Privacy Statement for IP CENTCOM

Last updated: May 2014

Key points:

We want you to understand the privacy policy truly, so we provide the following two key points upfront before all the fine print:

  1. IP CENTCOM NEVER collects and transmits personal information without asking the permission explicitly from the user. Personal information includes all information or data that could reasonably be used to identify a person. Examples of personal information include: contacts, photos, phone number, audio & video recordings, location, SMS or other text communication, images of the computer’s desktop or screen shots, unique identifiers based on the computer's hardware, and in some cases, combined browsing history.
  2. IP CENTCOM may collect the information of software exceptions (i.e. internal program crashes in plain English) and app usage occasionally for the sole purpose of improving the app.

This policy is modeled on the privacy policies of Microsoft for their applications.

Because we at Biyee SciTech, Inc. respect your privacy, we want you to understand how we collect and use information about you. We are committed to helping protect the privacy of your information and helping ensure you have full control over how your information is used and shared.


At Biyee SciTech, Inc (BST), we're working hard to protect your privacy while delivering products that bring you the performance, power, and convenience you want in your personal computing. This Privacy Statement explains many of the data collection and use practices of IP CENTCOM, which is an app for Windows 8 devices. Please read the information below and also any supplemental information linked to this page for additional details about particular IP CENTCOM and services you might use. This isn’t intended to be an exhaustive list and doesn’t apply to other online or offline BST sites, products, or services.

BST is committed to helping protect the privacy of your data and helping ensure you have full control over how your data is used and distributed.

Related links


Collection and use of your personal information

We use the information we collect to enable the features you are using and provide the services or carry out the requests you authorize. We might also use the information to request feedback, provide critical updates and notifications regarding the software, improve the product or service, for example, bug and survey form inquiries, or provide you with advance notice of events or to tell you about new product releases.

Some personal information you enter might be included in metadata files. This metadata is solely used by IP CENTCOM to function with stated features.

Personal information you provide is never transferred to third parties without your consent. We occasionally hire other companies to provide limited services on our behalf, such as providing customer support. We only provide those companies with the personal information they need to deliver the service. They’re required to maintain the confidentiality of that information and are prohibited from using that information for any other purpose.

Personal information is never sent to BST.

BST might access or disclose information about you, including the content of your communications, to: (a) comply with the law or respond to lawful requests or legal process; (b) protect the rights or property of BST or our customers, including the enforcement of our agreements or policies governing your use of the services; or (c) act on a good faith belief that such access or disclosure is necessary to protect the personal safety of BST employees, customers, or the public.

Collection and use of information about your computer

IP CENTCOM includes features that access the Internet to provide you with additional information. These features are available any time you have an active connection to the Internet.

Any time IP CENTCOM contacts a BST server, information about your computer ("standard computer information") is sent. BST uses standard computer information to provide you Internet-enabled services, to help improve our products and services, and for statistical analysis. Standard computer information typically includes information such as your IP address, operating system version, browser version, and regional and language settings. If a particular feature or service sends information to BST, standard computer information is also sent.

After IP CENTCOM has been installed, future Internet requests from that computer might contain information that includes the name of your software product and the version number. This information doesn’t contain personally identifiable information.

From time to time, BST might change some of the Internet addresses (URLs) of the Internet services it provides. To ensure uninterrupted service, BST might download a file to your system containing the new Internet addresses that OneNote needs to access to allow you to use Internet services.


A cookie is a small text file placed on your hard disk by an Internet server. Cookies contain information that can later be read by an Internet server in the domain that issued the cookie to you. Cookies can’t be used to run applications or deliver viruses to your computer.

One of the primary purposes of cookies is to provide a convenience feature to save you time.

Whenever IP CENTCOM contacts a BST server, it can potentially save or access cookies. We also use cookies to assist in collecting information about which pages our customers visit within BST web sites. This site visitation data is identified only by a unique ID number, and it’s never linked with personal information unless you consent as described elsewhere in the Privacy Statement.

You have the ability to accept or decline cookies or change your language or locale by changing the settings in the Privacy tab of the Internet Options in the Control Panel.

BST products accept the privacy settings you select under Internet Options in Control Panel or in Internet Explorer and doesn’t download cookies if you have chosen not to allow cookies to be downloaded. Those features, described later in this statement, that use cookies might not work correctly with this setting in place. In addition, features used by websites and services that use cookies might not work correctly in Internet Explorer.

BST account authentication

IP CENTCOM does not use BST account authentication.

In App key purchasing

IP CENTCOM may use Microsoft in-app service to allow the user to purchase a key to activate certain features and/or remove ads. IP CENTCOM only verifies the receipt of the purchase. The entire purchase transaction is handled by Microsoft.


IP CENTCOM does not offer any subscription.

Volume Licensing

IP CENTCOM does not offer any volume.

Customer Experience Improvement Program

IP CENTCOM may invite you to participate in our Customer Experience Improvement Program (CEIP) to improve the quality, reliability, and performance of BST software and services. You will be notified and explained to explicitly should you are invited.

If you decide to participate, BST collects information about your hardware configuration and how you use our software and services to identify trends and usage patterns.


BST is committed to helping protect the security of your personal information. We use a variety of security technologies and procedures to help protect your personal information from unauthorized access, use, or disclosure.

Changes to the Privacy Statement

BST might occasionally update this Privacy Statement. The "last updated" date at the top of the Privacy Statement is updated with every revision. We encourage you to review periodically this Privacy Statement to be informed of how BST is protecting your information.

How to contact us

BST welcomes your comments regarding this Privacy Statement. If you have questions about this Statement or believe that we have not adhered to it, contact us using our feedback form.