CustPro Terms of Use

Last Updated: October 17, 2025

Effective Date: October 17, 2025

Welcome to CustPro (hereinafter referred to as "the Product"), provided by Terabox, Inc.. These Terms of Use apply to all services and content provided by Terabox, Inc., including the official website, client software, applications (Apps), mini programs, and other platforms.

By using the Product, you acknowledge that you have fully understood and agreed to comply with the following terms:


1. Authorization and Scope of Use

Terabox, Inc. grants users permission to use the Product within the following scope:

  1. Display and browse the Product interface on your own devices.
  2. Unauthorized public commercial use is prohibited, except for internal company use, testing, or educational purposes.
  3. Users may download, save, or print provided samples or tool materials for non-commercial purposes only.

2. Copyright and Intellectual Property

  1. CustPro and its content (including but not limited to text, graphics, interface design, images, videos, logos, product names, AI models, and generated content) are protected by copyright and other intellectual property rights.
  2. Without explicit authorization from CustPro or the relevant rights holders, you may not modify, copy, redistribute, or use the content for commercial purposes.
  3. Unauthorized access, download, use, or modification of Product content may constitute infringement, and legal actions may be taken.

3. Rules of Use

When using the Product, please comply with the following rules:

  1. Do not modify, decompile, reverse engineer, or attempt to obtain the source code or algorithms of the Product.
  2. Do not use the Product for illegal purposes, cheating, or actions that violate platform rules.
  3. Do not post illegal content or content that may cause harm to others.
  4. Do not create misleading links or imply an official relationship with CustPro.
  5. Users should use the Product reasonably and avoid causing damage or interference to CustPro services.

4. Content Updates and Changes

  1. CustPro reserves the right to modify, update, or remove content in the Product without prior notice.
  2. CustPro will make reasonable efforts to ensure content accuracy based on current information and technology, but does not provide absolute guarantees.

5. Limitation of Liability

  1. To the extent permitted by law, the Product is provided "as is," without any express or implied warranties. This provision does not affect mandatory legal liabilities.
  2. CustPro shall not be liable, to the extent permitted by law, for any direct or indirect losses resulting from the use of the Product.
  3. Users are solely responsible for any third-party disputes, account suspensions, or data loss arising from their use of the Product.

6. Other Provisions

  1. To protect CustPro's research and development achievements, if users voluntarily provide technical proposals, please ensure they do not contain sensitive information. We will handle them according to the situation.
  2. Users must comply with applicable laws and platform rules when using the Product.
  3. CustPro reserves the right to update, modify, or supplement these Terms of Use at any time.

Terabox, Inc. reserves the final right of interpretation

Terabox, Inc. Privacy Policy

Last Updated: October 17, 2025

Effective Date: October 17, 2025

Terabox, Inc. (hereinafter referred to as "we") highly values the protection of your personal information and considers it our responsibility to safeguard it. We will protect your personal information in accordance with this Privacy Policy (hereinafter referred to as "this Policy") and implement appropriate standards and measures.

This Policy applies to all products and/or service channels provided by Terabox, Inc., including our official website, apps, email, telephone, and offline services.

Before using our products and/or services, please read this Policy carefully, especially the parts in bold. By using our products and/or services, you agree to this Policy. If you do not agree, please stop using our services immediately.

This Policy will help you understand the following:

  1. The personal information we may collect
  2. The purposes for which we collect and use personal information
  3. How we collect and use personal information
  4. How we store and protect your personal information
  5. How you can manage your personal information
  6. Policy revisions and notifications
  7. How to contact us

1. Personal Information We May Collect

We only collect the following personal information to the extent necessary for the purposes described in this Policy:

  • Name
  • Email address
  • Phone number
  • Company name

These are basic personal information items, and we use them only when necessary.


2. Purposes for Collecting and Using Personal Information

We collect the above information for the following purposes:

  1. To provide product or service support
  2. To communicate with you regarding business or customer matters
  3. To send notifications or information related to our services
  4. To analyze and improve our products and services

We will not use your information for purposes other than those explicitly stated in this Policy.


3. How We Collect and Use Personal Information

  1. Collection Methods

    • Online: Information voluntarily provided by you through our official website or apps
    • Offline: Information provided via telephone, email, or business communications
  2. Usage

    • Information is used solely to achieve the purposes outlined in this Policy
    • Any other use will comply with applicable laws and involve necessary measures
  3. Third-Party Information Sources

    • We only obtain information from third-party partners with your explicit authorization
    • We ensure legality and strictly limit the scope of use

4. How We Store and Protect Your Personal Information

  1. Retention Period

    • Information will be retained in accordance with legal requirements or as necessary to fulfill service purposes
    • After the retention period, information will be securely deleted or anonymized
  2. Security Measures

    • We take reasonable technical and administrative measures to prevent leakage, tampering, or loss of information
    • In the event of a security incident, affected users will be promptly notified and remedial measures taken

5. How You Can Manage Your Personal Information

You have the right to:

  1. Withdraw consent or restrict the use of your information
  2. Request deletion of your information (within the scope permitted by law)

You may exercise these rights using the methods listed under "How to Contact Us" below. We may request identity verification to ensure security.


6. Policy Revisions and Notifications

  1. We may revise this Policy in response to legal requirements or business changes
  2. When the Policy is revised, we will notify users appropriately (e.g., via our website) before it takes effect
  3. Once effective, the revised Policy supersedes the previous version

7. How to Contact Us

If you have any questions regarding this Policy or the protection of your personal information, please contact us:


Terabox, Inc. reserves the final interpretation rights

CustPro Security Policy

Last Updated: October 17, 2025

Effective Date: October 17, 2025

Terabox, Inc. places the highest importance on the security of CustPro’s data and systems, implementing multiple layers of protection to ensure the safety of your information and the stability of our services. The following outlines our main security measures and management practices.


1. Data Transmission and Storage Security

  1. All data is transmitted using HTTPS/TLS encryption to prevent interception or tampering by third parties.
  2. User account information (such as passwords) is stored using one-way hash encryption, ensuring that even if data is leaked, the original content cannot be recovered.
  3. Sensitive user data is encrypted and access-controlled, with strict restrictions on unauthorized access.

2. Access and Operation Control

  1. Critical operations, such as modifying account information or exporting results, require permission verification, and all actions are logged for auditing purposes.
  2. System management and maintenance operations use tiered access controls, with only authorized personnel allowed to perform high-level actions.
  3. Abnormal behaviors, unusual logins, or malicious requests are monitored as thoroughly as possible, with appropriate response measures taken.

3. System Protection and Vulnerability Management

  1. Regular security audits and vulnerability scans are conducted to promptly fix known issues.
  2. Firewalls, intrusion detection systems (IDS), and other measures are in place to prevent malicious attacks or intrusions.
  3. Third-party services are strictly evaluated to ensure their security meets CustPro’s requirements.

4. Backup and Business Continuity

  1. Data is backed up regularly to ensure quick recovery in the event of system failure or unexpected incidents.
  2. Critical services are deployed with high availability and redundancy to maintain business continuity.

5. User Security Responsibilities

  1. Users must properly safeguard their account information and not share login credentials with others.
  2. Suspicious logins, unusual operations, or security incidents should be reported immediately via official channels.
  3. Users must comply with applicable laws and platform rules when using content generated by this product.

6. Incident Response and Notification

  1. Upon detecting a security incident, Terabox, Inc. will immediately activate its emergency response mechanism, assess the impact, and take appropriate measures.
  2. Events potentially affecting user rights will be communicated promptly via email, notifications, or announcements, along with preventive guidance.
  3. Terabox, Inc. will handle major security incidents in accordance with applicable laws and regulations.

Terabox, Inc. reserves the final right of interpretation