your personal information;
5. Your rights;
6. Protection of Minors' Personal Information
7. Notifications and revisions.
I. What information will we collect (regardless of whether it is personal information)?
Personal information refers to various information recorded electronically or otherwise that can identify a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information.
We will only collect and use your relevant information for the following purposes and in the following ways:
1. The information you provided when registering as a user. This includes your name, gender, login password, detailed address, mobile phone number, email address, and date of birth.
2. Information from your device. We may also obtain information related to your use of our services through software on your device and other means, including device information, location information, etc. To identify your device ID and prevent malicious programs and improve service security, we will collect your device information (including IMEI, MEID, Android ID, IMSI, GUID, and MAC address). This device information is stored locally on your device and used during the operation of the app.
When you use location-related services (such as using GPS to find nearby Kelton sales stores), we may obtain your geographic location information through your IP address and GPS.
Please note that standalone device information, service log information, and other information that cannot identify a specific natural person is not your personal information. If we combine such non-personal information with other information to identify a specific natural person, or combine it with personal information, then during the period of combined use, such non-personal information will be treated as personal information. Unless we obtain your authorization or otherwise stipulated by laws and regulations, we will anonymize and de-identify such information.
You have the right to choose not to provide certain types of information, but please note that this may affect your use of certain service features.
Situations where you need to authorize us to collect and use your personal information
The purpose of collecting personal information is to provide you with products and/or services, and to ensure our compliance with applicable laws, regulations, and other normative documents. You have the right to choose whether to provide this information, but in most cases, if you do not provide it, we may not be able to provide you with the corresponding services or respond to your questions. These functions include:
Pairing smart wearable devices
To support the pairing of your smart wearable device with the application, we may collect your Kelit account information, the identification information of your smart wearable device, the identification information of your mobile phone (IMEI number, IMSI, MAC address, MEID, Android ID, device hardware serial number, SIM card identifier encrypted using a hash algorithm), mobile phone model, system version number, and Bluetooth information of your smart wearable device. Your mobile phone identification information is stored only locally on your mobile phone and is used during app operation. Your mobile phone model, system version number, and Bluetooth information of your smart wearable device will be stored on our servers and associated with your account information so that you can quickly pair and connect with your wearable device after changing your mobile phone.
II. How we use information
The purpose of collecting your personal information is to provide you with services and to ensure our compliance with applicable laws. You agree that we may process your personal information for the purposes of this Privacy Policy and disclose it to us and third-party service providers.
1. Your information will be used in the use cases clearly listed in the "What Information We Collect" clause.
2. Your information may be used in the following scenarios that are directly or reasonably related to the purposes stated in the "What Information We Collect" clause:
(1) We may store the collected information on the server side based on the statistical data of users' personal information.
(2) We may send you messages, make phone calls or send emails.
3. If we use your information beyond the scope that is directly or reasonably related to the purpose stated in the "What Information We Collect" clause, or if we intend to use the information for other purposes not specified in this policy, or if we intend to use information collected for a specific purpose for other purposes, we will obtain your explicit consent again in the form of a confirmation agreement, confirmation behavior in specific scenarios, or updating this privacy policy.
4. Exceptions to Obtaining Consent. You fully understand and agree that we may collect and use your personal information without your authorization or consent in the following circumstances:
(1) Those related to national security and defense security;
(2) Those related to public safety, public health, or major public interests;
(3) Matters related to judicial or administrative law enforcement, such as criminal investigation, prosecution, trial, and execution of judgments;
(4) For the purpose of protecting your or other individuals' vital legitimate rights and interests, such as life and property, but where obtaining their consent is difficult;
(5) Personal information that you have voluntarily disclosed to the public;
(6) Collecting personal information from legally publicly disclosed information, such as legitimate news reports and government information disclosure channels;
(7) As necessary for the execution of relevant agreements or other written documents signed with you;
(8) Necessary for maintaining the safe and stable operation of the products and/or services provided, such as detecting and handling product and/or service malfunctions;
(9) Necessary for legitimate news reporting;
(10) When academic research institutions conduct statistical or academic research for the public interest and provide the results of academic research or descriptions to the public, they shall de-identify the personal information contained in the results.
(11) Other circumstances stipulated by laws and regulations.
III. How do we share, transfer, and publicly disclose information?
(I) Sharing
We will not share your personal information with any company, organization, or individual other than the operators of Corneton, except in the following circumstances:
1. Sharing under legal circumstances. We may share your personal information with third parties as required by laws and regulations, litigation, dispute resolution, or as requested by administrative or judicial authorities in accordance with the law.
2. Sharing with your explicit consent. We will share your personal information with other parties after obtaining your explicit consent.
3. Sharing with Authorized Partners. To achieve the purposes stated in this policy, some of our services will be provided by authorized partners, and we may share your personal information with these partners to provide better user services and experience.
We will only share your personal information for legitimate, proper, necessary, and specifically stated purposes, and only the personal information necessary for our authorized partners to provide the services they provide. Currently, our authorized partners include the following types:
(1) Authorized partners providing advertising and analytics services. We will not share your personal information with partners providing analytics services unless we obtain your permission. We will entrust these partners to process information related to service effectiveness, but we will not provide your personally identifiable information, or we will de-identify this information so that it cannot identify you personally. These partners may combine the above information with other data they have lawfully obtained to execute service recommendations we entrust.
(2) Suppliers, service providers, and other partners. We send information to suppliers, service providers, and other partners who support our business, including those providing technical infrastructure services on our behalf, analyzing how our services are used, measuring the effectiveness of our services, or conducting academic research and surveys.
(3) We will sign strict confidentiality agreements with our authorized partners, stipulating strict data protection measures, requiring them to process personal information in accordance with our entrusted purposes, service descriptions, this privacy policy, and any other relevant confidentiality and security measures.
(ii) Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
1. After obtaining your explicit consent;
2. In the event of a merger, acquisition, or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization holding your information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to obtain your authorization and consent again.
3. Comply with mandatory requirements of laws and regulations, court orders, or government department requirements.
(III) Public Disclosure
We will only disclose your personal information in the following circumstances:
1. After obtaining your explicit consent;
2. Legal Disclosure: We may disclose your personal information when required by law, legal process, litigation, or mandatory requirements of government authorities.
(iv) Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing personal information
In the following circumstances, sharing, transferring, or publicly disclosing your personal information does not require your prior authorization or consent:
1. Related to national security and defense security;
2. Related to public safety, public health, and major public interests;
3. Cooperate with investigations by national judicial and administrative organs, and be involved in crimes, investigations, prosecutions, trials, and the execution of judgments;
4. To protect your or other individuals' vital property rights, such as life and property.
5. Other circumstances that safeguard the public interest;
6. Personal information that you have voluntarily disclosed to the public.
Please be aware that, according to applicable national laws, if we process personal information using technical measures and other necessary measures so that the data recipient cannot re-identify a specific individual and cannot restore the data, then the sharing, transfer, and public disclosure of such processed data do not require further notification to you or your consent.
IV. Any storage and protection of your personal information
(a) Storage of personal information
1. General Storage Period: Unless expressly required by law or with your permission, we will only retain your personal information for the period necessary for the purposes described in this Privacy Policy. To maintain service continuity and consistency in user experience, personal information is generally not deleted immediately after a single service is completed.
2. Where your personal information is stored: Personal information collected and generated within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.
(ii) Any action we take to ensure the security of your information
1. Data Security: We take appropriate technical measures to protect the security of your personal information. We use industry-standard security measures to protect the personal information you provide, preventing unauthorized access, use, modification, public disclosure, damage, or loss. Some of our security measures include data anonymization, data encryption, firewalls, and data access authorization controls. We attach great importance to data security and therefore regularly review and update our data protection mechanisms to provide effective protection against data misuse.
2. Your account has security protection features, please keep your account information safe. However, please understand that due to technical limitations and the possibility of various malicious acts, the internet environment is not 100% secure, and there is no "perfect security measure" on the internet.
3. In the event of a security incident such as information leakage, Perfect will activate the corresponding emergency plan to prevent the incident from escalating as much as possible, and will promptly inform you of the relevant situation through push notifications, announcements, and other means.
4. If you believe that the security of your data has been compromised, or if you would like to learn more about our data protection measures, please contact us using the information provided in "Contact Us" below.
V. Your Rights
We guarantee that you have the following rights regarding your personal information:
(a) You have the right to access, correct, or delete your personal information.
1. Accessing your personal information. If you wish to access or edit the personal information in your account, you can do so by logging into your account and accessing the settings page. This also applies to other information generated during your use of our services.
2. Correcting your personal information. If you find that there are errors in the personal information we process about you, you have the right to correct it yourself or request us to do so.
3. Delete your personal information. You may request that we delete your personal information in the following circumstances:
(1) If our processing of personal information violates laws and regulations;
(2) If our processing of your personal information violates our agreement with you;
When you delete information from our services, we may not immediately delete the corresponding information from the backup system, but we will delete this information when the backup is updated.
(ii) Changing the scope of your authorization and consent
You can revoke your permission to collect, use, and disclose your personal information in our possession by submitting a request. However, please understand that we will also be unable to provide the services corresponding to the authorization.
(iii) Account cancellation
1. You can apply to cancel your account by submitting a request. We will not set unreasonable conditions to prevent you from canceling your account, but if canceling your account would affect your or others' legitimate rights and interests, we will determine whether to inform you of your cancellation request based on your usage of our services.
2. Canceling your account will affect your normal use of related services. We kindly remind you that canceling your account will cause you a lot of inconvenience in using our services in the future.
3. If you have decided to abandon your account and meet all the cancellation requirements, please contact us using the contact information provided in this Privacy Policy to complete the relevant procedures. We are not responsible for any adverse effects on you caused by your account cancellation application.
VI. Protection of Minors' Personal Information
If you are a minor, please obtain your parent's or guardian's consent before using our services. We recommend that your parent or guardian carefully read this Privacy Policy. We will only use legally collected personal information of minors when permitted by law, with the explicit consent of their guardian, and necessary to protect the minor. If we discover that we have collected personal information from a minor without prior verifiable parent's or guardian's consent, we will endeavor to delete the relevant data as soon as possible. If a parent or guardian has reason to believe that a minor has submitted personal information to us without their consent, please contact us to ensure that such personal information is deleted and that the minor unsubscribes from our services.
VII. Notification and Revision
1. To provide you with better service, this Privacy Policy will be updated accordingly. However, we will not reduce your rights under this policy without your explicit consent. We will release the updated version on this platform and notify you of the updates through appropriate means before they take effect.
2. For significant changes, we will provide more prominent notifications (usually through special prompts on the browsing page, explaining the specific changes to the privacy policy). Significant changes referred to in this policy include, but are not limited to:
(1) Our service model has undergone significant changes. These include the purpose of processing personal information, the types of personal information processed, and the ways in which personal information is used.
(2) Significant changes have occurred in our ownership structure and organizational structure. These include changes in ownership due to business restructuring, bankruptcy, mergers, or acquisitions.
(3) The main recipients of shared, transferred, or publicly disclosed personal information have changed;
(4) There have been significant changes to your rights regarding the processing of your personal information and how to exercise those rights;
(5) When the department responsible for handling personal information security, its contact information, and complaint channels change;
(6) When the personal information security impact assessment report indicates that there is a high risk.
8. With whom does our company share your information?
We may sometimes disclose your personal information to third parties (as defined below) to provide you with the products or services you request. We may make such disclosures to the third-party service providers and affiliates listed below in this section. We will only share your personal information with your authorization, which will include the sub-processors who handle your personal information. You should understand that in any of the situations described below, when we share your personal information with third-party service providers, we will contractually define the practices and obligations of the third parties and comply with applicable local data protection laws. We will ensure, through contracts or other means, that third-party service providers comply with the privacy standards applicable to them in your jurisdiction.
8.1 Sharing information with our company and third-party service providers
In order to conduct business smoothly and provide you with the full functionality of our products and services, we may from time to time share your IP address with other of our affiliates (who are involved in hardware, social media, technology or cloud businesses) or our third-party service providers (our mail shops, delivery service providers, telecommunications companies, data centers, data storage facilities, customer service providers, advertising and marketing service providers, agents acting on our behalf) [affiliates and/or other third parties] (collectively, the “Third-Party Service Providers”) or our devices when you use certain applications.
8.2 Sharing information with others
Where applicable laws require, we may disclose your personal information without further consent.
8.3 Information that does not require consent
(1) The Company may share anonymous information in aggregate form with third parties (such as advertisers on the Company’s website) for commercial purposes; the Company may share general usage trends of the Company’s services with them, such as the number of customers in specific groups who purchase certain products or engage in certain transactions.
(2) For the avoidance of doubt, we will only collect, use or disclose your personal information without your consent to the extent expressly permitted by local data protection laws and only in such circumstances.
If you have any comments or questions about this Privacy Policy, or if you have any questions about our collection, use or disclosure of your personal information, please contact us at the address below.
Contact Address: 9th Floor, No. 37 Houxiang West Road, Haicang District, Xiamen City, Fujian Province
Contact email: ctqmy@xmcleartone.com
Postal code: 361028
Linghang (Midea Sound) User Agreement
Xiamen Kelitong Hearing Technology Co., Ltd. (hereinafter referred to as "Kelitong") hereby reminds users to carefully read and fully understand this "User Agreement" (hereinafter referred to as "this Agreement"). Users should carefully read and fully understand all the terms of this Agreement, especially the terms that exempt or limit Kelitong's liability, dispute resolution, and applicable law. Terms that exempt or limit liability will be marked in bold; you should pay special attention to them. Please carefully read and choose whether to accept or not accept this Agreement (minors should read it under the supervision of their legal guardians). Your use of the Linghang (Midea Sound) APP and other similar actions will be deemed as acceptance of this Agreement and agreement to be bound by its terms. If you do not agree to this Agreement, please do not use the Linghang (Midea Sound) APP. Kelitong has the right to revise this Agreement; the updated terms will be published on the Linghang (Midea Sound) APP and will take effect from the date of publication.
I. General Provisions
1.1. The Linghang (Midea Sound) APP is software provided by Kelitong for connecting smart wearable devices. It is an application that helps users improve hearing support services through wearable devices. All ownership and operating rights of this software and service belong to Kelitong.
1.2. This Agreement is an agreement between you (hereinafter referred to as the “User”) and Kelitong and its affiliates and operating partners (hereinafter referred to as the “Partners”) regarding the User’s use of the Linghang (Midea Sound) APP (hereinafter referred to as the “Software”) and other Kelitong related services.
1.3. This software and service includes:
1.3.1. The software and services provided are for smart wearable devices and provide users with hearing support services to help them improve their hearing. The specific services provided by the Linghang (Midea Sound) APP shall prevail.
The software described in section 1.3.2 is limited to updates or upgrades.
1.4. Users must understand that Kelton only provides this software and related services. All other costs related to the software and services (such as the cost of the software terminal and internet access fees) shall be borne by the user. Furthermore, using this software client and related services will consume the user's equipment, bandwidth, and data resources.
II. Scope of Software Licensing
2.1. Corneton grants users a personal, non-transferable, non-sublicensable, and non-exclusive license for this software.
2.2. Users may install, use, display, and permit this software on Kelitong devices for non-commercial purposes. However, users may not install, use, or run this software for commercial operation purposes, nor may they copy, modify, alter, attach, or create any derivative works of this software or the data released into the memory of any terminal device during its operation, or the interaction data between the client and server during the operation of this software. This includes, but is not limited to, using plug-ins, add-ons, or unauthorized third-party tools/services to access this software and related systems. If commercial sales, copying, or distribution is required, such as pre-installation and bundling of the software, written authorization and permission from Kelitong must be obtained.
2.3. Users shall not install this software on other terminal devices without the express permission of Cortex.
2.4. Users may make one copy of this software for the purpose of using this software and services, solely for backup purposes. The backup copy must contain all copyright information contained in the original software.
2.5. Except as expressly authorized in this Agreement, Corneton has not granted any other rights to the user. If the user wishes to use any other rights, the user must obtain Corneton’s written consent.
III. Software Upgrade
3.1. To improve user experience and enhance service content, Keliton reserves the right to provide replacement, modified, and upgraded versions of this software from time to time. The "Upgrade Notification" function is enabled by default for users. Depending on the software version used, Keliton allows users to choose whether or not to enable this function. After a new version of the software is released, Keliton does not guarantee the continued availability of older versions.
IV. User Account Registration and Login
4.1. Users of this software service may need to register a Linghang (Midea Sound) account.
V. Usage Guidelines
5.1. Subject to compliance with the law and this agreement, users may use this software and services in accordance with this agreement. Users shall not engage in the following activities:
5.1.1. Remove all copyright information from this software and other copies, and modify, delete or circumvent the technical measures implemented by this software to protect intellectual property rights.
5.1.2. Reverse engineering this software, such as disassembling, decompiling, or other methods to attempt to obtain the source code of this software.
5.1.3. Modifying or falsifying instructions or data during software operation to add, delete, or alter the functions or operating effects of the software, or operating or disseminating software or methods used for the above purposes to the public, regardless of whether these actions are for commercial purposes.
5.2. Information Release Standards
5.2.1. You shall ensure that you own the intellectual property rights to the information content you upload or have obtained legal authorization, and that your use of this software and services does not infringe upon the legitimate rights and interests of any third party.
5.2.2. Users shall not use this software to engage in the following activities, including but not limited to:
5.2.2.1. Creating, copying, publishing, disseminating, or storing content that violates local laws and regulations.
5.2.2.2. Publishing, transmitting, disseminating, or storing content that infringes upon the legitimate rights of others, such as their right to reputation, portrait rights, intellectual property rights, and trade secrets.
5.2.2.3. Fabricating facts and concealing the truth to mislead or deceive others.
5.2.2.4. Publishing, transmitting, and disseminating advertising information and spam.
5.2.2.5. Engaging in other acts that violate local laws and regulations.
5.2.3. Without the permission of Keliton, you may not engage in any commercial activities in this software, such as publishing advertisements or selling goods.
5.3. The user understands and agrees that:
5.3.1. Corneton will determine whether a user is suspected of violating the above usage guidelines, and based on the determination, terminate your usage license or take other restrictive measures that may be taken in accordance with this agreement.
5.3.2. For any information posted by users while using the licensed software that is suspected of being illegal, infringing on the legitimate rights of others, or violating this agreement, Corneton will delete it directly.
5.3.3. If a user's violation of the above usage guidelines causes damage to a third party, you shall bear legal responsibility independently in your own name and shall ensure that Keliton is free from any loss or additional cost arising therefrom.
5.3.4. If a user violates relevant laws or agreements, causing losses to Kelitong, or subjecting the user to claims from third parties, or penalties from administrative authorities, the user shall compensate Kelitong for the losses and/or expenses incurred, including reasonable attorney fees and investigation and evidence collection costs.
VI. Third-Party Service Description
6.1. Users understand and agree that this software system may include services provided by Kelitong's affiliates or third parties. Kelitong only provides relevant functional modules in the system to facilitate user operation and to provide access to third-party services.
6.2. Regardless of whether the third-party service is pre-installed in this software system or activated or subscribed by the user, the user understands and agrees that Kelitong makes no express or implied warranties or guarantees regarding the legality or validity of the actions of the third-party service provider or user, or the legality, accuracy, validity, and security of the third-party service.
6.3. Coriteborg does not supervise third-party services, has no control over them, provides no guarantee or warranty of any kind for third-party services, and assumes no responsibility for them.
6.4. Any disputes or conflicts between the user and the third-party service provider shall be resolved by the user and the third-party service provider through negotiation in accordance with the business processes and business specifications of the third-party service provider, and Kelitong shall not bear any responsibility.
VII. Privacy Policy and Personal Information Protection
7.1. Keliton promises to protect user privacy in accordance with the privacy policy of this product. For details, please see: "Linghang (Midea Sound) Privacy Policy".
VIII. Liability for Breach of Contract
8.1. Kelitong has the right to determine whether a user's behavior complies with the terms of this agreement. If Kelitong believes that a user has violated relevant laws and regulations, or the provisions of this agreement and related rules, depending on the severity of the user's violation, Kelitong has the right to take measures against the user, including deleting the violating information, restricting, suspending, or terminating the user's use of this software service, pursuing the user's legal liability, and other measures that Kelitong deems appropriate. The user shall bear full responsibility for any losses suffered by Kelitong (including but not limited to any claims from third parties or penalties from any administrative authorities).
IX. Service Risks and Disclaimers
9.1. Kelton provides service support based on current technology. Kelton does not guarantee that this software service will be uninterrupted or error-free, nor does it guarantee that it will correct all defects in this software service, nor does it guarantee that this software service will meet all user requirements. Kelton assumes no responsibility for any consequences arising therefrom.
9.2. Kelitong shall not be liable for any losses suffered by users due to third-party reasons such as communication line failure, technical problems, network or computer terminal equipment failure, system instability, and other force majeure events.
9.3. Keliton does not guarantee the legality, authenticity, accuracy, or validity of the information obtained through this software (including but not limited to the content of third-party services accessed), and Keliton shall not be liable for any results of any actions taken by users based on their queries or views.
9.4. Like most internet software, this software is susceptible to various security threats due to factors including, but not limited to, user-related issues, network service quality, and social environment. These threats may include unauthorized use of user data causing real-life harassment; other software downloaded or installed by the user, or other websites visited, containing viruses such as Trojan horses, threatening the security of the user's terminal device information and data, thereby affecting the normal use of this software. Users should strengthen their awareness of information security and user data protection, and pay attention to strengthening password protection to avoid losses and harassment.
9.5. When a user uses this software or requests specific services from Keliton, this software may call upon third-party systems or software to support the user's use or access. The results of such use or access will be provided by the third party. In addition to complying with the relevant rules of this agreement, the user shall also comply with the agreements and relevant rules of the third party. The user must understand and agree that when using third-party services, the third party may read the user's data. Keliton does not guarantee the security, accuracy, validity, or other uncertain risks of the results achieved through third-party systems or software. The user should exercise caution in judging the situation. Keliton shall not be liable for any disputes or damages arising therefrom.
9.6. Kelton would like to remind users that, in order to protect the company's autonomy in business development and adjustments, Kelton may modify or discontinue services at any time after notifying users in a reasonable manner.
9.7. Except as expressly provided by laws and regulations, Kelton will make every effort to ensure that the software and the related technologies and information are secure, effective, accurate and reliable. However, due to limitations of existing technology, users understand that Kelton cannot guarantee this.
9.8. The user shall be solely liable for any personal injury or incidental or indirect economic damages arising out of or related to any of the following circumstances, including but not limited to loss of profits, loss of data, damages for business interruption, or other commercial damages or losses:
(1) Using or being unable to use licensed software.
(2) Third parties use the software or modify user data without permission.
(3) Costs and losses incurred by users in using the software.
(4) User misunderstanding of the software.
(5) Other software-related losses not caused by Cortex.
9.9. Users agree that Kelton has the right to suspend, interrupt, or terminate the provision of all or part of this service to users based on the requirements of judicial, regulatory, or supervisory authorities, or for its own business reasons. Kelton shall not be liable for any such actions.
9.10. Users understand and agree that Corneton will make its commercially reasonable efforts to ensure the security of data storage in this software and service, but Corneton cannot provide a complete guarantee. Users must understand that Corneton is not responsible for the deletion, storage, or backup failure of data in the service.
10. Intellectual Property Statement
10.1. Keliton is the intellectual property rights holder of this software. All copyrights, trademark rights, patent rights, trade secrets, and other intellectual property rights of this software, as well as all information content related to this software (including but not limited to text, images, audio, video, charts, interface design, layout framework, related data, or electronic documents), are protected by local laws and regulations and relevant international treaties, and Keliton enjoys the aforementioned intellectual property rights.
10.2 Without the written consent of Kelton, users shall not implement, utilize, or transfer the aforementioned intellectual property rights themselves or authorize any third party to do so for any commercial or non-commercial purpose. Kelton reserves the right to pursue legal action against such acts.
XI. Terms of Use for Minors
11.1. If the user is a minor under the age of 18, this agreement and the software and related services should be read and used under the supervision and guidance of a guardian and with the consent of the guardian.
11.2. Special Note for Minor Users:
11.2.1. Minors using this service should learn to use the internet correctly within a reasonable scope under the supervision and guidance of their guardians, avoid becoming addicted to the virtual cyberspace, and develop good internet habits.
11.2.2. Teen users must abide by the "National Youth Internet Civilization Convention":
(1) Be good at learning online and avoid browsing harmful information.
(2) Communicate honestly and amicably, and do not insult or deceive others.
(3) Be aware of self-protection and do not casually meet online friends.
(4) We must maintain network security and not disrupt network order.
(5) It should be beneficial to physical and mental health, and one should not become addicted to virtual space.
XII. Amendment to the Agreement
12.1. Kelton reserves the right to modify the terms of this Agreement as necessary. Any changes to the terms will be published on the relevant page. If you do not agree to the changes, you should proactively cancel this service. Continued use of the service constitutes acceptance of the modified terms.
12.2. Kelton reserves the right to modify or change the paid services, pricing standards, payment methods, service fees, and terms of service as needed. Kelton may begin charging certain fees to some users now or in the future when providing services. If a user refuses to pay such fees, they will not be able to continue using the related services after the charging begins.
XIII. Applicable Law and Dispute Resolution
13.1. The validity and interpretation of these Terms shall be governed by and construed in accordance with the laws of the People's Republic of China (excluding Hong Kong, Macau, and Taiwan). In the absence of applicable laws, reference shall be made to international commercial practices and/or business practices.
13.2. This Agreement is signed in Haicang District, Xiamen City, Fujian Province.
13.3. The user and Kelitong agree that any dispute arising from this service shall be resolved through negotiation. If the negotiation fails, either party may submit the dispute to a court with jurisdiction in the place where this agreement is signed.
XIV. Other
14.1. Cortex will notify users of modifications to the Terms of Service, service changes, and/or other important matters via email, SMS, website announcement, or any other means deemed appropriate by Cortex. If a user does not raise any objection in writing within 3 days of receiving a message from Cortex through any of the above methods, they will be deemed to have accepted the new message.
14.2. This Agreement was last updated on August 1, 2025.
14.3. The headings of all clauses in this Agreement are for convenience of reading only and have no actual meaning in themselves, and shall not be used as the basis for interpreting the meaning of this Agreement.
14.4. If any provision of this Agreement is held to be invalid or unenforceable for any reason, the remaining provisions shall remain in full force and effect and binding on both parties.