Author Archives: admin

设计好的产品如何下载图片数据包?

1、   从用户仪表盘侧边栏依次进入”我的定制库”→”我的设计”,或者点击该链接直接跳转:https://popcustoms.cn/libraries/designs/

2、   勾选所需的产品;

3、   点击上方”下载图片数据包”。

image.png

 

● 数据包为.ZIP压缩包格式,您需要自行解压缩

● 压缩包内包含产品各视图图片和产品信息表格

上传的图片有什么要求?

颜色模式:POPCUSTOMS平台目前支持的图片颜色模式为RGB颜色。

图片格式:支持JPG/PNG/BMP格式的图片。

像素:为了保证打印效果,我们在每个产品的定制页面都标注了建议像素。

image.png

● 您也可以上传小于建议像素的图片,但是生产效果将无法得到保证。

● 即便您已上传了符合建议像素的图片,但是过分放大图片依然会导致成品图案模糊,我们会在定制页面上有所提示。

image.png

法律声明

更新日期:2022年03月01日

 

        在使用POPCUSTOMS平台(以下或称”我们”)各项服务前,请您务必审慎阅读并充分理解本声明内容,特别是有关限制或免除平台责任以及明确用户使用规则的内容。阅读本声明的过程中,如果您不同意本声明或其中任何内容,您应立即停止使用POPCUSTOMS平台服务。如果您继续使用POPCUSTOMS平台服务,即视为您已全面阅读并同意本声明的全部内容。

 

一、权利归属

        除POPCUSTOMS平台另有说明外,本网站所载述的域名、商号、文字、信息、版面设计、流程、软件、程序及其它内容数据均受著作权法等其它有关法律、法规、规范性法律文件及相关国际条约的保护,其所有权利均归属POPCUSTOMS平台所有。 

POPCUSTOMS平台上设计师图库中的图片作品(下称”设计师图片”)均由入驻POPCUSTOMS平台的设计师设计上传,设计师对其创作的图片享有著作权。

 

二、平台使用规则

        您仅可根据POPCUSTOMS平台相关规则在规定范围内使用POPCUSTOMS平台提供的软件技术、设计师图片以及其他相关资料,包括但不限于: 

        (1)您不得通过机器人、蜘蛛等程序或设备或其他任何方式监视、复制、传播、展示、镜像、上载、下载等方式擅自使用POPCUSTOMS平台的软件、技术及程序; 

        (2)您不得对平台设计师图片进行修改、编辑、二次创作,亦不得许可、转授权、分销或者共享前述设计师图片; 

        (3)对于依托或使用POPCUSTOMS平台相关软件技术、物质资料等生成的产品、数据及其他信息(包括但不限于:文字、图标、图片、照片、图表、色彩组合、版面设计等)仅限于在POPCUSTOMS平台上使用。若需将前述产品、数据或其他信息用于其他平台或其他途径生产、使用的,必须经过POPCUSTOMS平台的书面许可。 

        (4)您在使用POPCUSTOMS平台时上传或发布的图片、文字等不得含有任何违反法律法规规定或侵害第三方合法权益的内容。如因您在使用POPCUSTOMS平台服务的过程中,违反本声明或平台规则或法律法规或侵犯第三方的权利而产生或引起任何索赔、要求、诉讼、损失和损害的,您应独立承担全部责任,并同意就此对POPCUSTOMS平台遭受的损失进行补偿。

 

三、责任限制

        POPCUSTOMS平台上生产商店铺中的产品信息均由生产商提供上传,由生产商对其提供上传的信息提供保证和承担相应的法律责任,POPCUSTOMS平台不对此承担任何责任。 

        您需于设计、定制产品时使用具有完整、合法、有效知识产权的图片,无论是否使用平台上的图片,您均应自行承担可能产生的风险,POPCUSTOMS平台不就您使用的图片及使用图片所造成的后果承担任何责任。 

        POPCUSTOMS平台转载的相关信息(包括新闻、文章、公告或论坛内容等)仅出于传递更多信息之目的,并不意味我们赞同其观点或已经证实其内容的真实性。 

        POPCUSTOMS平台不对任何因非POPCUSTOMS平台原因造成的您与POPCUSTOMS平台服务器之间的连接受阻而无法访问负责。 

        您应自行对您在平台上的全部行为承担责任,除POPCUSTOMS平台另有说明外,无论何种情况下POPCUSTOMS平台均不对您使用本平台上的服务和信息做任何保证,亦不对您因使用POPCUSTOMS平台而造成的直接、间接、偶尔的、特殊的、惩罚性的损害或其他一切损害承担任何责任。

 

四、知识产权保护

        POPCUSTOMS平台一直以来均秉承着尊重并保护知识产权的原则,强烈反对并打击侵犯知识产权的行为。我们承诺将会尽最大努力,对平台的内容进行管理,包括但不限于用户信息的审核、个人合法权益的保护、违法内容的审查、知识产权的监管等,并会通过各种技术手段,最大程度的避免侵犯平台用户或第三方权益的行为。 

        但您应知晓,受当前技术条件及其他不可控原因的限制,POPCUSTOMS平台目前仍无法保证平台用户或第三方的权益完全不会受到侵犯,如不幸出现此类问题,POPCUSTOMS平台会迅速响应并配合权利人的维权需要。 

        知识产权权利人若认为POPCUSTOMS平台内容(包括但不限于POPCUSTOMS平台用户发布的图片、商品信息等)侵犯您合法权益的,可在第一时间与我们进行联系,并向我们提供构成侵权的初步证据,我们将在收到您的合格通知及初步证据后依据相应的法律法规以及POPCUSTOMS平台规则及时处理。 

        本《法律声明》自2022年03月01日起生效,原《法律声明》自本声明生效之日即自动失效。本法律声明最终解释权归POPCUSTOMS平台所有。

刺绣免责声明

免责声明

尊敬的客户,感谢您使用刺绣个性化定制服务。使用定制服务前,请您仔细阅读并同意以下内容,以便我们更好地为您服务。

 

1. 颜色和细节可能存在细微差异,效果图仅供参考,请以实物效果为准。

2. 如果您想要一个空白背景,它应该PNG文件,且是透明的。当图稿带有纯色背景时,API 将尝试自动删除背景。

3. 仅使用固体形状,不要用摄影图像。

4. 避免过于复杂的设计。细节厚度必须至少为 10像素(0.08厘米)。如果您的设计过于复杂——它包含许多精细的细节(小文字、细线等)——您需要修改您的作品。

5. 仅使用纯色(无渐变或混合)。

6. 您的作品中最多只能有4种颜色(如果超过4种颜色,API会将其生成为具有4种颜色的新图像)。

7. 刺绣总是对齐设置区域的中心,因为API会剪掉所有透明背景,如果您的设计是在侧面或角落,可能会被移动到中心位置。

8. 您必须具有完全的民事权利能力和行为能力,并对商品的定制内容承担全部责任,包括但不限于:文字、图片、设计等。

9. 您保证合法上传图片或添加文字进行商品定制,禁止以任何形式上传和使用涉及以下内容的图片或文字,包括但不限于此处列出的情况。如因您使用图片或文字造成不良影响或各种纠纷,由您自行承担一切责任,我们对此不承担任何责任:

a) 含有国旗、党旗、国徽等的图片或文字政治内容;

b) 有版权问题的艺术作品图片;

c) 以人民币或其他货币为主题的图片或文字;

d) 未经授权使用企业标志、企业名称图片;

e) 含有宗教、种族歧视、侮辱和诽谤他人、性暴力、泄露商业秘密等内容的图片或文字;

f) 出于尊重肖像权的考虑,请勿擅自上传可以清晰看到他人肖像的图片;如有类似情况,上传前请先虚拟背景;

g) 其他明示或暗示违反社会公德和地方风俗习惯的图片或文字。

10. 您保证本站不会因接受定制服务而被任何第三方起诉、索赔或索赔。一旦发生上述情况,您应自行承担解决的费用和责任。如本网站遭受任何损失,本网站有权向您追偿。

11. 一旦开始使用,即表示您完全理解并接受上述定制服务的条款和条件。

Copyright Policy

These Product Upload Design Customization Rules apply to the Popcustoms.com website and Agency and any mobile applications operated by the website and its affiliates (“POPCUSTOMS”).

You may not post or sell anything restricted or prohibited by federal, state or local law in any jurisdiction. We have listed the categories and designs of prohibited items as following, but some categories may not be covered here. As a seller, it is your responsibility to ensure that you do not post items and designs that are prohibited by the laws of any jurisdiction.

POPCUSTOMS may update this policy from time to time and it is your responsibility to review this policy periodically to ensure compliance.

In accordance with the User Terms and Conditions, POPCUSTOMS reserves the right, in its sole discretion, to determine whether an item violates this policy and to require you to immediately delete an item or terminate your account for violation of this policy.

Prohibited Items:

● Copyright infringing items;

● Items that contradict public morals;

● Counterfeit goods or items of any kind that are counterfeit;

● Any goods or items that infringe the intellectual property rights of any company or individual;

● Items that promote hatred, violence, national, racial or religious intolerance;

● Espionage equipment and devices;

● Any other categories prohibited by the laws, regulations, sanctions and trade restrictions of any relevant jurisdiction;

For example,

1、Items with copyright infringing content

It refers to the use of words and graphics that are the same or similar to others’ registered trademarks on the same commodity or similar commodities without the permission of the trademark registrant.

* The identification of “similar goods” shall be based on the goods approved for use in the trademark registration certificate.

* The identification of “similar trademarks” should usually be considered from two aspects: one is whether the goods or services used by the two trademarks are the same or similar; the other is whether the main parts of the logos of the two trademarks are similar.

Copyright infringing judgment standard

Taking the general attention of ordinary consumers as the subjective standard for judgment, and adopting the method of combining the overall comparison with the comparison of the distinctive parts of the trademark, a comprehensive judgment is made.

In practice, the three elements of sound, shape and meaning of trademarks are mostly considered.

(1) Whether the pronunciation is the same;

(2) Whether the shape is similar, and whether it may lead to the intuitive misunderstanding of ordinary consumers;

(3) Whether the meaning is the same.

* A certain brand is involved in footwear products, and the customer’s picture contains the logo or pattern of the registered trademark.

* A certain brand is involved in footwear products, and the customer’s picture contains a logo or pattern of a registered trademark with a slight color adjustment.

2、Any goods or items that violate the intellectual property rights of any company or individual

This behavior means that the unauthorized user uses the same or similar trademark as the well-known trademark on his own goods that are different from the well-known trademark, and it cause consumers to misidentify or confuse the source of the commodity and its relationship with the producer in other respects, thereby weakening the special appeal and identification of the well-known trademark.

The main forms of dilution of well-known trademarks:

One is to vilify the relevant well-known trademark in a certain way;

The second is to darken the relevant well-known trademarks in a certain way;

The third is to make consumers misunderstand the trademark as the common name of the relevant commodity in an indirect way of misinterpretation.

* A certain brand is only involved in clothing, footwear products, but the customers uses pictures which contains the logo or pattern of the registered trademark to design home products.

* A certain brand is only involved in clothing and footwear products, but the customers uses pictures which contains the logo or pattern of the registered trademark to design home products, though the color of the logo or pattern has been adjusted slightly.

If you have any questions about the Copyright Policy, please feel free to contact us.

                                                                 January 1st, 2022

Data Handling Policy

POPCSUSTOMS & PILLAR SUPPLY LLC standard operating policy includes controls to manage risk to the confidentiality, integrity and availability of sensitive data in any form and represent a minimum standard for protection of this data. Controls required under applicable laws, regulations, or standards governing Personally Identifiable Information “PII” also apply. Each individual who creates, uses, processes, stores, transfers, administers, and/or destroys sensitive Data within POPCSUSTOMS & PILLAR SUPPLY LLC is responsible and accountable for complying with these standards.

Data Creation

Data Records within POPCUSTOMS & PILLAR SUPPLY LLC are primarily created via secure data acquisition from an online Marketplace (Amazon, eBay, Walmart, etc) or website. These data records are occasionally created or edited by the Seller who owns & operates the online store on said marketplace or website. Virtually all records include PII and are used to fulfill product orders for online Buyers.

It is essential that all records are created and maintained appropriately throughout their entire life cycle. Personally Identifiable Information (PII) contained in POPCSUSTOMS’s data records constitutes an area of critical concern because of the severe risk to POPCSUSTOMS, its clients and connectivity partners should records be mishandled or information inappropriately accessed or disclosed. As a consequence, records containing sensitive information & PII should exist only in areas where there is a legitimate and justifiable business need.

Access Management

POPCUSTOMS & PILLAR SUPPLY LLC uses a unique ID assigned to each individual with computer access to Sensitive Information. Under no circumstances do we create or use generic, shared, or default login credentials or user accounts. We have implemented baselining mechanisms to ensure that at all times only the required user accounts have access Sensitive Information. We review the list of people and services with access to Sensitive Information on a monthly basis and remove accounts that no longer require access. We restrict employees from accessing or storing Sensitive data on personal devices. We maintain and enforce “account lockout” by detecting anomalous usage patterns and log-in attempts and disabling accounts with access to Sensitive Information as needed.

Data Governance

POPCSUSTOMS & PILLAR SUPPLY LLC keeps inventory of all software and physical assets with access to PII. This inventory is updated every 60 days. We keep records of all data processing activities, including but not limited to, specific data fields as well as how they are collected, processed, stored, used, shared, and disposed of as they apply to PII. This record is maintained for the purpose of establishing accountability and compliance with regulations. We follow our posted Privacy Policy as it applies to customer consent and data rights per all applicable data privacy regulations.

Network Protection

All POPCSUSTOMS & PILLAR SUPPLY LLC servers and systems employ VPC subnet/Security Groups as well as network firewall network protection controls for the purpose of denying access to unauthorized IP addresses. Public access is restricted to approved users only.

Encryption and Storage

All PII is encrypted at rest using AES-256 industry standards. All cryptographic materials (encryption/decryption keys) and cryptographic capabilities used for encryption of PII at rest are only accessible to POPCUSTOMS  & PILLAR SUPPLY LLC system processes and services. We do not store PII in removable media (USB, Flash Drives, Etc.) or unsecured public cloud applications (Google Drive, Drop Box, Etc). No documents containing PII are ever printed on paper.

Encryption in Transit

POPCUSTOMS & PILLAR SUPPLY LLC encrypts all Sensitive Information in transit, when the data traverses a network, or is otherwise sent between hosts using HTTP over TLS (HTTPS). We enforce this security control on all applicable external endpoints used by customers as well as internal communication channels and during operational tooling. We don’t use communication channels which do not provide encryption in transit even if unused. In addition, POPCUSTOMS & PILLAR SUPPLY LLC uses message-level encryption where channel encryption terminates in untrusted multi-tenant hardware.

Data Retention and Recovery

We retain PII only for the purpose of fulfilling product orders on behalf of our clients (online Sellers). This retention period is for no more than 60 days (“Hold Period”) from shipment and online confirmation of delivery to the Buyer (our client’s Customer). POPCSUSTOMS is not required by law to retain archival copies of PII, therefore beyond the 60-day Hold Period, we do not maintain backup media of any kind for PII. In the event that PII is lost, erased or unavailable for processing due to system crash or ransomware during the 60-day Hold Period, POPCSUSTOMS & PILLAR SUPPLY LLC maintains a backup copy of all PII. This copy is encrypted and meets all security requirements noted in this policy. All security backups are purged with the original at the end of the 60-day Hold Period.

Least Privilege Principle

POPCSUSTOMS & PILLAR SUPPLY LLC employs fine-grained access control mechanisms when granting rights to any party using the Application, as well as the Application’s operators, following the principle of least privilege. Application sections or features that vend PII are protected under a unique access role, and access is only granted on a “need-to-know” basis.

Personal Data Protection Policy

Last Updated: 2024-08-02

1. Introduction

POPCUSTOMS & PILLAR SUPPLY LLC is committed to protecting your privacy. This policy explains how we collect, use, disclose, and safeguard your personal data when you use our website https://popcustoms.com and related services (collectively, the “Services”).

By using our Services, you agree to the terms of this policy. If you do not agree, please do not use our Services.

2. Data We Collect

We may collect the following categories of personal data:

A. Information You Provide

  • Contact Details: Name, email, phone number, shipping/billing address.
  • Account Data: Username, password, profile information.
  • Payment Information: Credit/debit card details (processed via secure payment gateways).
  • Communications: Customer service inquiries, feedback, survey responses.

B. Data Collected Automatically

  • Device & Usage Data: IP address, browser type, operating system, pages visited, clickstream data.
  • Cookies & Tracking Technologies: We use cookies, pixels, and similar tools to enhance user experience and analyze trends.

C. Data from Third Parties

  • Social media platforms (if you log in via Facebook/Google).
  • Payment processors (e.g., PayPal, Stripe).
  • Analytics providers (e.g., Google Analytics).

3. How We Use Your Data

We process your data for the following purposes:

  • Service Delivery: To process orders, manage accounts, and provide customer support.
  • Personalization: To recommend products, customize content, and improve user experience.
  • Marketing: To send promotional emails (only with your consent; opt-out anytime).
  • Security & Fraud Prevention: To detect and prevent fraudulent activities.
  • Legal Compliance: To meet tax, accounting, or regulatory requirements.

4. Data Sharing & Disclosure

We may share your data with:

  • Service Providers: Payment processors, logistics partners, IT support.
  • Legal Obligations: To comply with laws, court orders, or government requests.
  • Aggregated/Anonymized Data: For analytics or marketing (non-identifiable).

We do not sell your personal data to third parties.

5. Data Security

We implement industry-standard measures to protect your data, including:

  • Encryption: SSL/TLS for data transmission.
  • Access Controls: Restricted access to authorized personnel only.
  • Regular Audits: Security assessments to mitigate risks.

6. Updates to This Policy

We may update this policy periodically. The “Last Updated” date will reflect changes. Continued use of our Services constitutes acceptance of the revised policy.

7. Contact Us

For privacy-related questions or requests, contact us: https://popcustoms.com/contact-us

Incident Response Policy

Applicable to: All employees, contractors, and third parties handling POPCUSTOMS & PILLAR SUPPLY LLC data or systems.

1. Purpose

POPCUSTOMS & PILLAR SUPPLY LLC is committed to maintaining a secure environment for our customers, employees, and partners. This Incident Response Policy (IRP) establishes clear procedures for identifying, containing, eradicating, and recovering from security incidents to minimize business impact and ensure compliance with legal and regulatory requirements.

2. Scope

This policy applies to all:

  • IT systems, cloud infrastructure, and corporate networks
  • Employees, contractors, and authorized third parties
  • Data breaches, cyberattacks, system failures, and other security events

3. Incident Classification

We categorize incidents based on severity:

LevelImpactExampleResponse Time
P1 (Critical)High business/customer impactRansomware, major data breachImmediate (24/7)
P2 (Major)Significant operational disruptionUnauthorized access, DDoSWithin 4 hours
P3 (Minor)Limited impactPhishing attempt, malware detectionWithin 24 hours

4. Roles & Responsibilities

  • Security Team (CSIRT): Lead technical investigation and containment.
  • Legal/Compliance: Ensure GDPR, CCPA, or other regulatory reporting.
  • IT Operations: Execute system recovery and patches.
  • PR/Communications: Manage customer/partner notifications.
  • Executive Management: Approve major actions (e.g., system shutdown).

5. Incident Response Process

Step 1: Detection & Reporting

  • Employees report incidents via:
    • Email: business@popcustoms.com
    • Automated monitoring alerts (SIEM/SOC).

Step 2: Assessment & Containment

  • CSIRT evaluates severity and isolates affected systems.
  • Legal team determines breach notification requirements.

Step 3: Eradication & Recovery

  • Remove threats (e.g., malware, compromised accounts).
  • Restore systems from clean backups.

Step 4: Post-Incident Review

  • Conduct a Root Cause Analysis (RCA).
  • Update policies/training to prevent recurrence.

6. Communication

  • Internal: Updates to stakeholders via [Slack/Email].
  • Regulators: Reported per legal requirements (e.g., 72 hours under GDPR).
  • Customers/Public: Disclosed only if data is compromised (approved by Legal/PR).

7. Training & Testing

  • Annual tabletop exercises for CSIRT.
  • Employee security awareness training.

8. Policy Compliance

Violations may result in disciplinary action. Exceptions require CISO approval.