Revised Privacy Policy Statement:

Preamble: We at Hector Weyl are committed to safeguarding the privacy of our users while providing accurate and personalized services. To achieve this, we collect, use, and disclose personal information in a manner that is transparent and secure. This Privacy Policy outlines the types of information we gather, how it is used, stored, and protected, as well as the options you have regarding your data. Please review it carefully before utilizing our services, and make informed choices as necessary. We aim to present technical terms in a clear and straightforward manner. By engaging with our services, you acknowledge that you have read, understood, and agree to the terms of this Privacy Policy regarding the handling of your information.

Scope: This Privacy Policy covers all product services provided by Hector Weyl, with the exception of certain specific services that are governed by supplementary policies or notices. These supplementary policies are considered part of this Privacy Policy, and in case of any inconsistency, the supplementary policies shall prevail. This Privacy Policy does not apply to situations where third parties independently provide services to you through our services, such as websites that may include our services or other sites linked to ours. Please be aware that if you use such third-party products and/or services and provide your personal information, your data will be handled according to their privacy policies, and we are not responsible for any misuse or improper disclosure of your information in those cases.

Data Collection: To enhance and personalize our services, we collect the following types of information:

  1. Information Provided by You:

    • Essential details such as your username, mobile phone number, email address, and password when you register for our services.
    • Additional information may be required for specific services like online upgrades, password resets, or purchases. This information is not needed if you do not use these specific services.
  2. Information Generated During Use:

    • Device information to enhance services and experiences, including device attributes like hardware model, unique identifiers, and MAC addresses.
    • Log information automatically recorded by our servers during service usage.
    • Location information collected when you use location-enabled services and provide地理坐标 for related services.
  3. Information from Third Parties:

    • Personal and other information collected from affiliates, partners, and trusted third-party suppliers, with your consent or as permitted by law.

Processing of Your Information: We process your information for the following purposes:

  1. To Provide or Improve Our Services:

    • Utilizing collected information to offer or enhance services, including operations, maintenance, improvements, and customer support.
  2. To Maintain Personalized Communication:

    • Sending important notifications, such as changes to our terms, conditions, and policies.
  3. To Protect Your Rights:

    • Using your information for authentication, customer service, security, fraud monitoring, and credit analysis.
  4. For Legal Reasons:

    • Sharing your personal information when required by law or to protect your rights, property, or safety.
  5. Other Purposes as Permitted by You:

    • Processing your information for other purposes with your consent.

Data Storage for Specific Services: Information collected for specific services is used solely for those features and retained only as long as necessary for processing.

Your Rights as a Data Subject:

  1. Access and Update Your Personal Information:

    • We strive to provide access to your personal information and enable you to update or delete it unless retained for legitimate reasons.
  2. Modify, Delete, or Remove Your Information:

    • You have the right to modify, delete, or transfer your personal data stored on our server.

The Security of Information: We prioritize the security of personal data and implement industry-standard practices to protect it from unauthorized access, disclosure, use, modification, damage, or loss.

Children’s Personal Data: Our services are intended for adults, and children are not allowed to create accounts without parental consent. We only use or disclose children's data with legal permission or to protect the child's safety.

Third-Party Suppliers and Their Services: You may receive content or links from third-party suppliers. We have no control over these third parties, and you should review their privacy policies before submitting personal information.

Data Transfers: We transfer information in compliance with local laws and regulations.

Privacy Policy Updates: We reserve the right to update or modify this policy, and we will notify you of significant changes.

Cookie Use: A) We use cookies to provide personalized services, and you can manage your cookie preferences in your browser settings. B) Refusing cookies may limit your ability to use certain services. C) This policy applies to all information obtained through cookies.

Latest blog

View all

The Lens in Security Cameras: An In-Depth Technical Exploration by Hector Weyl

The Lens in Security Cameras: An In-Depth Technical Exploration by Hector Weyl

Introduction: The Unseen Eye of Modern Security In the realm of security surveillance, the camera is often lauded for its sensor, its processing power, and its intelligent analytics. However, the critical component that literally shapes the light entering the system—the...

Read more

H.265/HEVC: The Engine of High-Definition Security - A Hector Weyl Technical Exploration

H.265/HEVC: The Engine of High-Definition Security - A Hector Weyl Technical Exploration

Introduction: The Unseen Battle for Bandwidth and Clarity In the realm of security and surveillance, the quest for perfection is a relentless pursuit of opposing forces. We demand higher resolutions—4K, 8K, and beyond—to capture critical forensic detail. We require longer...

Read more

Understanding RTSP in Security Video Surveillance Systems

Understanding RTSP in Security Video Surveillance Systems

In security video surveillance, real-time access to footage isn’t just a convenience—it’s a necessity. Imagine a retail store detecting a shoplifter, a city traffic camera spotting a reckless driver, or a warehouse monitoring for unauthorized entry: in all cases, delays of...

Read more

ONVIF: The Cornerstone of Interoperability in Modern Video Surveillance and the Strategic Commitment of Hector Weyl

ONVIF: The Cornerstone of Interoperability in Modern Video Surveillance and the Strategic Commitment of Hector Weyl

Introduction: The Networked Revolution and the Problem of Proprietary Silos The transition from analog to Internet Protocol (IP)-based video surveillance marked one of the most significant technological evolutions in the security industry. Network cameras, network video recorders (NVRs), video management...

Read more

Image Sensors in Security Systems: From CCD to CMOS and Beyond

Image Sensors in Security Systems: From CCD to CMOS and Beyond

In security surveillance, the difference between a usable camera and a useless one often comes down to a single component: the image sensor. Think of it as the camera’s “eye”—it converts light (from sunlight, streetlights, or IR) into electrical signals that...

Read more

Hector Weyl Network Cameras: A Guide to Face Detection Settings – Enhance Security with Identity-Based Alerts

Hector Weyl Network Cameras: A Guide to Face Detection Settings – Enhance Security with Identity-Based Alerts

In security setups where "who" is present matters as much as "what" is happening, basic motion detection or even smart motion detection falls short. For example: How do you instantly know if a visitor is an authorized employee or an...

Read more

Top Model Recommendations from Hector Weyl's Advanced Dual Hybrid Light IntelliSight Series

Top Model Recommendations from Hector Weyl's Advanced Dual Hybrid Light IntelliSight Series

When it comes to choosing the right security camera from Hector Weyl’s Advanced Dual Hybrid Light IntelliSight Series, the key is matching technical capabilities to your specific scene requirements. Whether you need cost-effective residential monitoring or rugged industrial surveillance, this...

Read more

Hector Weyl Advanced Dual Hybrid Light IntelliSight Series: Redefining Smart Surveillance for Day and Night

Hector Weyl Advanced Dual Hybrid Light IntelliSight Series: Redefining Smart Surveillance for Day and Night

In the world of security monitoring, two persistent challenges have long frustrated users: poor visibility in low-light conditions and annoying false alarms triggered by wind-blown branches or stray animals. Hector Weyl, a leader in intelligent surveillance solutions with over 15...

Read more

A Practical Guide to PPPoE Settings for Hector Weyl Network Cameras

A Practical Guide to PPPoE Settings for Hector Weyl Network Cameras

For many professional security setups—like remote warehouses, rural traffic cameras, or standalone monitoring points—Hector Weyl network cameras often need direct access to the public internet. But how do you connect a camera to the web without a router handling the...

Read more

Is Hector Weyl’s Solar PTZ Camera (BW-IPCSW-HY5) the Best Choice for Remote Site Security? (Warehouses, Construction Yards)

Is Hector Weyl’s Solar PTZ Camera (BW-IPCSW-HY5) the Best Choice for Remote Site Security? (Warehouses, Construction Yards)

Remote sites like construction yards and warehouses have a fatal flaw for security: they rarely have easy access to power or stable internet—two things traditional wired cameras depend on. A construction yard in a rural area might lack electrical outlets; a...

Read more

A Complete Guide to DDNS Settings for Hector Weyl Network Cameras

A Complete Guide to DDNS Settings for Hector Weyl Network Cameras

If you’ve ever struggled to access your Hector Weyl network camera remotely because its IP address keeps changing, you’re not alone. Many ISPs (Internet Service Providers) assign dynamic IP addresses—temporary addresses that shift when your camera restarts or your internet connection...

Read more

The Complete Guide to Face Recognition Technology: Standards, Deployment, and Innovation by Hector Weyl

The Complete Guide to Face Recognition Technology: Standards, Deployment, and Innovation by Hector Weyl

As a pioneering force in the design and manufacturing of advanced security surveillance solutions, Hector Weyl stands at the confluence of technological innovation and practical application. Face recognition has evolved from a nascent technology to the cornerstone of modern biometric...

Read more