Privacy Policy Open Source Licenses

NEXGO TAP Privacy Policy

The Privacy Policy is published on 31st, March, 2023

NEXGO TAP is a mobile application with security controls that provides the ability for smartphones to complete transactions by reading contactless payment cards through NFC, and provides the necessary security monitoring and protection during the process. This Privacy Policy applies when you use the NEXGO TAP Application (the “NEXGO TAP”) offered by NEXGO GLOBAL LIMITED and its affiliates (collectively, "NEXGO", "we", "us", and "our" ). We are committed to protecting and respecting your privacy, please carefully read and fully understand the content of each term herein. BY YOUR DOWNLOADING, USING, ACCESSING NEXGO TAP, YOU ARE FULLY AGREEING TO BE BOUND BY THIS PRIVACY POLICY AND EXPERSSLY AUTHORIZE US TO COLLECT, USE, SHARE, PROTECT, MANAGE AND TRANSFER YOUR DATA, UNDER THE TERMS AND CONDITIONS AS STIPULATED HEREIN. IF YOU DO NOT AGREE TO THE TERMS OF THIS PRIVACY POLICY, YOU SHALL DISCONTINUE THE ACCESS TO OR USE OF NEXGO TAP, ITS CONTENT OR RELATED SERVICE FORTHWITH. This Privacy Policy may be updated from time to time, in order to comply with our latest business and usage scenarios and applicable laws. We will send you a timely notice to remind you every time when we update, please read carefully, and make re-authorization, if you do not agree, please stop using NEXGO TAP, your continual use of NEXGO TAP shall be regard as acceptance of our latest Privacy Policy. We will not compromise your rights under this Privacy Policy without your express consent.

  1. 1. HOW WE COLLECT YOUR PERSONAL DATA

    NEXGO TAP is developed solely for commercial use of the payment acquiring companies, we will not collect your information for the purpose of obtaining personal data. However, in order to realize the basic functions of NEXGO TAP, necessary data and information will be collected by us, which may contain your personal data. If you refuse to provide necessary data and information to us, some of the functions may be affected accordingly.

    Our collection methods are divided into the following two types: (i) collection from data sharing authorized by a third-party application, in most cases, the application of a payment acquiring company, with direct consent of the data subjects; and (ii) collection during your use of NEXGO TAP.

  2. 2. PERSONAL DATA WE COLLECT

    The overarching data processing/collecting principle and purpose is to diagnose whether there exist any factors of risks during the process of any transaction involved, so as to provide a fundamentally reliable framework for secure transaction.
  3. 2.1 Information Obtained from Authorized Third Parties

    We collect the merchant IDs, terminal IDs, and other transaction related information (the transaction related information may be varied in different trading scenarios, common examples are order number, order amount, and order type) from the other third-party payment acquiring institutions with authorization.

    Information that we may obtain from the authorized third parties shall have the following features and safeguards:
    1. We collect information that is essential for the proper function of NEXGO TAP and thereby our fundamental business purposes, sometimes from other APP developers;
    2. Such information is also needed to verify your identity and qualification for using NEXGO TAP and associating services (e.g., to identify whether your identity matches one that is to be served by any of our business partners);
    3. Such third parties shall certify to us that they have already secured consent from the rightful owners of the above said information.
  4. 2.2 Information that We Collect from Your Use of NEXGO TAP

    1. Device Information.Such information concerns OS and version, communication ports, processor, GPU, memory speed, gyroscope, screen size, present power status, memory use, installed apps, developer mode, device system time, device running time, application startup timestamp, and chip architecture, etc
    2. Log Information.Such information is generated when you use our NEXGO TAP services or access contents associating therewith. In that case, NEXGO TAP will automatically collect some information such as access duration, access times, IP address, event information (e.g., abnormality reporting, error, crash, restart, upgrade), etc.
    3. Location Information.This information will not be accessed without your express consent. With your authorization, such information will be accessed during the NEXGO TAP running process, which is collected for the sole purpose of transactional security monitoring analysis or parameter transmission among payment institutions. If your region has strict legal and policy restrictions on the delivery of location information, we will not collect this data if it does not affect our business operation. If our business has the need to send (to relevant institutions), please be sure to authorize us to access such information to the extent permissible by applicable laws, otherwise please stop using our related services.
    4. Payment Information.To facilitate payment function of NEXGO TAP, certain payment information, including primary account number (PAN), expiration date, service code, full track data, card verification code, PINs/PIN blocks, will be transmitted to us. All processing of aforesaid payment information is with proper certification thereof and strictly in compliance with payment card industry standards, such as PCI MPoC Solution standards and EMV, etc., as amended from time to time by the relevant international organizations. We only store payment information in a highly encrypted format, which is further subject to mandatory laws and regulations in the payment industry, for the purposes of creating a secure transaction environment, anti-money-laundering, and other lawful purposes. We adopt a vigorously stringent regime to encrypt any payment information we receive, and will not use for any purposes other than those permitted by laws. Notwithstanding the above, we do not proactively access cardholder’s payment information, and you agree that you shall be solely responsible for ensuring your compliance with all applicable industry standards, laws, and regulations, and assume all risks associating with any breaches thereof, including without limitation any disputes that take place as a result of said breaches between you and the cardholders.
    5. Information Collected by Third-Party API.To protect your safe use of NEXGO TAP, we use the following service: [Google Play Integrity API] to further check your transaction environment under necessary circumstances, such as during device initialization process, when your device is detected in unsafe state, and any other suspicious circumstances that we deem necessary to intervene. Google Play Integrity API will conduct check on whether your actions and requests are coming from unmodified app binaries, installed by Google Play, or running on a genuine Android device. To realize such functions, Google Play Integrity API needs to collect certain information from you, which may contain your personal data, including but not limited to nonce provided in the request, package name, application version, application signing certificate, a device attestation token generated by Google Play services, and other necessary information. For details, please refer to the terms of Google Play Integrity API ( https://developer.android.com/google/play/integrity/terms). For your knowledge, however, if you do not agree with Google Play Integrity API to collect the aforementioned information, your access to the relevant services may be compromised, which may further affect your normal use of other functions or services. If you agree that Google Play Integrity API collects the aforesaid information from you, you acknowledge that Google shall be the responsible party regarding your information collected thereby.
  5. 3. APP PERMISSIONS WE REQUEST

    Besides personal data we collect as detailed above, we will request various app permissions and app information, based upon the type of device you use. Our request is to ensure the whole transaction process is under proper supervision, and we access your information solely for the purpose of filtering out risky factors to provide a secure transaction environment for you and the cardholders. All information accessed under aforesaid app permissions will be encrypted in compliance with our strict security mechanism, and we will not use any information acquired hereunder for any purposes other than those expressly stated in this Privacy Policy.

    The following chart is the app permissions that we need to obtain, and descriptions for how we use them:
    App permissions How to use
    Storage Store application security files and add or delete service data during service processing
    Network Connect to the network to access background services for service processing
    Location
    1. only collect with your prior consent, during the application running process;
    2. whether to obtain location data will be adjusted according to the corresponding security policy issued by your country/region;
    3. in some cases, payment acquiring institutions will request to obtain location data for transaction risk control verification;
    4. such location data will only be used for transaction security monitoring analysis.

    NOTE : If your country/region has strict legal and policy restrictions regulating the location data, we will not collect location data if it does not affect normal service operation; if the service does need to collect location data or it will be unable to process, please be sure to make prior consent according to the laws and regulations, or stop using our services immediately.

    NFC Used to read payment cards, and we will maintain exclusive use of NFC during payment card reading process, to ensure the security of the transaction environment on your device
    Battery Obtain battery power statistics for analyzing whether the device is a real device, rather than an emulator, to ensure the security of the transaction environment on your device
    Camera Prohibit other apps from accessing camera of your device in certain process, to ensure the security of the transaction environment on your device
    Bluetooth Used to check whether the device has Bluetooth to analyze whether the device is a real device, rather than an emulator, to ensure the security of the transaction environment on your device
    Recording Prohibit other apps from accessing the recording function in certain process to ensure the security of the transaction environment on your device
    list of installed apps Obtain the list of applications installed on your device to determine whether there are risky applications which may impair the security of the transaction environment of your device
  6. 4. HOW WE USE YOUR PERSONAL DATA

    We collect and store some information about you in order to provide services to you. The information you provide us, and that which we gather based on your activity, helps us to:

    1. Improve your smoothness of using NEXGO TAP and create a seamless experience for you;
    2. Ensure the security of your payment environment;
    3. Improve our loss prevention programs, which includes security protection, prevention and prohibition of illegal activities, risk reduction;
    4. Process necessary info pursuant to laws and regulations, e.g., supervision authority requests;
    5. Archive and backup necessary encrypted information pursuant to laws and regulations;
    6. Comply with the laws, regulations and regulatory requirements of your country/region and ours.
  7. 5. HOW WE SHARE YOUR PERSONAL DATA

    We do not share personal data with other companies, organizations, and individuals unless one of the following circumstances applies:

    5.1 Sharing with consent: after obtaining your consent, we may share the information authorized by specified third parties or categories of third parties, which you have lawfully obtained;

    5.2 Sharing in compliance with legal obligation and laws and regulations: we may share your information:
    1. as required by laws and regulations for resolving legal disputes;
    2. as required by administrative or judiciary authorities pursuant to applicable laws and regulations;
    3. for other reasonable and necessary purposes to implement relevant agreements signed between you and NEXGO or this Privacy Policy; or
    4. to protect public interest, personal safety and property and other legitimate rights of our clients, ourselves, our subsidiaries, our affiliates, our users, or employees.

    5.3 Sharing within NEXGO’s subsidiaries and affiliates: your information may be shared within NEXGO’ s subsidiaries and affiliates only for explicit and legitimate purposes, and the sharing is limited to information necessary required by providing services under this Privacy Policy.

    5.4 Sharing with cooperative third-party service provider(s) necessary for providing our services, such third-party service provider(s) are subject to contractual obligations and security precautions no less strict than this Privacy Policy. We discreetly select our service provider(s), and we currently cooperate with the following third-party service providers: Amazon Web Services, Inc. and MYHSM Ltd., who store and process your Personal Data in [Singapore].

  8. 6. HOW WE PROTECT YOUR PERSONAL DATA

    6.1 We attach great importance to the security of your personal data and we have adopted standard industry practices to protect your personal data and prevent it from unauthorized access, disclosure, use, modification, damage, or loss. To this end, we have implemented the following measures:

    1. We take reasonable and feasible measures to ensure that the personal data collected is minimal and directly relevant to what is necessary in relation to the stated purposes for which they are processed under this Privacy Policy
    2. We use a range of industry-standard technologies such as cryptographic technologies, identity, credential, and access management measures to ensure the confidentiality of data in transmission. We implement trusted protection mechanisms to protect data from attacks.
    3. We hold security and privacy protection training courses, tests, and publicity activities to maintain our employees' personal data protection awareness at a high level.
    4. We have adopted emergency security incident response processes, including data breach notification.
    5. We select third-party service providers prudently and implement essential security requirement for personal data protection to the business contract between you and us.

    Notwithstanding the above, you recognize that no security measure is perfect and no product, service, website, data transfer, computing system, or network connection is absolutely 100% secure. You shall take the initiative to take good care of your sensitive personal data and do not provide such data to anybody without inquiring into associated risks

    If any personal data incident occurs, we will timely notify you, pursuant to relevant legal and regulatory requirements, of the basic information about the security incident and its possible impact, measures that we have taken or will take, suggestions about active defense and risk mitigation, and remedial measures. The notification may take the form of an email, text message, push notification, and any other reasonably feasible format in the view of NEXGO. If it is difficult to notify data subjects one by one, we will take appropriate and effective measures to release a security notice. In addition, we will also report the handling status of personal data security incidents as required by supervisory authorities.

  9. 7. DATA RETENTION

    We securely store your information and hold it only for as long as we need to provide our services to you in accordance with (i) applicable law and regulations, or (ii) the time-frame set out in any relevant contract you have with us or our clients.

    We will need to retain the minimum amount of information about you so that we can ensure to meet your request and the requirements of applicable laws and regulations. Please note and you acknowledge that if you ask us to completely remove all information about you, and you subsequently use our products and services, we will no longer be able to recognize your previous request.

  10. 8. HOW YOU CAN MANAGE YOUR PERSONAL DATA

    8.1 The personal data we collect is listed in paragraph 2 above. Legislation in some countries and regions to which NEXGO provides services or from where NEXGO processes personal data, has established that data subjects have the right to request (hereinafter referred to as "Requests") access to, rectification of, or erasure of your personal data retained by NEXGO. In addition, data subjects have the right to data portability and to restrict and or object to the processing of your personal data by NEXGO including to withdraw consent where such processing is based on consent.
    1. Access to Your Data
      For data which is generated during your use of services, you may request through the contact information specified in Article 11 of this Privacy Policy, or get in touch with your designed customer manager; this step may require you to provide reasonable verification of your personal identity so that we can determine whether you are eligible for such request. And this verification process is also made pursuant to the safeguards as under this Privacy Policy.

    2. Change or Correct Your Data
      You have the right to change or correct your data, but there may be very few situations where our services may cause you to use such right, which is determined by the type of information we collect. If it does happen, you may request through the contact information specified in Article 11 of this Privacy Policy, or get in touch with your designed customer manager.

    3. Requesting Modes and Channels
      Data subjects’ requests shall be submitted in accordance with NEXGO designated customer service email channels in Article 11 “How to Contact us” at the end of this Privacy Policy or your designed customer managers to facilitate feedback of progress and result. The requests are valid even when the requester does not specify the laws on which the requests are based.

    4. Validity of Requests
      Most laws require data subjects to comply with specific requirements when you initiate requests. This Privacy Policy requires data subjects to:
      1. submit requests through dedicated channels provided by NEXGO;
      2. provide sufficient information for NEXGO to verify your identities (to ensure those who initiate the requests are the data subjects yourselves or those authorized by you); and
      3. ensure that your requests are specific and feasible. THERE ARE SOME CIRCUMSTANCES, PROVIDED BY LAWS AND REGULATIONS, IN WHICH NEXGO MAY NOT HAVE TO COMPLY WITH THE REQUEST IN FULL OR AT ALL.

  11. 8.2 Consent withdrawal
    You can change the authorized personal data collection scope or withdraw your consent without affecting the lawfulness of the processing activities based on the consent made prior to such change or withdrawal. You may request to withdraw your consent for specific products and services, following the methods and channels set forth in this Privacy Policy. Our contact information is specified at the end of this Privacy Policy. HOWEVER, THERE ARE SOME CIRCUMSTANCES, PROVIDED BY LAWS AND REGULATIONS, IN WHICH NEXGO MAY NOT HAVE TO COMPLY WITH THE REQUEST IN FULL OR AT ALL. FOR EXAMPLE, THE CONSENTED INFORMATION YOU ARE REQUESTING TO WITHDRAW IS SUBJECT TO COMPULSORY SUPERVISION BY PAYMENT INDUSTRY LAWS AND REGULATIONS.
  12. 9. INTERNATIONAL TRANSFER

    9.1 To offer our services, we may need to transfer personal data that you submit in your jurisdiction to the [secured servers] located in [Singapore]. For limited purpose of processing, providing, and promoting our services, authorized personnel of NEXGO and necessary third-party service providers acting on our behalf may access, use, and process personal data collected from you in a country/region that is different from the country/region where you entered the personal data, which may have less stringent data protection laws. When we transfer your personal data to other countries/regions, we will protect the personal data as described in this Privacy Policy or as otherwise disclosed to you at the time the data is collected (e.g. via privacy notice or supplementary statement of specific service).

    9.2 NEXGO strives to implement legally accepted means and privacy practices for processing personal data protected under applicable data protection laws. NEXGO transfers personal data between the jurisdictions as disclosed in this Privacy Policy as well as operate in accordance with the standards and conditions of applicable data protection laws, including standards and conditions related to security and processing.

    9.3 With respect to users from the European Union, we only provide services to entities such as enterprises and organizations in line with local laws and regulations. Nevertheless, to continuously improve and expand our global business, NEXGO strives to comply with applicable legal requirements providing adequate safeguards for the transfer of personal data to countries outside of the European Economic Area ("EEA"). We adopt a variety of robust legal mechanisms as envisioned under applicable laws to implement the cross-border transfer of your personal data; or implement security measures before the cross-border data transfer.

  13. 10. UPDATES

    We may update this Privacy Policy from time to time in order to reflect, for example, changes to our practices or other operational, legal, or regulatory reasons. Any changes made thereunder will be reflected in this statement, so you should check here regularly

  14. 11. HOW TO CONTACT US

    If you have any questions, comments, suggestions, or want to exercise your privacy rights, or have any privacy issues for which you need to lodge a privacy complaint, or want to inquire about general data protection, please contact us via Email: sales@xgd.com or liaise with your own NEXGO customer manager.

Please note we provide an open source software notice along with this product and/or this product firmware (in the following just “this product”). The open source software licenses are granted by the respective right holders. And the open source licenses prevail all other license information with regard to the respective open source software contained in the product, including but not limited to End User Software Licensing Agreement. This notice is provided on behalf of NEXGO GLOBAL LIMITED and any of its local subsidiaries which may have provided this product to you in your country/region.

/logback-android
[1]
Apache License
Version 2.0, January 2004
http://www.apache.org/licenses/

/gson
[2]
Please see above
Software: gson 2.9.0
Copyright notice:
Copyright 2008 Google Inc.
Copyright (c) 2012 Square, Inc.
Copyright (c) 2012 Google Inc.
Copyright (c) 2011 Google Inc.
Copyright (c) 2016 Gson
Copyright 2008-2011 Google Inc.
Copyright (c) 2008 Google Inc.
Copyright (c) 2009 Google Inc.
Copyright (c) 2010 Google Inc.
Copyright (c) 2021 Google Inc.
Copyright (c) 2014 Google Inc.
Copyright (c) 2017 The Gson authors
Copyright (c) 2010 The Android Open Source Project
Copyright (c) 2020 Google Inc.
Copyright (c) 2018 The Gson authors
Copyright (c) 2016 the Gson authors
Copyright (c) 2018 Gson
Copyright (c) 2015 Google Inc.
Copyright (c) 2016 Google Inc.
Copyright (c) 2017 Google Inc.
Copyright (c) 2017 Gson

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

1. Definitions.

"License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document.

"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.

"Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.

"You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.

"Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files.

"Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types.

"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).

"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.

"Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution."

"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work.

2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form.

3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.

4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:

You must give any other recipients of the Work or Derivative Works a copy of this License; and
You must cause any modified files to carry prominent notices stating that You changed the files; and
You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and
If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License.
You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.

5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions.

6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file.

7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License.

8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages.

9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability.

END OF TERMS AND CONDITIONS

APPENDIX: How to apply the Apache License to your work. To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets “[]” replaced with your own identifying information. (Don’t include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose be included on the same “printed page” as the copyright notice for easier identification within third-party archives.

Copyright [yyyy] [name of copyright owner]
Licensed under the Apache License, Version 2.0 (the “License”);
You may not use this file except in compliance with the License.
You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0.
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an “AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
See the License for the specific language governing permissions and limitations under the license.

/android-gifdrawable
[3]
MIT License
Copyright (c) 2013 - present Karol Wrótniak, Droids on Roids LLC

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

SKIA: // Copyright (c) 2011 Google Inc. All rights reserved.
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions are
// met:
//
// * Redistributions of source code must retain the above copyright
// notice, this list of conditions and the following disclaimer.
// * Redistributions in binary form must reproduce the above
// copyright notice, this list of conditions and the following disclaimer
// in the documentation and/or other materials provided with the
// distribution.
// * Neither the name of Google Inc. nor the names of its
// contributors may be used to endorse or promote products derived from
// this software without specific prior written permission.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

GIFLIB:
The GIFLIB distribution is Copyright (c) 1997 Eric S. Raymond

ReLinker:
Copyright 2015 KeepSafe Software, Inc.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

memset.arm.S:
Copyright (C) 2010 The Android Open Source Project

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.