HIKVISION DS-KD9403-E6 User Manual page 3

Video intercom face recognition door station
Hide thumbs Also See for DS-KD9403-E6:
Table of Contents

Advertisement

Video Intercom Face Recognition Door Station User Manual
CONNECTION WITH THE USE OF THE PRODUCT, EVEN IF HIKVISION HAS
BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR LOSS.
YOU ACKNOWLEDGE THAT THE NATURE OF THE INTERNET PROVIDES FOR
INHERENT SECURITY RISKS, AND HIKVISION SHALL NOT TAKE ANY
RESPONSIBILITIES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR
OTHER DAMAGES RESULTING FROM CYBER-ATTACK, HACKER ATTACK, VIRUS
INFECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION
WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED.
YOU AGREE TO USE THIS PRODUCT IN COMPLIANCE WITH ALL APPLICABLE
LAWS, AND YOU ARE SOLELY RESPONSIBLE FOR ENSURING THAT YOUR USE
CONFORMS TO THE APPLICABLE LAW. ESPECIALLY, YOU ARE RESPONSIBLE,
FOR USING THIS PRODUCT IN A MANNER THAT DOES NOT INFRINGE ON THE
RIGHTS OF THIRD PARTIES, INCLUDING WITHOUT LIMITATION, RIGHTS OF
PUBLICITY, INTELLECTUAL PROPERTY RIGHTS, OR DATA PROTECTION AND
OTHER PRIVACY RIGHTS. YOU SHALL NOT USE THIS PRODUCT FOR ANY
PROHIBITED END-USES, INCLUDING THE DEVELOPMENT OR PRODUCTION
OF WEAPONS OF MASS DESTRUCTION, THE DEVELOPMENT OR
PRODUCTION OF CHEMICAL OR BIOLOGICAL WEAPONS, ANY ACTIVITIES IN
THE CONTEXT RELATED TO ANY NUCLEAR EXPLOSIVE OR UNSAFE NUCLEAR
FUEL-CYCLE, OR IN SUPPORT OF HUMAN RIGHTS ABUSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE
APPLICABLE LAW, THE LATTER PREVAILS.
Data Protection
During the use of device, personal data will be collected, stored and
processed. To protect data, the development of Hikvision devices
incorporates privacy by design principles. For example, for device with facial
recognition features, biometrics data is stored in your device with
encryption method; for fingerprint device, only fingerprint template will be
saved, which is impossible to reconstruct a fingerprint image.
As data controller, you are advised to collect, store, process and transfer
data in accordance with the applicable data protection laws and regulations,
including without limitation, conducting security controls to safeguard
personal data, such as, implementing reasonable administrative and
physical security controls, conduct periodic reviews and assessments of the
effectiveness of your security controls.
ii

Advertisement

Table of Contents
loading

Table of Contents