Hector Weyl Product Privacy Policy

Revised Privacy Policy Statement:

Preamble: We at Hector Weyl are committed to safeguarding the privacy of our users while providing accurate and personalized services. To achieve this, we collect, use, and disclose personal information in a manner that is transparent and secure. This Privacy Policy outlines the types of information we gather, how it is used, stored, and protected, as well as the options you have regarding your data. Please review it carefully before utilizing our services, and make informed choices as necessary. We aim to present technical terms in a clear and straightforward manner. By engaging with our services, you acknowledge that you have read, understood, and agree to the terms of this Privacy Policy regarding the handling of your information.

Scope: This Privacy Policy covers all product services provided by Hector Weyl, with the exception of certain specific services that are governed by supplementary policies or notices. These supplementary policies are considered part of this Privacy Policy, and in case of any inconsistency, the supplementary policies shall prevail. This Privacy Policy does not apply to situations where third parties independently provide services to you through our services, such as websites that may include our services or other sites linked to ours. Please be aware that if you use such third-party products and/or services and provide your personal information, your data will be handled according to their privacy policies, and we are not responsible for any misuse or improper disclosure of your information in those cases.

Data Collection: To enhance and personalize our services, we collect the following types of information:

  1. Information Provided by You:

    • Essential details such as your username, mobile phone number, email address, and password when you register for our services.
    • Additional information may be required for specific services like online upgrades, password resets, or purchases. This information is not needed if you do not use these specific services.
  2. Information Generated During Use:

    • Device information to enhance services and experiences, including device attributes like hardware model, unique identifiers, and MAC addresses.
    • Log information automatically recorded by our servers during service usage.
    • Location information collected when you use location-enabled services and provide地理坐标 for related services.
  3. Information from Third Parties:

    • Personal and other information collected from affiliates, partners, and trusted third-party suppliers, with your consent or as permitted by law.

Processing of Your Information: We process your information for the following purposes:

  1. To Provide or Improve Our Services:

    • Utilizing collected information to offer or enhance services, including operations, maintenance, improvements, and customer support.
  2. To Maintain Personalized Communication:

    • Sending important notifications, such as changes to our terms, conditions, and policies.
  3. To Protect Your Rights:

    • Using your information for authentication, customer service, security, fraud monitoring, and credit analysis.
  4. For Legal Reasons:

    • Sharing your personal information when required by law or to protect your rights, property, or safety.
  5. Other Purposes as Permitted by You:

    • Processing your information for other purposes with your consent.

Data Storage for Specific Services: Information collected for specific services is used solely for those features and retained only as long as necessary for processing.

Your Rights as a Data Subject:

  1. Access and Update Your Personal Information:

    • We strive to provide access to your personal information and enable you to update or delete it unless retained for legitimate reasons.
  2. Modify, Delete, or Remove Your Information:

    • You have the right to modify, delete, or transfer your personal data stored on our server.

The Security of Information: We prioritize the security of personal data and implement industry-standard practices to protect it from unauthorized access, disclosure, use, modification, damage, or loss.

Children’s Personal Data: Our services are intended for adults, and children are not allowed to create accounts without parental consent. We only use or disclose children's data with legal permission or to protect the child's safety.

Third-Party Suppliers and Their Services: You may receive content or links from third-party suppliers. We have no control over these third parties, and you should review their privacy policies before submitting personal information.

Data Transfers: We transfer information in compliance with local laws and regulations.

Privacy Policy Updates: We reserve the right to update or modify this policy, and we will notify you of significant changes.

Cookie Use: A) We use cookies to provide personalized services, and you can manage your cookie preferences in your browser settings. B) Refusing cookies may limit your ability to use certain services. C) This policy applies to all information obtained through cookies.

Latest blog

How Does Active Motion Detection Work

How Does Active Motion Detection Work

Mastering Motion Detection: The Power of Active Motion Detection (AMD) Motion detection is a valuable security feature, designed to analyze scenes and trigger alerts when movement is detected. However, it can be frequently set off by non-threatening movements, such as...

Read more

Enhancing Night Vision: Insights from Nighttime Surveillance

Enhancing Night Vision: Insights from Nighttime Surveillance

High-Quality Imaging in Low-Light Conditions: Demystifying Nighttime Surveillance Technology Securing properties and assets often requires clear video surveillance, even in the most challenging low-light conditions. With a multitude of technologies available, selecting the right one can be daunting. In this...

Read more

Achieving High-Clarity Color Surveillance at Night for Small to Medium Sites

Achieving High-Clarity Color Surveillance at Night for Small to Medium Sites

Night-time surveillance for small to medium-sized locations can be quite challenging. Typically, the choices are restricted to day/night cameras or low-light cameras, also known as Starlight cameras. These devices can maintain color imagery as long as the lighting remains above...

Read more

Maximizing Surveillance Efficiency with Human-Based Video Metadata

Maximizing Surveillance Efficiency with Human-Based Video Metadata

In the realm of surveillance monitoring, video metadata pertains to the organized and retrievable information that can be extracted from video content. Essentially, it is a form of data that describes other data, often referred to as "data about data."...

Read more

HECTOR WEYL Color True 4K Cameras: Capture Realistic Images Even in the Dark

HECTOR WEYL Color True 4K Cameras: Capture Realistic Images Even in the Dark

Low-light circumstances are all too familiar to us. They have consistently presented a significant monitoring obstacle for both installers and end users. The images captured in dimly lit or nighttime settings with conventional surveillance cameras frequently turn out to be...

Read more

Active Deterrence

Active Deterrence

Active Deterrence is a security system designed to promptly intimidate intruders and avert crimes using integrated lighting and audio systems. It offers options for white or red & blue lighting to fit various situations. Utilizing deep learning algorithms, it delivers...

Read more