This Privacy Policy is closely related to the Ai XYZ Silo platform you use and various business functions included in the service (hereinafter collectively referred to as “the Site and/or Services”). We hope that you read carefully and make sure that you are fully aware and understand the contents stated in this policy before using our products and/or services. And allow you to make the choices you think are appropriate in accordance with the guidelines of this Privacy Policy. Once you begin to use or continue to use our products and/or services after we have updated this Privacy Policy, you have fully understood and agreed to the contents of this policy (including the updated version), and consent to our collection, use, storage and sharing of your relevant information in accordance with this Privacy Policy. This Privacy Policy will help you to understand the following:
1. Scope of application of this Privacy Policy
2. How do we collect and use your Personal information
3. How do we use cookies and similar technologies
4. How do we share and publicly disclose your personal information
5. How do we protect and store your personal information
6. How do you manage your Personal information
7.Protection of minors’ information
8. How is this policy updated
9. How can I contact us
1. Scope of this Privacy Policy
1. This Privacy Policy applies to your access and use of our products and services through the website, the website software development Kit (SDK) and application programming interface (API) used by the website for third-party websites and applications, but if the product and/or service have a separate privacy policy/privacy agreement, the separate privacy policy/privacy agreement shall prevail. This Policy applies to the contents not mentioned in the separate privacy
terms/privacy agreements.
2. This Policy does not apply to the following situations:
(1) Information and/or third-party services (including any third-party applications, websites, products, services, etc.) provided by or linked to third parties in our products and/or services are operated by third parties, and your use of such information and/or services is subject to the rules
for the collection and use of personal information separately explained to you by third parties.
(2) Other products and/or services that are not provided to you by this site.
2. How do we collect and use your Personal information
We will collect and use your personal information in accordance with the principles of legality, minimum necessity, openness and transparency, and for the purposes described in this policy. If we use your personal information for other purposes not specified in this policy, or collect and use your personal information for other specific purposes, We will, in a reasonable manner (including but not limited to by updating this policy, re-signing documents, page prompts, pop-up Windows, in-site letters, emails, website announcements or other ways that are convenient for you to know), separately explain to you in detail the collection, purpose, method, scope and other rules of the corresponding information, and collect and use after obtaining your authorization and consent.
Address book, geographical location, camera, microphone, photo album and other system permissions will not be opened by default, only after your express authorization will be accessed in order to achieve specific functions/services, you can withdraw your authorization at anytime. In particular, it should be pointed out that even if we can access your corresponding permissions with your authorization, we will only access within the scope of your authorization; And if you refuse to provide, it will only make you unable to use the corresponding function, but will not affect your normal use of other functions of the product and/or service.
In order to provide you with services, we will collect and use your personal information in the following ways:
1. Account registration information: when you register the site account for the first time, you need to provide your real name authentication mobile phone number, the above information is necessary for you to register the site account, if you refuse to provide such information, you will not be able to register the site platform account, you can only use browsing services. When you successfully register an account, you can log in to the site products or services through the mobile phone number and SMS verification code, you can also log in to the site products or services through the mobile phone number and password.
2. Recharge: When you purchase points to use the recharge service, we need to collect some or all of the following personal information, including: recharge amount, recharge time, order number, order status, payment method, payment status, we collect this information to help you successfully complete the recharge, query order information, provide customer service and so on.
3.AI creation: When you create AI,we will collect the content you provide, including the text you customize and the pictures you upload. We collect this information only to generate the works that meet your requirements according to your prompts. If the picture you upload involves your personal portrait, we will not share, transfer or disclose it to other third party companies, organizations or individuals without your authorization and consent. Please be aware of this.
4. Equipment information: We will receive and record information about the equipment you use (including software and hardware characteristic information such as device model, operating
system version, IP address, software version number, etc.) according to the specific permissions you grant during software installation and use; We will collect some of your device permissions based on providing more convenient and better services and experience:
(1) Based on camera/camera permissions: Obtaining camera/camera permissions is used for specific business scenarios such as real name authentication and can be carried out with your authorization.
(2) Photo-based access rights: Access to photos is used to upload the base map and other specific business scenarios and obtain your authorization to consent below can be carried out.
(3) Based on storage permission: access to storage permission is to ensure the stable operation of the client, you open the device storage permission, in the download of the work is used to write the downloaded work file to the storage.
(4) Obtain the device application list: The user agreement and privacy agreement page in the application will use the default browser application to open the corresponding page.
(5) Collect the MAC address of the device: identify the uniqueness of the network device in the process of network connection to ensure normal network communication.
(6) Collect the IMEI of the device: identify the uniqueness of the network device in the process of network connection to ensure normal network communication.
(7) Collect the ANDROID ID of the device: identify the uniqueness of the network device during the network connection process to ensure normal network communication.
Please note that the prerequisite for obtaining the above permission is that you have allowed the camera/camera, photo access permission, storage permission in your device to achieve the collection and use of the information involved in these permissions. You can check the status of the above permissions in your device’s Settings/Application Permissions (different device types), and you can choose to enable or disable the corresponding permissions as required. Please note that if you turn on any permission, you authorize us to collect or use relevant personal information to provide you with corresponding services. Once you turn off any permission, you cancel your authorization. We will no longer collect and use relevant personal information based on the corresponding permission, and we will not be able to provide you with the corresponding services. However, it will not affect the previous information collection and use based on your authorization.
5. Log information: We will collect your detailed use of our services as logs, including access to the network, type and status, network quality data, operation logs, service log information.
6. Personal information you submit through our customer service or participate in our activities: When you contact us, we may save your communication/call records and content or the contact information you leave behind and other information, in order to get in touch with you or help you solve/locate the problem, or record the solution and result of the relevant problem.
If we collect your personal information for other specific purposes not specified in this policy, we will seek your prior authorization and consent. The purpose of collecting and using the above information is to better operate the products and services of this site. If there is any update, we will notify you by means including but not limited to announcements on the website, letters on the website, phone calls or SMS messages.
If we stop the operation of the site products or services, we will promptly stop the activities of continuing to collect your personal information, will stop the operation of the notice within a
least 30 days to serve one by one or through the form of announcements to inform you, and the personal information held by the deletion or anonymization processing. Where children’s personal information is involved, we will inform the children’s guardian of the notice of cessation of operation in time.
7. Exceptions to authorized consent
You are fully aware that according to the requirements of relevant laws and regulations, we do not need to obtain your authorization to collect and use your personal information in the following circumstances:
(1) It is related to the performance of the obligations stipulated by laws and regulations by the personal information controller;
(2) directly related to national security and national defense security;
(3) those directly related to public security, public health or major public interests;
(4) those directly related to criminal investigation, prosecution, trial and enforcement of judgments;
(5) in order to protect the life, property and other major legitimate rights and interests of the personal data subject or other individuals, but it is difficult to obtain the authorization and consent of the person;
(6) the personal information involved is disclosed to the public by the personal information subject;
(7) necessary for the signing and performance of contracts as required by the personal data subject;
(8) Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
(9) necessary to maintain the safe and stable operation of the products or services provided, such as discovering or disposing of product or service failures;
(10) the personal information controller is a news organization, and it is necessary to carry out legitimate news reports;
(11) The personal information controller is an academic research institution, and when it is necessary to carry out statistics or academic research in the public interest, and it provides the results of academic research or description, the personal information contained in the results is de-identified.
In particular, you should note that if the information cannot identify you individually or in combination with other information, it does not belong to your personal information in the legal sense; When your information can be individually or in combination with other information to identify you personally, or when we will not be able to establish a connection with any specific personal information to use the data with other personal information, such information during the combined use, as your personal information will be treated and protected in accordance with this policy.
3. How do we use cookies and similar technologies
In order to make it easier for you to access the experience, when you use our products or services, we may collect and store the data related to your access to the services of the site through the use of various technologies. When you visitor visit the services of the site again, we can identify your identity and provide you with better and more services by analyzing the data.
Including the use of small data files to identify your identity, so as to understand your use habits, to help you save the steps of repeatedly entering account information, or to help judge your login status and account security. These data files may be cookies, or other local storage provided by your browser or associated application (collectively, “cookies”).
We do not use Cookies for any purpose other than those described in this Privacy Policy. You may manage or delete Cookies according to your preferences. You can clear all saved on your computer
Cookies, most web browsers accept Cookies automatically, but you can usually modify your browser’s Settings to reject Cookies as you see fit; Alternatively, you can clear all Cookies saved in the software.
You understand and acknowledge that some of our products/services can only be achieved through the use of cookies or similar technologies, if you refuse to use or delete, you may not be able to obtain the best service experience of our products and/or services, and may also have a certain impact on the protection of your information and account security.
Iv. How do we share, transfer and publicly disclose your personal information
We take the protection of your personal information very seriously. Without your authorized consent, we will not share your personal information with other third party companies, organizations and individuals, unless it is the information that cannot be identified or associated with you after anonymisedor de-identified processing, and the natural person subject of sharing such information cannot be re-identified by the third party. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share necessary personal information. If we share your personal sensitive information, we will ask for your authorized consent again. If a third party changes or exceeds the scope of your original authorization to use your personal information, we will ask the third party to obtain your authorization and consent again.
1. Sharing necessary for the implementation of our services/functions:
In some cases, in order to provide you with our services or realize the business functions of our products and/or services, we must share your personal information in order to realize the core functions of our products and/or services or provide the services you need, such as: Service providers who provide functional support for our products and/or services: To provide payment institutions that provide payment services with payment information related to your order payment, etc.; When we undergo due diligence or audit, we share your relevant information with external supervision, professional consulting institutions (such as audit institutions), etc.
2. Necessary and reasonable sharing with the company on this site:
In order to facilitate us to provide you with consistent services based on a unified account system, identify account anomalies, protect the personal and property safety of users or the public from infringement, and facilitate your unified management, you acknowledge and agree that your relevant personal information maybe shared within our products as necessary.
Note: The aforementioned “our products” refer to the websites and mobile application products under the Ai XYZ Silo Platform (i.e., Party A and its affiliates). The above website products shall
include the sub-domain pages or platforms of any website, as well as websites and mobile application products that are changed or added by the Website from time to time.
3. Share information for security and analysis statistics
(1) Ensure the use of security: we attach great importance to the security of accounts and services, in order to ensure the security of your and other users’ accounts and property, so that you and our legitimate rights and interests from illegal infringement, we and affiliated companies or service providers may share the necessary equipment, account and log information.
(2) Analysis of product usage: In order to analyze the use of our services and improve the user’s experience, we may share statistical data of product usage (crashes, flashbacks) with affiliated parties or third parties, which is difficult to identify your personal identity in combination with other information.
4. Third party SDK service providers:
In order to ensure the stable operation and functional realization of our client, so that you can use and enjoy more services and functions, our application will be embedded in the SDK or other similar applications of business partners. We will strictly monitor the software tool development kit (SDK) and application program interface (API) from which our business partners obtain information, and make them process personal information in accordance with this policy and any other relevant confidentiality and security measures to protect data security.
(1) Use SDK Name: Alipay Payment Alipay SDK Purpose: Integrate Alipay payment ability.
(2) Use SDK name: wechat Open Platform SDK to collect device information: obtain installation list, location information, mobile phone number, SIM card serial number, IMEIP address, WI-FI information, MAC address for users to share app content.
(3) Use SDK name: wechat Pay SDK to collect device information: Mobile phone number and SIM card status, the IME, MAC address, wi-fi information, used for WeChat payment, to ensure the safety of payment, you can access the following link for WeChat complete privacy policy: https://privacy.qq.com/, purpose of use: Wechat one-click login, Share Friends, Share Moments, wechat Pay
(4) Use SDK name: Pangolin Advertising SDK
Collect device information: The wireless network SSID name, WiFi router MAC address (BSSID), MAC address of the device, device identifier (such as IMEI, IMSI, ICCID, GAID (GMS service only), MEID, device serial number build_serial, the specific field varies according to the software and hardware version).
Purpose of use: advertising and advertising monitoring attribution, anti-cheating, Usage scenario: Used in advertising and advertising effect analysis.
Collect application information: software list information, Purpose of use: advertising, anti-cheating. Scenes
Usage scenario: Used in advertising and advertising effectiveness analysis.
Collect location information: precise location information, rough location information. Purpose of use: advertising targeting and anti-cheating.
Usage scenario: Used in advertising and advertising effect analysis.
(5) using the SDK name: their Allies statistical analysis of the SDK, collect personal information types: equipment information (IMEI/MAC/Android ID/IDFA/OAID/OpenUDID/GUID/SIM card IMSI/ICCID), location information, network information, purpose of use: Carry out statistics and analysis of APP operation.
(6) Use SDK name: Aurora Push SDK, collect personal information type:
a. Device identifiers (including IMEI, IDFA, Android ID, GAID, MAC, OAID, IMSI, MEID, UAID) : used to generate desensitized end-user device unique identifiers to ensure accurate message push and record user operation behaviors;
b. Device hardware information (including device model, device screen resolution, device hardware manufacturer, device product name) : used to ensure the compatibility of services on different devices and ensure the accurate delivery of messages;
c. Operating system information (including operating system version, system name, system language) : used to ensure the compatibility of services on different devices to ensure accurate message delivery;
d. Network information (including network type, operator name, base station information, IP address, WiFi information, SSID, BSSID) : used to judge the network connection status between SDK and server, to ensure the stability and continuity of services;
e. Push information log: used for you to query push service records and understand the delivery of push information.
f. Precise location information: used to provide “push report” and “statistical report” as well as the message push function for specific regional groups;
g. Software list information (including software list and software running list information) : when a device has multiple APP push links active at the sametime, we use the link merger technology, randomly merged into a link, to achieve the purpose of saving power and traffic for users; At the same time, it will help you to gain insight into the interests and preferences of your end users, and realize the user group push function.
Purpose: To provide information push service for APP users.
5. Other situations:
(1) Sharing with third parties in order to protect you, our other users or employees, the site or the public interest, property or security (such as: fraud or credit risk, etc.) from damage;
(2) sharing in accordance with relevant agreements (such as service agreements, etc.) or legal documents signed between you and us;
(3) in accordance with the relevant agreement between you and other third parties.
6. We will not transfer your personal information to any company, organization or individual, except for the following circumstances:(1) Transfer with express consent: After obtaining your express consent, we will transfer your personal information to other parties.
(2) In the event of a merger, acquisition or bankruptcy liquidation of the service provider of this site, or other circumstances involving a merger, acquisition or bankruptcy liquidation, such as the transfer of personal information, we will require the new company and organization holding your personal information to continue to be bound by this policy, otherwise we will require the company, organization and individual tore-seek your authorized consent.
7. Public disclosure:
(1) Except for public disclosure in accordance with laws and regulations or with your authorization and consent, we will not publicly disclose your information, and our public disclosure of your personal information will adopt security protection measures in line with industry standards.
(2) In violation of the account, fraud penalty announcement, we will disclose the relevant account information, or because you have violated laws and regulations or violated the relevant agreements and rules of the site platform, or to protect the site platform or the public’s personal property safety from infringement, we may be in accordance with laws and regulations, platform agreement or with your consent to disclose your account information.
8. Exceptions to the prior authorization consent when sharing, transferring, and publicly disclosing personal information:
In the following circumstances, we do not need to obtain your prior authorization and consent to share, transfer and publicly disclose your personal information:(1) Related to the performance of the personal information controller’s obligations under laws and regulations
(2) directly related to national security and national defense security;
(3) those directly related to public security, public health or major public interests;
(4) those directly related to criminal investigation, criminal investigation, prosecution, trial and execution of judgments;
(5) for safeguarding the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain the consent of the person;
(6) Personal information that you disclose to the public on your own;
(7) Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
5.How do we protect and store your Personal information
1. Preservation of your personal information
(1) Storage location: The information collected and generated in the operation of this site service in the People’s Republic of China is only stored in the People’s Republic of China.
(2) Storage period: The information you provide to us may be periodically archived or stored by us in accordance with the backup process, and retained for as long as is required for the purpose for which the information was collected, to provide you with our products and services, to resolve disputes, to establish legal defenses, to conduct audits, to pursue legitimate business purposes, to execute our agreements, and to comply with applicable laws. For example, the E-commerce Law of the People’s Republic of China requires that goods and services information and transaction information be stored for no less than three years from the date of completion of the transaction.
We judge the storage period of personal information mainly based on the following criteria:(1) Complete the transaction purposes related to you, maintain the corresponding transaction and business records, in response to your possible inquiries or complaints;
(2) to ensure the safety and quality of the services we provide to you;
(3) whether you agree to a longer retention period;
And (4) whether there are any other special agreements or laws and regulations regarding the retention period.
After the retention period is exceeded, we will delete or anonymize your personal information as required by applicable law.
2. We will take the following measures to protect your information
(1) We have always attached great importance to protecting the security of users’ personal
information. For this reason, we have adopted security technical measures and organizational and management measures in line with industry standards to minimize the risk of your information being leaked, damaged, misused, unauthorized access, unauthorized disclosure and alteration.
(2) We will take reasonable and feasible security measures and technical means in line with industry standards to store and protect your personal information, in order to prevent your information from being lost, unauthorized access, public disclosure, use, modification, damage, loss or disclosure. We will take all reasonable and practicable measures to protect your personal information. We will use encryption technology to ensure the confidentiality of your data; And we use trusted protection mechanisms to protect data from malicious attacks.
(3) We regularly conduct data security awareness training and security capability training for employees to enhance their understanding of the importance of protecting personal information. We will sign confidentiality agreements with employees and partners who have access to your personal information, clarify the job responsibilities and code of conduct, and establish strict access control and permission approval process to ensure that only authorized personnel can access personal information. If there is any violation of the confidentiality agreement, we will be held accountable.
(4) We have the responsibility and obligation to remind you that the Internet is not an absolutely secure environment. We suggest that you use complex passwords as required, do not disclose your password/verification code, do not lend accounts and devices to others at will, and pay attention to the security of your devices and personal information. If you log in to use the services of this site on public equipment, do not remember the password, log out in time after use, and beware of being misused by others. If you find that your account is abnormal or misappropriated, please change your password in time. If necessary, you can contact us for help in accordance with the ways described in this policy.
(5) If our physical, technical or management protection facilities are damaged, resulting in unauthorized access to information, public disclosure, tampering or destruction, resulting in damage to your legitimate rights and interests, we will promptly initiate emergency plans and take reasonable relief measures to minimize the impact on your personal information and other rights and interests.
3. Handling of personal privacy data leakage incidents
In the event of personal privacy data leakage, we will inform you in a timely manner in accordance with the requirements of relevant laws and regulations: the basic situation and possible impact of personal privacy data leakage, the disposal measures we have taken or will take, the suggestions that you can independently prevent and reduce risks, and the remedial measures for you. At the same time, we will timely inform you of the relevant circumstances of the incident by email, letter, telephone, push notification and other means. When it is difficult to inform the information subject one by one, we will take a reasonable and effective way to release announcements. At the same time, we will also, in accordance with the requirements of the regulatory authorities, take the initiative to report the disposal of personal privacy data leaks.
6. How do you manage your personal information
We attach great importance to your concerns about personal information, and do our best to protect your rights to access, correct and delete your personal information, so that you have the full ability to protect your privacy and security. Your rights include:
1. Access, correction
We encourage you to update and revise your information to make it more accurate and effective. You can query, access, and manage your personal account information. You can click “My”, according to the access, management of your personal information, and according to the management of the corresponding information to complete or ask us to modify, supplement. You can change your password in the Personal Center – setting interface, you can also contact our human customer service, apply for correction of your information, we promise to complete the verification and processing within 15 working days.
When accessing, correcting and deleting the above information, we may ask you to verify your identity in order to protect the security of your account.
Step 2: Delete
In the following circumstances, you can make a request to us to delete personal information, except that the data has been anonymized or otherwise provided for by laws and regulations.
(1) the purpose of processing has been achieved, cannot be achieved, or is no longer necessary to achieve the purpose of processing;
(2) we have ceased to provide the product or service, or the retention period has expired; And
(3) the individual withdraws consent
(4) if our processing of personal information violates laws, administrative regulations or agreements with you;
(5) other circumstances as provided by laws and administrative regulations.
Deletion of Personal information: refers to the act of removing personal information from the system involved in the realization of daily business functions, so that it remains unsearchable and inaccessible. After you or we assist you in deleting the relevant information, we may not be able to immediately delete the relevant information from the backup system due to applicable legal and security technical restrictions, we will securely store your personal information and limit any further processing of it until the backup can be erased or anonymized.
3. Refuse, return, transfer or request a copy of your data
You may make a request to refuse, return, transfer, or request a copy of your personal information by contacting us in the ways provided at the end of this Policy. We undertake to complete the verification and processing within 15 working days.
4 Change the scope of your authorized consent
If you want to change the authorization of the relevant permissions (e.g., storage, contacts, cameras, albums, etc.), you can do so through your hardware device.
You can also withdraw your consent by contacting us in the ways provided at the end of this policy. When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the processing of
personal information previously carried out based on your authorization. You may also permanently withdraw all authorization for us to continue to collect your personal information by canceling your account.
Please understand that each business function requires some basic personal information to complete. After you withdraw your consent or authorization, we will not be able to continue to provide you with the corresponding services for withdrawing your consent or authorization, and we will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the processing of personal information previously carried out based on your authorization.
5. Raise an objection
If you believe that our processing of your personal information violates this policy or the requirements of relevant laws and regulations, you can send an email to raise your objection. Each of your valuable suggestions we promise to complete the reply and processing within 15 working days.
Step 6 Log out
When you need to terminate the use of our services, you can apply for cancellation of your account, you can contact our human customer service, apply for cancellation of your account. We promise to complete the verification and processing within 15 working days.
After you cancel your account, you will no longer be able to log in and use our products and services with this account and third-party products and services with this account. All the rights and interests generated but not consumed during the use of our products and services and future expected benefits of the account will be eliminated; The contents, information, data and records under the account will be deleted or anonymized (except as otherwise stipulated by laws and regulations or required by regulatory authorities); At the same time, once the account is cancelled, it will not be restored.
7.Protection of minors’information
We attach great importance to the protection of minors’ personal information. This site is primarily for adults. If you are a minor under the age of 18, you should jointly read and agree to this Privacy Policy under the supervision and guidance of your parent or other guardian before using this product. If you are the guardian of a minor under the age of 16, you should read and agree to this Privacy Policy by your guardian before using this site and related services.
We protect minors’ personal information in accordance with relevant national laws and regulations, and will only collect, use or disclose minors’ personal information when permitted by law, parents or other guardians express consent or necessary to protect minors; If we find that personal information of minors has been collected without prior verifiable guardian consent, we will try to delete the relevant information as soon as possible.
If you are the guardian of a minor and have any further questions regarding the personal information of a minor under your custody, please contact us using the contact information set out in this Privacy Policy.
8. How to update this Policy
1. In order to provide you with better service, this privacy policy will also be updated. We will issue the updated version on the website and mobile terminal and remind you of the update of
the relevant content through the website announcement or other appropriate ways before it takes effect. Please also visit the website in order to keep abreast of the latest privacy policy.
2. For major changes, we will also provide more prominent notices (we will explain the specific changes to the Privacy policy by means of including but not limited to email, SMS or special reminders on the browsing page).
Material changes referred to in this policy include, but are not limited to:
(1) Significant changes to our service model. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc.;(2) We have made significant changes in our ownership structure, organizational structure, etc. Such as changes in owners caused by business adjustments, bankruptcy and mergers and acquisitions;
(3) changes in the main objects of personal information sharing, transfer or public disclosure;
(4) when the third-party supplier cooperation changes;
(5) when our department responsible for handling personal information security, contact information and complaint channels change;
(6) when the personal information security impact assessment report indicates that there is a high risk.
After this privacy policy is updated, we will issue an updated version on this site and remind you of the updated content through the official website announcement or other appropriate means before the updated terms take effect, so that you can keep abreast of the latest version of this Privacy policy.
9.how to contact us
If you have any questions, comments or suggestions about this Privacy policy, or need to make complaints or reports about the security of personal information, please contact us by email [email protected] or by post.
We will respond within 15 working days. If you are not satisfied with our reply, especially if our personal information processing behavior has harmed your legitimate rights and interests, you can also seek a solution through the people’s court where our company is located.
Release Date and effective date of this Privacy Policy: January 1, 2024 Revised Date: January 1, 2024