Welcome to the Star Chat AI Software (hereinafter referred to as “This Software”). This Privacy Agreement is designed to clarify the scope, manner, and rights and obligations associated with the scope, manner, and disclosure of user information collected, used, stored, transmitted, and disclosed by this Software, and to ensure the security of the user‘s personal information and legitimate interests. This Agreement applies to all users of this Software (hereinafter referred to as “Users”), and by using this Software, users are deemed to have fully read, understood, and agreed to all terms and conditions of this Agreement. If users do not agree to this Agreement, they should immediately stop using this Software.
1. Definition and scope
1.1 Definitions
1.1.1 Personal Information: Means various information recorded electronically or in other ways that can individually or in combination with other information identify a particular natural person or reflect the activities of a particular natural person, including but not limited to names, email addresses, phone numbers, device information, usage records, etc.
1.1.2 Non-Personal Information: Means data that cannot be individually identified as a specific natural person and that has been anonymized after processing, including but not limited to software usage statistics, functional test data, anonymized user behavior analysis data, etc.
1.1.3 Third-Party Services: Means services provided by third parties that are integrated or linked to this Software, including but not limited to third-party payments, third-party logins, data statistics, etc., whose privacy protection is governed by relevant third-party agreements.
1.2 Applicability Scope
1.2.1 This Agreement applies to all functional modules of this Software, including but not limited to chat interactions, AI generation, data backup, account management, etc.
1.2.2 This Agreement does not apply to third-party services, the processing of information from third-party services is the third party‘s independent responsibility, and this Software does not take responsibility for the privacy protection of third-party services.
2. Information Collection and Acquisition
2.1 Information Actively Collected
2.1.1 Account Registration Information: When users register for this Software account, they are required to provide an email address (as an account identifier), a password (encrypted storage), and optionally provide personalized information such as name, profile, etc. for account authentication, identity identification, and personalization services.
2.1.2 Interaction Information: During interactions such as chats, questions, and content creation by users using this Software, this Software will collect text, images, speech, and other content entered by users to provide AI response services and optimize service quality.
2.2 Automatically Collected Information
2.2.1 Device Information: This includes, but is not limited to, the device model, operating system version, device unique identifier (e.g. IMEI, MAC address), network type, and IP address for ensuring the proper operation of the software, troubleshooting, and optimizing suitability.
2.2.2 Usage Records: Includes but is not limited to software login time, usage duration, feature action records, and interaction frequency, used to analyze user usage habits, optimize service experience, and improve AI response accuracy.
2.3 Information Collection Limits
2.3.1 This Software collects only the information necessary to provide the Services and does not collect additional information that is not related to the Services.
2.3.2 The user has the right to opt out of providing information that is optional and does not affect the use of the core functionality of this Software.
3. Information Use Rules
3.1 Core Usage Purpose
3.1.1 Service Provision: Based on user input interaction information, provide core services such as AI chat, content generation, and question resolution, ensuring service stability and accuracy.
3.1.2 Account Management: Use account registration information for authentication, password recovery, account security protection, and prevent account theft, abuse, and other risks.
3.2 Optimization and Improvement
3.2.1 This Software can use anonymized processing of user interaction information and usage records for AI model training, functional optimization, improving service quality and response efficiency, without identifying specific users during this process.
3.2.2 Personalized recommendation services are provided based on user usage habits (such as quick access to commonly used features), which users can turn off in their settings.
3.3 Usage restrictions
3.3.1 Use of user information not exceeding the scope of use stipulated in this Agreement, and use of user information not for other unrelated purposes without the user‘s consent.
3.3.2 Do not use user information for illegal marketing, harassment, etc., and do not send users advertising information that is not related to this Software Service.
4. Information Storage and Protection
4.1 Storing Methods and Locations
4.1.1 User information will be stored on servers that comply with international privacy protection standards, located in regions that comply with data protection regulations such as the European Union and the United States, and not stored within China.
4.1.2 Encrypted storage technologies (such as AES-256 encryption) are used to protect user information from illegal access, tampering, and disclosure.
4.2 Storage Period
4.2.1 The personal information storage period is for the duration of the user‘s use of this Software and 12 months after signing out of the account. Upon expiration, the user‘s personal information will be anonymized or completely deleted.
4.2.2 Non-Personal Information may be stored for a long period of time for software optimization and service improvement, and remains anonymized throughout the storage process.
4.3 Security Precautions
4.3.1 Establish a well-established information security management system, equip with professional security technicians, and regularly conduct security testing and maintenance of servers and systems to prevent cyber attacks, data leakage, and other risks.
4.3.2 Restrict information access rights, only authorize employees to access user information when performing their work duties, and require adherence to strict confidentiality regulations, strictly prohibiting disclosure and misuse of user information.
5. Information Transfer and Disclosure
5.1 Information Transfer
5.1.1 User information uses encrypted transmission techniques (such as SSL/TLS encryption) during transmission to ensure security during the transmission of information, preventing illegal intercepts and theft.
5.1.2 Information transfers are carried out only between this Software‘s servers and users‘ devices, and between this Software and authorized third-party service providers, and the transfer is strictly limited to the scenarios required by the service.
5.2 Information Disclosure
5.2.1 With the User‘s explicit consent: In the case of active authorization by the User, user-specified information may be disclosed to third parties (such as disclosure of user account identification information when third parties log in).
5.2.2 Legal Compliance Requirements: When receiving a legal notification from a judicial authority or regulatory authority (such as a subpoena, an investigation warrant), you may disclose user information in accordance with the law to cooperate with relevant investigation work.
5.2.3 Anonymized Disclosure: Anonymized user data can be disclosed to third-party entities for academic research, industry analysis, etc., and this data cannot identify specific users.
5.2.4 Prohibition of Disclosure: Do not disclose your personal information to any third party without your consent and without legal basis, and do not sell, rent, or lend your information to third parties.
6. User Rights
6.1 Access and Query Rights
6.1.1 Users can log in to this Software account at any time to query and view their personal information (such as registration information, interaction records, usage records), and this Software will provide a convenient query entry.
6.2 Correction and Supplementary Rights
6.2.1 If the user discovers that the personal information is incorrect or incomplete, they can request correction and supplementation of the personal information through the Software‘s settings or by contacting Customer Service. The Software will process and provide feedback within 3 working days.
6.3 Right to Delete
6.3.1 Users may request the deletion of certain personal information (such as interaction records, personalized information), or request the sign-out of an account, upon which the Software will delete or anonymize the user‘s personal information in accordance with the terms of this Agreement.
6.3.2 If the user believes that the Software is illegally collecting and using the user‘s information, they can request the removal of the relevant information, which the Software will verify and promptly handle.
6.4 Revoking the Right to Consent
6.4.1 Users may revoke their consent to the collection, use, and disclosure of personal information by the Software at any time. Upon revoking the consent, the Software will stop processing the relevant information, but this will not affect the processing of information previously completed based on the user‘s consent.
7. Third-party service descriptions
7.1 Integration of Third-Party Services
7.1.1 This Software may integrate third-party services (such as third-party logins, payments, data statistics), third-party service providers may collect user-related information, and their information processing behavior follows their own privacy agreements.
7.1.2 This Software provides only necessary user information (such as account identifiers) to third-party service providers, and audits the privacy protection capabilities of third-party services to ensure that they comply with international privacy protection standards.
7.2 User Responsibility
7.2.1 When users use third-party services, they should carefully read the third-party privacy agreements to understand their information collection and usage rules. This Software assumes no responsibility for protecting the privacy of third-party services.
8. Agreement Updates and Dispute Resolution
8.1 Agreement Updates
8.1.1 This Software may update this Agreement in accordance with changes in international privacy protection regulations, service upgrade requirements, and will notify users through pop-ups, announcements, etc. of the updates.
8.1.2 The user‘s continued use of this Software is considered to agree to the updated agreement; if the user does not agree to the updated agreement, the user should immediately stop using this Software.
8.2 Dispute Resolution
8.2.1 Disputes arising from or related to this Agreement should first be resolved by friendly negotiation; if negotiation fails, either party has the right to file a lawsuit in the court with jurisdiction where this software server is located.
8.3 Contact Methods
8.3.1 If you have any questions, suggestions regarding this Agreement, or need to exercise your personal information-related rights, please contact us via the following email address: lazar@harporconstructtab.com. We will respond within 5 working days.
This Agreement is effective from the date of your first use of this Software.
Star Chat Software Operations Team