Chole privacy policy

This Privacy Agreement (hereinafter referred to as “This Agreement”) was established by the operating entity of Chloe Al AI Software (hereinafter referred to as “This Software”) (hereinafter referred to as “We”), and is designed to clearly inform users (hereinafter referred to as “You”) of the full process rules for how we collect, use, store, transmit, share, and destroy your personal information, and to clarify the privacy protection rights and responsibilities of both parties to protect your personal privacy and information security. This Agreement applies to your access, registration, and use of all AI services provided by this Software through any terminal device. By registering or using this Software, you are deemed to have fully read, understood, and voluntarily accepted all the terms and conditions of this Agreement; if you do not agree, please do not use this Software.

1. Definition and Core Principles of Privacy Protection

1.1 Core Definitions

1.1.1 Personal Information

Means various types of information that can identify a particular natural person individually or in combination with other information and reflect their activity, including identity identification, device information, network information, AI interaction data, and so on, as defined by the International General Privacy Protection Standard.

1.1.2 Sensitive Personal Information

It refers to the disclosure, abuse, and violation of personal information that may endanger the safety of personal property and violate personal dignity, including biometric identification, financial accounts, precise location, etc. We will take enhanced protection measures.

1.2 Protection Principles

1.2.1 Minimum Required Principle

Only the minimum amount of personal information required to provide AI services will be collected, and collection beyond this scope will be separately obtained with your explicit authorization.

1.2.2 Informed Consent and Security Principles

Pre-notifying and obtaining your consent for the processing of personal information, using international-leading technology to build a security protection system to ensure that information is not leaked or tampered with.

2. Scope and manner of collection of personal information

2.1 Proactively provided personal information

2.1.1 Account Registration Information

The email address that you voluntarily provide when you register for an account, and the password that you set, are used for account creation, login authentication, and identification.

2.1.2 AI Interaction Related Information

The text you enter when using AI features, uploaded speech/images/documents, and submitted request descriptions are used for AI response and content generation.

2.2 Automatically Collected Personal Information

2.2.1 Device and Network Information

Automatically collect your endpoint device model, operating system, IP address, network type, and more to ensure service compatibility and stability.

2.2.2 Using behavioral information

Automatically record your login time, AI feature access frequency, interaction duration, and more to optimize the service experience.

3. Purposes and Scenarios of Use of Personal Information

3.1 Core AI Service Provision

3.1.1 Basic Services Support

The collected information is used to provide you with core services such as AI interactions, content generation, speech/image recognition, and more, ensuring that the service responds properly.

3.1.2 Service optimization iteration

After anonymizing AI interaction data, it is used to optimize the accuracy of AI models, improve functional utility, and do not involve personal identification.

3.2 Security and compliance assurance

3.2.1 Account Security Protection

Identify unusual login behavior through device and network information, and take security warning measures to prevent account theft.

3.2.2 Compliance Compliance

Under the requirements of laws, regulations, and regulatory agencies, we use personal information appropriately, fulfill compliance reporting, cooperate with investigations, and other obligations.

4. Storage and Protection Measures for Personal Information

4.1 Storage Management

4.1.1 Location and duration of storage

Your personal information is stored in country/region encrypted servers that comply with international privacy standards, is stored continuously for the duration of use, and is completely deleted within 180 days after signing out of the account (except when retained as required by law and regulations).

4.1.2 Backup Policies

Multi-copy distributed backup technology is used to regularly back up personal information, and backup data is also protected by encryption.

4.2 Security Precautions

4.2.1 Technical Protection

SSL/TLS 1.3 transmission encryption, AES-256 storage encryption, firewall installation, intrusion detection system, prevent data leakage.

4.2.2 Management Protection

Establish strict data access controls, privacy training and confidentiality restrictions for employees who are exposed to information, and maintain operational audit logs.

5. Sharing, transfer, and disclosure of personal information

5.1 Information Sharing

5.1.1 Third-party Provider Sharing

Share only necessary third parties for server hosting, payment processing, etc., sign confidentiality agreements, and monitor their compliant use.

5.1.2 Authorized Sharing

With your explicit consent, relevant information may be shared with the third parties you designate, and the extent of sharing is based on authorization.

5.2 Transfer and Disclosure Limits

5.2.1 Transfer restrictions

Do not transfer personal information arbitrarily. When changes in the business require transfer, ensure that the beneficiary fulfills equal privacy protection obligations and obtains your consent.

5.2.2 Disclosure Limits

Information can only be disclosed under reasonable circumstances such as legal requirements, security interests, and so on. Anonymous information can be freely disclosed for legal use.

6. Your privacy rights and how they are exercised

6.1 Core Privacy Rights

6.1.1 Access and Correction Rights

You can use your account settings to view and correct personal information, and process applications that cannot be handled self-service through a contactable official email address.

6.1.2 Right to delete and unsubscribe

AI interaction records can be automatically deleted, or through account settings, official email application to sign out of an account. After signing out, all information is deleted according to the rules.

6.2 Directions for the Enforcement of Rights

Identity Verification

When exercising your privacy rights, you need to complete identity verification to ensure the security of your account.

6.2.2 Feedback channels

Privacy-related requests can be sent to the official contact email ahmadsani1974@outlook.com, and we will provide feedback within 30 business days.

7. Third-Party Services and Link Notes

7.1 Integration of Third-Party Services

7.1.1 Service Scope

This Software may integrate third-party login, payment, voice recognition, and other services that are operated independently by third parties and have privacy policies independent of this agreement.

7.1.2 Risk Alerts

When you use third-party services, you should review their privacy policies yourself, authorize carefully, and the third-party is responsible for any privacy losses caused by them.

7.2 Third-party links

7.2.1 Link Description

The links to third-party websites/applications contained in this Software are provided only for convenience of access, and we are not responsible for third-party privacy protection.

8. Agreement Updates, Dispute Resolution and Supplementary Rules

8.1 Agreement Update

8.1.1 Update Rules

When the agreement needs to be revised due to laws and regulations, compliance requirements, and service iterations, continued use will be considered as consent to the update through software pop-up windows and official email notifications.

8.2 Dispute Resolution

8.2.1 Negotiation and Arbitration

Disputes related to the agreement are prioritized for friendly negotiations through the official email address ahmadsani1974@outlook.com. Failure in negotiations can be applied to international arbitration bodies recognized by both parties, and the arbitration verdict is the final ruling.

8.3 Appendix

8.3.1 Law Applicability

This Agreement applies to the International General Business Rules and arbitration laws and regulations, prioritizing regulations that favor protecting user privacy.

8.3.2 Effectiveness and contact information

This agreement is effective from the date of publication. The official contact address is ahmadsani1974@outlook.com, responsible for handling privacy-related inquiries, complaints and claims.