Anti Surveillance Equipment

True Autonomous + Innovative Anti Surveillance Equipment

Meet the most innovative and unique autonomous anti surveillance equipment currently available: X-AWARE.

 

With X-AWARE, avoid overlooking important information or missing information due to camera blind spots. Protect yourself, your family, your assets and goods with both regular and innovative services.


This is because X-AWARE fully automatically scans the invisible electromagnetic spectrum around you. Static and Dynamic.

With X-AWARE you increase your security to the next level.

LEARN MORE > CONTACT US >

On the Move Anti Surveillance Equipment
Wireless Intelligence Anti Surveillance Equipment

Real-Time Anti Surveillance

X-AWARE. The ultimate anti surveillance equipment as an add-on to your regular protection and security teams.

 

In addition to Camera and License Plate Recognition technology, we offer with X-AWARE an additional + unique Anti Surveillance Detection. By scanning hundreds of wireless elements per minute in your vicinity, it can make real-time risk, threat and hazard analyzes fully automatically (based on actual data and AI technology).


Think of all types of invisible wireless elements that have been overlooked until now, while it is precisely X-AWARE that uses this to provide increased surveillance protection.

Detect + Recognize + Identify over 100+ intelligence-points additionally in your proximity with X-AWARE.

Unique Counter Surveillance Equipment: X-AWARE

At any given moment, with the anti-surveillance equipment X-AWARE you receive real-time preemptive alerts. Based on real-time factual collected intelligence.

 

X-AWARE works seamlessly in the background. Designed as, without the need for technical knowledge, a very user-friendly solution. Which can be processed within any vehicle or property.


Protect your customers and goods preventively. Contact us for more information on how our anti-surveillance technology can increase your current security.

 

LEARN MORE ABOUT: X-AWARE > CONTACT US >

Automatic Anti Surveillance Equipment

Counter Surveillance Equipment

Preventive Counter Surveillance

X-Surveillance introduces next-level Counter Surveillance Equipment that automatically detects threats and hazards when you are on the move: traveling, driving, bicycling.

 

Developed as an add-on towards existing Close Protection services.

Through years of experience of what is possible with the use of surveillance technologies. For that reason, X-Surveillance has developed a solution that alerts close protection details both preventively and actively so that they can act more proactively.

 

LEARN MORE > CONTACT US >

Counter Surveillance Equipment
On the Move Counter Surveillance Equipment

Autonomous Counter Surveillance Technology

AWARE is the ultimate solution to detect unwanted surveillance by vehicles, motorcycles, bicycles and people. With our innovative: autonomous and passive technology you get more situational awareness than ever before.

 

AWARE is an automatic counter surveillance equipment which, unlike other counter surveillance techniques, does not require any prior knowledge or input data. Of course you can set certain attributes for the purpose of operation.

X-Surveillance AWARE, an innovative and effective add-on to your current Close Protection detail services.

Discrete Counter Surveillance Equipment

With AWARE, you have the ability to act quickly and proactively to fend off potential attacks or other threats before they happen.

 

In addition to camera equipment, AWARE uses the radio frequency electromagnetic spectrum. This allows it to detect, recognize and correlate invisible and overlooked attributes.

Contact us for more technical explanation about our unique counter surveillance equipment, and how it can help you.

 

LEARN MORE > CONTACT US >

Unique Counter Surveillance Equipment

Counter Surveillance Technology

 

Contact us and discover how we can help your organization with our innovative and unique Counter Surveillance Technology independently designed for Counter Surveillance, Anti Surveillance and Surveillance Detection.

Contact Us + Learn More about our unique technology










    Contact us for more information about AWARE.
    Designed for Anti Surveillance + Surveillance Detection

    Automatic Preventive + Active > Real-Time Surveillance Detection
    Mobile-Friendly, On-Site and Control Room Integrable Technology
    Users Receive Automatic Preeemptive Anti Surveillance Alerts
    Fully Customizable + User-Friendly Counter Surveillance Technology
    Our Counter Surveillance Technology Operates Fully Autonomous
    Protect Your Clients – Family – Valuables – Goods – More
    Contact us to learn more about our Surveillance Detection Technology

    Based on your request, we will contact you as soon as possible – within one or two working days.
    Based on a few questions, we can provide you the best X-AWARE version.


    X-AWARE is available as a full Passive and Passive+Extended solution. With both the Passive and Passive+Extended, over 100+ data points can be detected – recognized – processed – identified.

    • Passive: With a unique combination of up to 15 different wireless spectrums and frequencies, X-AWARE offers a total picture.
    • Passive+Extended: Additional intelligence is gathered by identifying wireless devices within the cellular spectrum.

    Contact us for more information about our X-AWARE and its possible deployments.

    X-AWARE Anti + Counter Surveillance Detection Technology

    X IMSI Catcher

    X IMSI CATCHER

    New Model: X IMSI Catcher

    The new Phone + IMSI Catching model “X IMSI Catcher” is a Plug & Play at fixed locations rapid deployable Multi Spectrum in One technology.

     

    The basis of X-Surveillance technology remains as you are used to from us, Privacy-by-Default, so that only the X IMSI Catcher only collects the IMSI, TMSI, MCC, MNC, SNR, PWR and other attributes. It does not intercept any privacy sensitive data.

    The Multi-Spectrum X IMSI Catcher has been developed for Public Safety + Public Security.

    X IMSI Catcher = IMSI Catching Technology
    Multi Spectrum IMSI Catcher

    Multi Spectrum IMSI Catcher

    At the same time, the X IMSI Catcher can scan all spectrums and detect wireless devices within GSM + EDGE + 4G LTE + 5G Ready + BLE + WIFI. This makes it possible to detect wireless devices within all spectrums within seconds.

     

    In combination with the X-Surveillance comprehensive dashboard, the detected wireless devices can be identified, verified and correlated in real time.

    With the X IMSI Catcher, operators and officers gain real-time situational awareness, tactical intelligence, factual digital forensics and life saving insights.

    Plug & Play IMSI Catcher

    We understand that as a security organization, law enforcement agency or integrator you want a Plug & Play IMSI Catching technology that can be easily installed. Which can also be configured, monitored and managed remotely.

     

    The X-Surveillance X IMSI Catcher has been developed in such a user-friendly way that it can easily be installed by any integrator without technical or programming knowledge.

    There is even a Plug & Play covert backpack and concealable trolley available. Contact us to learn about all available Plug & Play Models.

    X IMSI Catcher as Plug & Play Solution
    New introduction: X IMSI Catcher

    Purchase the new: X IMSI Catcher

    Contact us today and ask about the introduction discount. For a certain time, this new version is available for a reduced price.

     

    Because the technology is Plug & Play, it can be widely and easily integrated, built in, placed or hung anywhere. Because of the Plug & Play IMSI Catching technology, we offer this new verion any how at a very affordable price.

    Contact us for more information, price lists and deployment options.

    Stingray Phone Tracking Technology

    Stingray Phone Tracking Technology

    PBIC Stingray Phone Tracking

    The Stingray Phone Tracking technology of PBIC is a combination of IMSI + Phone Detection capabilities and Phone Tracking features in the dashboard.

     

    As a simple, user-friendly Plug & Play Stingray Phone Tracking solution, it can be deployed or integrated anywhere. For example, it is possible to track cell phones from:

    • Fixed or temporary covert surveillance installations
    • Portable discreet surveillance backpacks
    • Hidden in two & four-wheel vehicles
    • Temporary concealed tactical cases
    PBIC Stingray Phone Tracking
    PBIC Stingray for IMSI + Phone Tracking

    Remote IMSI + Phone Tracking

    X-Surveillance makes it easier to carry out surveillance tasks with the Stingray Phone Tracking PBIC. By being able to track IMSI and Phones remotely, operators can perform their tasks more unrecognizably.

     

    Operators and officers can perform their duties without being discovered, recognized or identified by cameras, suspects, co-suspects or bystanders. From a distance in combination with other surveillance equipment, end users have more access to tactical intelligence.

    With an operational range of 5 to 100 – expandable with PBIC SigInt Extenders up to 300 meters – cell phones, burner phones, vehicles, smart wearables and more can be unobtrusively tracked.

    Stingray Tracking Technology

    In addition to the PBIC Stingray technologies being able to track phones, the PBIC Stingray has the ability to track more wireless devices and machines.

     

    By placing the PBIC Stingray in various locations, such as along roads, it can track phones in the vehicles, GPS modules, e-calling systems and the vehicles themselves in real time.

    As also described on the IMSI Catcher page on which the PBIC Stingray is based, no calls are intercepted. Wireless devices such as cell phones, smartphones and vehicles are only detected or tracked. The technology is available within the spectrums: GSM – EDGE – 4G LTE – 5G-Ready – BLE – WIFI. For more information contact us.

    PBIC Stingray's: IMSI Phone Tracking Technology
    IMSI + Phone Tracking by Stingray's PBIC

    Affordable Stingray Phone Tracking

    X-Surveillance aims to provide the best possible IMSI + Phone Detection + Tracking technology at the most affordable price. This makes it possible for any Law Enforcement, Public Security, Public Safety, Search & Rescue organization to keep communities safer.

     

    Would you like to know more about the IMSI + Phone Tracking technology of the PBIC Stingray solution?

    Contact us for More Information and Live Demonstration.

    IMSI Catcher

    IMSI Catcher of X-Surveillance

    IMSI Catcher / Collector

    The X-Surveillance IMSI Catcher operates as the name suggests, it ‘catches’ or collects IMSI addresses of wireless devices. Compared to other IMSI Catcher solutions, the X-Surveillance IMSI Catcher has been developed in such a way that the Privacy-By-Design only collects the IMSI. It does not intercept conversations.

     

    X-Surveillance provides its IMSI Catching capabilities within the following spectrums: 5G-ReadyNative 4G LTENative GSM.

    IMSI Catcher / Collector
    Privacy By Design IMSI Catcher

    Privacy-By-Design IMSI Catcher

    X-Surveillance IMSI technology does not intercept conversations or data, it is more privacy-friendly than other techniques.

     

    The reason why X-Surveillances IMSI technology does not intercept conversations or data is because, in our view, lawless persons still communicate encrypted or work with a VPN connection. In short, only the local population is affected by privacy-sensitive conversations being intercepted.

     

    For that reason, the IMSI Catcher of X-Surveillance only catches or collects IMSIs and IMEIs.

    Advantages IMSI Catching / Collection

    There are many reasons why IMSI Catching / Collecting is a good technique for Law Enforcement, among others. Think of use cases where the technology is used in research projects involving human trafficking, criminal activities, espionage, breaking the law, and so on.

     

    The X-Surveillance IMSI Catcher can of course also be used more widely, such as personal protection, disaster response, search & rescue, and so on.

     

    Does your organization work within the Safety / Security sector, please contact the IMSI Catcher deployment options.

    IMSI Catching + Collection

    IMSI Catcher Deployments

    The X-Surveillance IMSI Catcher is available in the following formats:

     

    – Portable: A portable or mobile trolley that can operate within one or more bands and even within different spectrums at the same time. With a large power bank, it can detect wireless devices within a range of 5 to 200 meters for 4 to 6 hours.

    – Tactical: A portable backpack that can operate within one or more bands at the same time. With a medium-sized power bank, it can detect wireless devices within a range of 5 to 100 meters for up to 4 hours.

    – Plug & Play: A very affordable solution that can be integrated quickly and can be placed at any location, both indoors and outdoors. For detecting wireless devices, vehicles, GPS trackers, and more.

     

    Would you like to know more about the different deployments and the costs? Contact us without obligation.

    4G LTE ECall IMSI Catcher

    4G LTE ECall IMSI Catcher

    4G ECall IMSI Catcher

    Because all new cars from now on will only use 4G LTE, it will be more difficult for the Law Enforcement, Public Safety and Security Companies to detect and identify these vehicles. Not to mention existing vehicles that only support LTE. We advise these organizations to look at alternatives as soon as possible and to invest in new technology as soon as possible before it is too late.

     

    The passive and close proximity PBIC 4G LTE IMSI Catcher / Detector has been developed to detect and identify all types of mobile devices within the 4G LTE spectrum including the ECall and Infotainment systems of vehicles.

    4G LTE ECall IMSI Catcher
    5G + 4G LTE ECall IMSI Catcher

    4G ECall IMSI Catcher / Detector

    If you need to detect, identify, verify and validate 4G LTE smartphones, 4G LTE GPS Trackers, 4G LTE Infotainment and 4G LTE ECall systems within a vehicle within seconds, the PBIC ECall IMSI Catcher is the solution.

     

    Because the 4G ECall IMSI Catcher only detects and does not intercept any data, it is a passive solution, which means that it can also be seen as a 4G ECall IMSI Catcher / Detector.

    4G + 5G ECall IMSI Catcher

    The 4G + 5G ECall IMSI Catcher is available as a fixed and portable unit. It is possible to detect 4G and 5G (ready) ECall and Infotainment systems and smartphones within vehicles.

     

    The 4G + 5G ECall IMSI Catcher is passive which means it only collects the IMSI and TMSI of a vehicle. Optionally, it is also possible to receive the IMEI, but that is only on request.

    5G + 4G LTE ECall IMSI Catcher / Detector
    4G LTE ECall IMSI Catcher / Detector

    ECall IMSI Catcher / Detector

    The ECall IMSI Catcher is very reasonably priced. Pricing depends on the speed of detection. There are several affordable demo kits available, a model that detects within 3 minutes and even a model that detects within 15 seconds.

     

    If you would like to know more about the pricing of the 4G LTE ECall IMSI Catcher / Detector and the associated demo kits, please feel free to contact us.

    IMSI Catcher / Detector

    PBIC Passive 4G LTE + 5G IMSI Catcher / Detector

    Passive IMSI Catcher / Detector

    X-Surveillance has developed a passive 4G + 5G IMSI Catcher with the objective of providing a more privacy-friendly IMSI Catcher. Actually, the IMSI Catcher can be considered as an IMSI Detector.

     

    Thus, the passive 4G LTE and 5G IMSI Catcher PBIC can be seen as a passive IMSI Detector as it only detects the IMSI, TMSI or IMEI. The PBIC broadcasts a signal to all 4G and 5G devices with a specific command to which these 4G and 5G devices respond. The 4G and 5G devices in the target area when they respond to the PBIC IMSI Catcher – Detector share only their IMSI, TMSI or IMEI identifiers.

     

    At X-Surveillance – passive means it does not intercept any conversations (calls – messages) or other privacy-sensitive communicative data. It only catches / detects the IMSI, TMSI, IMEI and other device related attributes.

    PBIC Passive 4G LTE + 5G IMSI Catcher / Detector
    PBIC Passive 4G LTE + 5G IMSI Catcher / Detector

    IMSI Catcher Detector Operations

    In general, 4G LTE and 5G devices only share the IMSI (International Mobile Subscriber Identity) and TMSI (Temporary Mobile Subscriber Identity), but in some cases a device may also share the IMEI (International Mobile Equipment Identity). In general, it concerns the IMSI and TMSI.

     

    The passive 4G LTE and 5G IMSI Catcher (Detector) PBIC have been developed in such a way that they function in close proximity with a distance of 1 meter to 50 meters, precisely with the concept that the targeted device can be searched specifically.

     

    PBIC – IMSI Catcher Detector

    During the development of the PBIC IMSI Catcher / Detector, Privacy-By-Default was central. As a result, a ‘passive IMSI Catcher / Detector’ was chosen, which means that no privacy-sensitive data is intercepted. Only the wireless device / cellular device related attributes and identifiers such as the IMSI, IMEI, TMSI, MCC, MNC, RSSI, etc.

    This enables the X-Surveillance PBIC to detect and identify 4G LTE + 5G-Ready phones. Interested to know more, contact us.

    4G + 5G IMSI Catcher Detector

    The PBIC GSM, 4G LTE and 5G IMSI Catcher Detector has been developed in such a way that it has as little negative impact on the privacy of those detected as possible. That is why the technology has been developed in such a way that it can detect between 5 and 100 meters within Close Proximity.

     

    To receive as little “noise” as possible. At the same time, to track down, identify, verify or correlate suspects as specifically as possible, we advise our users to operate as Close Proximity as possible.

    Close Proximity application is available for both GSM IMSI Catcher, 4G LTE IMSI Catcher and 5G IMSI Catcher.

     

     

    Please feel free to contact us for more information.

    PBIC Passive 4G LTE + 5G IMSI Catcher / Detector

    IMSI Stingray Device

    IMSI Catching – Non-Intercepting Full Spectrum Stingray Device

    Stingray Device for IMSI Catching

    Based on the IMSI Catcher technology of PBIC we present a Small + Low Cost Stingray Device that is integrable within existing covert surveillance equipment.

    The PBIC Stingray Device has been developed for covert and discrete (invisible) intelligence collection within the radio frequency spectrum.

    As an additional intelligence gathering and security solution, the technology is complementary to covert equipment. Covert equipment such as: surveillance cameras, license plate recognition, face recognition, and so on. By obtaining the IMSI, an extra intelligence layer is added.

    Intelligence Gathering

    Designed for a more Secure World

    The world is changing, it is becoming increasingly difficult to deploy traditional operatives without being recognised. They can’t operate anymore without someone taking a photo or sharing their thoughts on social media.

    For tactical intelligence it is necessary to obtain as much relevant and factual data as possible.

    For example, the PBIC Stingray Device provides operators with the ability to receive alerts when targeted IMSIs are detected. Or retrieve IMSI addresses of specific suspects, or create correlations from obtained IMSI addresses, and much more.

    Stingray Device

    Collecting IMSI of Wireless Devices

    We understand that obtaining real-time factual intelligence can be vital. Obtaining multi-spectrum intelligence plays a major role in this.

    This is why the PBIC Stingray Device has the ability to scan per spectrum or all spectrums simultaneously and detect wireless devices within these spectrums in real time.

    For example, you can choose to select a spectrum based on the location: GSM / EDGE / 4G LTE / 5G-Ready. Or simultaneous spectrum detection: GSM + EDGE + 4G LTE + 5G-Ready.

    IMSI Collection

    Real-time intel and evidence gathering.

    The real-time processing of the obtained IMSI – IMEI – MAC – and other attributes into comprehensible and visual intelligence is possible within the comprehensive Cell Phone Detection Dashboard which is included with the purchase of the PBIC Stingray Device.

    Within the smart (fact-data AI-based) dashboard, operators can gather intelligence from a distance without being visible. Completely anonymous and unobtrusive, operators can now gather intelligence within an operational range of 5 to 100 meters (with special PBIC SigInt boosters even up to 200 or 300 meters).

    Would you like to know more about the very affordable: PBIC Stingray Device with IMSI Catching capabilities and Comprehensive Dashboard. Contact us for more information.

    Technology beyond existing LTE IMSI Catchers. Introducing passive detection with PBIC.

    Next-Gen IMSI Detector Investigation Kit

    Affordable IMSI Detector Investigation Kit

    The X-Surveillance PBIC Investigation Kit allows the user to collect more evidence and intelligence accurately and rapidly.

     

    Developed in the Netherlands in collaboration with forensic, intelligence and investigative specialists.


    With the PBIC Investigation Kit, the operator can (remotely) detect, identify and verify the suspect within seconds. It also has the ability to identify and correlate suspects based on AI configurations.

    Intelligence, Forensics & Evidence Investigation Kit

    Always wanted to know who met the suspect at a rendezvous during an investigation. With real-time insight into the network of fellow suspects.

     

    Get the digital identity of a vehicle within a minute allowing your team to know exactly which vehicle belongs to the suspect and which vehicles belong to the fellow suspects.


    Trace the suspect’s whereabouts in under a minute. Know how many suspects are in a room, and much more.

    In short, with the PBIC Investigation Kit you can realize a comprehensive forensic report in no time.

    Collecting intelligence or forensic evidence

    The PBIC Investigation Kit can be widely deployed without technical knowledge. This includes criminal investigation, forensics, crime scene protection, technical support, and so on.

     

    The PBIC obtains this valuable information by detecting, analyzing, verifying, processing and correlating wireless fingerprints in the cellular spectrum.


    If you would like to know more about this solution, please contact one of our specialists.

    Next-Gen Investigation & Forensics

    Next-Gen Investigation Kit

    X-Surveillance introduces a Next-Gen Investigation Kit developed in collaboration with forensic, intelligence and investigation specialists.

     

    With the X-Surveillance Investigation Kit you can easily and quickly locate wireless and cellular devices. Its ultra-accurate and targeted detection allows operators to very accurately detect, identify and verify suspect smartphones, burner phones and other cellular devices.

    Intelligence, Forensics & Evidence Investigation Kit

    The X-Surveillance Investigation Kit can be widely deployed. This includes criminal investigation, forensics, crime scene protection, technical support, and so on.

     

    In short, the goal of this affordable and immediately operational solution is to collect intelligence using wireless and cellular IMSI Detection, Verification and Correlation technology.


    Collecting valuable insights such as: IMEI, IMSI, TMSI, GPS, etc. from the cellular spectrum with practically zero effect on the connectivity. Within a close proximity of 2.5 meters up to 100 meters.

    Collecting intelligence or forensic evidence

    The Investigation Kit can be widely used without technical knowledge.

     

    Whether the Investigation Kit is used to gather information during an investigation, verify the suspect’s presence, correlate the suspect’s contact person, or observe the suspect’s whereabouts.

    To learn more about Investigation Kit deployment options and applications, please contact us.

    SHARX & PBIC INTRODUCTION

    CONTACT US FOR A DEMONSTRATION

    Contact us for an extensive product and service demonstration.

     

    Interested to learn more about the PBIC (Advanced Analytics) Dashboard? Please contact us.

    Ethical 5G IMSI Catcher For Sale Regulations

    Ethical 5G IMSI Catcher

    The 5G IMSI Catcher is for sale in combination with the LTE and GSM processors to ensure overall close proximity spectrum detection.

     

    Because we apply strict ethical policies, the 5G IMSI Catcher is only for sale to government agencies for safety purposes or large enterprises for asset protection. One of our consultants will contact you prior to the sale.

    Fifth-Gen Cellular Detection

    We offer the fifth-generation cellular network protocol 5G IMSI Catcher for sale as an add-on, as part of the overall GSM and LTE set. Note: only available for Mil and LEA’s.

     

    The X-Surveillance 5G IMSI Catcher is a single or dual add-on. Which each can be configured user-friendly. The 5G IMSI Catcher is available in a modular kit and as a complete set.

    5G IMSI Catcher Availability

    – Modular kit: Cellular (GSM + LTE + 5G) processors where the user can link their own SDR + Amplifier. To determine the desired distance per use case.

     

    – Complete set: Cellular (GSM + LTE + 5G) processors where X-Surveillance offers the 5G IMSI Catcher for sale immediately deployable. As a user you can choose from close proximity or long range.

    5G IMSI Catcher Cellular Detection

    New: 5G IMSI Catcher

    X-Surveillance introduces the new 5G IMSI Catcher add-on to the existing LTE IMSI Catcher, enabling the user to catch the IMSI and IMEI of existing 5G ready smartphones. The X-Surveillance IMSI Catcher + 5G add-on detects next to the existing cellular smartphones, now also the fifth-generation cellular network smartphones.

     

    The 5G protocol uses increased security, nevertheless X-Surveillance with the 5G IMSI Catcher add-on is able to detect, track and trace 5G smartphones via a technical detour.

    Tactical IMSI Catcher 5G

    Due to its small size, fast deployment and close proximity detection, the 5G IMSI Catcher can be deployed tactically. As you would expect from X-Surveillance, it is designed for use within special operations.

     

    The 5G IMSI Catcher add-on always comes in conjunction with the LTE IMSI Catcher as it is a constantly updated software module within the existing X-Surveillance Catcher processor.

    By also detecting 5G smartphones, you can detect the entire cellular spectrum.

    5G IMSI Catcher Add-on

    The X-Surveillance IMSI Catcher + 5G add-on is designed to passively and more ethically detect 5G cellular smartphones. The solution is more privacy-friendly because no data interception or intrusion is used. It detects the 5G smartphone identities passively.

     

    An example of the displayed information in the dashboard:
    – Targeted and correlated data from IMSI’s / IMEI
    – Country of origin of the native telecom operator
    – Hosting telecom provider when roaming
    – Location coordinates of the detection

    Learn more about the availability. Or, contact us for more information of the 5G IMSI Catcher.

    Discover how we can help your organization with our exclusive X-Surveillance detection technologies.

    Contact Us Today









      Depending on the use cases, X-Surveillance technologies are designed to operate passively, privacy-compliant. No downgrading.
      Both the Native 4G LTE + Native 2G GSM + Wireless Spectrums Detectors come with a web-based Live and Forensics Dashboard.
      One operator can manage one or thousands of Detectors from the (managed / self-hosted) Advanced Dashboard.
      Little to no training required to operate the Wireless / Cellular Detectors on-site or remotely. Rapid deployment.
      The Detectors are Off-The-Shelf + Compatible with various SDR’s and Amplifiers and Antennas to increase the range and accuracy.
      The technology is based upon passive detection, meaning we can never fully guarantee speed or detection. Native operational detection.
      Note: Our services are only available for enterprises, law enforcement, intelligence and emergency services. We deliver only for ethical, security monitoring and pen testing purposes.

      Executive PBIC Cellular Detection

      Passive Baseband Identifier Collector

      Executive PBIC Cellular Intrusion Detection

      The Executive PBIC (Executive Passive Baseband Identifier Collector) is a broad cellular spectrum intrusion detection & security layer.

       

      Designed to passively perform a consistent, automatic and real-time calibration within the (cellular) wireless spectrum.

      Do you know what’s happening in your cellular spectrum?
      Exactly how many mobile devices are in use or have been left behind in (sensitive) business environments?

      Maximize your enterprise situational awareness with the advanced, scalable and efficient preventive cellular detection analytics technology: Executive PBIC.

      Real-time Cellular Detection

      Worried that you are not detecting all wireless devices? We even detect devices that are not connected to your Wi-Fi network.

      Every cellular device has a unique footprint. Everyone wears a cellular device these days and has it with them all the time. We detect this footprint.

       

      With our product, your security department can easily view real-time and forensic reports remotely. It remotely detects abandoned mobile devices, cellular eavesdropping devices or other unknown GSM and LTE devices.

      The Executive PBIC preemptive cellular detection technology can protect your organization. We know the negative effects of IP, Tech or Policy theft. In addition to considerable damage to your reputation, it also has an effect on your competitive position and long-term investments.

      Physical & Preemptive Security

      The Executive PBIC is a stand-alone technology that can be used in both large and small spaces. This can be done without the need to integrate software or middleware into your IT environment. You can detect both known and unknown, authorized or unauthorized cellular devices and geo-fenced white- or blacklist cellular devices.

       

      Using both machine learning and deep learning, the Executive PBIC gives you a real-time picture of your (segmented) business environments.

      Increase your operational security by consistently and automatically inspecting the cellular spectrum using preemptive cellular detection security analytics.

      Covert Executive Protection

      Preventive Executive Protection

      Preventive covert protection is aimed at preventing and reducing attacks and calamities for celebrities and executives traveling.

       

      The PBIC-VIP for the covert protection uses preventive security analytics by constantly detecting wireless footprints. Like everyone else, attackers also carry mobile devices and smartwatches.

      Every wireless device has a unique footprint. With the machine-learning and deep-learning PBIC technology, possible attackers and pursuers can be detected preventively.

      Executive Travel Protection

      The PBIC-VIP is a discrete technology that can be widely used during a trip. High profile celebrities and executives can become victims of an attack or kidnapping in high-risk situations.

       

      Surveillance and counter-surveillance can offer a solution, especially if these coverts are performed with invisible observation and correlation technique. Which can be hidden somewhere, which can be integrated somewhere or can be carried in a backpack.

      To learn more about the PBIC VIP for celebrity and executive protection, please contact us.

      Close Family & Executive Protection

      Close Executive Protection

      We have designed PBIC-VIP for a specific use case, where security officers carry the PBIC  during travel and around the house. Compact and completely discreet.

       

      Without any technical knowledge, every executive can be protected more preventively by close protection guards.

      With the PBIC-VIP, high risk and high profile celebrities, executives, individuals and families can be preventively protected. It provides an additional layer of protection based on wireless footprint preventive analytics.

      Close (UHNW) Family Protection

      We understand that close protection operatives should always have the best tools to best protect their clients such as ultra high net-worth families. From now on, preventive protection can be added to the security tools.

       

      Everyone wears mobile devices and smartwatches. Also the attackers, and every wireless device has a unique footprint. With the machine-learning and deep-learning PBIC technology, possible attackers, pursuers, blackmailers or kidnappers can be detected preventively.

      If you want to know more about how the PBIC-VIP can protect your high risk and high profile family and executive clients, please contact us.

      Preventive Armored Vehicles Protection

      Armored Vehicles Protection

      During missions you want to know if you are being pursued. A pursuer can follow your client in an armored vehicle via the same or different routes, possibly with different vehicles each time. We have developed a Special Vehicle Protection (PBIC-SVP version) especially for this use case.

       

      Preventively protect your (traveling in armored vehicles) VIP client by using real-time analytics. The unique mil-grade technology PBIC is now discreetly integrable within all types of special protection vehicles and high security armored vehicles.

      Special VIP Vehicles Protection

      By constantly scanning around the vehicle for wireless footprints, security guards gain real-time insight into the potential threat. This makes your VIP security and protection smarter.

       

      Everything is becoming more digital, including your attackers. They also wear mobile devices and smart watches. Every wireless device has a unique identifier. This way we can detect whether you are being chased or if you end up in a trap. This makes the PBIC an extra layer of unique preventive vehicle protection.

      Learn more about the PBIC-SVP (Special Vehicle Protection), and how it can protect you clients preventively with the wireless footprint & security analytics.

      Stingray Device : PBIC

      Stingray Device: PBIC

      Stingray Device: PBIC

      The Stingray Device: PBIC (Proximity + Portable + Plug & Play – Baseband Identifier Collector) is a multi-purpose IMSI Catcher Stingray Device that enables operators to easily detect mobile devices within all Cellular + Wireless Spectrums.

       

      Next to its operational range from 5 meters up to 100 meters, the Stingray Device PBIC main ability is the user-friendliness.

      For example, on-site operators or integrators can place the Stingray Device PBIC at a location without any technical knowledge. In a Portable trolley, backpack or Plug & Play integrated in an existing electrical box.

      Proximity + Portable + Plug & Play Stingray Device

      Remote Controllable Stingray Device

      X-Surveillance offers a Managed Service to remotely configure the Stingray Devices. Of course, remote operators who have been trained by X-Surveillance can also easily configure the PBICs from a distance.

       

      By following the simple installation steps exactly, a PBIC can be installed and configured within 30 minutes.

      The PBICs are equipped with smart fully-automatic configuration and semi-automatic calibration capabilities to detect close proximity or long-range mobile devices within minutes within any spectrum.

      Stingray Device - Multi-Spectrum

      To detect as many mobile devices as possible, it is possible to detect 5G-Ready, 4G LTE, GSM, Bluetooth and WiFi devices with the PBIC as a Stingray Device.

       

      While the PBIC detects mobile devices within one or more cellular spectrums, its wireless capabilities also detect Bluetooth and WiFi simultaneously. This allows us to maximize the detection possibilities.

      Thanks to smart technology, largely private and public MAC addresses of BLE and WIFI are detected. By combining this with IMSI, a fixed Collective ID is generated, which provides end users with increased situational awareness.

      Multi Spectrum Stringray Device
      PBIC Stingray Dashboard

      Remote Controllable Stingray Device

      One or hundreds of stingray devices can be managed and monitored simultaneously from one remote PBIC Cell Phone Detection Dashboard. All IMSI detections can easily be viewed at a glance, the IMSI detections are displayed as “Detection IDs”.

       

      Within each Detection IDs page, a lot of valuable information is loaded, such as the IMSI, IMEI, MCC, MNC, Device Data, Detection Data and so on.

      By linking hundreds of stingray devices, it is possible to discover Patterns of Life, and even recognize when they deviate.

      Let one of our representatives contact you for all possibilities of the Stingray Device with PBIC Dashboard. Click here to request a callback appointment.

      Portable Anti-Tracker Phone Detector

      FORENSIC & ANTI-TRACKING PHONE DETECTOR

      Protect your staff and investigation.

       

      We understand that you constantly want to know if antagonists are tracking your staff by placing mobile devices and trackers in and under their vehicle.

      By simply analyzing the vehicle by using the DoT Forensic Phone Detector.

      LTE + GSM + WI-FI PHONE TRACKING DETECTION

      The stand-alone DoT Portable Forensic Phone Detector can work:

      • Autonomous where all information is stored locally.
      • Connected to an on-premise host, using an encrypted connection.
      • Independent of external power through a built-in power bank.

       

      Download the Portable Forensics & Anti-Tracking Phone Detector brochure.

      Portable Forensic Phone Detector

      PBIC FORENSIC & EVIDENCE PHONE DETECTOR

      We understand that you want to know if suspects’ mobile devices have been left behind. And even to learn that the suspects mobile devices are unconsciously connected to IoT systems within the vehicle.

       

      Without having to disassemble a vehicle. Simply analyze the vehicle by using the PBIC Forensic Phone Detector.


      The stand-alone DoT Portable Forensic Phone Detector can work:

      • Autonomous (portable) locally stored dashboard.
      • Connected to an on-premise host, encrypted data storage.
      • Built-in power bank: independent of external power supplies.

      Beyond camera technology: Wireless Detection Security

      Beyond camera technology

      For security guards to constantly keep an eye on cameras is a very labor intensive process.

       

      Forced entry initiates an alarm, assisting the security personnel to rapidly check the camera and act instantly.

       

      What if a proactive notification could be sent to the security officers, where they can see if an authorized or unauthorized person is entering the restricted space?

      Wireless detection & security

      Compared to security cameras, the Executive PBIC security technology is very sustainable. With minimal data consumption (only 1 MB of detection data compared to 1,000 GB camera images), it can be deployed anywhere.

      In addition to being a more sustainable security solution, with lower power and data consumption than more traditional options, we are also not limited by:

      • Line of sight (blindspots)
      • Weather
      • Face protections (masks, scarfs, etc.)
      • Time of the day (light and dark)

       

      Due to its Plug & Play simplicity, this wireless security solution is easy to integrate and quickly operational.

       

      Contact us for more information / Order Demo Kit.

      Unoccupied / Vacant Property Security

      Securing unoccupied spaces

      During the Covid-19 period we learned to work more from home. Statistics indicate that this trend will continue, with fewer employees returning to the office full-time.

       

      Which means more floors and spaces are unoccupied.

       

      Security officers know that access cards and biometrics are a security layer. Colleagues trust each other, so tailgating and accidentally granting access to spaces is still possible.

      Wireless spectrum detection

      The X-Sensors technology is the ultimate unoccupied and vacant property security solution. Detecting authorized or unauthorized persons by scanning the wireless spectrum.

       

      Everyone has a wireless device with them these days. These devices transmit signals into the spectrum. By scanning in this invisible spectrum we generate more valuable data for the security staff.

       

      This allows the security staff to make better decisions, without having to deal with more work and tasks.

      Vacant property security

      For security specialists who (remotely) protect vacant properties, the X-Sensors technology is an excellent addition.

       

      They don’t have to constantly look at the monitors. With the X-Sensors technology, they proactively receive a notification when an unauthorized person enters a vacant space.

      Gain more situational awareness by detecting unauthorized visitors and intruders by scanning the wireless spectrum.

      Where security camera’s are designed for visual security. The X-Sensors technology is an invisible security.
      As an additional layer, you increase the security of your organisation.

      Request Quotation / Information :











        Depending on the customer’s requirement, this X-Sensors technology GDPR (world’s strictest privacy regulation) compliant.
        The X-Sensors technology comes standard with a web-based Live Tracking and Forensics GDPR-Compliant Dashboard.
        Using the cell phone detection X-Sensors technology – your security staff gains more situational awareness, instantly.
        One operator can manage thousands of sensors (with various spectrum detectors) with just one dashboard. Very user-friendly.
        An additional layer of security. Detecting unauthorized individuals accessing restricted spaces using wireless cell phone detection tech.
        Disruptive technology. Detecting cell phones (individuals) without downgrading. Cellular detection: GSM – LTE – WiFi.
        Customer’s engineers can experiment and customize the code upon customer’s request. Freedom to experiment and change the code.

        Cell Phone Detection

        Cell Phone Detection

        Cell Phone Detection Dashboard

        The Cell Phone Detection Dashboard provides its users with more real-time situational awareness and factual digital forensics.

         

        This is a comprehensive dashboard that integrates dozens of tools to remotely detect, identify, verify and track cell phones. With the ability for operators to receive real-time preventive and proactive security results.

        PBIC Cell Phone Detection
        Smart Cell Phone Detection

        Smart Cell Phone Detection

        The comprehensive dashboard uses AI (Artificial Intelligence) to receive valuable real-time intelligence autonomously, automatically and semi-automatically – completely dependent on the customer’s settings.

         

        The following technologies are integrated:
        – Autonomous cell phone detection correlations
        – Automatic smart pattern recognition
        – Automatic custom risk classifications
        – Live tracking of detected cell phones
        – Forensic tracing of detected cell phones
        – Black & Whitelisting of detected cell phones
        – And much more.

         

        Contact us to learn about all Cell Phone Detection capabilities that the dashboard has to offer.

        Cell Phone Detection Deployment

        We understand that your officers are great at keeping our society safe, so we developed the PBIC > IMSI Catcher and  Stingray Device to be configured semi-automatically.

         

        The Plug & Play version is operational on location within a few minutes. Remotely, operators can optimize configurations and monitor and manage the cell phone detection dashboard.

        Without any technical knowledge, cell phones can be detected within the full wireless spectrum.

        Cell Phone Detection Dashboard - Remote Deployment Techniques
        Cell Phone Detection Dashboard Intelligence

        Connected "Detection" Intelligence

        The smart Cell Phone Detection Dashboard can autonomously connect detected cell phones. This makes it possible to identify which “IMSI” belongs to which “IMEI”, and which “IMSI + IMEI” belongs to BLE MAC, and also which “IMSI + IMEI + BLE MAC” belongs to which WIFI MAC. In short, operators get a complete picture of which spectrum identifiers belong to one device.

         

        Because nowadays everyone carries several mobile devices with them, such as a Smartphone, Cell Phone, Headset, Smartwatch or other Smart wearables. A connection is automatically established between all these detected devices.

        Collective Intelligence @ Dashboard

        When multiple PBIC IMSI Catchers or Stingray Devices are deployed, all data can be combined into one collective intelligence.

         

        This makes it possible to identify which “vehicles” with their GPS modules, infotainment and e-call systems belong to which cell phones, smartphones and so on.

        This allows operators to even recognize patterns that were previously unknown. Would you like to know more about X-Surveillance’s smart Cell Phone Detection Dashboard? Please feel free to contact us for an extensive demonstration.

        Cell Phone Detection Dashboard Operations

        Faraday Bags Re-Designed. Introducing the Spectrum Blocker.
        With the Spectrum Blocker you are instantly protected against wireless eavesdropping and wireless surveillance.

        PURCHASE YOUR SPECTRUM BLOCKER DEMO SET











          You will receive an invoice by mail within 48 hours, please check your spambox. By purchasing the X-Catcher you agree with the Terms & Conditions.

          Anti Phone Detection Protection. The Spectrum Blocker is a re-designed faraday technology purse, increasing the protection many fold.
          We know what is possible with Phone Detection + Interception. Within seconds a physical conversation can be eavesdropped.
          Once hackers entered your phone, tablet or laptop they can easily eavesdrop every physical conversation.
          Eavesdropping physical conversations can result in long-term strategic, financial and operational damages. Resulting in millions of damages.
          Don’t let cyber criminals and criminal funded hackers eavesdrop on your conversations. You know what is possible. Be better protected.

          Anti Surveillance : Phone & Meeting Room Protection

          Eavesdropping & Wireless Surveillance Protection

          You require military-grade protection against eavesdropping? The small, low-priced, and portable Spectrum Blocker is the solution.

           

          Now a days, eavesdropping one conversation can result in millions of financial, operational or long-term strategic damage. While every physical conversation can be protected, easily.

          Mobile Encrypted Data
          Mobile IoT Security

          Redesigning the Faraday Bag : Spectrum Blocker

          X-Surveillance has in collaboration with X-Systems re-designed existing faraday bags into a high quality Phone Protector purse to protect users being eavesdropped in the wireless radio spectrum.

           

          Thanks to its design and quality it blocks all radio signals. In addition to the “airplane mode” it is highly secure textile protector.

           

          Delivering True Security against Wireless Surveillance and Eavesdropping. Order your Spectrum Blocker Demo Set.

          Phone & Meeting Room Protection

          The Spectrum Blocker is available as Phone Protector + Meeting Room Protector. Order your Spectrum Blocker Demo Set.

           

          Phone Protector: Add your phone (in flight mode, to save battery) in the Phone Spectrum Blocker to ensure no one is listening to your physical conversations.

           

          Meeting Room Protector: Not only phones, also laptops and tablets have microphones integrated. To be wirelessly protected against eavesdropping, place those devices in the XL Spectrum Blocker.

          Terms & Conditions | Purchase X-Catcher

          PURCHASING

          When ordering a X-Catcher on the X-Surveillance website:

          • You will receive a purchase confirmation email
            • From one of our X-Surveillance team members within one up to two working day(s)
            • Including this purchase confirmation you will receive an invoice with a Customer ID and Purchase ID

           

          • You may be called to notify you about the sent invoice

           

          • Soon after the payment, a shipping label will be created
            • You will receive an email with a tracking link to review the shipping progress

           

          • Handling time is generally 3-5 business days
            • During which time the tracking information will indicate that the shipping label has been created
            • Once your order ships, the tracking information will update

           

          SERVICE

          • Every product sold by X-SURVEILLANCE is tested before it is sent to the client.
          • Every Development Kit and Portable & Tactical kit is custom configured for the client.
          • Within 5 working days the recipient, client, can return the product in the package delivered without opening the package.

           

          RETURNS

          • Due to the sensitive nature of our information security equipment, we can only accept returns for unopened, unused and unmarked goods for 5 working days from the date of receipt.
          • Our clients security and anonymity is one of our highest concerns, so we take the integrity of our supply chain seriously. To that effect, X-Surveillance products are never refurbished or resold.
          • If a product is defective at first arrival, a warranty claim must be opened. We will investigate the logs if the product has been used as part of the warranty process.
          • All returned products will be destroyed in accordance with our data integrity policy to ensure that authenticity and security of X-Surveillance products are maintained.
          • To return an item to the X-Surveillance product destruction and recycling center, you must first contact us to request a Return Merchandise Authorization number. Only returns with a valid RMA number will be accepted.
          • A 30% destruction and recycling fee will apply to all unopened returned products.

           

          RETURNS & REFUNDS

          Credit is initiated on the original source funds (PayPal, credit card) within 60 business days of the returned merchandise acceptance. It may take a full billing cycle to appear on your statement. Returned products may be subject to a 30% packaging destruction, recycling, handling and processing fee.

           

          • Packages are only refunded when unopened. It is unopened when the seal is and the seal is unbroken and the log files of the product are not showing any use.
          • Shipping and handling charges are non-refundable.
          • International orders are subject to customs and import duties in your country and are non-refundable.
          • Packages and opened packages are non-refundable.
          • Packages and packages containing the used product are non-refundable.
          • Packages and packages containing the product tested, opened or otherwise are non-refundable.
          • Refusal of a package and packages returned on this basis will incur additional charges.
          • The refuser has to pay for returning the packages:
            • If you decline package acceptance, the package will be returned to X-Surveillance at our expense.
            • The carrier’s shipping charges for returned packages that are declined will be deducted from the total refund.
            • We will refund the buyer only for refused packages, less the dollar amount of the return.
          • It can take up to one full billing cycle for a refund to appear on your credit card company’s account.
          • Custom configured development kits and tactical kits are non-refundable in any situation.
          • To avoid (defective) Death on Arrivals, we test every product before it is shipped. We do not accept any defective devices once they are used.
          • Returns are accepted for unused goods within 5 working days of purchase.

           

          DISCLAIMER OF WARRANTIES; LIMITATION OF LIABILITY

          We do not guarantee, represent or warrant that your use of our service will be uninterrupted, timely, secure or error-free. We do not warrant that the results that may be obtained from the use of the service will be accurate or reliable.

          You agree that from time to time we may remove the service for indefinite periods of time or cancel the service at any time, without notice to you.

          You expressly agree that your use of, or inability to use, the service is at your sole risk. The service and all products and services delivered to you through the service are (except as expressly stated by us) provided ‘as is’ and ‘as available’ for your use, without any representation, warranties or conditions of any kind, either express or implied, including all implied warranties or conditions of merchantability, merchantable quality, fitness for a particular purpose, durability, title, and non-infringement.

          In no case shall X-Surveillance, our directors, officers, employees, affiliates, agents, contractors, interns, suppliers, service providers or licensors be liable for any injury, loss, claim, or any direct, indirect, incidental, punitive, special, or consequential damages of any kind, including, without limitation lost profits, lost revenue, lost savings, loss of data, replacement costs, or any similar damages, whether based in contract, tort (including negligence), strict liability or otherwise, arising from your use of any of the service or any products procured using the service, or for any other claim related in any way to your use of the service or any product, including, but not limited to, any errors or omissions in any content, or any loss or damage of any kind incurred as a result of the use of the service or any content (or product) posted, transmitted, or otherwise made available via the service, even if advised of their possibility. Because some states or jurisdictions do not allow the exclusion or the limitation of liability for consequential or incidental damages, in such states or jurisdictions, our liability shall be limited to the maximum extent permitted by law. Standard Terms & Conditions will comply at any situation.

           

          Thank you for your purchase. The X-CATCHER is designed as a Custom-Build-Your-Own 4G LTE or 2G GSM IMSI Catcher.
          To assist you in your developments, we provide more services.

          Additional X-Catcher Services










            67  −  59  =  


            Once you already have an SDR (Software Defined Radio) for operational use. You do not require to purchase a SDR. An additional SDR can be purchased for an additional 1.000 Euros.
            To increase the range of detection of the X-CATCHER (4G + 2G) IMSI Catcher you might need an amplifier. If you already have an amplifier, you do not have to purchase an extra amplifier.
            Upon request we may send you a list of advised omnidirectional and directional antennas, or assist you in (reimbursed) researching for the best matching antennas.
            For the use of the Development Kit, we advise using Nuand as SDR and Amplifier provider. It is compatible with own developments with other SDR and Amplifier providers.
            Product assistance: Training and Custom co-developments are additional services. Each purchase comes with a fixed € 500,00 start-up costs.
            Customer’s engineers can experiment and customize the code upon customer’s request. Freedom to experiment and change the code.
            Note: The LTE Cellular Interceptor / IMSICatchers are only available for enterprises, law enforcement, intelligence and emergency services. We sell only for ethical, security monitoring and pen testing purposes.

            The X-CATCHER is designed as a Custom-Build-Your-Own 4G LTE or 2G GSM IMSI Catcher.
            Making it easy for any engineer to setup their own environment using the X-Catcher Development Kit.

            Purchase the Out of the Box – pre-configured, custom setup – 4G LTE or 2G GSM IMSI Catcher Processor.

            Purchase 4G LTE / 2G GSM IMSI Catcher











              You will receive an invoice by mail within 48 hours, please check your spambox. By purchasing the X-Catcher you agree with the Terms & Conditions.

              The X-Catcher LTE is the first (affordable) Native 4G LTE IMSI Catcher small-sized Portable Software Kit. Instant detection + No downgrading.
              Both the Native 4G LTE + Native 2G GSM IMSI Catcher comes standard with a web-based Live Tracking and Forensics Dashboard.
              One operator can manage thousands of Native 4G LTE and/or Native 2G GSM IMSI Catchers from the Advanced Dashboard.
              Customer’s engineers can develop beyond IMSI Catching after purchasing the Tactical Engineer Kit. Freedom to customize the code.
              The 4G + 2G X-CATCHER’s are a software-defined Lab Kit to, that requires additional SDR + Amplifier + Antennas, or can be purchased separately afterwards. Customizable to the needs and deployment.
              The X-CATCHER’s are compatible with most SDR’s and Amplifiers and Antennas to increase the range and accuracy.
              Note: The LTE Cellular Interceptor / IMSICatchers are only available for enterprises, law enforcement, intelligence and emergency services. We sell only for ethical, security monitoring and pen testing purposes.

              GSM & LTE Portable Tactical IMSI Catcher

              Tactical IMSI Catcher vs PBIC

              Looking for a portable and tactical IMSI Catcher? You may need one to increase your situational awareness in the cellular wireless spectrum.

               

              An IMSI Catcher is not always necessary in tactical situations. For example, if you want real-time and on-the-move threat detection then the PBIC is a good alternative.

               

              The portable and tactical PBIC is ideally suited for body-worn or concealed applications.

              Tactical IMSI Catcher?

              We understand that during a tactical mission you want a portable and compact alternative to a large sized multi spectrum GSM or LTE IMSI Catcher. The PBIC Tactical is the solution.

               

              With the PBIC, your specialists have a major tactical advantage.

              Thanks to its low weight, small size and ability to be deployed on-the-move and in-the-air, the PBIC is the tactical solution within the cellular and wireless domain.

              Portable IMSI Catcher?

              During active operations you want to know immediately, within seconds, how many suspects are present. Preferably Plug and Play. Current (interception techniques) such as IMSI Catchers and Stingrays are not handy and far too cumbersome.

               

              The PBIC is designed to integrate invisibly within vehicles, to be worn discreetly inside a backpack, or placed inconspicuously anywhere else.

              If you would like to know more about the portable PBIC Tactical version, please contact us.

              4G LTE Cell-site simulators (SDR / Catcher)

              X-Systems Encrypted Smartphone Security

              4G LTE Emergency Cell-Site Simulator

              Purchase your 4G LTE Cell-site simulator only € 1.200,-.

              + GSM Cell-site simulator (€ 1.100,-) = total € 2.300,-.

               

              4G LTE Cell-site simulator can be deployed as:

               

              1) Cell-site simulator as Basestation for emergency communications.

               

              1 A) an Emergency BaseStation whereby UE’s (User Equipment) with a dedicated sim-card make use of their own local, stand-alone 4G network. Depending on the requirements it is wise to choose 4G or 2G.

              1 B) When transferring fast and large data sets we advise LTE.
              When long range in hillside environments small data sets are transferred we advise GSM.

              Mobile Encrypted Data
              Mobile IoT Security

              4G LTE Catcher Cell-Site Simulator

              4G LTE Cell-site simulator can be deployed as:

               

              2) Cell-site simulator as IMSI Catcher for ethical pen-testing & perimeter security.

               

              2 A) an IMSI Catcher whereby UE’s are silently detected, natively on the 4G LTE spectrum without being downgraded.

              2 B) optionally the GSM UE’s can be detected using the GSM IMSI Catcher.

               

              Note: both solutions may only be deployed in own environments (perimeters).

              LTE + GSM Cell Site Simulators

              The range of the 4G LTE + 5G Cellular Interceptor / Catcher may be very close to 1 meter up to 200 meters. Depending on the antennas, amplifier and SDR selected. The service is continuously yearly updated, once or multiple times a year.

               

              Customer’s engineers can customize the software to the needs: 1) Basestation or 2) Catcher.

               

              Note: The LTE + GSM Cell Site Simulators are only available for enterprises, law enforcement, intelligence and emergency services. We sell only for ethical, security, safety and pen testing purposes.

              X SYSTEMS Mobile Security

              4G LTE IMSI Catcher / Interceptor

              X-Systems Encrypted Smartphone Security

              4G LTE Catcher + Interceptor

              Note: This is a “Build Your Own” Interceptor. The technology allows interception, yet we do not provide this technique out of the box. Purchase the freedom to operate Tactical 2G+4G Engineer Kit to investigate the possibilities.

               

              4G LTE protocol IMSI Catcher & Interceptor a.k.a. Stingray is a NATIVE LTE 4G IMSI CATCHER, it does not downgrade to GSM, the detected user equipment stays on the 4G spectrum. Detect UE’s without being noticed, as the UE keeps operating on the 4G bands.

               

              Note: The LTE Cellular Interceptor / IMSICatchers are only available for enterprises, law enforcement, intelligence and emergency services. We sell only for ethical, security monitoring and pen testing purposes.

              Mobile Encrypted Data
              Mobile IoT Security

              LTE and/or GSM INTERCEPTION

              One X-CATCHER software in a single PC will be shipped that operates as a Stingray / Hailstorm whereby mobile devices can be detected. In the software customer’s engineers can change the software from a IMSI Catcher (Detector) to an Interceptor, in an ethical pen-testing environment.

               

              The two apparatus both have their own unique operations:

              LTE = detecting cellular devices on the natively 4G LTE spectrum.

              GSM = detecting cellular devices (downgraded) on the GSM spectrum.

              4G CATCHER + INTERCEPTOR

              4G LTE Cellular Interceptor & IMSI-Catcher a.k.a. Stingray / Hailstorm:

               

              4G LTE IMSI Catcher a.k.a. Stingray:

              – (TMSI) Temporary Mobile Subscriber Identity, randomly-generated temporary identifier

              – (IMSI) International Mobile Subscriber Identity, related to the native telecom provider

              – Country of origin of the telecom provider (phone)

              – Native telecom provider and hosting telecom provider when roaming

              X SYSTEMS Mobile Security
              Mobile IoT Security

              GSM + LTE INTERCEPTOR

              LTE + GSM Interceptor a.k.a. Hailstorm:

              – Engineers of the customer can experiment (in an ethical way) how to intercept both native LTE + native + downgraded GSM cellular and over the top data.

              Note: The GSM protocol has many more flaws than the LTE protocol allowing the operator more easily intercept UE’s (smartphones / IoT) on the GSM protocol. However, in some cases you may not want to downgrade UE’s as they may be noticed or the UE’s only allow 4G connections. Which is why we provide for ethical pen testing both the GSM + LTE Catcher / Interceptor.

               

              Order your Tactical 2G+4G Engineer Kit to investigate the technical possibilities of X-CATCHER > Today.

              2G GSM IMSI Catcher

              GSM IMSI CATCHER vs PBIC

              Looking for a more passive, less active, 2G IMSI Catcher technology, without intercepting communications?

               

              The PBIC is an innovative passive mobile phone detection technology that can be used for observation, safety or security. It gives your teams more situational awareness ahead of a planned action.

              The PBIC is a more society-friendly detection solution, instead of the existing 2G GSM IMSI Catcher mass intercept systems. The PBIC has a particular advantage in that it is compact and can be used during tactical and protection tasks.

              NATIVE 2G IMSI CATCHER?

              Since the PBIC does not intercept communications, unlike a 2G GSM IMSI Catcher, it only shows the IMSI and IMEI of the suspected mobile devices. In most cases this is more than enough and is less invasive.

               

              Whether you need to undertake observation, reconnaissance or detention tasks, teams equipped with the PBIC are empowered to make better decisions by providing them with vital data in real-time.

              Know exactly how many mobile devices are in a home or present at a raid or unauthorized within a geo-fenced perimeter. This is possible with the targeted PBIC scanning techniques.

              PBIC vs GSM IMSI CATCHER

              As you would expect from an exclusive LTE or GSM IMSI Catcher, the PBIC also offers automatic frequency hopping capability. The PBIC is operational within different networks and always chooses the most suitable frequency.

               

              As a result, the PBIC GSM and LTE versions can be used operationally while the operator is on the move. It is even remotely operational with the use of a web-based Live Tracking and Forensics Dashboard, allowing the operators to remotely detect, monitor, pinpoint and track suspect devices.

              If you would like to know more about the PBIC GSM version, please contact us.

              4G LTE IMSI Catcher

              TMSI + IMSI CATCHER (4G LTE)

              During operations or missions, it is often not necessary to intercept communications.

               

              Detecting, tracing and tracking a suspect on location and on the move is sufficient in most cases. The low-cost, portable and small-sized PBIC 4G LTE IMSI Catcher has been developed precisely for these tasks.

              Due to its unique software architecture, it displays the detected TMSI and IMSI of a 4G LTE mobile device and smartphone within seconds in the (on-premises) dashboard and operators mobile app.

              Undercover with the 4G LTE IMSI Catcher SHARX
              Tactical Ops with the 4G LTE IMSI Catcher SHARX

              NATIVE 4G LTE IMSI CATCHER

              The PBIC LTE IMSI Catcher does not downgrade the connection to GSM, it operates natively within the LTE spectrum, without a network being actively influenced or without the communication being intercepted.

               

              The PBIC 4G LTE IMSI Catcher is designed to detect mobile devices especially in ultra close proximity (3 meters) or close proximity (50+ meters). Optionally, the distance can be increased, but that is not our value proposition.

              Both the portable, covert, flexible and the fixed 4G IMSI Catcher are compatible with the 5G IMSI Catcher, by adding an add-on, 4G and 5G smartphones can be detected simultaneously.

              Tactical 4G LTE IMSI CATCHER

              The PBIC is a true tactical IMSI Catcher that operates on 4G LTE (optionally expandable with GSM and Wi-Fi), it is portable and small in size, the PBIC can easily be tucked away in a backpack, briefcase or rugged case.

               

              Law Enforcement: Whether you want to know where a suspect is, whether he is present or with whom the suspect has an appointment. The PBIC gives your team better real-time situational awareness in any situation, anytime, anywhere.

              Special Operations: For lone operators or teams it is crucial to be able to carry out assignments safely. Thanks to its portable size, it can help during a RON (Rest Over Night) or be used to determine if you’re being tracked during missions.

              Law Enforcement with the 4G LTE IMSI Catcher SHARX
              Dashboard of the 4G LTE IMSI Catcher SHARX

              Extended SHARX Dashboard

              In addition to receiving real-time data, the PBIC IMSI Catcher can be configured remotely, forensic reports can be viewed and correlations can be made using machine learning. All this within a desktop, laptop and mobile friendly comprehensive (managed or self hosted) dashboard.

               

              An example of the displayed information in the dashboard:
              – Targeted and correlated data from TMSI’s + IMSI’s
              – Country of origin of the native telecom operator
              – Hosting telecom provider when roaming
              – Location coordinates of the detection

              The PBIC gives your team valuable invisible data that can save lives during law enforcement or military operations.

               

              Request more information about the PBIC 4G LTE IMSI CATCHER.

              Consular & Embassy Protection by Cellular Intrusion Detection

              SECURE BRIEFING - MEETING - BOARD ROOMS

              The low-priced X-CATCHER cellular intrusion detection system helps to secure a compound against criminals, activists, intruders and terrorists.

               

              By using its geo-fence settings in the dashboard and antennas the X-SURVEILLANCE X-SENSOR is a directional and highly accurate 4G LTE cellular detection sensor system. Set the antennas omnidirectional or directional (phase array).

              SAFE BRIEFING - MEETING - BOARD ROOMS

              The advantage of the X-SURVEILLANCE X-SENSOR is that it will not be detected by a smart phone or smart device, it detects and identifies LTE 4G smart devices semi-passively. Without downgrading. Detects and identifies any (secure) smartphone.

               

              The X-SURVEILLANCE X-SENSOR system detects smart phones and smart devices directional and accurately. Within the entire cellular spectrum: LTE, GSM, WiFi. Thanks to the concept of Deep Learning and AI (Artificial Intelligence) the X-SENSOR dashboard an operator can verify intruders or eavesdroppers in seconds.

              CELLULAR EAVESDROPPING DETECTION

              The advantage of the X-SURVEILLANCE X-SENSOR is that smart phones or smart devices are not alerted while being detected, the X-SENSOR sensor system detects and identifies LTE 4G smart devices semi-passive (discrete and unnoticed).

               

              Via a cellular, mostly LTE 4G or WiFi, connection conversations are overheard by competitors or activists.

               

              For this specific problem, X-SURVEILLANCE has designed the “X-SENSOR Intelligence & Evidence” which A) constantly monitors the room, B) is monitoring during a meeting.

              Safe Briefing, Meeting & Board Room Protection

              SECURE BRIEFING - MEETING - BOARD ROOMS

              The protection of briefing, meeting and board rooms where sensitive topics are discussed is critical.

               

              Securing a briefing, meeting- or boardroom by using wireless and cellular intrusion detection.

               

              By eavesdropping a C-Level meeting room an intruder gains instant access to valuable information such as financial results, long-term strategies, intellectual properties, cooperation agreements, and so on. Having a safe and secure meeting room should be the top priority, regardless of the size of the business.

              SAFE BRIEFING - MEETING - BOARD ROOMS

              Eavesdropping on conversations (and certainly business-sensitive conversations) can be a great risk for a company. It can rarely turn out to be crucial.

               

              Threats are becoming increasingly innovative and more difficult to trace. Small, possible remotely activated, bugs (covert listening devices) with a microphone can be placed within the office, under office tables, inside cable trays or inside ventilators.

              CELLULAR EAVESDROPPING DETECTION

              The advantage of the X-SURVEILLANCE X-SENSOR is that smart phones or smart devices are not alerted while being detected, the X-SENSOR sensor system detects and identifies LTE 4G smart devices semi-passive (discrete and unnoticed).

               

              Via a cellular, mostly LTE 4G or WiFi, connection conversations are overheard by competitors or activists.

               

              For this specific problem, X-SURVEILLANCE has designed the “X-SENSOR Intelligence & Evidence” which A) constantly monitors the room, B) is monitoring during a meeting.

              PBIC Cell Phone Detection Dashboard

              CELL PHONE DETECTION DASHBOARD

              The machine-learning and deep-learning PBIC dashboard is designed to detect both known and unknown, unauthorized or suspicious mobile devices.

               

              Using the Advanced Analytics tools within the (managed or self hosted) web-based PBIC dashboard, correlations can be performed while the data remains privacy-compliant.

              The dashboard shows the targeted detected (anonymous) 4G LTE or 2G GSM cell phones data real-time, anywhere in the world.

              USER-FRIENDLY DASHBOARD

              Both the control room and/or an operator in the field, equipped with the passive cell phone detection solution PBIC, always stay in the know by accessing the dashboard from any desktop computer, laptop, tablet or handheld in order to meet the requirements of any operational need.

               

              Receiving real-time cell phone detection data such as the IMSI + TMSI + Country of origin + Telecom Provider + Device data and more.

              Presented in the Role-Based Access Control user-friendly PBIC web-dashboard user interface.

              ADVANCED ANALYTICS DASHBOARD

              The dashboard can be extended with the Advanced Analytics Plugin, allowing the operators to receive more detailed information about detected phones or other communication devices.

               

              Advanced Analytics contains: Device Correlation, Device Pinpointing, Device Tracking, GPS Detection, Location Management, and many more.

              Interested to learn more about the PBIC (Advanced Analytics) Dashboard? Please contact us.

              SIGINT Cellular Intrusion Detection

              SIGINT + Authorized / Unauthorized Cellular Detection

              Signal Intelligence: The X-SURVEILLANCE X-SENSOR can be extended with a self-learning software module to automatically identify cellular signals (SIGINT) to whitelist or blacklist smart devices, smart phones, vehicles and persons.

               

              Operators can whitelist certain users and the self-learning software can automatically whitelist users. It can also blacklist suspects, and notify the operators when required.

              CELLULAR INTRUSION DETECTION

              By using the X-SURVEILLANCE X-SENSOR SIGINT toolkit it is possible to detect, to identify, to track and trace users, by using the self-learning software module. An excellent feature for border security and customs security. The border and customs workload decreases, the intelligence increases.

               

              By using the Border & Customs SIGINT toolkit, the travel time and waiting time will be reduced, resulting in a more pleasant working situation for border and customs operators. as well as for the visitors, truckers, and so on.

              Cellular Intrusion Detection

              Cellular Intrusion Protection

              X-SENSOR by X-SURVEILLANCE is a directional and highly accurate 4G LTE and WiFi cellular detection sensor system. The X-SENSOR is a scalable surveillance, evidence and intelligence system based upon a SDR (Software Defined Radio) toolkit to detect and identify 4G LTE smart devices.

               

              X-SURVEILLANCE Cellular Detection is a geo-fence detection and forensics tool that can identify, track and trace wireless devices throughout the cellular RF spectrum.

              INTRUSION DETECTION: 4G IMSI CATCHER

              The cellular intrusion detection sensor system detects standard 4G LTE smart devices using geo-fencing or directional detection techniques, and can be expanded with one or multiple tool kits to detect the entire RF spectrum:

               

              • 4G LTE cellular devices

              • 3G GPRS cellular devices

              • 2G GSM cellular devices

              • WiFi wireless devices

              • IoT wireless devices

              Perimeter Security Critical Infrastructure

              PERIMETER SECURITY: CELLULAR DETECTION

              Frequent false alarms are always an issue,- for perimeter security end-users who need to spend time investigating each alarm-, and are very costly due to a possible delay of necessary response time and generally affecting efficiency.

               

              X-SURVEILLANCE X-SENSOR Intelligence & Evidence detects unauthorised persons using their cellular / wireless devices carrying with them. X-SURVEILLANCE X-SENSOR Intelligence & Evidence detects unauthorised persons using their cellular / wireless devices carrying with them.

              PERIMETER SECURITY: 4G IMSI CATCHER

              Detection of cellular devices is very crucial for the safety and security policies of a critical infrastructure.

               

              Whether your organisation operates in one of these critical infrastructure sectors, the X-SURVEILLANCE X-SENSOR system is the cellular intrusion detection solution for perimeter security:

              • (Petro) Chemical industry sector

              • Oil refinery facilities sector

              • Critical manufacturing sector

              • Pharmaceutical sector

              • Defense industrial base sector

              • Emergency services sector

              • Government facilities sector

              • Healthcare and public health sector

              • Nuclear reactors, materials, and waste sector

              • Maritime & passenger and cargo port sector

              • Drink water system sector

              • Waste water system sector

              PERIMETER INTRUSION DETECTION

              By using its geo-fence settings in the dashboard and antennas the X-SURVEILLANCE X-SENSOR is a directional and highly accurate 4G LTE cellular and WiFi cellular detection sensor system. Set the perimeter and it detects every intruder by using its cellular device as well as indoor as outdoor.

               

              Remotely monitoring, scanning, detecting, identifying, locating, tracking and tracing cellular devices throughout the cellular RF spectrum in matters of seconds.

              Secure Area by Cellular & Wireless Intrusion Detection

              STORAGE SECURITY: PHARMACEUTICALS & MEDICINE

              Monitor unauthorised access to secured pharma R&D and medicine storage areas using Cellular Intrusion Detection.

               

              Unauthorised access and authorised access policies are critical for the operation of the company but despite all precautions, the intruders still succeed to bypass the current security measures.

              ACCESSING SECURED AREAS

              There are a few types of accessing unauthorised to secured areas, such as:

               

              Tailgating
              One or more persons follow, intentionally or unintentionally, an authorised employee through a door. Smart action allows intruders to easily gain access to a secure area.

               

              Forcing access
              Gaining unauthorised access to a secured room can be done by using “door propping”. This is mostly detected after some short of time, resulting in a low response time. Door props can permit unauthorised access and render electronic access control systems valueless.

               

              Keys & cards
              Security systems identify an unauthorised intruder as an employee and give access to a secured area. Whether the keys or cards are stolen, lost, forgotten or loaned out, the intruder has full access to a secured area.

               

              Biometric and facial recognition
              Researchers, executives and business reps of pharmaceutical companies might enter simultaneously a secured area, who of them took also a mobile device with them that may lead to IP theft? X-SENSOR solves more than a more secure access management.

              Wireless Cellular Detection, Track and Tracing

              WIRELESS CELLULAR DETECTION

              X-SENSOR is a remote operational surveillance solution detecting cellular and wireless mobile devices within matters of seconds. In combination with X-SENSOR Identity the toolset is complete, making it possible to identify mobile devices as well as indoor as outdoor.

               

              By using special developments we made it possible to identify both 4G LTE, 3G, 2G and WiFi devices with the possibility to store both temporary and permanent identities.

               

              This makes the X-SURVEILLANCE X-SENSOR system the only product able to detect, to locate and to identify cellular and wireless devices without other surveillance techniques. The system can operate as an addition or as a stand-alone deployable solution.

              X-SURVEILLANCE DoT VERSIONS

              • Detection & Localisation
              By using passive techniques. Detecting and localising wireless devices using accurately placed dots on a floor-plan map.

               

              • Detection & Localisation + Tracking
              By using passive techniques. Combining other surveillance techniques and a X-SENSOR mesh-network to keep tracking a suspect.

               

              • Detection & Localisation + Tracking + Tracing
              By using semi-passive techniques. Increasing the intel with the tracking and tracing of every wireless device.

              Compound Cellular & Wireless Intrusion Detection

              TACTICAL CELLULAR DETECTION

              For tactical purposes the X-SURVEILLANCE X-SENSOR can operate as a stand-alone deployed compound cellular intrusion detection. The X-SURVEILLANCE X-SENSOR C2 Receiver with Dashboard and Alarm system is integrated in a waterproof rugged case, enabling the operator to deploy, to operate and to control all semi-passive cellular detection sensors.

               

              The advantage of the X-SURVEILLANCE X-SENSOR is that it will not be detected by a smart phone or smart device, it detects and identifies LTE 4G smart devices semi-passive.

              COMPOUND INTRUSION DETECTION

              This tactical compound cellular intrusion detection sensor system is developed to easily detect smart phones and smart devices in any terrain. Used for easy detection, localisation and identification of an intruder, without warning the smart phone or smart device.

               

              This semi-passive cellular intrusion detection system helps to secure a compound against criminals, activists, intruders and terrorists. For humanitarian operations the X-SURVEILLANCE X-SENSOR can be deployed after an emergency or disaster looking for lost individuals nearby an affected compound using drones to scan a specific or large area.

              Perimeter Cellular Intrusion Sensors

              Cellular Intrusion Detection Sensors System.

              X-SURVEILLANCE Cellular Intrusion Detection is a directional, highly accurate and geo-fencing detection sensor system tool that can identify, track and trace wireless devices throughout the cellular RF spectrum. It monitors preset areas, scans for wireless devices, detects and identifies devices for evidence and intelligence.

               

              X-SURVEILLANCE introduces X-Sensor DoT. A neatly-meshed next-generation security, safety and surveillance (proactive and forensic) solution that can be used for Public Safety and Perimeter Security purposes.

              Cellular Intrusion Detection Public Safety

              – Identify unrecognisable suspects
              – Verify wirelessly a suspect’s identity
              – Passively track and trace suspects
              – Pinpoint suspect’s whereabouts
              – Correlating data of connected suspects
              – Correlating members of a criminal organisation
              – Enabling leaders to make better decisions
              – Increase safety using predictive correlation

              Perimeter Security

              – Better protect and secure compounds
              – Increasingly safeguarding valuable assets
              – Predict break-ins, thefts and assaults
              – Segment areas for targeted security
              – Improve personnel and visitor’s security
              – Better controlling (un)-authorised visitors
              – Expanding of access control systems

               

              X-Sensor DoT is a real-time disruptive proprietary plug & play system of sensors and an extended AI based operation center for privacy-compliant monitoring of entities (suspects) with their unique wireless footprint.

              About X-Surveillance

              X-Systems Encrypted Smartphone Security

              X-Surveillance Organisation

              Thanks to years of experience in mobile and IoT safety and security by the founders and management team of X-Surveillance. We understand there is a need of less equipment and more safety features to keep our lives safe and secure.

               

              X-Surveillance is founded in the Netherlands and is located at the The Hague Security Delta in The Hague, the Netherlands.

              Mobile Encrypted Data
              Mobile IoT Security

              X-Surveillance Services

              X-SURVEILLANCE provides high-tech tactical mobile and cellular related surveillance tools for surveillance, intelligence and forensics purposes to increase situational awareness.

               

              • Tactical Emergency Communication Solution
              Mobile Ad-Hoc Networking data, audio, video, location solution.

               

              • Tactical Cellular & Wireless Device Detection
              Perimeter and intruder detection with rapid access control.

              Product Warranty

              X-SURVEILLANCE WARRANTY POLICY

              X-SURVEILLANCE WARRANTS THAT THE PURCHASED PRODUCT IS AT THE TIME OF ITS ORIGINAL PURCHASE FREE OF DEFECTS IN DESIGN, MATERIAL AND WORKMANSHIP.

              YOU WILL FIND HEREIN/BELOW ALL X-SURVEILLANCE WARRANTY POLICY DETAILS OFFERED BY X-SURVEILLANCE. THIS WARRANTY IS GIVEN ONLY TO THE ORIGINAL PURCHASER OF THE PRODUCT.

              A PRODUCT THAT HAS BEEN SCRATCHED, DROPPED, ALTERATION, ATTACKED, INFRINGED, MISUSE OR ABUSED MAY NOT BE RETURNED UNDER ANY CIRCUMSTANCES. FOR ALL OTHER PRODUCTS; IF THE ITEM IS RETURNED IN THE ORIGINAL PACKAGING AND IN THE NEW UNTOUCHED STATUS WE WILL EXCHANGE INTO ANOTHER X-SURVEILLANCE PRODUCT. OF COURSE ALL COSTS OF RETURNING THE PRODUCT IS ON BEHALF OF THE RETURN SENDER.

              THIS WARRANTY POLICY IS AN ESSENTIAL PART OF THE TERMS & CONDITIONS OF X-SURVEILLANCE

              1. WARRANTY DEFINITION:

              X-SURVEILLANCE PROVIDES THIS WARRANTY TO BUYERS WHO PURCHASED THE X-SURVEILLANCE PRODUCT (PRODUCT) FROM X-SURVEILLANCE. X-SURVEILLANCE PRODUCTS ARE GUARANTEED AGAINST ALL MANUFACTURING OR MATERIAL DEFECTS (DEFECT) FOR THE WARRANTY PERIOD AS DEFINED BELOW.

              X-SURVEILLANCE PRODUCTS ARE COMPLIANT WITH THEIR DESCRIPTION AND SPECIFICATIONS; IT IS YOUR RESPONSIBILITY TO ENSURE THAT THE PRODUCTS YOU PURCHASE ARE COMPATIBLE FOR THE INTENDED USE.

              II WARRANTY PERIOD:

              THE WARRANTY PERIOD STARTS AT THE DATE OF PURCHASE OF THE PRODUCT. THE PRODUCT MAY CONSIST OF SEVERAL DIFFERENT PARTS AND DIFFERENT PARTS MAY BE COVERED BY DIFFERENT WARRANTIES PERIODS (PLEASE REPORT TO “WARRANTY PERIOD”).

              • THE DIFFERENT WARRANTIES PERIOD IS:

              TWELVE (12) MONTHS FOR ALL X-SURVEILLANCE SENSORS, MOBILE DEVICES, INCLUDING TELEPHONES, SMARTPHONES, BODYCAMS, TABLETS, LAPTOPS AND NAVIGATION SYSTEMS, -SOS, TRACKING SYSTEM, AND SIX (6) MONTHS FOR ACCESSORIES LIKE CAR CHARGERS, HEADPHONES, BLUETOOTH SPEAKERS, BLUETOOTH HEADPHONES, SCREEN PROTECTORS, POWER BANKS, PHONEHOLDERS, SPEAKERPHONES AND CHARGING UNITS, ETC.(WHETHER INCLUDED IN THE MOBILE DEVICE SALES PACKAGE OR SOLD SEPARATELY). THE WARRANTY DOES NOT AFFECT THE LEGAL RIGHTS OF CUSTOMERS UNDER APPLICABLE LOCAL OR NATIONAL LAWS GOVERNING THE SALE OF CUSTOMER GOODS.

              TO THE EXTENT PERMITTED BY NATIONAL LAWS, THE WARRANTY PERIOD WILL NOT BE EXTENDED, RENEWED OR OTHERWISE AFFECTED DUE TO SUBSEQUENT RESALE, REPAIR OR REPLACEMENT OF THE PRODUCT. HOWEVER, PART(S) REPAIRED OR REPLACEMENT PRODUCT(S) DURING THE WARRANTY PERIOD WILL BE WARRANTED FOR THE REMINDER OF THE ORIGINAL WARRANTY PERIOD PROVIDED REPLACEMENT OR REPAIR HAS BEEN PERFORMED BY X-SURVEILLANCE OR AN AUTHORIZED X-SURVEILLANCE RESELLER.

              NOTHING IN THIS WARRANTY POLICY CAN EXCLUDE OR LIMIT THESE STATUTORY PROVISIONS. III REPAIR OR REPLACEMENT:

              THROUGHOUT THE WARRANTY PERIOD X-SURVEILLANCE OR ITS AUTHORIZED RESELLER WILL, -AT THEIR DISCRETION -, WITHOUT CHARGE AND SUBJECT REPAIR OR REPLACE A DEFECTIVE PRODUCT. REPAIR OR REPLACEMENT MAY INVOLVE THE USE OF FUNCTIONALLY EQUIVALENT RECONDITIONED UNIT.

              X-SURVEILLANCE WILL RETURN THE REPAIRED PRODUCT OR REPLACED WITH ANOTHER FUNCTIONAL EQUIVALENT PRODUCT TO THE CUSTOMER IN GOOD WORKING CONDITION. ALL REPLACED FAULTY PARTS OR COMPONENTS WILL BECOME THE PROPERTY OF X-SURVEILLANCE.

              THIS WARRANTY APPLIES ONLY TO THE HARDWARE COMPONENTS OF THE PRODUCT AS ORIGINALLY SUPPLIED AND DOES NOT APPLY TO ANY SOFTWARE OR OTHER PARTS OR EQUIPMENT.

              IF X-SURVEILLANCE REPAIRS OR REPLACES THE PRODUCT, THE REPAIRED OR REPLACED PRODUCT SHALL CONTINUE TO BE WARRANTED FOR THE REMAINING TIME OF THE ORIGINAL WARRANTY PERIOD.

              BEFORE RETURNING ANY UNIT FOR SERVICE, BE SURE TO BACKUP DATA AND REMOVE ANY CONFIDENTIAL, PROPRIETARY, OR PERSONAL INFORMATION FROM THE DEVICE. X-SURVEILLANCE IS NOT RESPONSIBLE FOR THE DAMAGE TO OR LOSS OF ANY PROGRAMS, DATA, OR REMOVABLE STORAGE MEDIA WHERE YOU DO NOT BACK-UP YOUR DATA.

              ALL X-SURVEILLANCE DEVICES IS WARRANTED AGAINST DEFECTS IN MATERIAL OR WORKMANSHIP FOR 30 DAYS FROM THE DATE OF PURCHASE. WARRANTY CLAIMS OF CUSTOMERS REGARDING THEIR X-SURVEILLANCE PRODUCT ARE TO BE MADE THROUGH THE AUTHORIZED X-SURVEILLANCE RESELLER WHERE PURCHASED OR BY OUR SUPPORT CENTER WARRANTY IS ONLY VALID WITH PROOF OF PURCHASE FROM THE AUTHORIZED X-SURVEILLANCE RESELLER. THE X SYSTEMS WARRANTY PROGRAM DOES NOT COVER ANY DEFECTS DUE TO IMPROPER INSTALLATION OR FIT

              IV THE WARRANTY DOES NOT COVER:

              • DAMAGES DUE TO TRANSPORTATION
              • DAMAGES DUE TO STORAGE
              • DAMAGES DUE TO IMPROPER USE OF THE PRODUCTS AND POOR MAINTENANCE
              • DAMAGES DUE TO NON-OBSERVANCE OF THE INSTRUCTIONS OR RESTRICTIONS FOR USE OF THE PRODUCT AS DEFINED IN THE PRODUCTS OWNER MANUAL
              • DAMAGES DUE TO HACKING, MALWARE, INFRINGEMENT, SPYWARE, ETC, ETC.
              • DAMAGES DUE TO THE PRODUCTS NORMAL WEAR AND TEAR
              • DAMAGES DUE TO NON-OBSERVANCE OF THE INSTRUCTIONS FOR MAINTENANCE AS DEFINED IN THE PRODUCTS OWNER MANUAL
              • DAMAGES DUE TO MODIFICATION OF THE PRODUCTS
              • DAMAGES DUE TO ANY IMPACT CAUSED BY SHARP ITEMS, DUE TO TORSION, COMPRESSION, A FALL GREATER THAN 1.8 M., AN ABNORMAL IMPACT OR OTHER ACTIONS THAT CANNOT BE UNDER X-SURVEILLANCE’S REASONABLE CONTROL.
              • DAMAGES WITH, IN OR ON THE GLASS OF THE DISPLAY.

              V THIS WARRANTY SHALL NOT APPLY IF THE DEFECT IS CAUSED BY ANY OF THE FOLLOWING:

              1. A) THE PRODUCT SERIAL NUMBER, THE ACCESSORY DATE CODE, THE IMEI NUMBER, WATER INDICATOR OR THE WARRANTY SEAL HAS BEEN REMOVED, ERASED, DEFACED, ALTERED OR IS ILLEGIBLE; OR
              2. B) DETERIORATION OF THE PRODUCT DUE TO NORMAL WEAR AND TEAR; OR
              3. C) USE OTHER THAN IN ACCORDANCE WITH THE USER MANUAL, SUBMERSION IN WATER AS EXPLAINED AT THE MAXIMUM WARRANTY PRODUCT DETAILS PER X-SURVEILLANCE DEVICE, PROLONGED EXPOSURE TO MOISTURE, DAMPNESS OR EXTREME THERMAL OR ENVIRONMENTAL CONDITIONS OR A RAPID CHANGE IN SUCH CONDITIONS, CORROSION, OXIDATION, UNAUTHORIZED MODIFICATIONS OR CONNECTIONS, UNAUTHORIZED OPENING OR REPAIR, REPAIR BY USE OF UNAUTHORIZED SPARE PARTS, ACCIDENTS, FORCES OF NATURE, OR OTHER ACTIONS BEYOND THE REASONABLE CONTROL OF X-SURVEILLANCE (INCLUDING BUT NOT LIMITED TO DEFICIENCIES IN CONSUMABLE PARTS) UNLESS THE DEFECT WAS CAUSED DIRECTLY BY DEFECTS IN MATERIALS OR WORKMANSHIP. THIS WARRANTY DOES NOT COVER PHYSICAL DAMAGE TO THE SURFACE OF THE PRODUCT INCLUDING BUT NOT LIMITED TO SCRATCHES ON THE DISPLAY, CAMERA LENS; OR
              4. D) THE DEFECTS CAUSED BY THE FACT THAT THE BATTERY HAS BEEN SHORT-CIRCUITED OR BY THE FACT THAT THE SEALS OF THE BATTERY ENCLOSURE OR THE CELLS ARE BROKEN OR SHOW EVIDENCE OF TAMPERING OR BY THE FACT THAT THE BATTERY HAS BEEN USED IN EQUIPMENT OTHER THAN THOSE FOR WHICH IT HAS BEEN SPECIFIED; OR
              5. E) THE DEFECT WAS CAUSED BY A DEFECTIVE FUNCTION OF THE CELLULAR NETWORK OR OTHER SYSTEM; OR F) THE PRODUCT SOFTWARE NEEDS TO BE UPGRADED DUE TO CHANGES IN CELLULAR NETWORK PARAMETERS; OR
              6. G) THE DEFECT WAS CAUSED BY THE FACT THAT THE PRODUCT WAS USED WITH OR CONNECTED TO AN ACCESSORY NOT APPROVED OR PROVIDED BY X-SURVEILLANCE OR USED IN OTHER THAN ITS INTENDED USE AND WHERE IT CAN BE SHOWN BY X-SURVEILLANCE THAT SUCH DEFECT IS NOT THE FAULT OF THE PRODUCT ITSELF; OR
              7. H) THE DEFECT WAS CAUSED BY THE FACT THAT THE PRODUCT WAS MISUSED OR BECAME UNUSABLE DUE TO AN ATTACK OR HACKING FROM THIRD PARTIES. THIS HACKING CAN BE DONE DIRECTLY BY A DEVICE BUT ALSO BY A SERVER ON WHICH THE DEVICE IS ATTACHED. (CHARGING OR REPLAY)
              8. I) WHEN THE PRODUCT IS BEING DROPPED OUT OF HAND WITHOUT FALLING STRAIGHT WITH THE BACK OF THE PRODUCT ON A STRAIGHT SURFACE, WHEN PRODUCT HAS BEEN DROPPED ON A SHARP SURFACE OR HAS BEEN IN CONTACT WITH A SHARP MATTER OR SURFACE; OR
              9. J) SOLD VIA AN UN-AUTHORIZED SELLER, PREVIOUSLY OWNED CUSTOMER OR SOLD IN ANOTHER COUNTRY THAN CUSTOMER IS FROM ,OR PRODUCTS BEING USED; OR
              10. K) PERFORMANCE ISSUES OR INCOMPATIBILITIES CAUSED BY EDITING OF THE REGISTRY SETTINGS, MODIFICATIONS OF THE OPERATING SOFTWARE OR THIRD PARTY APPLICATION DOWNLOADS. USING CUSTOM OPERATING SYSTEM SOFTWARE MAY CAUSE YOUR DEVICE AND APPLICATION TO WORK INCORRECTLY.
              11. L) IF THE PRODUCT HAS BEEN RE-EXPORTED FROM ITS ORIGINAL DESTINATION COUNTRY TO ANOTHER COUNTRY, THE PRODUCT MAY CONTAIN COUNTRY SPECIFIC ELEMENTS THAT ARE NOT CONSIDERED TO BE A DEFECT UNDER THIS WARRANTY.
              12. M) THE WARRANTY DOES NOT AFFECT THE LEGAL RIGHTS OF CUSTOMERS UNDER APPLICABLE LOCAL OR NATIONAL LAWS GOVERNING THE SALE OF CUSTOMER GOODS.

              VI THE PRESENT WARRANTY IS NOT ENFORCEABLE IF :

              1. A) MISUSE OR ABUSE OF THE PRODUCT;
              2. B) IT’S NOT ALLOWED (WITHOUT ANY WRITTEN CONSENT FROM X-SYSTEMS) TO LEND OR HANDOVER HIGHLY SENSITIVE OR INTELLECTUAL PROPERTY RELATED SOFTWARE AND VITAL COMPONENTS TO THIRD PARTIES , – WHETHER OR NOT AN IMPARTIAL (GOVERNMENT) AGENCY OR A COMMERCIAL INSTITUTION -, DUE TO THE HIGH IMPACT OF THE SURVEILLANCE SOLUTIONS AND TRADEMARK VIOLATIONS. THE IP RIGHTS BELONG EXCLUSIVELY TO X-SYSTEMS B.V. AND IT IS THEREFORE ENTITLED TO WATCH OVER ANY INFRINGEMENT OF ITS RIGHTS. BY VIOLATION THE WARRANTY PROVISION, NO CLAIM AND OR REFUND CAN EVER BE MADE;
              3. C) DETERIORATION OF THE PRODUCT DUE TO NORMAL WEAR AND TEAR;
              4. D) WILLFUL DAMAGE OR NEGLIGENCE BY THE END USER OR ANY THIRD PARTY OTHER THAN X-SURVEILLANCE OR AN AUTHORIZED SERVICE AGENT OF THE PRODUCT;
              5. E) THE PRODUCT WAS USED IN A MANNER FOR WHICH IT WAS NOT INTENDED, OR WHERE X-SURVEILLANCE CAN SHOW THAT SUCH DEFECT IS NOT THE FAULT OF THE PRODUCT ITSELF;
              6. F) THE PRODUCT HAS BECOME A VICTUM OF AN ATTACK, HACKING, EAVESDROPPING, OR TEMPERING F) THE PRODUCT IS NOT RETURNED IN ITS ORIGINAL PACKAGING, IF IT HAS BEEN MODIFIED OR REPAIRED BY ANY PERSON OR ENTITY OTHER THAN X-SURVEILLANCE OR AN AUTHORIZED X-SURVEILLANCE RESELLER;
              7. G) THE PRODUCT HAS BEEN REPAIRED WITH UNAUTHORIZED SPARE PARTS;

              VII WARRANTY ENFORCEMENT:

              IN CASE OF DEFECT, X-SURVEILLANCE AGREES TO ACCEPT THE CLAIM, REPLACE OR REPAIR THE PRODUCT AT NO CHARGE FOR THE END-USER AND RETURN IT. THIS SHALL BE DETERMINED IN THE SOLE DISCRETION OF X SYSTEMS OR HIS AUTHORIZED RESELLER, UNLESS THIS IS IMPOSSIBLE OR DISPROPORTIONATE. THE REMEDY WILL BE DEEMED TO BE DISPROPORTIONATE BY X-SURVEILLANCE IF IT IMPOSES COSTS ON X SYSTEMS WHICH, IN COMPARISON WITH THE ALTERNATIVE REMEDY, ARE UNREASONABLE, TAKING INTO ACCOUNT:

              • THE VALUE OF THE GOODS WOULD HAVE IF THERE WERE NO DEFECT,
              • THE SIGNIFICANCE OF THE DEFECT,
              • WHETHER THE ALTERNATIVE REMEDY COULD BE COMPLETED WITHOUT SIGNIFICANT

              INCONVENIENCE TO THE CUSTOMER.

              X-SURVEILLANCE AGREES THAT ALL REPAIR OR REPLACEMENT OF THE PRODUCT WILL OCCUR WITHIN A REASONABLE

              PERIOD AND WITHOUT ANY MAJOR INCONVENIENCE FOR THE CUSTOMER, TAKING ACCOUNT OF THE GOOD KIND AND ITS FITNESS FOR PURPOSE.

              THE CUSTOMER IS NOT ENTITLED TO HAVE THE CONTRACT RESCINDED IF THE DEFECT IS MINOR.

              FOR ALL WARRANTY CLAIMS, PLEASE PRODUCE THE PRODUCT AND THE PROOF OF PURCHASE TO THE AUTHORIZED X-SURVEILLANCE RESELLER. PROVIDE THE FOLLOWING INFORMATION:

              – MODEL NUMBER

              – SERIAL NUMBER

              – IMEI NUMBER

              – LOCATION OF SOLD PRODUCT

              – DESCRIPTION OF PRODUCT PROBLEM

              – CONTACT NAME, PHONE NUMBER & EMAIL

              – RECEIPT OR CREDITCARD NUMBER OF PURCHASE

              – THE SIGNED “REPAIR RECEIPT CERTIFICATE”

              VIII USAGE OF DEVICES:

              ALTHOUGH X-SURVEILLANCE IS VERY PRIDE ON ITS PRODUCTS AND HAS ATTEMPTED TO PROVIDE THE HIGHEST GRADE OF QUALITY, IT STILL MAY BE POSSIBLE THAT YOU WILL EXPERIENCE PROBLEMS. FOR MORE INFORMATION ABOUT THE WARRANTY, PLEASE CHECK OUR WARRANTY POLICY.

              X-SURVEILLANCE ASSUMES NO LIABILITY FOR ANY ACCIDENT, INJURY, DEATH, LOSS, OR OTHER CLAIM RELATED TO OR RESULTING FROM THE USE OF THIS PRODUCT. THE USER SHOULD BE FULLY RESPONSIBLE FOR THE USE OF THE PRODUCT IN A SAFE AND NORMAL MANNER WITHOUT RISKING IT’S LIFE. IN NO EVENT X-SURVEILLANCE SHALL BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES RELATING TO OR RESULTING FROM THE USE OF THIS PRODUCT OR ANY OF ITS PARTS. X-SURVEILLANCE ADVICES TO USE THE PRODUCTS AS RECOMMENDED BY THE LAW AND REGULATIONS OF YOUR LOCAL COUNTRY. IN SOME COUNTRIES, NON HANDSFREE CALLING OR SETTING NAVIGATION DESTINATION WHEN DRIVING, IS ILLEGAL OR REQUIRE GOVERNMENTAL PERMISSION.

              VIIII LIMITATION OF LIABILITY:

              TO THE EXTENT PERMITTED BY NATIONAL LAWS, THE PRESENT WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES. X-SURVEILLANCE SHALL NOT BE HELD LIABLE FOR ANY CONSEQUENTIAL DAMAGES / ACCIDENTS/ABUSE INCLUDING BUT NOT LIMITED TO LOSS OF CHANCE OR PROFITS, LOSS OF SAVINGS OR REVENUE, LOSS OF DATA, PUNITIVE DAMAGES, LOSS OF USE OF THE PRODUCT OR ANY ASSOCIATED FACILITIES, COST OF CAPITAL, COST OF ANY SUBSTITUTE EQUIPMENT OR FACILITIES, DOWNTIME, THE CLAIMS OF ANY THIRD PARTIES, INCLUDING CUSTOMERS, AND INJURY TO PROPERTY, RESULTING FROM THE PURCHASE OR USE OF THE PRODUCT OR ARISING FROM BREACH OF THE WARRANTY, BREACH OF CONTRACT, NEGLIGENCE, STRICT TORT, OR ANY OTHER LEGAL OR EQUITABLE THEORY, EVEN IF X-SURVEILLANCE KNEW OF THE LIKELIHOOD OF SUCH DAMAGES. X-SURVEILLANCE SHALL NOT BE LIABLE FOR DELAY IN RENDERING SERVICE UNDER THE LIMITED WARRANTY, OR LOSS OF USE DURING THE PERIOD THAT THE PRODUCT IS BEING REPAIRED.

              THE END-USER UNDERSTANDS AND AGREES THAT X-SURVEILLANCE HAS NO LIABILITY FOR ANY DAMAGE OR DESTRUCTION TO END-USER ELECTRONIC DEVICE(S) OR OTHER PERSONAL PROPERTY THAT ARE CONTAINED INSIDE OR OUTSIDE THE PRODUCT, INCLUDING, WITHOUT LIMITATION, MOBILE DEVICES/BODYCAMS OR ANY LOSS OF DATA CONTAINED IN THE SAME.

              IN CASE X-SURVEILLANCE WILL BE LIABILITY UNDER OR IN CONNECTION WITH THIS WARRANTY, CONTRACT, TORT (INCLUDING NEGLIGENCE) OR OTHERWISE X-SURVEILLANCE SHALL BE STRICTLY LIMITED TO EITHER THE AMOUNT ACTUALLY PAID BY THE END-USER FOR THE PRODUCT OR X-SURVEILLANCE RECOMMENDED RE-SALE PRICE OF THE PRODUCT, WHICHEVER IS LOWER.

              1. IN THE EVENT OF PRODUCT FAILURE, THE CUSTOMER SHOULD TAKE THE FOLLOWING ACTION:
              2. A) CONTACT THE RESELLER WHERE THE PRODUCT WAS PURCHASED
              3. APPLICABLE LAW.

              THIS WARRANTY POLICY IS GOVERNED BY DUTCH LAW, THE DUTCH COURT IN ‘S GRAVENHAGE, THE NETHERLANDS..

              2 COMPETENT JUDGE OF THE COURT OF ‘S-GRAVENHAGE, THE NETHERLANDS.

               

              Terms & Conditions

              STANDARD TERMS AND CONDITIONS

              THE SUPPLY OF PRODUCTS AND SERVICES REFERRED TO HEREIN IS GOVERNED BY THE AGREEMENT IN FORCE BETWEEN X-SURVEILLANCE (SELLER) AND THE BUYER GOVERNING THE SUPPLY OF SUCH PRODUCTS AND / OR SERVICES (THE “UNDERLYING AGREEMENT”).

              THE SELLER SHALL NOT BE BOUND BY ANY OTHER TERMS AND CONDITIONS, INCLUDING THOSE WHICH MAY BE INCLUDED IN BUYER’S STANDARD PURCHASE ORDER OR WHICH MAY HAVE GOVERNED PREVIOUS PURCHASE AND/OR LICENSE TRANSACTIONS BETWEEN BUYER AND THE SELLER

              SECTION 1: STANDARD TERMS AND CONDITIONS OF SALE FOR PRODUCTS – APPLY TO ALL PURCHASES OF PRODUCTS:

              ALL PURCHASES OF HARDWARE BY THE BUYER FROM X-SURVEILLANCE OR SUCH OF ITS AFFILIATES AS IS RESPONSIBLE FOR THE DELIVERY OF THE PRODUCTS (AS STATED ON THE PURCHASE ORDER AND CONFIRMED ON THE CORRESPONDING ORDER ACKNOWLEDGMENT) (HEREAFTER THE “SELLER”) SHALL BE GOVERNED BY THE SELLER’S STANDARD TERMS AND CONDITIONS AND ANY RELEVANT SELLER QUOTATION DOCUMENT. ANY PURCHASE ORDER PLACED BY THE BUYER FOR PRODUCTS (“ORDER”), IF AND WHEN ACCEPTED BY THE SELLER, SHALL CONSTITUTE A SEPARATE BINDING CONTRACT ENTERED INTO BY THE SELLER AND THE BUYER IN ACCORDANCE WITH AND INCORPORATING THE SELLER’S STANDARD TERMS AND CONDITIONS AND ANY RELEVANT SELLER QUOTATION DOCUMENT (HEREAFTER “AGREEMENT”).

              AN ORDER (WHICH MAY BE PART OF A PURCHASE ORDER) IS ACCEPTED ONLY UNDER THE TERMS OF THE AGREEMENT WHICH SHALL APPLY TO THE EXCLUSION OF ALL OTHERS (INCLUDING TERMS SET OUT ON THE ORDERS ISSUED BY THE BUYER). THE BUYER’S ACCEPTANCE OF PRODUCTS SHIPPED BY THE SELLER PURSUANT TO THE AGREEMENT SHALL BE DEEMED AS ACCEPTANCE OF THE TERMS OF THE AGREEMENT AND THE PRODUCTS SHIPPED.

              1. DEFINITIONS

              CAPITALISED TERMS USED IN THE AGREEMENT SHALL HAVE THE FOLLOWING MEANINGS:

              “AFFILIATES” SHALL MEAN PARENTS, SUBSIDIARIES, PARTNERSHIPS, JOINT VENTURES AND ANY ENTITY(IES) THAT DIRECTLY OR INDIRECTLY CONTROLS OR IS CONTROLLED BY A PARTY, OR WITH WHICH A PARTY SHARES COMMON CONTROL. A PARTY “CONTROLS” ANOTHER ENTITY WHEN THE PARTY, THROUGH OWNERSHIP OF THE VOTING STOCK OR OTHER OWNERSHIP INTEREST OF THAT ENTITY, OR BY CONTRACT OR OTHERWISE, HAS THE ABILITY TO DIRECT ITS MANAGEMENT..

              “BOOKABLE ORDER CRITERIA” SHALL MEAN THE REQUIREMENTS FOR PLACING AN ORDER, AS SPECIFIED BY THE SELLER AND MAY INCLUDE (WITHOUT LIMITATION) THE REQUESTED DELIVERY DATES AND LOCATIONS, FULL BUYER NAME, BILLING ADDRESS, PRODUCT MODEL NUMBERS AND DESCRIPTIONS, QUANTITIES AND PRICES.

              “CONFIDENTIAL INFORMATION” SHALL MEAN ALL INFORMATION MARKED AS CONFIDENTIAL OR PROPRIETARY OR SIMILAR LEGEND OR WHICH IN ALL OF THE CIRCUMSTANCES IS CLEARLY INTENDED TO BE TREATED AS CONFIDENTIAL WHETHER DISCLOSED IN WRITING, VERBALLY OR BY ANY OTHER MEANS AND WHETHER DIRECTLY OR INDIRECTLY; PROVIDED THAT, IF DISCLOSURE IS ORAL, THE INFORMATION WILL BE REDUCED TO WRITING WITHIN THIRTY (30) DAYS OF THE DATE OF DISCLOSURE, INCLUDING, WITHOUT LIMITATION, THE SUBJECT MATTER OF THE AGREEMENT, DATA, TECHNICAL INFORMATION, KNOW HOW, FORMULAE, SPECIFICATIONS, DESIGN RIGHTS, AND ANY INFORMATION RELATING TO THE RELEVANT PARTY’S PRODUCTS, OPERATIONS, PROCESSES, PLANS OR INTENTIONS, PRODUCT INFORMATION, TRADE SECRETS, MARKET OPPORTUNITIES AND BUSINESS AFFAIRS AND ANY INFORMATION EXPRESSLY AGREED TO BE CONFIDENTIAL INFORMATION IN ANY OTHER PROVISION OF THE AGREEMENT.

              “BUYER” SHALL MEAN THE ENTITY STATED ON THE ORDER.

              “EMEA” SHALL MEAN THE COUNTRIES LOCATED IN EUROPE, MIDDLE EAST AND AFRICA AS DETERMINED BY THE SELLER FROM TIME TO TIME.

              “PARTY” SHALL MEAN THE SELLER OR THE BUYER AND “PARTIES” SHALL BE CONSTRUED ACCORDINGLY.

              “PRODUCTS” SHALL MEAN ALL PRODUCTS MANUFACTURED OR SUPPLIED BY THE SELLER UNDER THE AGREEMENT (TOGETHER WITH ANY RELATED AND / OR EMBEDDED SOFTWARE, IF ANY). “PROPRIETARY MATERIALS” SHALL MEAN SOFTWARE (INCLUDING WITHOUT LIMITATION ANY CORRECTIONS, BUG FIXES, ENHANCEMENTS, UPDATES, OR MODIFICATIONS TO OR DERIVATIVE WORKS FROM THE SOFTWARE WHETHER MADE BY THE SELLER OR A THIRD PARTY, OR ANY IMPROVEMENTS THAT RESULT FROM THE SELLER’S PROCESSES OR, IF APPLICABLE, PROVIDING INFORMATION SERVICES, BUT EXCLUDING EMBEDDED SOFTWARE), CERTAIN SOFTWARE TOOLS AND/OR OTHER TECHNICAL MATERIALS, INCLUDING, BUT NOT LIMITED TO, DATA, MODULES, COMPONENTS, DESIGNS, UTILITIES, SUBSETS, OBJECTS, PROGRAM LISTINGS, MODELS, METHODOLOGIES, PROGRAMS, SYSTEMS, ANALYSIS FRAMEWORKS, LEADING PRACTICES AND SPECIFICATIONS THAT THE SELLER HAS DEVELOPED PRIOR TO, OR INDEPENDENTLY FROM, THE PROVISION OF ANY SELLER SERVICES AND/OR THAT SELLER LICENSES FROM THIRD PARTIES.

              “PROPRIETARY RIGHTS” SHALL MEAN ANY INTELLECTUAL PROPERTY RIGHTS INCLUDING WITHOUT LIMITATION: (A) PATENTS, PATENT APPLICATIONS, INVENTIONS, COPYRIGHTS, TRADE SECRETS, TRADEMARKS, TRADE NAMES, MASK WORKS, KNOW-HOW, IDEAS AND CONCEPTS, PROCESSES, METHODOLOGIES, TOOLS, TECHNIQUES, SOFTWARE, UTILITY MODELS, MORAL RIGHTS, TOPOGRAPHY RIGHTS, DATABASE RIGHTS AND RIGHTS OF CONFIDENCE AND ALL EMBODIMENTS THEREOF, WHETHER TANGIBLE OR INTANGIBLE IN ALL CASES WHETHER OR NOT REGISTERED OR REGISTRABLE IN ANY COUNTRY, FOR THE FULL TERMS (INCLUDING ANY EXTENSION TO OR RENEWAL OF THE TERMS) OF THOSE RIGHTS AND INCLUDING REGISTRATIONS AND APPLICATIONS FOR REGISTRATION OF ANY OF THESE AND RIGHTS TO APPLY FOR THE SAME; AND

              (B) ALL RIGHTS AND FORMS OF PROTECTION OF A SIMILAR NATURE OR HAVING EQUIVALENT OR SIMILAR EFFECT TO ANY OF THOSE SET OUT IN (A) ANYWHERE IN THE WORLD. “THIRD PARTY SOFTWARE” SHALL MEAN SOFTWARE PROPRIETARY TO OR SUPPLIED BY A THIRD PARTY SUPPLIER.

              “WORKING DAYS” SHALL MEAN FROM MONDAY TO FRIDAY.

              1. PAYMENT.

              PAYMENT TERMS FOR THE PURCHASE OF THE SELLER’S PRODUCTS ARE TO PAY IN ADVANCE OF THE ORDERED PRODUCTS, BEFORE DELIVERY. (HARDWARE & SOFTWARE) AFTER RECEIPT OF THE PAYMENT THE ORDER WILL BE TAKEN IN PROCESS. EACH SHIPMENT SHALL BE INVOICED AND MUST BE PAID FOR WITHOUT REGARD TO OTHER SCHEDULED DELIVERIES. FAILURE TO COMPLY WITH PAYMENT WILL INVALIDATE ANY WARRANTY BY THE SELLER FOR SOFTWARE, OR PRODUCTS SUPPLIED UNDER THE AGREEMENT.

              1. TITLE & DELIVERY

              THE PARTIES AGREE THAT DELIVERY TERMS ARE EXW (EX WORK) , UNLESS OTHERWISE STATED ON THE SELLER ORDER ACKNOWLEDGEMENT FOR A SPECIFIC ORDER. THE SELLER SHALL NOT BE LIABLE FOR ANY DAMAGES OR PENALTY FOR DELAY CAUSED SOLELY BY TRANSPORTATION OR FAILURE TO GIVE NOTICE OF SUCH DELAY. FOR THE AVOIDANCE OF DOUBT TITLE IN SOFTWARE SHALL NEVER PASS AND SHALL REMAIN VESTED WITH THE SELLER OR ITS SUPPLIERS AS APPROPRIATE AND A RIGHT TO USE SHALL BE GRANTED IN ACCORDANCE WITH CLAUSE 6 HEREIN.

              1. TAXES

              PRICES ARE EXCLUSIVE OF ALL VALUE ADDED TAX, MUNICIPAL OR OTHER GOVERNMENT EXCISE, CUSTOM DUTIES, SALES, USE, OCCUPATIONAL OR LIKE TAXES IN FORCE, AND ANY SUCH TAXES SHALL BE ASSUMED AND BE PAID FOR BY THE BUYER. IN ORDER TO EXEMPT A SALE FROM SALES OR USE TAX LIABILITY, THE BUYER WILL SUPPLY A CERTIFICATE OF EXEMPTION OR SIMILAR DOCUMENT TO THE SELLER AT THE TIME OF ORDER PLACEMENT.

              1. INTEREST

              NOT APPLICABLE

              1. PROPRIETARY MATERIALS

              6.1 IN ACCORDANCE WITH THE AGREEMENT, THE SELLER WILL PROVIDE THE BUYER WITH PRODUCTS THAT CONTAIN EMBEDDED, PRE-LOADED, OR INSTALLED SOFTWARE.

              6, (I) “SOFTWARE” MEANS PROPRIETARY SOFTWARE IN OBJECT CODE FORMAT, AND ADAPTATIONS, TRANSLATIONS, DECOMPLICATIONS, DISASSEMBLES, EMULATIONS, OR DERIVATIVE WORKS OF SUCH SOFTWARE; (II) MEANS ANY MODIFICATIONS, ENHANCEMENTS, NEW VERSIONS AND NEW RELEASES OF THE SOFTWARE PROVIDED BY THE SELLER; AND (III) MAY CONTAIN ITEMS OF SOFTWARE OWNED BY A THIRD PARTY SUPPLIER. THE TERM “SOFTWARE” DOES NOT INCLUDE ANY THIRD PARTY SOFTWARE PROVIDED UNDER SEPARATE LICENSE OR THIRD PARTY SOFTWARE NOT LICENSABLE UNDER THE TERMS OF THIS AGREEMENT.

              “DOCUMENTATION”, FOR THE PURPOSES OF THIS CLAUSE 6, MEANS PRODUCT AND SOFTWARE DOCUMENTATION THAT SPECIFIES TECHNICAL AND PERFORMANCE FEATURES AND CAPABILITIES, AND THE USER, OPERATION AND TRAINING MANUALS FOR THE SOFTWARE (INCLUDING ALL PHYSICAL OR ELECTRONIC MEDIA UPON WHICH SUCH INFORMATION IS PROVIDED).

              6.2 THE SELLER HEREBY GRANTS TO THE BUYER A PERSONAL, NON-ASSIGNABLE, NON-TRANSFERABLE, NON-EXCLUSIVE LICENSE UNDER THE SELLER’S COPYRIGHTS AND CONFIDENTIAL INFORMATION EMBODIED IN THE SOFTWARE TO USE THE X-SURVEILLANCE SOFTWARE INSTALLED ON THE X-SURVEILLANCE HARDWARE, ANY OTHER USE OF THE SOFTWARE IS STRICTLY PROHIBITED AND WILL BE DEEMED A BREACH OF THE AGREEMENT.

              6.3 IT’S NOT ALLOWED (WITHOUT ANY WRITTEN CONSENT FROM X-SYSTEMS) TO LEND OR HANDOVER HIGHLY SENSITIVE OR INTELLECTUAL PROPERTY RELATED SOFTWARE AND VITAL COMPONENTS TO THIRD PARTIES , – WHETHER OR NOT AN IMPARTIAL (GOVERNMENT) AGENCY OR A COMMERCIAL INSTITUTION -, DUE TO THE HIGH IMPACT OF THE SURVEILLANCE SOLUTIONS AND TRADEMARK VIOLATIONS. THE IP RIGHTS BELONG EXCLUSIVELY TO X-SYSTEMS B.V. AND IT IS THEREFORE ENTITLED TO WATCH OVER ANY INFRINGEMENT OF ITS RIGHTS. BY VIOLATION THE WARRANTY PROVISION, NO CLAIM AND OR REFUND CAN EVER BE MADE. BY ATTEMPTS OF SOFTWARE CODE REVIEWING OR CODE RE-ENGINEERING WITHOUT PERMISSION THERE IS EVEN A FINE OF 10 MILLION EUROS. THE SAME ALSO APPLIES TO ATTEMPTS AND EXECUTION OF HARDWARE AND SOFTWARE REVERSE ENGINEERING. HANDING OVER THE TECHNOLOGY FOR RESEARCH, ANALYSIS, EXAMINATIONS, EXPERIMENTS, MEASUREMENTS, TRIALS, TESTS OR TRIALS WITHOUT WRITTEN PERMISSION FROM X-SYSTEMS ALSO SUFFICES WITH THESE CONDITIONS.

              1. INFRINGEMENT INDEMNIFICATION

              7.1THE SELLER SHALL HAVE NO LIABILITY TO THE BUYER FOR ANY ALLEGED OR ACTUAL INFRINGEMENT, OR OTHERWISE, ARISING OUT OF OR IN CONNECTION WITH THE BUYER’S USE OR TRANSFER OF THE SELLER PRODUCTS AFTER THE SELLER’ WRITTEN NOTICE TO THE BUYER THAT THE BUYER SHALL CEASE USE OR TRANSFER OF SUCH SELLER PRODUCTS. 7.2. THE SELLER SHALL HAVE NO OBLIGATION TO DEFEND OR INDEMNIFY THE BUYER UNDER THE AGREEMENT FOR ANY DAMAGES BASED UPON A PER-USE ROYALTY OR THE BUYER’S REVENUES, OR UPON ANY DAMAGES THEORY OTHER THAN A REASONABLE ROYALTY APPLIED TO, OR LOST PROFITS OF THE PATENT OWNER BASED ON, THE PURCHASE PRICE PAID BY THE BUYER TO THE SELLER FOR THE INFRINGING THE SELLER PRODUCT. THE SELLER SHALL HAVE NO OBLIGATION TO DEFEND OR INDEMNIFY THE BUYER UNDER THE AGREEMENT FOR ANY ALLEGED OR ACTUAL INFRINGEMENT ARISING OUT OF (A) USE OF THE SELLER PRODUCTS IN CONNECTION OR IN COMBINATION WITH EQUIPMENT, DEVICES OR SOFTWARE NOT PROVIDED BY THE SELLER;

              (B) USE OF THE SELLER PRODUCTS IN A MANNER FOR WHICH THEY WERE NOT DESIGNED;

              (C) ANY MODIFICATION OF SELLER PRODUCTS BY ANYONE OTHER THAN THE SELLER;

              (D) COMPLIANCE WITH THE BUYER’S DESIGNS, SPECIFICATIONS, GUIDELINES OR INSTRUCTIONS; (E) COMPLIANCE WITH A STANDARD ISSUED BY ANY PUBLIC OR PRIVATE STANDARDS BODY; OR (F) ANY ASSERTION BY A NON-PRACTICING ENTITY WHICH MAINTAINS NO SIGNIFICANT MANUFACTURING CAPABILITY ((A) – (D) DEFINED AS “EXCLUDED CONDUCT”).

              THE BUYER SHALL INDEMNIFY THE SELLER AGAINST ANY CLAIM OF INFRINGEMENT THAT IS BROUGHT AGAINST THE SELLER BASED UPON OR ARISING OUT OF SUCH EXCLUDED CONDUCT OR ARISING OUT OF THE BUYER’S CONTINUED USE OR TRANSFER OF THE SELLER PRODUCTS AFTER BEING NOTICED TO CEASE SUCH USE OR TRANSFER. THE SELLER SHALL NOT BE RESPONSIBLE FOR ANY COMPROMISE OR SETTLEMENT MADE BY THE BUYER WITHOUT THE SELLER’S PRIOR WRITTEN CONSENT.

              7.3. THIS CLAUSE 7 PROVIDES THE BUYER’S SOLE AND EXCLUSIVE REMEDIES AND THE SELLER’S ENTIRE LIABILITY IN THE EVENT OF AN INFRINGEMENT CLAIM. THE BUYER HAS NO RIGHT TO RECOVER AND THE SELLER HAS NO OBLIGATION TO PROVIDE ANY OTHER OR FURTHER REMEDIES, WHETHER UNDER ANOTHER PROVISION OF THE AGREEMENT OR ANY OTHER LEGAL THEORY OR PRINCIPLE, IN CONNECTION WITH AN INFRINGEMENT CLAIM. IN ADDITION, THE RIGHTS AND REMEDIES PROVIDED IN THIS CLAUSE ARE SUBJECT TO AND FURTHER LIMITED BY THE RESTRICTIONS SET FORTH IN THE GENERAL LIMITATION OF LIABILITY CLAUSE OF THE AGREEMENT (CLAUSE 9). IN NO EVENT SHALL THE SELLER BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT, COLLATERAL, CONSEQUENTIAL OR PUNITIVE DAMAGES OR LOST PROFITS OF THE BUYER IN CONNECTION WITH ANY CLAIMS, LOSSES, DAMAGES OR INJURIES UNDER THIS CLAUSE. IN NO EVENT SHALL THE SELLER’S LIABILITY UNDER THIS CLAUSE EXCEED THE TOTAL NET VALUE OF THE RESPECTIVE PURCHASE ORDER GIVING RISE TO THE INFRINGEMENT CLAIM.

              1. WARRANTY

              8.1 THE SELLER PRODUCTS ARE WARRANTED AGAINST DEFECTS IN WORKMANSHIP AND MATERIALS FOR 12 MONTHS OR FOR A PERIOD STIPULATED IN THE RELEVANT PRODUCT INVOICE AT THE TIME OF PURCHASE OF SUCH PRODUCT(S) FROM THE DATE OF SHIPMENT (“WARRANTY PERIOD”), UNLESS OTHERWISE PROVIDED BY THE SELLER IN WRITING, PROVIDED THE HARDWARE PRODUCT REMAINS UNMODIFIED AND IS OPERATED UNDER NORMAL CONDITIONS AND IN LINE WITH THE PUBLISHED PRODUCT SPECIFICATIONS.

              8.2 WARRANTY PROVISIONS AND DURATIONS ON SOFTWARE, INTEGRATED INSTALLED SYSTEMS, PRODUCT MODIFIED OR DESIGNED TO MEET SPECIFIC BUYER SPECIFICATIONS (“CUSTOM MADE SOFTWARE PRODUCTS”), (RE)MANUFACTURED PRODUCTS, AND RECONDITIONED OR UPGRADED PRODUCTS, SHALL BE AS PROVIDED IN THE PARTICULAR PRODUCT CATALOGUE IN EFFECT AT THE TIME OF PURCHASE OR IN THE ACCOMPANYING SOFTWARE LICENSE. 8.3 HARDWARE PRODUCTS MAY BE SERVICED OR MANUFACTURED WITH PARTS, COMPONENTS, OR SUBASSEMBLIES THAT ORIGINATE FROM RETURNED PRODUCTS THAT HAVE BEEN REFURBISHED TO MEET THE APPLICABLE SPECIFICATIONS FOR EQUIVALENT NEW MATERIAL AND HARDWARE PRODUCTS.

              8.4 THE SOLE OBLIGATION OF THE SELLER FOR DEFECTIVE HARDWARE PRODUCTS IS LIMITED TO REPAIR OR REPLACEMENT (AT THE SELLER’S OPTION) ON A “RETURN TO SERVICE DEPOT” BASIS WITH PRIOR WRITTEN SELLER AUTHORIZATION. THE BUYER IS RESPONSIBLE FOR SHIPMENT TO THE SELLER AND ASSUMES ALL COSTS AND RISKS ASSOCIATED WITH THIS TRANSPORTATION; RETURN SHIPMENT TO THE BUYER WILL BE AT THE SELLER’S EXPENSE. THE BUYER SHALL BE RESPONSIBLE FOR RETURN SHIPMENT CHARGES FOR PRODUCT RETURNED WHERE THE SELLER DETERMINES THERE IS NO DEFECT (“NO DEFECT FOUND”), OR FOR PRODUCT RETURNED THAT THE SELLER DETERMINES IS NOT ELIGIBLE FOR WARRANTY REPAIR. NO CHARGE WILL BE MADE TO THE BUYER FOR REPLACEMENT PARTS FOR WARRANTY REPAIRS. THE SELLER IS NOT RESPONSIBLE FOR ANY DAMAGE TO OR LOSS OF ANY SOFTWARE PROGRAMS, DATA OR REMOVABLE DATA STORAGE MEDIA, OR THE RESTORATION OR REINSTALLATION OF ANY SOFTWARE PROGRAMS OR DATA OTHER THAN THE SOFTWARE, IF ANY, INSTALLED BY THE SELLER DURING MANUFACTURE OF THE PRODUCT.

              8.5 THE ABOVE WARRANTY PROVISIONS SHALL NOT APPLY TO ANY PRODUCT

              (I) WHICH HAS BEEN REPAIRED, TAMPERED WITH, ALTERED OR MODIFIED, EXCEPT BY THE SELLER OR SELLER AUTHORIZED REPAIR PROVIDERS;

              (II) IN WHICH THE DEFECTS OR DAMAGE TO THE PRODUCT RESULT FROM NORMAL WEAR AND TEAR, MISUSE, NEGLIGENCE, IMPROPER STORAGE, HACKING OR MALWARE ATTACKS, ATTACKS FROM OUTSIDE BY THIRD PARTIES, WATER OR OTHER LIQUIDS INCLUDING CONTAMINATION WITH BODILY FLUIDS, BATTERY LEAKAGE, USE OF PARTS OR ACCESSORIES NOT APPROVED OR SUPPLIED BY THE SELLER, OR FAILURE TO PERFORM OPERATOR HANDLING AND SCHEDULED MAINTENANCE INSTRUCTIONS SUPPLIED BY THE SELLER; OR

              (III) WHICH HAS BEEN SUBJECTED TO UNUSUAL PHYSICAL OR ELECTRICAL STRESS, ABUSE, OR ACCIDENT, OR FORCES OR EXPOSURE BEYOND NORMAL USE WITHIN THE SPECIFIED OPERATIONAL AND ENVIRONMENTAL PARAMETERS SET FORTH IN THE APPLICABLE PRODUCT SPECIFICATION; OR

              (IV) IF THE BUYER DOES NOT GIVE WRITTEN NOTICE OF THE DEFECT TO THE SELLER, WITHIN FOURTEEN (14) DAYS OF THE TIME WHEN THE BUYER DISCOVERS OR OUGHT TO HAVE DISCOVERED THE DEFECT; OR

              (V) IF THE SELLER IS NOT GIVEN AN OPPORTUNITY AFTER RECEIVING THE NOTICE OF EXAMINING SUCH PRODUCTS AND THE BUYER (IF ASKED TO DO SO BY THE SELLER) RETURNS SUCH PRODUCTS TO THE SELLER; OR

              (VI) IF THE BUYER MAKES ANY FURTHER USE OF SUCH PRODUCTS AFTER GIVING SUCH NOTICE; NOR SHALL THE ABOVE WARRANTY PROVISIONS APPLY TO ANY EXPENDABLE OR CONSUMABLE ITEMS, SUCH AS BATTERIES, SUPPLIED WITH THE PRODUCT UNLESS OTHERWISE STIPULATED IN THE RELEVANT PRODUCT DATASHEET.

              8.6 X-SURVEILLANCE EXTENSIVE “WARRANTY POLICY” WITH ALL RIGHTS AND OBLIGATIONS AS WELL AS ALL EXCLUSIONS IS AN INTEGRAL PART OF THESE TERMS & CONDITIONS.

              WARRANTY II:

              8.7 ADDITIONALLY, THE SELLER HEREBY REPRESENTS AND WARRANTS THAT THE SELLER HAS ALL RIGHT, TITLE, OWNERSHIP INTEREST AND MARKETING RIGHTS NECESSARY TO PROVIDE THE PRODUCTS TO THE BUYER.

              8.8 EXCEPT AS EXPRESSLY PROVIDED IN THE AGREEMENT, ALL OTHER CONDITIONS, WARRANTIES, TERMS, UNDERTAKINGS, STATEMENTS AND/OR REPRESENTATIONS OF ANY KIND WHATSOEVER, EXPRESS OR IMPLIED, WHETHER BY STATUTE, COMMON LAW, IN ANY COMMUNICATION WITH THE BUYER OR OTHERWISE ARE EXCLUDED FROM THE AGREEMENT TO THE FULLEST EXTENT PERMITTED BY LAW AND THE SELLER SPECIFICALLY DISCLAIMS THE IMPLIED TERMS, CONDITIONS AND WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, NON-INFRINGEMENT, OR FITNESS FOR A PARTICULAR PURPOSE AND MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND REGARDING ANY THIRD PARTY SOFTWARE. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF IMPLIED TERMS, WARRANTIES OR CONDITIONS, SO THE ABOVE EXCLUSION MAY NOT APPLY TO THE BUYER.

              8.9. ANY PROPRIETARY MATERIALS PROVIDED UNDER THE AGREEMENT TO THE BUYER ARE PROVIDED “AS IS”. THE SELLER DOES NOT WARRANT THAT THE PROPRIETARY MATERIALS WILL MEET THE BUYER’S REQUIREMENTS, OR THAT THE OPERATION OF THE PROPRIETARY MATERIALS WILL BE UNINTERRUPTED OR ERROR FREE, OR THAT DEFECTS IN THE PROPRIETARY MATERIALS WILL BE CORRECTED. THE SELLER MAKES NO WARRANTY WITH RESPECT TO THE CORRECTNESS, ACCURACY, OR RELIABILITY OF THE PROPRIETARY MATERIALS.

              1. LIMITATION OF LIABILITY

              9.1. LIABILITY OF THE PARTIES IS GOVERNED EXCLUSIVELY BY THE FOLLOWING PROVISIONS. 9.2. NOTHING IN THIS AGREEMENT WILL EXCLUDE OR LIMIT EITHER PARTY’S LIABILITY FOR

              (A) DEATH OR PERSONAL INJURY CAUSED BY NEGLIGENCE;

              (B) FRAUD OR FRAUDULENT MISREPRESENTATION;

              (C) ANY OTHER ACT OR OMISSION, LIABILITY FOR WHICH MAY NOT BE LIMITED UNDER APPLICABLE LAW. 9.3. SUBJECT TO CLAUSE 9.2, THE SELLER’S MAXIMUM AGGREGATE LIABILITY TO THE BUYER: (A) IN CONNECTION WITH ANY AND ALL CLAIMS, WHETHER IN CONTRACT, WARRANTY, TORT (INCLUDING NEGLIGENCE, OR BREACH OF STATUTORY DUTY), PATENT OR ANY OTHER INTELLECTUAL PROPERTY INFRINGEMENT OR OTHERWISE FOR PRODUCTS SUPPLIED BY THE SELLER TO THE BUYER UNDER THE AGREEMENT, IS LIMITED TO THE TOTAL NET VALUE OF THE RESPECTIVE ORDER GIVING RISE TO THE LIABILITY; .

              9.4. SUBJECT TO CLAUSE 9.2 AND EXCEPT FOR BREACH OF CLAUSE 18 (CONFIDENTIAL INFORMATION), NEITHER PARTY SHALL BE LIABLE UNDER OR IN CONNECTION WITH THIS AGREEMENT FOR ANY:

              (A) LOSS OF PROFIT; OR

              (B) LOSS OF REVENUES;

              (C) LOSS OF BUSINESS, OR INCREASED COST OF DOING OR RETAINING BUSINESS, OR CONTRACTS, OR LOSS OF BUSINESS OPPORTUNITY; OR

              (D) LOSS OF ANTICIPATED SAVINGS; OR

              (E) ANY DESTRUCTION OR LOSS OF DATA (IN EACH CASE, WHETHER DIRECT OR INDIRECT);OR

              (F) ANY CONSEQUENTIAL , INDIRECT OR SPECIAL LOSS OR DAMAGE.

              9.5. NOTWITHSTANDING CLAUSE 9.2 HEREIN, THE SELLER IS ALSO NOT LIABLE FOR LOSSES INCURRED DUE TO THE BUYER’S FAILURE TO TAKE BACK UP COPIES OF SOFTWARE AND DATA IN ACCORDANCE WITH BEST COMPUTING PRACTICE AND THE BUYER ACKNOWLEDGES THAT IT IS ITS RESPONSIBILITY TO TAKE SUCH BACKUP COPIES.

              9.6. EACH PROVISION OF THE AGREEMENT, EXCLUDING OR LIMITING LIABILITY, OPERATES SEPARATELY. IF ANY PART IS HELD BY A COURT TO BE UNREASONABLE OR INAPPLICABLE, THE OTHER PARTS WILL CONTINUE TO APPLY.

              1. OTHER PRODUCTS AND SERVICES

              THE BUYER ACKNOWLEDGES AND ACCEPTS RESPONSIBILITY FOR THE SELECTION OF THE PRODUCTS AND SERVICES TO ACHIEVE THE BUYER’S INTENDED RESULTS, AND THEIR INSTALLATION, SYSTEM INTEGRATION AND USE. THE BUYER ALSO HAS THE RESPONSIBILITY FOR SELECTION AND USE OF OTHER EQUIPMENT, SOFTWARE, APP’S AND SERVICES ACQUIRED FROM THIRD PARTIES OUTSIDE OF THE AGREEMENT AND USED WITH THE SELLERS’S PRODUCTS. THE SELLER HAS NO RESPONSIBILITY FOR PLANNING, DEVELOPMENT, IMPLEMENTATION, INSTALLATION, SYSTEM INTEGRATION, OR SUPPORT UNLESS PROVIDED UNDER A SEPARATE WRITTEN CONSULTING OR SERVICE AGREEMENT.

              IF THE SELLER HAS TO CARRY OUT WORK ON SYSTEMS OR EQUIPMENT OF THIRD PARTIES, OR SELLER SYSTEMS HAVE TO BE ADAPTED TO ADDITIONAL REQUIREMENTS OF BUYER OR ITS CUSTOMERS FOR, FOR EXAMPLE: (SYSTEM) INSTALLATION/INTEGRATION, IMPLEMENTATION ,CUSTOM OR TAILOR-MADE SOFTWARE, SIM CARD INSTALLATION / CONNECTION, MPU5 CONNECTION, EXTRA SUPPORT OR OTHERWISE, THEN SELLER IS ENTITLED TO CHARGE AN AMOUNT OF 120 EUROS PER HOUR, PER PERSON TO THE BUYER.

              1. ORDERS

              11.1. THE BUYER MUST SUBMIT TO THE SELLER AN ORDER FOR THE PRODUCT(S), IN THE CURRENCY APPLICABLE TO THE BUYER AS PREVIOUSLY AGREED WITH THE SELLER, AND SUCH ORDER IS SUBJECT TO THE SELLER’ ACCEPTANCE. SUCH ORDERS SHALL BE SUBMITTED TO THE APPROPRIATE ORDER ENTRY LOCATION, IN THE FORM AND MEDIUM, ALL AS SPECIFIED BY THE SELLER, WHICH MAY BE PHYSICAL OR VIRTUAL.

              11.2. IF THERE IS ANY INCONSISTENCY BETWEEN THE TERMS OF THE AGREEMENT AND THE TERMS OF THE BUYER’S ORDER, THE TERMS OF THE AGREEMENT SHALL PREVAIL AND THE INCONSISTENT TERMS OF THE BUYER’S ORDER SHALL BE VOID AND OF NO EFFECT.

              11.3. AN ORDER MUST BE SIGNED (INCLUDING ELECTRONIC SIGNATURES IF APPLICABLE) BY AN AUTHORIZED SIGNATORY. AT THE SELLER’S DISCRETION, ORDERS RECEIVED WITHOUT THIS SIGNATORY WILL BE REJECTED AND THE BUYER WILL BE ASKED TO RESUBMIT.

              11.4. THE SELLER SHALL ACKNOWLEDGE THE RECEIPT OF ORDERS WITHIN FIVE (5) WORKING DAYS, UNLESS THE SELLER HAS A LEGITIMATE REASON TO REJECT SUCH ORDERS. SUCH LEGITIMATE REASON MAY BE INCLUDING BUT NOT LIMITED TO TERMINATION OF PRODUCTION, NOT HAVING RECEIVED THE AMOUNT OF THE ORDER IN ADVANCE OF THE BUYER, AN OVERDUE PAYMENT OF THE BUYER ETC. DELIVERY DATES ACKNOWLEDGED BY THE SELLER ARE APPROXIMATE AND THE SELLER WILL NOT BE LIABLE FOR ANY LOSS OR DAMAGE DUE TO ITS FAILURE TO MEET SCHEDULED DELIVERY DATES. 11.5 IN THE EVENT THE BUYER REQUESTS THE SELLER TO DELAY DELIVERY OF PRODUCT WITH LESS THAN THIRTY (30) DAYS WRITTEN NOTICE PRIOR TO THE SCHEDULED SHIPMENT DATE OF A PRODUCT, THE BUYER MAY, AT THE SELLER’S DISCRETION, BE SUBJECT TO A FIFTEEN (15%) PERCENT CHARGE BASED UPON THE CONTRACT PRICE OF THE PRODUCT, WHERE THE SELLER HAS INCURRED COSTS TO SATISFY THE ORIGINAL SHIPMENT DATE. IF THE BUYER REQUESTS POSTPONEMENT OF A SCHEDULED SHIPMENT TO A DATE THAT IS SIX (6) MONTHS OR MORE AFTER THE ORIGINALLY SCHEDULED SHIPMENT, THE ORDER PERTAINING TO SUCH SHIPMENT SHALL BE CONSIDERED CANCELLED. IN THE EVENT OF ANY CANCELLATION, DUE TO SHIPMENT DATE POSTPONEMENT OR OTHERWISE, THE SELLER SHALL BE ENTITLED TO PURSUE ALL LEGAL REMEDIES.

              1. PROPRIETARY RIGHTS

              ALL PROPRIETARY RIGHTS IN THE PRODUCTS AND ALL FUTURE MODIFICATIONS AND VARIATIONS MADE TO THE PRODUCTS ARE AND SHALL VEST IN THE SELLER OR ITS LICENSORS INCLUDING TECHNIQUES AND COMPONENTS OF THE DEVELOPMENT OF SOFTWARE INCORPORATED IN THE PRODUCTS TO WHICH THE BUYER MAY HAVE CONTRIBUTED, UNLESS OTHERWISE AGREED IN WRITING AND SIGNED BY AUTHORIZED OFFICERS OF BOTH PARTIES. THE SELLER RESERVES THE RIGHT TO AUDIT THE BUYER RECORDS USING AN INDEPENDENT THIRD PARTY AUDITOR TO VERIFY COMPLIANCE WITH ALL LICENSES GRANTED UNDER THE AGREEMENT.

              1. FORCE MAJEURE

              13.1. NEITHER PARTY SHALL BE LIABLE FOR ANY DELAY OR DEFAULT IN ITS PERFORMANCE OF ANY OBLIGATION UNDER THE AGREEMENT CAUSED DIRECTLY OR INDIRECTLY BY AN ACT OR OMISSION OF CIVIL OR MILITARY AUTHORITY OF A STATE OR NATION, STRIKE, PANDEMIC, LOCKOUT OR OTHER LABOR PROBLEM, INABILITY TO SECURE, DELAY IN SECURING OR SHORTAGE OF LABOR, MATERIALS, SUPPLIES, TRANSPORTATION OR ENERGY, FAILURES OF SUBCONTRACTORS OR SUPPLIERS, DISCONTINUATION OF SERVICES / SERVICES BY THIRD (OPEN SOURCE) SUPPLIERS, OR BY WAR, RIOT, EMBARGO OR CIVIL DISTURBANCE, BREAKDOWN, OR DESTRUCTION OF PLANT OR EQUIPMENT ARISING FROM ANY CAUSE WHATSOEVER, OR ANY OTHER CAUSE OR CAUSES BEYOND SUCH PARTY’S REASONABLE CONTROL (A “FORCE MAJEURE SITUATION”). OR BY WAR, RIOT, EMBARGO OR CIVIL DISTURBANCE, BREAKDOWN, OR DESTRUCTION OF PLANT OR EQUIPMENT ARISING FROM ANY CAUSE WHATSOEVER, OR ANY OTHER CAUSE OR CAUSES BEYOND SUCH PARTY’S REASONABLE CONTROL (A “FORCE MAJEURE SITUATION”).

              13.2. AT SUCH PARTY’S OPTION AND FOLLOWING NOTICE TO THE OTHER PARTY, THAT PARTY’S OBLIGATIONS SHALL BE DEEMED TO BE SUSPENDED FOR THE CONTINUANCE OF THE FORCE MAJEURE SITUATION AND SUCH PARTY AGREES TO CONTINUE PERFORMANCE OF SUCH OBLIGATIONS WHENEVER SUCH FORCE MAJEURE SITUATION HAS BEEN CONCLUDED.

              1. DISPUTES

              IF LEGAL PROCEEDINGS ARE COMMENCED TO RESOLVE A DISPUTE ARISING OUT OF OR RELATING TO THIS AGREEMENT, THE PREVAILING PARTY SHALL BE ENTITLED TO RECOVER ALL OF ITS COSTS, ATTORNEY FEES, AND EXPERT WITNESS FEES, INCLUDING ANY COSTS OR ATTORNEY FEES, IN CONNECTION WITH ANY APPEALS, SUBJECT TO THE LIMITATIONS OF LIABILITY CONTAINED ELSEWHERE IN THE AGREEMENT.

              1. THIRD PARTY RIGHTS

              A THIRD PARTY THAT IS NOT A PARTY TO THIS AGREEMENT HAS NO RIGHT UNDER ANY LEGISLATION IN ANY COUNTRY GIVING RIGHTS TO THIRD PARTIES TO ENFORCE ANY TERM OF THIS AGREEMENT.

              1. EXPORT CONTROL

              THE PRODUCTS AND ALL RELATED TECHNICAL INFORMATION THAT THE SELLER MAY DELIVER OR DISCLOSE TO THE BUYER ARE SUBJECT TO DUTCH EXPORT CONTROL LAWS AND MAY BE SUBJECT TO EXPORT OR IMPORT RESTRICTION IN OTHER COUNTRIES. THE BUYER SHALL AT ALL TIMES COMPLY WITH THE DUTCH EXPORT REGULATIONS. THE X-SURVEILLANCE HEAD DESIGN AND X-SURVEILLANCE TECHNOLOGIES LOGO ARE TRADEMARKS OF X-SURVEILLANCE. ALL OTHER TRADEMARKS ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS. ALL RIGHTS RESERVED. THE BUYER SHALL OBTAIN ALL REQUIRED LICENSES AND APPROVALS NECESSARY TO COMPLY WITH THE EXPORT REGULATIONS AND ANY OTHER APPLICABLE LAW, INCLUDING ANY APPLICABLE LAWS PERTAINING TO THE EXPORT OF THE PRODUCTS FROM THE BUYER´S COUNTRY. THE SELLER MAY REFUSE TO DELIVER PRODUCTS TO THE BUYER WHERE THE BUYER IS LOCATED IN A COUNTRY WHICH THE DUTCH DEPARTMENT OF COMMERCE HAS PLACED AN EMBARGO (“EMBARGOED COUNTRIES”).

              1. ENTIRE AGREEMENT; NO WAIVER

              17.1. THE AGREEMENT CONSTITUTES THE WHOLE AGREEMENT BETWEEN THE PARTIES AND SUPERSEDES ANY PRIOR AGREEMENTS AND ARRANGEMENTS BETWEEN THE PARTIES IN RELATION TO ITS SUBJECT MATTER. FURTHERMORE, UNLESS EXPRESSLY PERMITTED IN THE AGREEMENT, ANY TERMS PROPOSED IN ANY DOCUMENT SUBMITTED BY THE BUYER OR THE SELLER, WHICH ADD TO, VARY FROM OR CONFLICT WITH THE AGREEMENT, ARE HEREBY EXCLUDED AND ANY SUCH TERMS PROPOSED SHALL NOT APPLY.

              17.2. THE BUYER ACKNOWLEDGES AND AGREES THAT IN ENTERING INTO THE AGREEMENT IT DOES NOT RELY ON, AND WILL HAVE NO REMEDY IN RESPECT OF ANY STATEMENT, REPRESENTATION, WARRANTY OR UNDERSTANDING (WHETHER NEGLIGENTLY OR INNOCENTLY MADE) OF ANY PERSON (WHETHER A PARTY TO THE AGREEMENT OR NOT) OTHER THAN AS EXPRESSLY SET OUT IN THE AGREEMENT. |

              17.3. NOTHING IN THIS CLAUSE 17 SHALL OPERATE TO LIMIT OR EXCLUDE ANY LIABILITY FOR FRAUDULENT MISREPRESENTATION.

              17.4. THE AGREEMENT MAY BE AMENDED OR MODIFIED ONLY IN WRITING SIGNED BY AUTHORIZED REPRESENTATIVES OF BOTH PARTIES.

              17.5. NOTWITHSTANDING THIS CLAUSE 17.5 THE SELLER HAS THE RIGHT TO AMEND THE AGREEMENT FOR THE REASONS SPECIFIED IN CLAUSE 20 (LAWS & REGULATIONS) WITH THIRTY (30) DAYS WRITTEN NOTICE TO BUYER. 17.6 A FAILURE BY ANY PARTY TO EXERCISE OR DELAY IN EXERCISING ANY RIGHT OR POWER CONFERRED UPON IT IN THE AGREEMENT SHALL NOT OPERATE AS A WAIVER OF ANY SUCH RIGHT OR POWER.

              1. CONFIDENTIAL INFORMATION

              18.1 EACH PARTY IS A DISCLOSING PARTY (“DISCLOSER”) AND A RECEIVING PARTY (“RECIPIENT”) OF CONFIDENTIAL INFORMATION UNDER THE AGREEMENT. DURING THE TERM OF THE AGREEMENT AND FOR A PERIOD OF THREE (3) YEARS FROM THE EXPIRATION OR TERMINATION OF THE AGREEMENT,

              (I) A RECIPIENT WILL NOT DISCLOSE CONFIDENTIAL INFORMATION TO ANY THIRD PARTY;

              (II) RESTRICT DISCLOSURE OF CONFIDENTIAL INFORMATION TO ONLY THOSE EMPLOYEES, AGENTS OR CONSULTANTS OF THE RECIPIENT WHO MUST BE DIRECTLY INVOLVED WITH THE CONFIDENTIAL INFORMATION FOR THE PURPOSES OF THE AGREEMENT AND WHO ARE BOUND BY CONFIDENTIALITY TERMS SUBSTANTIALLY SIMILAR TO THOSE IN THE AGREEMENT; (III) NOT REVERSE ENGINEER, DE-COMPILE OR DISASSEMBLE ANY CONFIDENTIAL INFORMATION; (IV) USE THE SAME DEGREE OF CARE AS FOR ITS OWN INFORMATION OF LIKE IMPORTANCE, BUT AT LEAST USE REASONABLE CARE, IN SAFEGUARDING AGAINST DISCLOSURE OF CONFIDENTIAL INFORMATION;

              (V) PROMPTLY NOTIFY THE DISCLOSER UPON DISCOVERY OF ANY UNAUTHORIZED USE OR DISCLOSURE OF THE CONFIDENTIAL INFORMATION AND TAKE REASONABLE STEPS TO REGAIN POSSESSION OF THE CONFIDENTIAL INFORMATION AND PREVENT FURTHER UNAUTHORIZED ACTIONS OR OTHER BREACH OF THE AGREEMENT. NOTWITHSTANDING THE ABOVE, THE SELLER MAY DISCLOSE CONFIDENTIAL INFORMATION TO ANY OF ITS AFFILIATES.

              18.2 THE DISCLOSER CONSENTS TO THE DISCLOSURE OF THE CONFIDENTIAL INFORMATION TO THE EXTENT STRICTLY NECESSARY FOR INFORMING ANY SUBCONTRACTORS OR SUPPLIERS OF THE RECIPIENT WHO NEED TO KNOW SUCH LIMITED INFORMATION IN ORDER TO PERFORM ANY ASSIGNMENTS OR HANDLE ANY ORDERS OF THE RECIPIENT PURSUANT TO THE AGREEMENT PROVIDED HOWEVER THAT SUCH SUBCONTRACTORS OR SUPPLIERS WILL FIRST HAVE AGREED WITH THE RECIPIENT TO BE BOUND BY ITS CONFIDENTIALITY OBLIGATIONS HEREUNDER OR OBLIGATIONS WHICH PROTECT THE CONFIDENTIAL INFORMATION TO THE EXTENT PROTECTED HEREUNDER IN RESPECT OF SUCH LIMITED CONFIDENTIAL INFORMATION THEY WILL RECEIVE INCLUDING APPROPRIATE OBLIGATIONS NOT TO DISCLOSE THE SAME TO OTHERS AND NOT TO USE IT FOR OTHER PURPOSES AS WELL AS TO RETURN ALL SUCH INFORMATION TO THE RECIPIENT UPON COMPLETION OF THEIR ASSIGNMENT OR OTHER REQUIRED PERFORMANCES.

              18.3 THE OBLIGATIONS OF CONFIDENTIALITY WILL CEASE TO APPLY TO INFORMATION WHICH: (A) IS AT THE DATE OF THE DISCLOSURE PUBLIC KNOWLEDGE THROUGH NO FAULT OF THE RECIPIENT; OR CAN BE SHOWN BY THE RECIPIENT TO HAVE BEEN KNOWN TO IT BEFORE THE INFORMATION WAS DISCLOSED BY THE DISCLOSER; OR (B) IS EXPLICITLY APPROVED FOR RELEASE BY WRITTEN AUTHORIZATION OF THE DISCLOSER;

              (C) IS LAWFULLY OBTAINED FROM A THIRD PARTY OR PARTIES WITHOUT A DUTY OF CONFIDENTIALITY; (D) IS INDEPENDENTLY DEVELOPED BY A PARTY WITHOUT THE USE OF ANY OF THE OTHER PARTY’S CONFIDENTIAL INFORMATION OR ANY BREACH OF THE AGREEMENT; OR

              (E) IS REQUIRED TO BE DISCLOSED BY ANY APPLICABLE LAW OR REGULATION.

              18.4 IN THE EVENT THAT A PARTY IS REQUIRED BY LAW IN ANY JUDICIAL OR GOVERNMENTAL PROCEEDING OR OTHERWISE TO DISCLOSE ANY CONFIDENTIAL INFORMATION BELONGING TO THE OTHER PARTY, THE FIRST PARTY WILL GIVE TO THE OTHER PARTY PROMPT WRITTEN NOTICE OF SUCH REQUEST SO THAT THE OTHER PARTY MAY SEEK A PROTECTIVE ORDER OR APPROPRIATE REMEDY. IF, IN THE ABSENCE OF A PROTECTIVE ORDER, THE FIRST PARTY DETERMINES, UPON THE ADVICE OF COUNSEL, THAT IT IS REQUIRED TO DISCLOSE CONFIDENTIAL INFORMATION BELONGING TO THE OTHER PARTY, IT MAY DISCLOSE SUCH DOCUMENTATION ONLY TO THE EXTENT COMPELLED TO DO SO.

              18.5 CONFIDENTIAL INFORMATION DISCLOSED HEREUNDER WILL REMAIN THE PROPERTY OF THE DISCLOSER AND WILL NOT BE COPIED OR REPRODUCED WITHOUT THE EXPRESS WRITTEN PERMISSION OF THE DISCLOSER, EXCEPT FOR SUCH COPIES AS MAY BE ABSOLUTELY NECESSARY IN ORDER TO PERFORM ITS OBLIGATIONS UNDER THE AGREEMENT. UPON EXPIRATION OR TERMINATION OF THE AGREEMENT, OR WITHIN TEN (10) DAYS OF RECEIPT OF A DISCLOSER’S WRITTEN REQUEST, A RECIPIENT WILL RETURN ALL CONFIDENTIAL INFORMATION TO THE DISCLOSER ALONG WITH ALL COPIES AND PORTIONS THEREOF, OR CERTIFY IN WRITING THAT ALL SUCH CONFIDENTIAL INFORMATION HAS BEEN DESTROYED. HOWEVER, THE RECIPIENT MAY RETAIN ONE ARCHIVAL COPY OF THE CONFIDENTIAL INFORMATION WHICH IT MAY USE ONLY IN CASE OF A DISPUTE CONCERNING THE AGREEMENT.

              18.6 IF ANY DATA TRANSFER IS SET UNDER THE LAWS AND REGULATIONS OF THE UNITED STATES, EUROPEAN UNION AND / OR ANY OTHER APPLICABLE COUNTRIES, EACH PARTY HAS TO ABIDE BY SUCH. SPECIFICALLY, BUT WITHOUT LIMITATION, EACH PARTY AGREES THAT IT WILL NOT IN ANY FORM EXPORT, SELL OR TRANSFER DIRECTLY OR INDIRECTLY, ANY PRODUCTS, DOCUMENTATION, TECHNICAL DATA OR SOFTWARE OR A DIRECT PRODUCT THEREOF TO ANY THIRD PARTY WITHOUT FIRST OBTAINING THE APPROPRIATE LICENSES OR OTHER GOVERNMENTAL APPROVAL REQUIRED FROM THE UNITED STATES, EUROPEAN UNION AND / OR ANY OTHER APPLICABLE COUNTRIES.

              1. SEVERABILITY

              IF ANY PROVISION OF THE AGREEMENT IS HELD INVALID, ILLEGAL OR UNENFORCEABLE FOR ANY REASON BY ANY COURT OF COMPETENT JURISDICTION, SUCH PROVISION SHALL BE SEVERED AND THE REMAINDER OF ITS PROVISIONS WILL CONTINUE IN FULL FORCE AND EFFECT AS IF THE AGREEMENT HAD BEEN EXECUTED WITH THE INVALID, ILLEGAL OR UNENFORCEABLE PROVISION OMITTED.

              1. LAWS & REGULATIONS STANDARD TERMS AND CONDITIONS OF SALE FOR MOBILE & VIDEO SOLUTIONS. PRODUCTS AND SERVICES X-SURVEILLANCE ITS AFFILIATES AND THE X-SURVEILLANCE DESIGN AND X-SURVEILLANCE TECHNOLOGIES LOGO ARE TRADEMARKS OF X-SURVEILLANCE. ALL OTHER TRADEMARKS ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS. ALL RIGHTS RESERVED. 20.1 BOTH PARTIES SHALL COMPLY WITH ALL APPLICABLE LAWS AND REGULATIONS DIRECTLY RELATING TO THE PRODUCTS AND THE SELLER SPECIFICALLY WILL COMPLY WITH THE EU DIRECTIVE ON WASTE ELECTRICAL AND ELECTRONIC EQUIPMENT (WEEE) WHERE THE SELLER IS DEEMED A “PRODUCER”.

              20.2 IF THE BUYER USES ANY PRODUCT WITHIN ANY MEMBER STATE OF THE EUROPEAN UNION, THE BUYER AGREES TO USE ALL REASONABLE COMMERCIAL EFFORTS TO ENSURE THAT THE HARDWARE PRODUCTS ARE DISPOSED OF AS WASTE IN THE CORRECT MANNER. WASTE DISPOSAL STATIONS IN ALL MUNICIPALITIES IN THE EU PLAY AN IMPORTANT ROLE IN SEPARATING WASTE, INCLUDING ELECTRICAL AND ELECTRONIC EQUIPMENT.

              20.3. THE SELLER SHALL NOT BE LIABLE FOR ANY BREACH OF THE AGREEMENT DIRECTLY OR INDIRECTLY OCCASIONED BY OR RESULTING FROM COMPLIANCE WITH ANY REGULATORY ACTION OR DECISION TAKEN BY ANY COMPETENT AUTHORITY IN RESPECT OF THE AGREEMENT OR ANY PROVISION OF THE AGREEMENT OR IF ANY PROVISION OF THE AGREEMENT IS HELD TO BE VOID OR UNENFORCEABLE BY SUCH AUTHORITY.

              20.4. THE BUYER SHALL EFFECT OR SECURE AND MAINTAIN AT ITS OWN COST ALL NECESSARY GOVERNMENTAL PERMITS, LICENSES, APPROVALS AND REGISTRATIONS REQUIRED IN CONNECTION WITH THE EXECUTION OR PERFORMANCE OF THE AGREEMENT AND THE IMPORTATION AND RESALE OF THE PRODUCTS.

              20.5 WHERE THE APPLICABLE INCOTERM IS OTHER THAN DDP INCOTERMS 2010, THE BUYER ADDITIONALLY UNDERTAKES TO COMPLY WITH ALL REGULATORY REQUIREMENTS RELATING TO THE SALE OF THE PRODUCTS AND IN THE EXERCISE AND PERFORMANCE OF ITS RIGHTS AND OBLIGATIONS UNDER THE AGREEMENT. WITHOUT LIMITING THE GENERALITY OF THE FORGOING, THE BUYER UNDERTAKES TO VERIFY AND ASCERTAIN, PRIOR TO SHIPMENT OF PRODUCTS, TO ANY COUNTRY WITHIN THE REGION THAT THE PRODUCTS SHIPPED COMPLY WITH THE SPECIFIC REGULATORY REQUIREMENTS OF THAT PARTICULAR COUNTRY.

              1. NOTICES

              21.1. ALL NOTICES REQUIRED TO BE GIVEN UNDER THE AGREEMENT SHALL BE IN WRITING AND DELIVERED BY HAND, EMAIL, FACSIMILE OR BY INTERNATIONAL OVERNIGHT COURIER TO THE APPROPRIATE PARTY AS FOLLOWS: (A) NOTICES TO THE BUYER SHALL BE SENT TO THE BILLING ADDRESS AS STATED ON FRONT OF THE SUBMITTED ORDER OR AT SUCH ADDRESS AS MAY BE NOTIFIED BY THE BUYER FROM TIME TO TIME IN WRITING. (B) NOTICES TO THE SELLER SHALL BE SENT TO THE ADDRESS IDENTIFIED IN EACH RESPECTIVE ORDER ACKNOWLEDGMENT OR AT SUCH ADDRESS AS MAY BE NOTIFIED BY THE SELLER FROM TIME TO TIME IN WRITING.

              21.2. THE BUYER SHALL NOTIFY THE SELLER OF ANY CHANGES TO THE BUYER’S CONTACT INFORMATION IN WRITING. THE

              SELLER IS NOT RESPONSIBLE, NOR TO BE HELD LIABLE, FOR UNDELIVERED NOTICES DUE TO CHANGES TO THE BUYER’S CONTACT INFORMATION THAT THE SELLER WAS NOT NOTIFIED OF IN WRITING.

              1. GOVERNING LAW

              THE VALIDITY, INTERPRETATION AND CONSTRUCTION OF THE AGREEMENT SHALL BE GOVERNED BY AND CONSTRUED IN ACCORDANCE WITH LAWS OF THE NETHERLANDS. THE SELLER AND BUYER HEREBY AGREE TO SUBMIT TO THE NON EXCLUSIVE JURISDICTION OF THE COURTS OF THE HAGUE IN THE NETHERLANDS.

               

              Software Warranty

              X-SURVEILLANCE SOFTWARE WARRANTY

               

              X-SURVEILLANCE PERSONALIZED AND CUSTOM DEVELOPMENTS, PARTS OF EXISTING IP AS LICENSED SOFTWARE, OR ENTIRELY UPON LICENSED SOFTWARE, X-SURVEILLANCE WARRANTS THAT THE DELIVERED SOFTWARE (AND/OR SYSTEM) WILL NOT BE DEFECTIVE UNDER NORMAL USE, FOR A PERIOD OF THIRTY (30) DAYS FROM DELIVERY.

              X-SURVEILLANCE WILL SOLVE ANY DEFECTIVE SOFTWARE (AND/OR SYSTEM) WHICH IS EXAMINED AFTER THE REQUEST BY THE (END-)CLIENT BY EXPERTS AND DEVELOPERS OF X-SURVEILLANCE PRIOR TO SOLVING AN DEFECTIVE. THE ABOVE WARRANTY IS INAPPLICABLE IN THE EVENT THE SOFTWARE (AND/OR SYSTEM) BECOMES DEFECTIVE DUE TO UNAUTHORIZED USE, OR EXACT DELIVERY AND USAGE OF THE SOFTWARE AS DELIVERED BY X-SURVEILLANCE TO THE (END-CLIENT), OR MINOR MODIFICATIONS BY (END-)CLIENT OR USER(S), OR WITHOUT THE PURCHASE OF SLA (SERVICE LEVEL AGREEMENTS PROVIDED BY X-SURVEILLANCE SPECIFICALLY FOR THE CONTINUES FUNCTIONING OF SOFTWARE (AND/OR SYSTEM) AS PRE-ACTIVE, ACTIVE AND REAL-TIME DETECTION, ANALYSING AND SOLVING THREATS, ATTACKS OR OTHER BREACHES) OF THE SOFTWARE (AND/OR SYSTEM).

               

              X-SURVEILLANCE WARRANTS THAT THE SOFTWARE (AND/OR SYSTEM), AS DELIVERED BY X-SURVEILLANCE AND WHEN USED IN ACCORDANCE WITH THE DOCUMENTATION, WILL SUBSTANTIALLY CONFORM TO THE DOCUMENTATION FOR A PERIOD OF THIRTY (30) DAYS FROM DELIVERY. IF THE SOFTWARE (AND/OR SYSTEM) DOES NOT COMPLY WITH THIS WARRANTY AND SUCH NON-COMPLIANCE IS REPORTED BY YOU (END-)CLIENT TO X-SURVEILLANCE WITHIN THE THIRTY (30) DAY WARRANTY PERIOD, X-SURVEILLANCE WILL DO ONE OF THE FOLLOWING, SELECTED AT X-SURVEILLANCE’S REASONABLE DISCRETION: EITHER (I) REPAIR ON-SITE THE SOFTWARE (AND/OR SYSTEM), (II) SOLVE THE ISSUE WITHIN THE SOFTWARE (AND/OR SYSTEM) FOR A TIME PERIOD NOT EXCEEDING THIRTY (30) DAYS. THE ABOVE WARRANTY SPECIFICALLY EXCLUDES DEFECTS RESULTING FROM ACCIDENT, ABUSE, UNAUTHORIZED REPAIR, MODIFICATIONS OR ENHANCEMENTS, POOR COMMUNICATION, FAULTY HARDWARE, INFERIOR COLLABORATION OR MISAPPLICATION. THE OBJECTIVE BY X-SURVEILLANCE IS TO DELIVER A ERROR-FREE ON UNINTERRUPTED AND ROBUST AND APPROPRIATE WORKING SOFTWARE (AND/OR SYSTEM).

              TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ARE EXCLUSIVE WARRANTIES AND ARE IN LIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES, AND NON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. X-SURVEILLANCE MAKES NO WARRANTIES OR REPRESENTATIONS THAT THE SOFTWARE (AND/OR SYSTEM), UPDATES OR UPGRADES WILL MEET (END- )CLIENT’S REQUIREMENTS OR THAT OPERATION OR USE OF THE SOFTWARE (AND/OR SYSTEM), UPDATES, AND UPGRADES WILL BE UNINTERRUPTED OR ERROR-FREE. X-SURVEILLANCE CAN SOLELY PROVIDE CONTINUOUS FUNCTIONING OF THE SOFTWARE (AND/OR SYSTEM) AS LONG AS ALL PROCEEDINGS ARE HANDLED BY X SYSTEMS AND BY THE PURCHASE OF THE SLA’S PROVIDED BY X-SURVEILLANCE BASED UPON THE SPECIFIC DELIVERED SOFTWARE (AND/OR SYSTEM).

              LIMITATION OF LIABILITY. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENT WILL X-SURVEILLANCE OR ITS LICENSORS, OR PARTNERS BE LIABLE TO THE (END-)CLIENT FOR (I) ANY COSTS OF PROCUREMENT OF SUBSTITUTE OR REPLACEMENT GOODS AND SERVICES, LOSS OF PROFITS, LOSS OF USE, LOSS OF OR CORRUPTION TO DATA, BUSINESS INTERRUPTION, LOSS OF PRODUCTION, LOSS OF REVENUES, LOSS OF CONTRACTS, LOSS OF GOODWILL, OR ANTICIPATED SAVINGS OR WASTED MANAGEMENT AND STAFF TIME; OR (II) ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES WHETHER ARISING DIRECTLY OR INDIRECTLY OUT OF THIS WARRANTY AGREEMENT, EVEN IF X-SURVEILLANCE OR ITS LICENSORS, OR PARTNERS HAS BEEN ADVISED SUCH DAMAGES MIGHT OCCUR. ADDITIONAL IN NO CASE SHALL X-SURVEILLANCE BE LIABLE WHEN ANY, MINOR OR MAJOR, CHANGE,

              MODIFICATION, RESTYLE, ADJUSTMENT, RESELL, CREATING COPIES OR TRYING TO GAIN ACCESS TO THE OPERATION PART OF THE SOFTWARE (AND/OR SYSTEM) BY THE (END-)CLIENT OR ITS PARTNERS. NOR WILL X-SURVEILLANCE BE LIABLE FOR THREATS, ABUSE, MISUSE, MISTREAT, MALTREAT, MANIPULATION OR ANY OF THIS KIND IS ATTEMPTED AND/OR EXECUTED BY (END-)CLIENT, ITS PARTNERS OR THIRD PARTIES THAT MAY EXAMINE, ATTEMPT, PERFORM, ACCOMPLISH WITH GOOD OR BAD INTENTIONS AND THAT MAY AFFECT THE SOFTWARE (AND/OR SYSTEM).

              X-SURVEILLANCE HAS NO OBLIGATION UNDER THIS LICENSE AGREEMENT TO PROVIDE MAINTENANCE / SUPPORT FOR THE SOFTWARE (AND/OR SYSTEM). ANY MAINTENANCE / SUPPORT PURCHASED FOR THE SOFTWARE (AND/OR SYSTEM) IS SUBJECT TO X-SURVEILLANCE THEN-CURRENT SLA (SERVICE LEVEL AGREEMENT). AND MUST BE PURCHASED TO RECEIVE CONTINUES MAINTENANCE / SUPPORT, DEPENDING ON THE SLA TIER’S THAT THE (END-)CLIENT HAS PURCHASED.

              WHEN THE SOFTWARE (AND/OR SYSTEM) BY X-SURVEILLANCE IS PROVIDED TO THE (END-)CLIENT FOR EVALUATION PURPOSES AND (END-)CLIENT HAS AN

              EVALUATION PERIOD WHERE BY THE SOFTWARE (AND/OR SYSTEM) IS EVALUATED BY THE (END-)CLIENT FOR A PERIOD OF NOT EXCEEDING THIRTY (30) DAYS FROM THE DATE OF (END-)CLIENT INITIAL INSTALLATION, TRIAL AND OPERATION OF THE SOFTWARE (AND/OR SYSTEM), AND IS DECISIVE OF THE BEGIN OF THE WARRANTY PERIOD. IF NO SUCH EVALUATION IS DONE BY THE (END-)CLIENT ON THE SOFTWARE (AND/OR SYSTEM) THERE IS NO EXTENSION OF WARRANTY OR EVALUATION PERIOD.

              THE SOFTWARE (AND/OR SYSTEM) MAY CONTAIN AN AUTOMATIC DISABLING MECHANISM THAT PREVENTS ACCESS BY THE (END-)CLIENT, ITS PARTNERS OR THIRD-PARTIES WHEN THERE IS NO ACCESS GRANTED BY X SYSTEMS TO PREVENT ANY THREATS, ABUSE, MISUSE, MISTREAT, MALTREAT, MANIPULATION OR ANY OF THIS KIND WITHIN THE EVALUATION PERIOD AND AFTER THE EVALUATION PERIOD.

              THE COLLABORATION AND SOFTWARE (AND/OR SYSTEM) SHALL BE TERMINATED UPON (END-)CLIENT’S BREACH OF ANY TERM CONTAINED HEREIN. UPON TERMINATION, YOU SHALL IMMEDIATELY STOP USING AND DESTROY ALL COPIES OF THE SOFTWARE (AND/OR SYSTEM).

              THE COLLABORATION AND SOFTWARE (AND/OR SYSTEM) SHALL BE TERMINATED UPON (END-)CLIENT’S BREACH OF ANY TERM CONTAINED HEREIN. UPON TERMINATION, YOU SHALL IMMEDIATELY STOP USING AND DESTROY ALL COPIES OF THE SOFTWARE (AND/OR SYSTEM).

              IT’S NOT ALLOWED (WITHOUT ANY WRITTEN CONSENT FROM X-SYSTEMS) TO LEND OR HANDOVER HIGHLY SENSITIVE OR INTELLECTUAL PROPERTY RELATED SOFTWARE AND VITAL COMPONENTS TO THIRD PARTIES , – WHETHER OR NOT AN IMPARTIAL (GOVERNMENT) AGENCY OR A COMMERCIAL INSTITUTION -, DUE TO THE HIGH IMPACT OF THE SURVEILLANCE SOLUTIONS AND TRADEMARK VIOLATIONS. THE IP RIGHTS BELONG EXCLUSIVELY TO X-SYSTEMS B.V. AND IT IS THEREFORE ENTITLED TO WATCH OVER ANY INFRINGEMENT OF ITS RIGHTS. BY VIOLATION THE WARRANTY PROVISION, NO CLAIM AND OR REFUND CAN EVER BE MADE. BY ATTEMPTS OF SOFTWARE CODE REVIEWING OR CODE RE-ENGINEERING WITHOUT PERMISSION THERE IS EVEN A FINE OF 10 MILLION EUROS. THE SAME ALSO APPLIES TO ATTEMPTS AND EXECUTION OF HARDWARE AND SOFTWARE REVERSE ENGINEERING. HANDING OVER THE TECHNOLOGY FOR RESEARCH, ANALYSIS, EXAMINATIONS, EXPERIMENTS, MEASUREMENTS, TRIALS, TESTS OR TRIALS WITHOUT WRITTEN PERMISSION FROM X-SYSTEMS ALSO SUFFICES WITH THESE CONDITIONS.

              IN THE EVENT (END-)CLIENT REQUIRES TECHNICAL SUPPORT, MAINTENANCE OR ANY OF THIS KIND, SERVICE(S) MAY AND CAN ONLY BE GIVEN IN COMBINATION WITH PURCHASED SLA (SERVICE LEVEL AGREEMENT) AND UPON THE PURCHASED TIER’S BY THE (END-)CLIENT. WHEN A PURCHASE OF A SLA OR AN UPGRADE OF A SPECIFIC SLA TIER IS REQUIRED 24 HOURS PRIOR TO TECHNICAL SUPPORT, MAINTENANCE OR ANY OF THIS KIND THERE IS AN EMERGENCY RESPONSE FEE REQUESTED, DEPENDING OF THE NEED OF THE (END-)CLIENT, ON TOP OF THE STANDARD SLA TIER MONTHLY FEES THAT DEPEND ON THE TECHNICAL SUPPORT AND MAINTENANCE SLA TIER’S. WHEN AN SLA TIER IS PURCHASED FROM THE BEGINNING OF THE WARRANTY AND EVALUATION PERIOD, AND CONTINUES AFTER THESE PERIODS X-SURVEILLANCE WILL PROVIDE TECHNICAL SUPPORT, MAINTENANCE OR ANY OF THIS KIND AS AGREED IN THE SELECTED AND PURCHASED SLA (SERVICE LEVEL AGREEMENT).

              Discover how we can help your organization.
              Contact us to schedule a Live Meeting / Demonstration.

              Contact Us Today









                End To End Security

                Discover how we can help your organization with our “Security-by-Default” and “Privacy-by-Design” video conferencing platform.

                Book your Product Demo today









                  End To End Security
                  X-SURVEILLANCE WITH REGISTERED OFFICES AT LAAN VAN NIEUW OOST INDIE 202, 2593 CC DEN HAAG, THE NETHERLANDS (“X-SURVEILLANCE”), IS COMMITTED TO PROTECTING THE ONLINE PRIVACY OF THE USERS OF THIS WEBSITE (“WEBSITE”). AS SUCH, THIS PRIVACY POLICY HAS BEEN WRITTEN IN ORDER TO ALLOW YOU TO UNDERSTAND X-SURVEILLANCE’S POLICY REGARDING YOUR PRIVACY, AS WELL AS HOW YOUR PERSONAL INFORMATION WILL BE HANDLED WHEN USING THE WEBSITE. THIS PRIVACY POLICY WILL ALSO PROVIDE YOU WITH INFORMATION SO THAT YOU ARE ABLE TO CONSENT TO THE PROCESSING OF YOUR PERSONAL DATA IN AN EXPLICIT AND INFORMED MANNER, WHERE APPROPRIATE.

                  IN GENERAL, ANY INFORMATION AND DATA WHICH YOU PROVIDE TO X-SURVEILLANCE OVER THE WEBSITE, OR WHICH IS OTHERWISE GATHERED VIA THE WEBSITE BY X-SURVEILLANCE, IN THE CONTEXT OF THE USE OF X-SURVEILLANCE’S SERVICES (“SERVICES”), WILL BE PROCESSED BY X-SURVEILLANCE IN A LAWFUL, FAIR AND TRANSPARENT MANNER. TO THIS END, AND AS FURTHER DESCRIBED BELOW, X SYSTEMS TAKES INTO CONSIDERATION INTERNATIONALLY RECOGNISED PRINCIPLES GOVERNING THE PROCESSING OF PERSONAL DATA, SUCH AS PURPOSE LIMITATION, STORAGE LIMITATION, DATA MINIMISATION, DATA QUALITY AND CONFIDENTIALITY.

                  CONTENTS

                  1. DATA CONTROLLER AND DATA PROTECTION OFFICER
                  2. PERSONAL DATA PROCESSED
                  3. NAME, CONTACT DETAILS AND OTHER PERSONAL DATA
                  4. JOB APPLICATIONS
                  5. SPECIAL CATEGORIES OF PERSONAL DATA
                  6. OTHER PERSONS’ PERSONAL DATA
                  7. BROWSING DATA
                  8. COOKIES
                  9. PURPOSES OF PROCESSING
                  10. GROUNDS FOR PROCESSING AND MANDATORY OR DISCRETIONARY NATURE OF PROCESSING 5. RECIPIENTS OF PERSONAL DATA
                  11. TRANSFER OF PERSONAL DATA
                  12. RETENTION OF PERSONAL DATA
                  13. DATA SUBJECTS’ RIGHTS
                  14. AMENDMENTS
                  15. DATA CONTROLLER AND DATA PROTECTION OFFICER

                  X-SURVEILLANCE, AS IDENTIFIED AT THE TOP OF THIS PRIVACY POLICY, IS THE DATA CONTROLLER REGARDING ALL PERSONAL DATA PROCESSING CARRIED OUT THROUGH THE WEBSITE.

                  TO GET IN TOUCH WITH X-SURVEILLANCE’S DATA PROTECTION OFFICER, PLEASE CONTACT: INFO@X-SURVEILLANCE.COM

                  1. PERSONAL DATA PROCESSED

                  WHEN YOU USE THE WEBSITE, X-SURVEILLANCE WILL COLLECT AND PROCESS INFORMATION REGARDING YOU (AS AN INDIVIDUAL) WHICH ALLOWS YOU TO BE IDENTIFIED EITHER BY ITSELF, OR TOGETHER WITH OTHER INFORMATION WHICH HAS BEEN COLLECTED. X-SURVEILLANCE MAY ALSO BE ABLE TO COLLECT AND PROCESS INFORMATION REGARDING OTHER PERSONS IN THIS SAME MANNER, IF YOU CHOOSE TO PROVIDE IT TO X-SURVEILLANCE.

                  THIS INFORMATION MAY BE CLASSIFIED AS “PERSONAL DATA”, AND CAN BE COLLECTED BY X SYSTEMS BOTH WHEN YOU CHOOSE TO PROVIDE IT (E.G., WHEN YOU SIGN UP FOR AN ACCOUNT, IN ORDER TO RECEIVE X-SURVEILLANCE’S SERVICES) OR SIMPLY BY ANALYSING YOUR BEHAVIOR ON THE WEBSITE.

                  PERSONAL DATA WHICH CAN BE PROCESSED BY X-SURVEILLANCE THROUGH THE WEBSITE ARE AS FOLLOWS:

                  1. NAME, CONTACT DETAILS AND OTHER PERSONAL DATA

                  IN VARIOUS SECTIONS OF THE WEBSITE – INCLUDING, IN PARTICULAR, IF YOU DECIDE TO CREATE AN ACCOUNT ON THE WEBSITE – YOU WILL BE ASKED TO SUBMIT INFORMATION SUCH AS YOUR NAME, PHONE / MOBILE NUMBERS, E-MAIL ADDRESS, GENDER, DATE OF BIRTH, COUNTRY OF RESIDENCE AND ADDRESS, AS WELL AS, IN CERTAIN CASES, INFORMATION RELATED TO THE COMPANY YOU CURRENTLY WORK FOR AND YOUR POSITION IN THAT COMPANY. WHEN SUBSCRIBING OR SIGNING UP TO RECEIVE SERVICES, YOU WILL NEED TO PROVIDE INFORMATION AS TO YOUR PREFERRED MODE OF PAYMENT – PAYPAL OR CREDIT CARD – WHICH CAN BE SET AS A DEFAULT PAYMENT OPTION (WHERE AVAILABLE).

                  IN ADDITION, WHENEVER YOU PARTICIPATE IN SURVEYS AND OTHER PROMOTIONS OR CONTESTS WHICH MAY BE AVAILABLE ON THE WEBSITE, AS WELL AS WHENEVER YOU COMMUNICATE WITH X SYSTEMS THROUGH THE CONTACT DETAILS PROVIDED IN THE WEBSITE OR BY TELEPHONE WITH CUSTOMER SERVICE, X-SURVEILLANCE MAY COLLECT ADDITIONAL INFORMATION WHICH YOU CHOOSE TO PROVIDE. THIS IS ALSO THE CASE REGARDING ANY INFORMATION YOU CHOOSE TO DISCLOSE IN CERTAIN SECTIONS OF THE WEBSITE WHICH ALLOW YOU TO PARTICIPATE IN A PUBLIC FORUM OR TO CONTACT X-SURVEILLANCE DIRECTLY.

                  1. JOB APPLICATIONS

                  WHEN REGISTERING TO APPLY FOR A POSITION WITHIN X-SURVEILLANCE, IN THE “CAREERS” SECTION OF THE WEBSITE (WHEN AVAILABLE), YOU WILL ALSO BE ASKED TO PROVIDE VARIOUS TYPES OF PERSONAL DATA, INCLUDING PROFESSIONAL / EMPLOYMENT DETAILS (E.G., RESUME, COVER LETTER, PROFESSIONAL QUALIFICATIONS, AVAILABILITY TO START, PROFESSIONAL SOCIAL MEDIA URLS, ETC.).

                  YOU ARE ALSO ASKED TO PROVIDE OTHER JOB-SPECIFIC INFORMATION, WHICH INCLUDES YOUR MARITAL STATUS, GENDER AND DATE OF BIRTH, WHICH MAY HELP TO GIVE MORE INSIGHT INTO YOU AS A CANDIDATE – HOWEVER, THIS IS ENTIRELY OPTIONAL AND NOT MANDATORY (UNLESS OTHERWISE PROVIDED BY THE APPLICABLE LAW).

                  1. SPECIAL CATEGORIES OF PERSONAL DATA

                  CERTAIN AREAS OF THE WEBSITE INCLUDE FREE TEXT FIELDS WHERE YOU CAN WRITE MESSAGES TO X SYSTEMS, OR OTHERWISE ALLOW YOU TO POST VARIOUS TYPES OF CONTENT ON THE WEBSITE, WHICH MAY CONTAIN PERSONAL DATA.

                  WHERE THESE FIELDS ARE COMPLETELY FREE, YOU MAY USE THEM TO DISCLOSE, OR MAY POST CONTENT WHICH DISCLOSES (INADVERTENTLY OR NOT) MORE SENSITIVE CATEGORIES OF PERSONAL DATA, SUCH AS DATA REVEALING YOUR RACIAL OR ETHNIC ORIGIN, POLITICAL OPINIONS, RELIGIOUS OR PHILOSOPHICAL BELIEFS, OR TRADE UNION MEMBERSHIP. THE CONTENT YOU UPLOAD IN THESE FIELDS MAY ALSO (INADVERTENTLY OR NOT) INCLUDE OTHER TYPES OF SENSITIVE INFORMATION RELATING TO YOU, SUCH AS YOUR GENETIC DATA, BIOMETRIC DATA OR DATA CONCERNING YOUR HEALTH, SEX LIFE OR SEXUAL ORIENTATION.

                  X-SURVEILLANCE ASKS THAT YOU DO NOT DISCLOSE ANY SENSITIVE PERSONAL DATA IN THESE FREE TEXT FIELDS OR IN YOUR POSTS ON THE WEBSITE, UNLESS YOU CONSIDER THIS TO BE STRICTLY NECESSARY. IF YOU DO, THEN YOU WILL BE CONSIDERED AS HAVING CONSENTED TO X-SURVEILLANCE’S PROCESSING OF THIS PERSONAL DATA, WHICH WILL BE CONSIDERED LAWFUL ALSO DUE TO THE FACT THAT YOU HAVE PUBLICLY DISCLOSED IT ON THE WEBSITE.

                  IN ANY CASE, X-SURVEILLANCE WOULD STRESS THE IMPORTANCE OF PROVIDING YOUR EXPLICIT CONSENT TO PROCESS THIS SORT OF PERSONAL DATA (E.G., BY DECLARING THAT YOU CONSENT TO PROCESSING IN THE MESSAGE YOU WRITE IN THE FREE TEXT FIELDS OR POSTS), IF YOU DECIDE, NONETHELESS, TO SHARE IT.

                  WHEN REGISTERING TO APPLY FOR A POSITION WITHIN X-SURVEILLANCE, IN THE “CAREERS” SECTION OF THE WEBSITE (WHERE AVAILABLE), YOU ARE ALSO ASKED TO SUBMIT (OPTIONALLY) ADDITIONAL PERSONAL DATA, IDENTIFIED AS “JOB-SPECIFIC INFORMATION”. HERE, YOU MAY CHOOSE TO SHARE INFORMATION, E.G., REGARDING ANY DISABILITIES YOU MAY HAVE. AS IT IS TOTALLY OPTIONAL TO PROVIDE THIS INFORMATION, IF YOU DO, THEN YOU WILL BE CONSIDERED AS HAVING CONSENTED TO X SYSTEMS’S PROCESSING OF THIS PERSONAL DATA, WHICH WILL BE CONSIDERED LAWFUL ALSO DUE TO THE FACT THAT YOU HAVE PUBLICLY DISCLOSED IT ON THE WEBSITE.

                  1. OTHER PERSONS’ PERSONAL DATA

                  AS MENTIONED IN THE PREVIOUS SECTION, CERTAIN AREAS OF THE WEBSITE INCLUDE FREE TEXT FIELDS WHERE YOU CAN WRITE MESSAGES TO X-SURVEILLANCE, OR OTHERWISE ALLOW YOU TO POST VARIOUS TYPES OF CONTENT ON THE WEBSITE. THESE MESSAGES AND CONTENT MAY (INADVERTENTLY OR NOT) INCLUDE PERSONAL DATA RELATED TO OTHER PERSONS.

                  IN ANY SITUATION WHERE YOU DECIDE TO SHARE PERSONAL DATA RELATED TO OTHER PERSONS, YOU WILL BE CONSIDERED AS AN INDEPENDENT DATA CONTROLLER REGARDING THAT PERSONAL DATA, AND MUST ASSUME ALL INHERENT LEGAL OBLIGATIONS AND RESPONSIBILITIES. THIS MEANS, AMONG OTHER THINGS, THAT YOU MUST FULLY INDEMNIFY X-SURVEILLANCE AGAINST ANY COMPLAINTS, CLAIMS OR DEMANDS FOR COMPENSATION FOR DAMAGES WHICH MAY ARISE FROM THE PROCESSING OF THIS PERSONAL DATA, BROUGHT BY THE THIRD PARTIES WHOSE INFORMATION YOU PROVIDE THROUGH THE WEBSITE.

                  AS X-SURVEILLANCE DOES NOT COLLECT THIS INFORMATION DIRECTLY FROM THESE THIRD PARTIES (BUT RATHER COLLECTS THEM, INDIRECTLY, FROM YOU), YOU MUST MAKE SURE THAT YOU HAVE THESE THIRD PARTIES’ CONSENT BEFORE PROVIDING ANY INFORMATION REGARDING THEM TO X-SURVEILLANCE; IF NOT, THEN YOU MUST MAKE SURE THERE IS SOME OTHER APPROPRIATE GROUNDS ON WHICH YOU CAN RELY TO LAWFULLY GIVE X-SURVEILLANCE THIS INFORMATION.

                  1. BROWSING DATA

                  THE WEBSITE’S OPERATION, AS IS STANDARD WITH ANY WEBSITES ON THE INTERNET, INVOLVES THE USE OF COMPUTER SYSTEMS AND SOFTWARE PROCEDURES, WHICH COLLECT INFORMATION ABOUT THE WEBSITE’S USERS AS PART OF THEIR ROUTINE OPERATION. WHILE X-SURVEILLANCE DOES NOT COLLECT THIS INFORMATION IN ORDER TO LINK IT TO SPECIFIC USERS, IT IS STILL POSSIBLE TO IDENTIFY THOSE USERS EITHER DIRECTLY VIA THAT INFORMATION, OR BY USING OTHER INFORMATION COLLECTED – AS SUCH, THIS INFORMATION MUST ALSO BE CONSIDERED PERSONAL DATA.

                  THIS INFORMATION INCLUDES SEVERAL PARAMETERS RELATED TO YOUR OPERATING SYSTEM AND IT ENVIRONMENT, INCLUDING YOUR IP ADDRESS, LOCATION (COUNTRY), THE DOMAIN NAMES OF YOUR COMPUTER, THE URI (UNIFORM RESOURCE IDENTIFIER) ADDRESSES OF RESOURCES YOU REQUEST ON THE WEBSITE, THE TIME OF REQUESTS MADE, THE METHOD USED TO SUBMIT REQUESTS TO THE SERVER, THE DIMENSIONS OF THE FILE OBTAINED IN RESPONSE TO A REQUEST, THE NUMERICAL CODE

                  INDICATING THE STATUS OF THE RESPONSE SENT BY THE SERVER (SUCCESSFUL, ERROR, ETC.), AND SO ON.

                  THESE DATA ARE USED TO COMPILE STATISTICAL INFORMATION ON THE USE OF THE WEBSITE, AS WELL AS TO ENSURE ITS CORRECT OPERATION AND IDENTIFY ANY FAULTS AND/OR ABUSE OF THE WEBSITE.

                  1. COOKIES

                  – DEFINITIONS, CHARACTERISTICS, AND APPLICATION OF STANDARDS

                  COOKIES ARE SMALL TEXT FILES THAT MAY BE SENT TO AND REGISTERED ON YOUR COMPUTER BY THE WEBSITES YOU VISIT, TO THEN BE RE-SENT TO THOSE SAME SITES WHEN YOU VISIT THEM AGAIN. IT IS THANKS TO THESE COOKIES THAT THOSE WEBSITES CAN “REMEMBER” YOUR ACTIONS AND PREFERENCES (E.G., LOGIN DATA, LANGUAGE, FONT SIZE, OTHER DISPLAY SETTINGS, ETC.), SO THAT YOU DO NOT NEED TO CONFIGURE THEM AGAIN WHEN YOU NEXT VISIT THE WEBSITE, OR WHEN YOU CHANGE PAGES WITHIN A WEBSITE.

                  COOKIES ARE USED FOR ELECTRONIC AUTHENTICATION, MONITORING OF SESSIONS AND STORAGE OF INFORMATION REGARDING YOUR ACTIVITIES WHEN ACCESSING A WEBSITE. THEY MAY ALSO CONTAIN A UNIQUE ID CODE WHICH ALLOWS TRACKING OF YOUR BROWSING ACTIVITIES WITHIN A WEBSITE, FOR STATISTICAL OR ADVERTISING PURPOSES. SOME OPERATIONS WITHIN A WEBSITE MAY NOT BE ABLE TO BE PERFORMED WITHOUT THE USE OF COOKIES WHICH, IN CERTAIN CASES, ARE TECHNICALLY NECESSARY FOR OPERATION OF THE WEBSITE.

                  WHEN BROWSING A WEBSITE, YOU MAY ALSO RECEIVE COOKIES FROM WEBSITES OR WEB SERVERS OTHER THAN THE WEBSITE BEING VISITED (I.E., “THIRD-PARTY COOKIES”).

                  THERE ARE VARIOUS TYPES OF COOKIES, DEPENDING ON THEIR CHARACTERISTICS AND FUNCTIONS, WHICH MAY BE STORED ON YOUR COMPUTER FOR DIFFERENT PERIODS OF TIME: “SESSION COOKIES”, WHICH ARE AUTOMATICALLY DELETED WHEN YOU CLOSE YOUR BROWSER, AND “PERSISTENT COOKIES”, WHICH WILL REMAIN ON YOUR DEVICE UNTIL THEIR PRE-SET EXPIRATION PERIOD PASSES.

                  ACCORDING TO THE LAW WHICH MAY BE APPLICABLE TO YOU, YOUR CONSENT MAY NOT ALWAYS BE NECESSARY FOR COOKIES TO BE USED ON A WEBSITE. IN PARTICULAR, “TECHNICAL COOKIES” – I.E. COOKIES WHICH ARE ONLY USED TO SEND MESSAGES THROUGH AN ELECTRONIC COMMUNICATIONS NETWORK, OR WHICH ARE NEEDED TO PROVIDE SERVICES YOU REQUEST – TYPICALLY DO NOT REQUIRE

                  THIS CONSENT. THIS INCLUDES BROWSING OR SESSION COOKIES (USED TO ALLOW USERS TO LOGIN) AND FUNCTION COOKIES (USED TO REMEMBER CHOICES MADE BY A USER WHEN ACCESSING THE WEBSITE, SUCH AS LANGUAGE OR PRODUCTS SELECTED FOR PURCHASE).

                  ON THE OTHER HAND, “PROFILING COOKIES” – I.E., COOKIES USED TO CREATE PROFILES ON USERS AND TO SEND ADVERTISING MESSAGES IN LINE WITH THE PREFERENCES REVEALED BY USERS WHILE BROWSING WEBSITES – TYPICALLY REQUIRE SPECIFIC CONSENT FROM USERS, ALTHOUGH THIS MAY VARY ACCORDING TO THE APPLICABLE LAW.

                  – TYPES OF COOKIES USED BY THE WEBSITE

                  THE WEBSITE USE THE FOLLOWING TYPES OF COOKIES:

                  • BROWSING OR SESSION COOKIES, WHICH ARE STRICTLY NECESSARY FOR THE WEBSITE’S OPERATION, AND/OR TO ALLOW YOU TO USE THE WEBSITE’S CONTENT AND SERVICES.
                  • ANALYTICS COOKIES, WHICH ALLOW X-SURVEILLANCE TO UNDERSTAND HOW USERS MAKE USE OF THE WEBSITE, AND TO TRACK TRAFFIC TO AND FROM THE WEBSITE.
                  • FUNCTION COOKIES, WHICH ARE USED TO ACTIVATE SPECIFIC WEBSITE FUNCTIONS AND TO CONFIGURE THE WEBSITE ACCORDING TO YOUR CHOICES (E.G., LANGUAGE), IN ORDER TO IMPROVE YOUR EXPERIENCE.
                  • PROFILING COOKIES, WHICH ARE USED TO OBSERVE THE PREFERENCES YOU REVEAL THROUGH YOUR USE OF THE WEBSITE AND TO SEND YOU ADVERTISING MESSAGES IN LINE WITH THOSE PREFERENCES.

                  X-SURVEILLANCE ALSO USES THIRD-PARTY COOKIES – I.E. COOKIES FROM WEBSITES / WEB SERVERS OTHER THAN THE WEBSITE, OWNED BY THIRD PARTIES. THESE THIRD PARTIES WILL EITHER ACT AS INDEPENDENT DATA CONTROLLERS FROM X-SURVEILLANCE REGARDING THEIR OWN COOKIES (USING THE DATA THEY COLLECT FOR THEIR OWN PURPOSES AND UNDER TERMS DEFINED BY THEM) OR AS DATA PROCESSORS FOR X-SURVEILLANCE (PROCESSING PERSONAL DATA ON X-SURVEILLANCE’S BEHALF). FOR FURTHER INFORMATION ON HOW THESE THIRD PARTIES MAY USE YOUR INFORMATION VISIT THEIR WEBSITES.

                  YOU CAN BLOCK OR DELETE COOKIES USED ON THE WEBSITE VIA YOUR BROWSER OPTIONS. YOUR COOKIE PREFERENCES WILL BE RESET IF DIFFERENT BROWSERS ARE USED TO ACCESS THE WEBSITE. FOR MORE INFORMATION ON HOW TO SET THE PREFERENCES FOR COOKIES VIA YOUR BROWSER, PLEASE REFER TO THE FOLLOWING INSTRUCTIONS:

                  • INTERNET EXPLORER
                  • FIREFOX
                  • CHROME
                  • SAFARI

                  CAUTION: IF YOU BLOCK OR DELETE TECHNICAL AND/OR FUNCTION COOKIES USED BY THE WEBSITE, THE WEBSITE MAY BECOME IMPOSSIBLE TO BROWSE, CERTAIN SERVICES OR FUNCTIONS OF THE WEBSITE MAY BECOME UNAVAILABLE OR OTHER MALFUNCTIONS MAY OCCUR. IN THIS CASE, YOU MAY HAVE TO MODIFY OR MANUALLY ENTER SOME INFORMATION OR PREFERENCES EVERY TIME YOU VISIT THE WEBSITE.

                  X-SURVEILLANCE USES GOOGLE ANALYTICS ON THE WEBSITE. THIS IS A TOOL DEVELOPED BY GOOGLE AND USED TO COLLECT INFORMATION, WHICH PERMITS EVALUATION OF THE USE OF THE WEBSITE, ANALYSIS OF YOUR BEHAVIOR AND IMPROVEMENT OF YOUR EXPERIENCE WITH THE WEBSITE. YOU CAN OBTAIN MORE INFORMATION ABOUT HOW TO OPT OUT OF GOOGLE ANALYTICS AT: HTTPS://TOOLS.GOOGLE.COM/DLPAGE/GAOPTOUT.

                  1. PURPOSES OF PROCESSING

                  X-SURVEILLANCE INTENDS TO USE YOUR PERSONAL DATA, COLLECTED THROUGH THE WEBSITE, FOR THE FOLLOWING PURPOSES:

                  • TO VERIFY YOUR IDENTITY AND ASSIST YOU, IN CASE YOU LOSE OR FORGET YOUR LOGIN / PASSWORD DETAILS FOR ANY OF X-SURVEILLANCE’S REGISTRATION SERVICES, TO ALLOW YOU TO PARTICIPATE IN THE WEBSITE’S FORUMS AND DISCUSSIONS, BY MAINTAINING A REGISTERED USER PROFILE, AS WELL AS MANAGING AND REGISTERING YOUR PARTICIPATION, AND TO PROVIDE ANY OTHER SERVICES WHICH YOU MAY REQUEST (“SERVICE PROVISION”);
                  • TO EXAMINE APPLICANT’S RESUMES / CVS AND TO GET IN CONTACT WITH APPLICANTS WHO HAVE SUBMITTED THEIR APPLICATION VIA THE WEBSITE (“RECRUITMENT”);
                  • FOR FUTURE MARKETING, PROMOTIONAL AND PUBLICITY PURPOSES, INCLUDING TO ALLOW PARTICIPATION IN CONTESTS AND PROMOTIONS AVAILABLE VIA THE WEBSITE, AS WELL AS TO CARRY OUT DIRECT MARKETING, MARKET RESEARCH AND SURVEYS, VIA E-MAIL, SMS, PUSH NOTIFICATIONS, OVER THE PHONE, THROUGH AN OPERATOR, THROUGH X-SURVEILLANCE’S OFFICIAL SOCIAL MEDIA PAGES (“MARKETING”);
                  • TO CREATE A PROFILE OF YOU AS A WEBSITE USER, THROUGH THE USE OF PROFILING COOKIES AND BY COLLECTING AND ANALYSING INFORMATION ON THE PREFERENCES YOU SELECT AND CHOICES YOU MAKE IN THE WEBSITE, AS WELL AS YOUR GENERAL ACTIVITIES ON THE WEBSITE. THIS PROFILE WILL BE USED TO GIVE YOU INFORMATION ABOUT OTHER WEBSITES /

                  SERVICES WHICH X-SURVEILLANCE BELIEVES YOU MAY BE INTERESTED IN, AND TO SHOW YOU INFORMATION AND ADVERTISEMENTS WHICH MAY BE RELEVANT TO YOU AND YOUR INTERESTS. ALL ALGORITHMS INVOLVED IN THIS PROCESSING ARE REGULARLY TESTED, TO ENSURE THE PROCESSING’S FAIRNESS AND CONTROL FOR BIAS (“PROFILING”);

                  • FOR COMPLIANCE WITH LAWS WHICH IMPOSE UPON X-SURVEILLANCE THE COLLECTION AND/OR FURTHER PROCESSING OF CERTAIN KINDS OF PERSONAL DATA (“COMPLIANCE”);
                  • FOR DEVELOPMENT AND ADMINISTRATION OF THE WEBSITE, IN PARTICULAR BY USE OF DATA ANALYTICS REGARDING HOW YOU AND OTHER USERS USE THE WEBSITE, AS WELL AS THE INFORMATION AND FEEDBACK YOU PROVIDE, TO IMPROVE OUR OFFERINGS (“ANALYTICS”);
                  • TO PREVENT AND DETECT ANY MISUSE OF THE WEBSITE, OR ANY FRAUDULENT ACTIVITIES CARRIED OUT THROUGH THE WEBSITE (“MISUSE/FRAUD”).
                  1. GROUNDS FOR PROCESSING AND MANDATORY / DISCRETIONARY NATURE OF PROCESSING

                  X-SURVEILLANCE’S LEGAL BASES TO PROCESS YOUR PERSONAL DATA, ACCORDING TO THE PURPOSES IDENTIFIED IN SECTION 3 , ARE AS FOLLOWS:

                  • SERVICE PROVISION: PROCESSING FOR THESE PURPOSES IS NECESSARY TO PROVIDE THE SERVICES AND, THEREFORE, IS NECESSARY FOR THE PERFORMANCE OF A CONTRACT WITH YOU. IT IS NOT MANDATORY FOR YOU TO GIVE X-SURVEILLANCE YOUR PERSONAL DATA FOR THESE PURPOSES; HOWEVER, IF YOU DO NOT, X-SURVEILLANCE WILL NOT BE ABLE TO PROVIDE ANY SERVICES TO YOU.
                  • RECRUITMENT: PROCESSING FOR THIS PURPOSE IS NEEDED IN ORDER FOR X-SURVEILLANCE TO BE ABLE TO CONSIDER OFFERING YOU A POSITION AND, THEREFORE, IS NECESSARY TO TAKE STEPS AT YOUR REQUEST BEFORE (POTENTIALLY) ENTERING INTO AN EMPLOYMENT CONTRACT. IT IS NOT MANDATORY FOR YOU TO GIVE X-SURVEILLANCE YOUR PERSONAL DATA FOR THESE PURPOSES; HOWEVER, IF YOU DO NOT, X-SURVEILLANCE WILL NOT BE ABLE TO CONSIDER YOUR CANDIDACIES.
                  • MARKETING: PROCESSING FOR THESE PURPOSES IS BASED ON YOUR CONSENT. IT IS NOT MANDATORY FOR YOU TO GIVE CONSENT TO X-SURVEILLANCE FOR USE OF YOUR PERSONAL DATA FOR THESE PURPOSES, AND YOU WILL SUFFER NO CONSEQUENCE IF YOU CHOOSE NOT

                  TO (ASIDE FROM NOT BEING ABLE TO RECEIVE FURTHER MARKETING COMMUNICATIONS FROM X-SURVEILLANCE). ANY CONSENT GIVEN MAY ALSO BE WITHDRAWN AT A LATER STAGE (PLEASE SEE SECTION 8 FOR MORE INFORMATION).

                  • PROFILING: PROCESSING FOR THIS PURPOSE IS BASED ON YOUR CONSENT, GIVEN BY ACCEPTING THE USE OF PROFILING COOKIES. IT IS NOT MANDATORY FOR YOU TO GIVE CONSENT TO X-SURVEILLANCE FOR USE OF YOUR PERSONAL DATA FOR THIS PURPOSE, AND YOU WILL SUFFER NO CONSEQUENCE IF YOU CHOOSE NOT TO (ASIDE FROM NOT BEING ABLE TO BENEFIT FROM GREATER PERSONALISATION OF YOUR USER EXPERIENCE REGARDING THE WEBSITE). ANY CONSENT GIVEN MAY ALSO BE WITHDRAWN AT A LATER STAGE (PLEASE SEE SECTION 8 FOR MORE INFORMATION).
                  • COMPLIANCE: PROCESSING FOR THIS PURPOSE IS NECESSARY FOR X-SURVEILLANCE TO COMPLY WITH ITS LEGAL OBLIGATIONS. WHEN YOU PROVIDE ANY PERSONAL DATA TO X-SURVEILLANCE, X-SURVEILLANCE MUST PROCESS IT IN ACCORDANCE WITH THE LAWS APPLICABLE TO IT, WHICH MAY INCLUDE RETAINING AND REPORTING YOUR PERSONAL DATA TO OFFICIAL AUTHORITIES FOR COMPLIANCE WITH TAX, CUSTOMS OR OTHER LEGAL OBLIGATIONS.
                  • ANALYTICS: INFORMATION COLLECTED FOR THIS PURPOSE IS USED TO ALLOW X-SURVEILLANCE TO UNDERSTAND HOW USERS INTERACT WITH THE WEBSITE AND TO IMPROVE THE WEBSITE ACCORDINGLY, WITH THE AIM TO PROVIDING A BETTER USER EXPERIENCE.
                  • MISUSE/FRAUD: INFORMATION COLLECTED FOR THIS PURPOSE IS USED EXCLUSIVELY TO PREVENT AND DETECT FRAUDULENT ACTIVITIES OR MISUSE OF THE WEBSITE (FOR POTENTIALLY CRIMINAL PURPOSES).
                  1. RECIPIENTS OF PERSONAL DATA

                  YOUR PERSONAL DATA MAY BE SHARED WITH THE FOLLOWING LIST OF PERSONS / ENTITIES (“RECIPIENTS”):

                  • PERSONS, COMPANIES OR PROFESSIONAL FIRMS PROVIDING X-SURVEILLANCE WITH ADVICE AND CONSULTANCY REGARDING ACCOUNTING, ADMINISTRATIVE, LEGAL, TAX, FINANCIAL AND DEBT COLLECTION MATTERS RELATED TO THE PROVISION OF THE SERVICES;
                  • ENTITIES ENGAGED IN ORDER TO PROVIDE THE SERVICES (E.G., HOSTING PROVIDERS OR E-MAIL PLATFORM PROVIDERS);
                  • ENTITIES ENGAGED AS DATA PROCESSORS, TO CARRY OUT PROCESSING ACTIVITIES RELATED TO MARKETING ON X-SURVEILLANCE’S BEHALF, WHERE YOU HAVE CONSENTED TO PROCESSING OF YOUR PERSONAL DATA FOR THESE PURPOSES (E.G., SMS ENGINES);
                  • PERSONS AUTHORISED TO PERFORM TECHNICAL MAINTENANCE (INCLUDING MAINTENANCE OF NETWORK EQUIPMENT AND ELECTRONIC COMMUNICATIONS NETWORKS);
                  • PERSONS AUTHORISED BY X-SURVEILLANCE TO PROCESS PERSONAL DATA NEEDED TO CARRY OUT ACTIVITIES STRICTLY RELATED TO THE PROVISION OF THE SERVICES, WHO HAVE UNDERTAKEN AN OBLIGATION OF CONFIDENTIALITY OR ARE SUBJECT TO AN APPROPRIATE LEGAL OBLIGATION OF CONFIDENTIALITY (E.G., EMPLOYEES OF X-SURVEILLANCE);
                  • OTHER COMPANIES WITHIN THE X-SURVEILLANCE GROUP; AND
                  • PUBLIC ENTITIES, BODIES OR AUTHORITIES TO WHOM YOUR PERSONAL DATA MAY BE DISCLOSED, IN ACCORDANCE WITH THE APPLICABLE LAW OR BINDING ORDERS OF THOSE ENTITIES, BODIES OR AUTHORITIES;
                  1. TRANSFER OF PERSONAL DATA

                  CONSIDERING X-SURVEILLANCE’S WORLDWIDE PRESENCE AND BUSINESS OPERATIONS, YOUR PERSONAL DATA MAY BE TRANSFERRED TO RECIPIENTS LOCATED IN SEVERAL DIFFERENT COUNTRIES. X SYSTEMS IMPLEMENTS APPROPRIATE SAFEGUARDS TO ENSURE THE LAWFULNESS AND SECURITY OF THESE PERSONAL DATA TRANSFERS, SUCH AS BY RELYING ON ADEQUACY DECISIONS FROM THE EUROPEAN COMMISSION, STANDARD DATA PROTECTION CLAUSES ADOPTED BY THE EUROPEAN COMMISSION, OR OTHER SAFEGUARDS OR CONDITIONS CONSIDERED ADEQUATE TO THE TRANSFER AT HAND.

                  1. RETENTION OF PERSONAL DATA

                  PERSONAL DATA PROCESSED FOR SERVICE PROVISION WILL BE KEPT BY X-SURVEILLANCE FOR THE PERIOD DEEMED STRICTLY NECESSARY TO FULFIL SUCH PURPOSES – IN ANY CASE, AS THESE PERSONAL DATA ARE PROCESSED FOR THE PROVISION OF THE SERVICES, X-SURVEILLANCE MAY

                  CONTINUE TO STORE THIS PERSONAL DATA FOR A LONGER PERIOD, AS MAY BE NECESSARY TO PROTECT X-SURVEILLANCE’S INTERESTS RELATED TO POTENTIAL LIABILITY RELATED TO THE PROVISION OF THE SERVICES.

                  PERSONAL DATA PROCESSED FOR RECRUITMENT WILL BE KEPT BY X-SURVEILLANCE FOR AS LONG AS THE VACANCY FOR WHICH THE CV WAS SUBMITTED IS STILL AVAILABLE OR, IN CASE OF OPEN POSITIONS, FOR UP TO 1 YEAR. X-SURVEILLANCE MAY CONTACT APPLICANTS BEFORE THE EXPIRATION OF THIS PERIOD TO REQUEST AN EXTENSION OF THE RETENTION PERIOD.

                  PERSONAL DATA PROCESSED FOR MARKETING AND PROFILING WILL BE KEPT BY X-SURVEILLANCE FROM THE MOMENT YOU GIVE CONSENT UNTIL THE MOMENT YOU WITHDRAW THE CONSENT GIVEN. ONCE CONSENT IS WITHDRAWN, PERSONAL DATA WILL NO LONGER BE USED FOR THESE PURPOSES, ALTHOUGH IT MAY STILL BE KEPT BY X-SURVEILLANCE, IN PARTICULAR AS MAY BE NECESSARY TO PROTECT X SYSTEMS’S INTERESTS RELATED TO POTENTIAL LIABILITY RELATED TO THIS PROCESSING.

                  PERSONAL DATA PROCESSED FOR COMPLIANCE WILL BE KEPT BY X-SURVEILLANCE FOR THE PERIOD REQUIRED BY THE SPECIFIC LEGAL OBLIGATION OR BY THE APPLICABLE LAW.

                  PERSONAL DATA PROCESSED FOR ANALYTICS AND MISUSE/FRAUD WILL BE KEPT BY X-SURVEILLANCE FOR AS LONG AS DEEMED STRICTLY NECESSARY TO FULFIL THE PURPOSES FOR WHICH IT WAS COLLECTED, UNLESS YOU VALIDLY OBJECT TO THE PROCESSING OF YOUR PERSONAL DATA FOR THESE PURPOSES (PLEASE SEE SECTION 8 FOR MORE INFORMATION).

                  1. DATA SUBJECTS’ RIGHTS

                  UNDER THE REGULATION, YOU, AS A DATA SUBJECT, ARE ENTITLED TO EXERCISE THE FOLLOWING RIGHTS BEFORE X-SURVEILLANCE, AT ANY TIME:

                  • ACCESS YOUR PERSONAL DATA BEING PROCESSED BY X-SURVEILLANCE (AND/OR A COPY OF THAT PERSONAL DATA), AS WELL AS INFORMATION ON THE PROCESSING OF YOUR PERSONAL DATA;
                  • CORRECT OR UPDATE YOUR PERSONAL DATA PROCESSED BY X-SURVEILLANCE, WHERE IT MAY BE INACCURATE OR INCOMPLETE;
                  • REQUEST ERASURE OF YOUR PERSONAL DATA BEING PROCESSED BY X-SURVEILLANCE, WHERE YOU FEEL THAT THE PROCESSING IS UNNECESSARY OR OTHERWISE UNLAWFUL;
                  • REQUEST THE RESTRICTION OF THE PROCESSING OF YOUR PERSONAL DATA, WHERE YOU FEEL THAT THE PERSONAL DATA PROCESSED IS INACCURATE, UNNECESSARY OR UNLAWFULLY PROCESSED, OR WHERE YOU HAVE OBJECTED TO THE PROCESSING;
                  • EXERCISE YOUR RIGHT TO PORTABILITY: THE RIGHT TO OBTAIN A COPY OF YOUR PERSONAL DATA PROVIDED TO X-SURVEILLANCE, IN A STRUCTURED, COMMONLY USED AND MACHINE READABLE FORMAT, AS WELL AS THE TRANSMISSION OF THAT PERSONAL DATA TO ANOTHER DATA CONTROLLER;
                  • OBJECT TO THE PROCESSING OF YOUR PERSONAL DATA, BASED ON RELEVANT GROUNDS RELATED TO YOUR PARTICULAR SITUATION, WHICH YOU BELIEVE MUST PREVENT X-SURVEILLANCE FROM PROCESSING YOUR PERSONAL DATA; OR
                  • WITHDRAW YOUR CONSENT TO PROCESSING (FOR MARKETING AND PROFILING).

                  PLEASE NOTE THAT MOST OF THE PERSONAL INFORMATION YOU PROVIDE TO X-SURVEILLANCE CAN BE CHANGED AT ANY TIME, INCLUDING YOUR E-MAIL PREFERENCES, BY ACCESSING THE USER PROFILE YOU CAN CREATE ON THE WEBSITE.

                  YOU CAN WITHDRAW CONSENT REGARDING PROCESSING FOR MARKETING BY SELECTING THE APPROPRIATE LINK INCLUDED AT THE BOTTOM OF EVERY MARKETING E-MAIL MESSAGE RECEIVED.

                  ASIDE FROM THE ABOVE MEANS, YOU CAN ALSO EXERCISE YOUR RIGHTS DESCRIBED ABOVE BY SENDING US A SUPPORT REQUEST VIA THE WEBSITE, OR BY SENDING A WRITTEN REQUEST TO X SYSTEMS AT THE FOLLOWING ADDRESS: INFO@X-SURVEILLANCE.COM

                  IN ANY CASE, PLEASE NOTE THAT, AS A DATA SUBJECT, YOU ARE ENTITLED TO FILE A COMPLAINT WITH THE COMPETENT SUPERVISORY AUTHORITIES FOR THE PROTECTION OF PERSONAL DATA, IF YOU BELIEVE THAT THE PROCESSING OF YOUR PERSONAL DATA CARRIED OUT THROUGH THE WEBSITE IS UNLAWFUL.

                  1. AMENDMENTS

                  THIS PRIVACY POLICY ENTERED INTO FORCE ON JUNE, 2021. X-SURVEILLANCE RESERVES THE RIGHT TO PARTLY OR FULLY AMEND THIS PRIVACY POLICY, OR SIMPLY TO UPDATE ITS CONTENT, E.G., AS A RESULT OF CHANGES IN APPLICABLE LAW. X-SURVEILLANCE WILL INFORM YOU OF SUCH CHANGES AS SOON AS THEY ARE INTRODUCED, AND THEY WILL BE BINDING AS SOON AS THEY ARE PUBLISHED ON THE WEBSITE. X-SURVEILLANCE THEREFORE INVITES YOU TO REGULARLY VISIT THIS PRIVACY POLICY IN ORDER TO ACQUAINT YOURSELF WITH THE LATEST, UPDATED VERSION OF THE PRIVACY POLICY, SO THAT YOU MAY REMAIN CONSTANTLY INFORMED ON HOW X-SURVEILLANCE COLLECTS AND USES PERSONAL DATA.

                  PBIC, a Privacy-By-Design Proximity IMSI Detector

                  X-Surveillance introduces the new PBIC v3 – Proximity Baseband Identifier Collector.

                  X-Surveillance it’s (UVP) unique value proposition is ultra-close and close proximity detection of mobile and IoT devices. Privacy-centric and native 4G LTE IMSI Catcher + 5G IMSI Catcher (close) proximity detection technology. Collecting wireless and cellular handshakes passively from the open wireless spectrum.

                  SEMI-PASSIVE IMSI CATCHER & IMSI DETECTOR

                  PBIC V3 Multi-Spectrum

                  Close Proximity & Passive IMSI Detector

                  Detecting accurately in ultra close (1.5 mtrs) up to close (75 mtrs) proximity IoT and mobile devices within the GSM – EDGE – LTE – 5G – BLE – WIFI spectrum.

                  Collecting wireless and cellular identifiers (handshakes) in the spectrum, both directional and omnidirectional.

                  With the PBIC V3 it is possible to bound different spectrum IMSI detecting devices to one account, for a broad (cost-reducing) solution.

                  Next-Gen Predictive Security

                  Additional Layer of Security

                  The corporate PBIC is specially developed to safeguard properties and assets. To warn you more accurately and more quickly as a preventative measure using predictive techniques.

                  Detected identifiers are converted into predictive detected intelligence based on a configured algorithm, fact-data correlations, attributes and patterns. This gives you accurate and real-time insights into possible risks 24/7.

                  Remote Management

                  Real-time intelligence monitoring

                  Without extensive training, the PBIC can be deployed with ease as a portable, flexible and fixed solution.

                  A trained controller can remotely configure, maintain and monitor the PBIC. Optionally, the PBIC can be operational for up to 7 days separately from existing infrastructure. Available in different sizes. Like the size of a football, backpack or rugged case.

                  Close proximity & privacy-by-design IMSI Detection.

                  Economical IMSI Detection

                  X-Surveillance offers the PBIC in different variants. As a stand-alone, covert, tactical, portable and even as a fixed variant. Due to its small size and low price, the PBIC can be used as an IMSI detecting passive IMSI Catcher / Detector device for everything.

                   

                  We understand that interception is often not necessary, by only offering an IMSI Detector without interception, the price can remain low. Contact us to learn more about our PBIC models.

                  GSM + LTE + 5G Detection

                  For tactical deployment, for national security, we understand that you want to use all means to detect threats. With extensive (remote) collective intelligence and (on-site) situational awareness, you can increase safety proactively and preventively.

                   

                  X-Surveillance offers various (privacy-ethical) privacy-centric IMSI Detectors for (tactical) operational deployment, the Passive GSM IMSI Catcher, 4G LTE IMSI Catcher and 5G IMSI Catcher. Allowing you to detect all unknown, unauthorized and authorized GSM, LTE, 5G, Bluetooth and Wi-Fi cellular devices in a close proximity.

                   

                  If you are looking for an IMSI Catcher with a range of 3 to 50 meters (optionally expandable to 75 meters), the PBIC IMSI Detector is the solution for you.