    360 Total Security Software Usage License Agreement

    Welcome to 360 Total Security for Mac!

Please carefully read and ensure that you understand all the rights and restrictions contained in the provisions of this Software License Agreement (hereafter the "Agreement"). You will not be authorized to download, install or use this "software" and its associated services unless you accept the terms of the Agreement. If you install, copy, download, access or otherwise use this software product, you will be regarded as having accepted the Agreement, i.e. you indicate that you agree to be bound by the articles of the Agreement. If you do not agree to the terms of the Agreement, please do not install, copy or use this software.

This Agreement is a legal agreement between the user and Qihu 360 Software Co., Ltd. (hereafter "360") concerning the downloading, installation, usage and copying by the user of the 360 software (hereafter the "software") accompanied by the Agreement.

1.Copyright Statement

All intellectual property rights to this software, and to all information content associated with the software, including but not limited to: Text expressions and combinations thereof, icons, patterns, graphics, charts, colors, interface designs, layouts, associated data, add-in programs, printed materials or electronic documents, are the property of 360, and as such are protected by copyright law, international copyright agreements, and the provisions of other laws and regulations concerning intellectual property rights.

2. Scope of License

2.1 Downloading, installation and usage: This software is free; users may download, install and use the software an unlimited number of times for non-commercial purposes.

2.2 Copying, distribution and dissemination: The user may copy, distribute and disseminate this software product an unlimited number of times for non-commercial purposes. However, users must ensure that the software is copied,distributed or disseminated accurately and in full and intact form on each occasion, include all software, electronic documents, copyright and trademarks associated with this software product, as well as this Agreement.

3.Restrictions

3.1 Reverse engineering, decompiling and disassembly is prohibited: The user must not reverse engineer, decompile or disassemble this software product, and may not modify any resources compiled within the program files. The user must comply with these restrictions to the Agreement unless permission for the above activities is expressly provided by laws or regulations.

3.2 Division of components: The software product is licensed for use as a single product; the user may not make separate use of the individual parts thereof for any purpose.

3.3 Individual licensing: 360's written permission and licenses must be obtained in order to engage in commercial sale, copying or distribution, including but not limited to software sales, pre-installing and bundling.

3.4 Reservation of rights: All other rights not expressly authorized by this agreement remain the property of 360; users must obtain the written agreement of 360 to use any such other rights.

4. Important Information for Users:

4.1 Function of the Software: The Software has various functions, including the computer optimization, cleanup and protection. New features of the software will be released continuously in order to fulfill user's need and to help a user to manage computer and protect users from internet security risk. The functions of the software including but not limited to: virus searching and killing, remove unneeded cache, log, trash, and download files from the computer, uninstall applications, protect users from Phishing and Trojan embedded websites, and check a user's Mac hardware parameters.

4.1.1 Junk Cleaner: Junk Cleaner is a customizable function that allows the user to clear unwanted cache files, log files, and any files in the Trash. It scans and cleans those files that waste disk space and slow down your computer. No personal information is scanned or accessed when using the Junk Cleaner function.

4.1.2 Virus Scan. Virus Scan protects against and eliminates malware. It allows the user to choose different scan modes: Full Scan, Quick Scan and Custom Scan. Virus scan only scan the files in local system. No Personal User Information will be uploaded to 360's servers in the process. The Software will perform a scan of4.1.2 Virus Scan. Virus Scan protects against and eliminates malware. It allows the user to choose different scan modes: Full Scan, Quick Scan and Custom Scan. Virus scan only scan the files in local system. No Personal User Information will be uploaded to 360's servers in the process. The Software will perform a scan of the system when you click a scan mode button.

1. Full Scan: The software will perform a full scan of the system from the root directory.

2. Quick Scan: During a Quick Scan, the software will scan the important files. For example, the startup items, dock bar, desktop and etc.

3. Custom Scan: The user can customize the scanning location, directory and item.

4.1.3 Cloud Scan. As a protective measure against malware and viruses, the Software will automatically perform a cloud scan when you click a scan mode button or select a file to be scanned. During a cloud scan, certain information will be collected from the scanned documents, including the device serial number, device version, system version, Software version, the SHA1 of the scanned files. This information will be sent to the server to analyze the safety status of each document on your device and address any concerns appropriately. You may deactivate Quick Scan or Full Scan mode if you do not want to perform a cloud scan. Only the SHA1 will be collected, the content of the file will not be collected.

4.1.4 Uninstall Software: Users can choose batch uninstall to uninstall application.

4.1.5 Web Protection: The URLs of websites that you visit will be uploaded to 360 Cloud Security Center servers for phishing and online fraud analysis. Any Personal User Information will be removed from the URLs before they are uploaded. The information is processed with encryption before the upload. You may disable Web Protection by sliding Web Protection into the "off" mode.

4.1.6 Hardware Information: Users can check Mac hardware parameters, name of CPU, available memory, display card, hard disk status, Bluetooth power and display. This function runs locally and will not collect and upload any information.

4.1.7 Phone Cleanup:  Users can choose trust to connect their phone with the Mac device in order to run this function to clean the app cache. It scans and cleans those files that waste disk space and slow down your computer. No personal information is collected when using the Phone Cleanup function.

4.2 The software is only suitable for use with the supported published on our official website; the software will automatically run when the OS starts up, in order to provide product service and shorten response time. If, after installing this software, the user wishes to discontinue its use for any reason, the user may uninstall the software using the system's software management functions.

4.3 Product support for this software is provided by the 360 Security Center.

4.4 Revisions and upgrades to the software: 360 reserves right to provide the user with revised or upgraded versions of the software at any time.

4.5 Product accompanying: In order to improve your experience, you agree that 360 can provide other relevant 360 products to accompany the software for your independent choice to download and install.

4.6 This software does not include any malicious code intended to damageuser data or obtain the user's private information, does not contain any functions or code that monitor or survey the user's computer, does not collect the user's personal files, documents or other information, and will not disclose the user's private information.

4.7 The user may only this software in compliance with the law and the terms of this Agreement. The user is not entitled to take certain actions, including but not limited to:

(1) Deleting or modifying any of the electronic rights management information within the software.

(2) Deliberately circumventing or breaking the technical measures taken by the copyright holder to protect the copyright of this software

(3) Using the software to mislead or deceive other people.

(4) Violating state regulations by deleting, modifying, supplementing or interfering with the functions of the OS, causing the OS to not operate normally.

(5) Unauthorized entry into computer information networks or use of computer information network resources.

(6) Unauthorized deletion, modification or supplementation of computer information network functions.

(7) The unauthorized storage, processing or transfer of data within computer information networks, or use of programs to make deletions, modifications or supplementations.

(8) Damaging the normal operation of this software system or websites, deliberately transmitting viruses, Trojans or other destructive programs.

(9) Any other actions that are harmful to the security of computer information networks.

4.8 If the software product is downloaded from sites other than those designated by 360, or obtained from media not issued by 360, 360 cannot guarantee that the software is free from viruses and does not contain hidden Trojan programs or other malware. Using software of this nature can result in unforeseeable risks, and we recommend that users do not download, install or use it; 360 shall not accept any legal liability arising from such actions.

4.9 Privacy protection

4.9.1 360 promise to comply with the "360 White Paper on Privacy Protection " and the applicable law.

4.9.2 In order to improve the software and the service, the software will report to 360 security center server about the users installing and uninstalling of the software. It will visit a page of the server, and the server will count the frequency of the users installing and uninstalling according to the visiting frequency of the page.

4.9.3 Web Protection: The URLs of websites that you visit will be uploaded to 360 Cloud Security Center servers for phishing and online fraud analysis. Any Personal User Information will be removed from the URLs before they are uploaded. The information is processed with encryption before the upload. You may disable Web Protection by sliding Web Protection into the "off" mode.

4.9.4 360 URL cloud security plan: You can select whether to join the cloud security plan. When the user browses webpage that may have the risk of fraudulent, Trojan and page hijacking and suspicious URLs, the software will upload the URL and the source of the URL to the 360 server if the URL is not in the 360 server. Only when the webpage may have the risk of fraudulent, Trojan and page hijacking, and the URL is not in the 360 server, it will upload the URL. And the ordinary URLs will not be uploaded. Any Personal User Information will be removed from the URLs before they are uploaded. The uploaded URLs will only be used for the purpose of analyzing fishing and Trojan URLs. You may disable cloud security plan by sliding cloud security plan into the "off" mode.

4.9.5 Crash Report. If the Software crashes or certain abnormalities occur when using the Software, the Software will only send a crash report to 360 with the user's consent. Crash reports will not include any Personal User Information; however, they may include information relating to your operating system and the Software functions in use when the crash occurred.

4.9.6 360 has created strict processing regulations and security protection measures for the user's uploaded data to ensure that there is no collection of user data that exceeds the purpose and scope, to ensure that the user's uploaded information is secure, and to ensure that the user's uploaded information is not misused. 360 will not provide the user's uploaded files or information to any third party without obtaining the express written consent of the user and explicit provision in law.

4.9.7 360 has created the following four privacy protection principles to provide us with guidance when dealing with issues with the product that involve user privacy and user information:

(1) Use the information we collect to provide valuable products and services to the user.

(2) Develop products that are consistent with privacy standards and privacy practices.

(3) Be transparent about the collection of personal information, and be monitored by a third party authority.

(4) Do our best to protect the information we obtain.

You can find more detailed information about our privacy protection on the 360 Security Center website at: http://www.360totalsecurity.com/experience/ts-mac/

5. Disclaimer and Limitation of Liability

5.1 This software has undergone detailed testing, but we cannot guarantee that it is fully compatible will all software and hardware systems, or that it is completely free of errors. If an incompatibility or software error occurs, the user may call the technical support line and report the issue to 360 to obtain technical support. If the compatibility issue cannot be resolved, the user can delete the software.

5.2 Within the maximum scope permitted by the applicable laws, 360 shall undertake no liability for any damages or risks arising from the use of, or inability to use, the software, including but not limited to direct or indirect personal injury, loss of commercial profit, disruption of trade, loss of commercial information, and any other financial losses.

5.4 360 shall accept no liability for damages resulting from telecommunication system or Internet failures, computer malfunctions, handset malfunctions, or viruses, damaged or lost data, computer system problems, or any other force majeure.

5.5 Violation of the provisions of this Agreement by the user, that is detrimental to 360. 360 has the right to take measures including terminating the user license, ceasing to provide services, restricting usage, and taking legal action.

6. Laws and Resolution of Disputes

6.1 The Agreement shall be governed by the law of the Peoples Republic of China.

6.2 For any dispute you have with 360, you agree to first contact us and attempt to resolve the dispute with us informally. If 360 has not been able to resolvethe dispute with you informally, we each agree to resolve any claim, dispute, or controversy (excluding claims for injunctive or other equitable relief) arising out of or in connection with or relating to this Agreement by binding arbitration by the Beijing Arbitration Commission ("BAC"). The arbitration award shall be final and binding upon all parties.

7.Other Articles

7.1 If all or part of any article of this Agreement is rendered ineffective or unenforceable for any reason, or violates any applicable law, the relevant article shall be regarded as having been deleted; however, the remaining articles of the Agreement shall continue to be valid and binding.

7.2 360 has the right to revise this Agreement at any time in accordance with changes to the relevant laws and regulations, or in the company's business situation and operational policies. The revised Agreement will be published on the 360 website (http://www.360totalsecurity.com/experience/ts-mac/), and will accompany new versions of the software. The latest Agreement text shall be definitive if any relevant disputes arise. You may delete the software yourself if you do not agree with the revised content. Continued use of the software by the user shall be regarded as acceptance of the changes to the Agreement.

7.3 Should there be any inconsistency between the Simplified Chinese and the English versions of the Agreement, the Simplified Chinese version shall prevail.

7.4 360 holds all rights to the interpretation and amendment of the Agreement within the maximum scope permitted by the law.

January 2015


