Privacy Policy

Welcome to use "Fulxion AI" (" this product and/or service "). Fulxion AI (hereinafter referred to as "we") fully understands the importance of personal information to users (hereinafter referred to as "you") and will comply with the requirements of Singapore's laws and regulations, taking adequate and appropriate measures to protect your personal information and privacy. The Fulxion AI Privacy Policy (" this Policy ") is designed to help you understand how we will collect, use, share, store and protect your personal information, as well as the terms that may be relevant to your interests and how we handle sensitive personal information. Please refer to the full version below.

[Special Note] Before using this product and/or service, please read this policy carefully and fully understand it (especially the content marked in bold or underline), and determine our processing rules for your personal information. If you understand and agree to accept this policy, you can click the "Agree" button to accept our services.

1. Scope of application

1.1 This policy applies to:

(a) Users who use the services provided by "Fulxion AI";

(b) "Fulxion AI" website or application form.

1.2 Please note that this policy does not apply to the following situations:

(a) Services provided to you by third-party application systems integrated through page embedding, links, jumps, etc. are not subject to this policy. It is recommended that you review the information protection statement of the third-party application system to understand how it handles your information. The consequences arising from the personal information you provide to third-party application systems or voluntarily share or disclose to others shall be borne by you alone.

(b) All personal information we process when providing services on behalf of enterprises is not subject to this policy.

2. Types of collected data

We will collect information in accordance with the principles of "reasonableness, relevance and necessity", with your consent, and will not collect information prohibited by laws and regulations. At the same time, in our business involving personal information, we have always carefully assessed the necessity of the types, purposes and processing methods of personal information, and tried our best to prevent the collection of necessary information from the source. In cases where it is inevitable, we will clearly inform you of the specific purposes for collecting necessary information, and let you independently judge whether to agree to the processing. You may refuse information that is necessary for the realization of business functions or required by laws and regulations without affecting other functions or services. As part of our anti-corruption compliance program and a legal obligation, we will use the collected information on the basis of your valid consent if necessary.

During your use of the products and/or services, we will obtain your personal information through the following means:

(a) Information you agree to provide directly: We may collect and retain the information you provide to us when using our products and/or services, including the information you fill in online on our pages, the information you provide when applying for products and/or services or contacting us, as well as the transaction and activity information you generate when using our services.

(b) Information We collect: During your use of this product/service, we will collect information sent to us by your computer, mobile phone and other access devices.

(c) Information obtained from related parties, partners, etc. : To jointly provide you with products and/or services, or to improve the quality of products and services, or for the safety of products and services, we may, in accordance with the provisions of laws and regulations or based on your valid authorization, receive your personal information and other information from trusted third-party suppliers such as related companies and partners. We will require the provider of personal information to explain the source of the personal information in advance and confirm the legality of the source and the scope of authorization and consent. If the processing of personal information required for business purposes exceeds the scope of the authorization and consent obtained, we will obtain your explicit consent within a reasonable period after obtaining the personal information or within a reasonable period before processing the personal information, or obtain your explicit consent through the personal information provider.

If we must use your personal information beyond the scope you have agreed to, we will inform you again and obtain your explicit consent before using your personal information. Please note that the types of personal information we collect vary depending on the content of the products and/or services. The actual provision of the products and/or services shall prevail.

2.1 Business Scenarios

Register and log in

When you register for the "Fulxion AI" products and/or services, depending on the registration method you choose, we will collect your relevant information as needed to assist you in completing the registration of your "Fulxion AI" account, so that your data can be synchronized when you log in to Fulxion AI on different devices.

1. If you register and log in to "Fulxion AI" with your mobile phone number, we will collect your mobile phone number. You need to provide the SMS verification code sent by us for verification. Your encrypted mobile phone number will serve as your default nickname. If you refuse to provide your mobile phone number for verification, you can also choose the login method associated with a third-party account (such as your email address).

2. If you log in to "Fulxion AI" with a third-party account, you need to authorize "Fulxion AI" to read and share your online identity information posted on the third-party platform under the premise of complying with relevant laws and regulations. At the same time, the nickname and profile picture provided by the third-party account will be your default nickname and profile picture. After registering an account through your mobile phone number or a third-party platform, you can also edit and improve your personal information according to your own needs.

Edit your profile

You can choose to fill in your gender, nickname, profile picture, birthday, location and personal signature information. This will help us provide you with a more personalized experience. If you do not fill in, it will not affect your use of other functions of our products and/or services. When you upload or change your profile picture, we will request your camera, storage/photo-taking permissions and collect the information of the pictures you upload or change. If the pictures you upload involve your sensitive personal information, it may have a significant impact on your privacy and interests. Please protect your privacy well and avoid uploading pictures that contain privacy factors or sensitive personal information. We will strictly protect the pictures you upload in accordance with the law.

2.2 Operation and Safety Assurance

(a) To ensure the security of the software service and your account, as well as the quality and efficiency of service operation, We will collect your hardware model, operating system version number, device name, device configuration, International Mobile Device identification code, unique device identifier, network device hardware address, IP address, WLAN access point, Bluetooth, software version number, network access method, type, status, network quality data, operation, usage, service logs and other information. We may associate your device information or phone number with your account under this product and/or service.

(b) To prevent malicious programs, ensure service security and enhance the browsing experience, we will collect information on installed applications or running processes, the overall operation status, usage and frequency of applications, application crash situations, overall installation and usage status, performance data, application sources, etc.

(c) To analyze statistical indicators such as application addition, activation, retention, and performance, we may call the clipboard to conduct attribute analysis on the relevant statistical information. Please rest assured that we will not collect your private information.

(d) We may use your account information, device information, service log information, as well as information shared by our affiliated companies and partners with your authorization or in accordance with the law, to determine account security, application activation activities and events, conduct identity verification, detect and prevent security incidents.

2.3 User Feedback Service

(a) Customer Service and Issues: To facilitate contact with you, assist you in solving problems or record solutions and results related to issues, we may retain your communication/call records and related content (including account information, feedback information, order information, other information you provide to prove relevant facts, or contact information you leave). If you consult, complain or make suggestions regarding a specific order, We will use your account information and order information.

(b) When you complain about others or are complained about by others, in order to protect your and others' legitimate rights and interests, we need to submit your account/identity information, contact details, and complaint-related content to the relevant legal department, so as to resolve the complaint dispute in a timely manner.

(c) Questionnaire Survey: To fulfill your order and enhance service quality, we may also use other information you provide when contacting customer service and the questionnaire response information you send to us when participating in the questionnaire survey. If you do not agree, you should refuse to participate in the questionnaire survey.

2.4 Device Permission Description

2.4.1 To ensure the smooth completion of the services provided to you, we need you to authorize the relevant system permissions. Sensitive permissions will not be opened by default. Only after you explicitly agree to the authorization will we call you immediately to inform you whether the device permissions need to be opened and explain the purpose of the permission application. You can enter the system "Settings" at any time to turn off the corresponding system permissions. At that time, we will no longer continue to collect and use the relevant personal information based on the corresponding permissions. The permissions we apply for will be consistent with the service functions provided. If the business functions we provide are adjusted, the device permissions we apply for will also be adjusted accordingly.

2.4.2 Please note that once you disable any permission, it means you have revoked the authorization. This will result in our inability to provide you with the corresponding business function services and directly affect your usage experience. However, your decision to disable this permission will not affect the processing of your personal information that was previously carried out based on your authorization. We hereby guarantee that if you do not select any of the above functions, unless this function provides basic support for all or part of other functions (such as account login, etc.), it will not affect your normal use of other functions we provide for you.

2.5 Third-party SDKS or other similar applications

To ensure the stable operation of the software and the realization of its functions, and to enable you to use and enjoy more services and functions, we will follow the principles of legality, propriety and necessity. According to the service requirements, we will embed or integrate third-party automation tools (through code, scripts, interfaces, algorithm models, software development kits and mini-programs, etc.). The third party may seek your consent. To collect and process your necessary personal information. We will carefully assess the purpose of use by third parties and require them to properly protect your personal information by strengthening personal information security management, complying with laws, regulations and the requirements of agreements, etc. Please note that we have no control over the privacy and data protection policies of third parties, and such policies are not subject to this policy. At the same time, third-party SDKS may change their types of personal information processing due to version upgrades, policy adjustments, etc. Please refer to the official explanations of the third party. Before submitting personal information to a third party, please review its privacy policy.

2.6 We may send you messages

You acknowledge and agree that for the contact information you provide with your consent during your use of the service, we may send multiple notifications to one or more of them during the operation process for purposes such as user message notifications, identity verification, security verification, and user experience research. Additionally, we may also provide you with related services, functions or activities. However, please rest assured If you do not wish to receive this information, you can unsubscribe through the methods provided in the message or contact us directly. We may send you service-related announcements when necessary (for example, to suspend a certain service due to system maintenance).

2.7 The purpose of collecting and using personal information has changed

Please understand that as our business develops, the related product functions and services we provide may change. In principle, when new functions or services are related to the ones we are currently providing, the personal information collected and used will have a direct or reasonable connection with the original processing purpose. In cases where there is no direct or reasonable connection with the original processing purpose, if we collect or use your personal information, we will inform you in accordance with the requirements of laws, regulations and national standards through reasonable means such as page prompts, interaction processes and agreement confirmations, and obtain your consent.

2.8 Exceptions to Authorization and Consent

Please understand that in the following circumstances, in accordance with the regulations and relevant laws and regulations:

Information related to our fulfillment of obligations stipulated by laws and regulations;

Information directly related to national security and national defense security;

Information directly related to public security, public health, and major public interests;

Information directly related to criminal investigation, prosecution, trial and the enforcement of judgments;

Information that is needed to safeguard your or others' major legitimate rights and interests such as life and property, but it is difficult to obtain your authorization and consent;

Personal information that you have publicly disclosed to society;

At the request of the personal information subject and as necessary for the performance of the contract;

Your personal information collected from legally disclosed public sources, such as legitimate news reports, government information disclosure channels, etc.

Necessary for maintaining the safe and stable operation of software and related services, such as discovering and handling faults of software and related services;

The information necessary for legal news reporting;

When academic research institutions conduct statistical or academic research work that is necessary for the public interest and provide academic research or description results to the outside world, and de-identify the personal information contained in the results;

Other circumstances as prescribed by laws and regulations.

3. Use of Cookies

3.1 When you use our products and/or services, we may use Cookies to collect some of your personal information, including your website visiting habits, your browsing information, and your login information, in order to provide you with a better service experience. When you use the products and/or services, we may use relevant technologies to send one or more cookies or anonymous identifiers to your device in order to collect and store information as you access and use the services. We promise not to use Cookies for any purpose other than those described in this Privacy Policy. We mainly use Cookies to achieve the following functions or services:

(a) Ensure the safe and efficient operation of products and services: We may set Cookies or anonymous identifiers for identity verification and security purposes, so that we can confirm whether you can log in to the service safely or whether you have encountered illegal activities such as theft or fraud. These technologies will also help us enhance service efficiency and improve login and response speeds.

(b) Help you have a more convenient access experience: Using such technology can help you avoid the repetitive steps and processes of filling in personal information and entering search content (for example: record search, form filling).

3.2 If your browser allows, you can manage Cookies through your browser Settings (for example, perform the corresponding data clearing operation in the browser Settings feature).

4. Entrustment processing, sharing, transfer and public disclosure of personal information

4.1 Entrusted Processing

Each functional module of the product and/or service is independently provided by us, and the personal information required for the relevant functions is also processed by us. If we introduce third-party partners for the development of new functions and modules, we will strictly review their qualifications, sign strict confidentiality agreements, and require them to handle personal information in accordance with our requirements, this policy, and any other relevant confidentiality and security measures. At the same time, we will inform you and obtain your consent before the third-party partner processes your personal information.

4.2 Sharing

4.2.1 For the purpose of external processing, we may provide your personal information to third-party partners, allowing them to process the above information for us in accordance with our instructions, privacy policy and other relevant confidentiality and security measures, and provide you with our services to achieve the purposes of collecting and using your personal information as described in this policy. We will only share your personal information for legal, necessary and specific purposes, and only personal information related to services provided by third parties will be shared. Unless we obtain your authorization or otherwise stipulated by laws and regulations, our partners have no right to use the shared personal information for any other purposes. For the companies, organizations and individuals with whom we share personal information, we will sign strict agreements with them and handle the shared personal information in accordance with our instructions, this policy and any other relevant confidentiality and security measures.

4.2.2 Currently, our authorized partners generally include the following types (subject to the content of the statement) :

(a) Advertising and analytics and service partners. We entrust these partners to handle information related to the reach and effectiveness of advertisements, but we will not provide them with your personal identification information, or we will de-identify this information to make it impossible for them to recognize your personal identity. These partners may combine the above information with other data they have legal access to in order to implement the advertising services or decision-making suggestions entrusted by us.

(b) Suppliers, service providers and other partners. When third-party software, hardware/system products or services are provided to you in combination with our products or services, with your authorization, we may provide your necessary personal information to third-party suppliers, service providers and other partners in order to provide us with infrastructure technical services, data analysis services, security services, customer services, etc., and enhance your user experience.

(c) Related parties or users of the same account system. Our data security protection measures and management levels are highly consistent with those of related parties or users in the same account system. To enhance the security and convenience of your use of the product and provide you with a consistent service experience, we will share your personal information with affiliated parties or users within the same account system, subject to legal requirements.

4.3 Transfer

4.3.1 We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

(a) We have obtained your explicit consent or authorization in advance;

(b) In accordance with applicable laws and regulations, the requirements of legal procedures, and mandatory administrative or judicial requirements;

(c) In the event of a merger, acquisition, asset transfer or similar transaction or bankruptcy liquidation, if the transfer of your personal information is involved, we will require the new entity holding your personal information to continue to be bound by this Privacy Policy. Otherwise, we will require the new entity to re-obtain your authorization and consent.

4.3.2 In the event of the aforementioned changes, we will continue to protect your personal information in accordance with the requirements of laws and regulations and no less than the security standards required by this policy, or require the successor recipient of your personal information to continue to protect it. Otherwise, we will require the successor recipient to obtain your separate authorization and consent.

4.4 Public Disclosure

We will not publicly disclose the personal information we have collected about you, unless we must comply with laws and regulations or obtain your consent. When we disclose your personal information, we will desensitize your information, including replacing the content, removing the identifier or anonymizing it, to ensure the security of your information. When we are required to disclose personal information in compliance with any applicable laws or in response to legal procedures, we will inform you of the purpose of the public disclosure, the type of information, and the sensitive personal information that may be involved. On the basis of ensuring the legality of the disclosure, we will abide by the minimum necessary disclosure principles stipulated by relevant laws and regulations.

4.5 Exceptions

Please understand that in the following circumstances, without prior consent from you, in accordance with relevant laws, regulations and national standards, we are compelled to share, transfer or publicly disclose your personal information:

(a) It is related to our fulfillment of obligations stipulated by laws, regulations and government authorities, or the need to resolve litigation or disputes;

(b) Information directly related to national security and defense security;

(c) Information directly related to public security, public health, and major public interests;

(d) Information directly related to criminal investigation, prosecution, trial and the enforcement of judgments;

(e) Where it is necessary to safeguard your or another person's major legitimate rights and interests such as life and property, but it is difficult to obtain your prior consent;

(f) Personal information that you have already disclosed to the public;

(g) Through legally disclosed public information, such as legitimate news reports, government information disclosure and other channels.

5. Storage and protection of personal information

5.1 Storage Period

5.1.1 We will retain your personal information for the shortest period necessary to achieve the purpose of processing it, except where you exercise your rights such as deleting or canceling your account, or where otherwise stipulated by laws and regulations. When the retention period has expired and the law no longer requires us to continue processing your specific personal information, we will delete your personal information or anonymize it in accordance with the requirements of applicable laws (anonymized information will no longer be recognized as personal information). We take appropriate measures to ensure that we process and retain your information

(a) The retention period of personal information shall be the shortest time necessary to achieve the purpose;

(b) As required by law, contract or our legal obligations;

(c) Only retain the period necessary for the purpose of collecting and processing the information, but may extend it as required by the contract and applicable law, and take appropriate safeguards.

5.1.2 If we cease the operation of this software, we will promptly stop collecting users' personal information and inform you through individual service notifications or announcements. After ceasing operations, we will delete users' personal information.

5.2 Safety Protection measures

5.2.1 In accordance with the requirements of relevant laws and regulations, we have designated the person responsible for personal information protection and the working institution for personal information protection. We have also established a data security management system centered on data and centered around the data life cycle, enhancing the security of the entire system from various aspects such as organizational construction, system design, personnel management, and product technology. We have adopted industry-standard security measures to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. For instance, we employ encryption technology to ensure confidentiality, use protection mechanisms to prevent malicious attacks, deploy access control mechanisms to ensure that only authorized personnel can access personal information, and conduct security and privacy training to enhance employees' awareness of the importance of protecting personal information. We attach great importance to the security of your personal information and will do our utmost to ensure the security of the information you submit. However, please understand that the Internet environment is not absolutely secure, and no security measure can be flawless.

5.2.2 Specifically, to protect your personal information, we take the following measures

(a) We take reasonable and feasible measures to ensure that the collection of personal information is minimized to the greatest extent and that personal information unrelated to the purpose of processing is not collected;

(b) We will use encryption technology to ensure the confidentiality of information transmission and storage. We will use reliable protection mechanisms to prevent malicious attacks on the servers that store information.

(c) We will deploy access control mechanisms to ensure that only authorized personnel can access personal information, and control the number of authorized personnel and management based on business needs and personnel levels.

(d) We will select business partners and service providers and incorporate the requirements for personal information protection into the contracts, audits, evaluations and other activities between both parties.

(e) We will organize security and privacy protection training courses, tests and promotional activities to enhance employees' awareness of the importance of protecting personal information.

5.2.3 Although we are responsible for protecting your personal information, you are also responsible for properly keeping your login information. If you find that your personal information has been leaked, please contact us immediately through the contact information provided in this policy so that we can take appropriate measures.

5.3 Measures for Handling Safety Accidents

5.3.1 We have taken safety precautions in line with industry standards, including but not limited to:

(a) We will adopt feasible technical measures such as encryption, desensitization and de-identification to ensure the security and confidentiality of information during storage or transmission.

(b) We will strictly limit access rights to information, adopt a hierarchical management or approval mechanism, and minimize the scope of personnel required to control access to information.

(c) We will establish an information security emergency response team and the corresponding system management framework, and regularly confirm the protection of personal information and identify risks.

5.3.2 In the event of personal information leakage or other incidents, we will promptly inform you or make an announcement in accordance with the requirements of laws and regulations, and take remedial measures in a timely manner. We will also proactively report the handling situation of personal information security incidents in accordance with the requirements of regulatory authorities.

5.4 Notification when the product or service stops operating

When our products or services cease operation, we will notify you through push notifications, announcements and other forms, and delete your personal information or anonymize it within a reasonable period of time, except as otherwise required by laws and regulations.

6. The rights and interests of personal information subjects

6.1 A copy of personal information

6.1.1 You can query and copy your personal information through the path listed in "Query and Access Personal Information". If you need a copy of your personal information, you can also apply to download it through the path of "My - Privacy Settings - Personal Information - Apply for Download". In addition, you can also contact us through the contact information published in this policy. After verifying your identity, we will provide you with a copy of your personal information (including basic information and identity information) in our services, except as otherwise required by laws and regulations or agreed upon in this policy.

6.2 Correct and supplement personal information

When you find that the personal information we process about you is incorrect or incomplete, you have the right to request the correction or supplementation of such incorrect or incomplete information. You can submit a correction or supplementary application through the path of "My" - "Profile" - "Edit Profile", or through information feedback, error reporting and other means to us. You can also contact us through the contact information provided in this policy. After verifying your personal information, we will promptly correct and supplement it.

6.3 Delete personal information

6.3.1 You can delete your browsing/collecting/reading history through the path "My - History - More";

6.3.2 Under the following circumstances, you may contact us through the contact information provided in this policy to delete our personal information:

A.If we process your personal information in violation of the provisions of laws, regulations or agreements;

B.If our processing objective has been achieved, cannot be achieved, or is no longer necessary to achieve it;

C.If we cease to provide the products and/or services, or the storage period has expired;

D.If you withdraw your consent;

E.Other circumstances as prescribed by laws and administrative regulations.

6.3.3 Please understand that if the storage period stipulated by laws, administrative regulations or explicitly stated in this Privacy Policy has not yet expired, or if it is technically difficult to delete personal information, we will cease storage and take necessary security protection measures.

6.4 Change or withdrawal of consent

You can change the scope of your authorization for us to continue collecting your personal information or withdraw your consent by deleting the information, disabling device permissions, or turning off the personalized recommendation switch (if any). You can also withdraw some or all of our authorization to continue collecting your personal information by canceling your account or other means.

Please understand that each business function requires some basic personal information to be completed. We may not be able to respond to your request to change the scope of authorization. After you withdraw your consent or authorization, we will no longer be able to provide you with the corresponding services that have been authorized, nor will we process your relevant personal information. However, your decision to withdraw consent or authorization will not affect the processing of your personal information that was carried out based on your prior authorization.

If you are unable to change or withdraw your authorization and consent through the above-mentioned path, you can contact us through the contact information provided in this policy. We will review and respond to your request as soon as possible within 15 working days or within the time limit stipulated by laws and regulations.

6.5 Cancel your account

6.5.1 If you are an individual user, you can deactivate your account through the path of "My - Settings - Deactivate Account".

6.5.2 You are aware and understand that account cancellation is an irreversible act. Once you cancel your Fulxion AI account, you will no longer be able to use all products and/or services under your Fulxion AI account. Please proceed with caution. After your account is cancelled, we will stop providing you with all products and/or services of "Fulxion AI", and anonymize your personal information in accordance with the provisions of laws and regulations, or delete the personal information related to your account. However, this does not apply if laws, regulations or regulatory authorities have other provisions regarding the storage period of user information, or if customer data is processed separately as required by the customer.

6.6 Access the Privacy Policy

We will inform you of this policy on the account registration/login page. In addition, you can also view the full content of this policy at any time by clicking on "Footer - Support - Privacy Policy". Please understand that the relevant functions of the products and/or services described in this policy may vary due to factors such as the model of the device you use, system version, and version of the software application. The final product and/or service is subject to the software and related services you use.

6.7 Respond to your rights requests

6.7.1 Any questions, suggestions, opinions or complaints can be submitted to our customer service through the customer service channel, or via "Workbench" - "Help and Resources" - "Feedback". To ensure safety, we will respond to your request within 15 working days after receiving your application or within the time limit stipulated by laws and regulations. You are also aware that in the following circumstances, we may not be able to respond to your request:

(a) Related to our fulfillment of obligations stipulated by laws and regulations;

(b) Directly related to national security and defense security;

(c) Directly related to public security, public health, and major public interests;

(d) Directly related to the investigation, prosecution, trial and enforcement of criminal offenses;

(e) There is sufficient evidence to show that the personal information subject has acted in bad faith or abused their rights;

(f) Where it is necessary to safeguard the major legitimate rights and interests of the personal information subject or another individual, but it is difficult to obtain the authorization and consent of the personal information subject;

(g) Responding to your request would cause serious damage to your or other individuals' or organizations' legitimate rights and interests;

(h) Involving trade secrets.

6.7.2 For your reasonable requests, we generally do not charge any fees. However, for repeated requests, we may charge a certain cost fee depending on the circumstances. We may reject requests that are unreasonable and repetitive, require excessive technical means (for example, requiring the construction of a new system or a fundamental change to current practices), pose risks to the legitimate rights and interests of others, or are highly impractical (for example, involving backup information stored on magnetic tapes).

6.8 Exceptions to the Exercise of Rights

Under the following circumstances, we may not be able to respond to your requests for access, correction, supplementation, deletion, copying, transplantation, withdrawal of consent, knowledge, decision, etc.

(a) Directly related to national security and national defense security;

(b) Directly related to public security, public health, and major public interests;

(c) Directly related to criminal investigation, prosecution, trial and the enforcement of judgments;

(d) We have sufficient evidence to show that you have malicious intent or are abusing your rights (if your request will endanger public safety, the legitimate rights and interests of others, or exceed the scope that can be covered by general technical means and business costs);

(e) Responding to the request of the personal information subject will cause serious damage to your or other individuals' or organizations' legitimate rights and interests;

(f) Involving trade secrets;

(g) Where otherwise provided by laws and administrative regulations.

7. Modification and update of this policy

7.1 In order to provide you with better services, this service will be updated and changed from time to time. The terms we modify form part of this policy and have the same effect as this policy. Without your explicit consent, we will not reduce the rights you are entitled to under this currently effective policy.

7.2 We may revise and update this policy from time to time. If this policy is revised, we will release an updated version and remind you to read the updated content in an appropriate manner so that you can be informed of the latest version of the privacy policy in a timely manner. If you continue to use the products and/or services after the update date of this policy, it will be deemed that you have accepted the updated privacy policy. When there are significant changes to this policy, we will inform you in more prominent ways, such as Posting on the main exposure pages or sites of the product or service, pushing notifications, sending you emails, text messages, etc. If you do not agree with such changes, please stop using the corresponding product or service immediately.

7.3 The major changes referred to in this policy include but are not limited to:

(a) Our service model has undergone significant changes. Such as the purpose of processing personal information, the types of personal information processed, the way personal information is used, etc.

(b) There have been significant changes in our ownership structure and organizational structure. For example, changes in ownership resulting from business adjustments, bankruptcies, mergers and acquisitions, etc.

(c) The main objects to which personal information is provided, transferred or disclosed publicly change;

(d) There are significant changes to your rights regarding the processing of personal information and the ways to exercise them;

(e) We are responsible for handling changes in the department in charge of personal information security, contact information and complaint channels, etc.

(f) The personal information security impact assessment report indicates a high risk.

8. Contact us

8.1 If you have any comments, questions, suggestions or complaints regarding this policy or the protection of your personal information, or if you have any questions about the processing of your personal information, you may contact us at the following email address: support@ai-ghibli-style.com

8.2 To ensure that we can handle your issue efficiently and provide you with timely feedback, we will process your request after verifying your identity. Under normal circumstances, we will reply to your question within 15 working days after receiving it. If the situation is complex and an extension is required, we will explain the reasons to you within 15 working days.

9. Others

9.1 The interpretation of this policy and the resolution of disputes shall be governed by the laws of the People's Republic of China (mainland). In the event of any dispute arising from the signing, performance of this policy or our processing of your personal information, both parties shall strive to resolve it through friendly consultation. If the negotiation fails, you may file a lawsuit with the people's court having jurisdiction in the defendant's location. If you believe that our processing of your personal information has infringed upon your legitimate rights and interests, you may also file a complaint with the relevant government department.

9.2 During the use of our products and/or services, you may access applications and other services linked to third parties. Such applications and other services may involve situations where you provide specific types of personal information to third parties. We recommend that you carefully read the applicable terms and conditions (as well as any relevant privacy statements) before using such applications or services to ensure that you fully understand the rules governing the use of your personal information and decide whether to use it. If you have any questions about a specific third party's use of your personal information, please contact that third party directly.