Privacy Agreement
Aita Technology (Hangzhou) Co., Ltd. and/or its affiliates (hereinafter referred to as "Aita Technology" or "we") respect and protect personal information and will treat such information with a high degree of diligence and prudence. When you visit and use Chat2DB as well as other services provided by Aita Technology, we will collect, process, and disclose your information in accordance with this Privacy Agreement (hereinafter referred to as "this Agreement"). We hope to clearly introduce through this Agreement how we handle your information, to help you understand how to maintain your privacy rights. Before accepting this Agreement, please read all of its contents carefully. If you cannot understand or do not agree with any content of this Agreement, please do not access, use Chat2DB, or any other services provided by Aita Technology. Your actions such as clicking to confirm on the web page, actual use of Chat2DB services or other services provided by Aita Technology indicate that you have read and fully understood the content of this Agreement and are bound by it. This Agreement is an integral part of the "Chat2DB Service Agreement." Agreeing to the "Chat2DB Service Agreement" is deemed as agreeing to all contents of this Agreement.
1. Scope of Application of This Agreement
This Agreement applies when you use any of our products and services, regardless of whether the product and service have a separate privacy agreement, and whether you are a browsing user (visitor) or a registered login user. Please note, this Agreement does not apply to:
Information collected by third-party services (including any third-party websites) accessed through our products and/or services; Information collected by other companies or agencies providing advertising services in our products and/or services. Please be aware: If you provide your personal information to a third party when browsing third-party websites or using third-party products and/or services, your information should be subject to the third party's privacy statement or similar agreement. We do not assume any legal responsibility for any improper use or disclosure of the information provided by you to any third party, regardless of whether you log in or browse the above websites, software, or use their products and/or services based on the links or guidance of Aita Technology. We strongly recommend that you understand and confirm the privacy protection situation of the service provider before using the above third-party services.
2. How We Collect Your Personal Privacy Information
2.1. Information you provide actively when using Chat2DB services, including: Username, name, email, mobile phone number, avatar, pictures, documents, etc., that you actively fill out or upload when registering or using the service.
2.2. When you use the service, Chat2DB may automatically collect information, including: Device information, such as device model, operating system version, device settings, device environment, software version number, browser type, client's IP address, etc.
2.3. To complete service order payments, you can settle payments via bank transfer or third-party payment platforms cooperating with Aita Technology (Alipay or other third-party payment platforms, as involved), Chat2DB may share your username, corresponding third-party payment platform account name, order payment-related information, order security-related device information, and other necessary information required by anti-money laundering laws with the third-party payment platform through software development kits (SDKs) embedded in websites or mobile platforms. The aforementioned third-party payment platform may obtain your network connection permission, device information permission, and access network status and Wi-Fi status.
3. How We Use Your Personal Privacy Information
Aita Technology strictly adheres to laws and regulations, and the collected information is only used for the following purposes:
To provide you with services; To meet your personalized needs, such as location settings, personalized help services; Product development and service optimization, such as when Aita Technology's system malfunctions, Aita Technology will record and analyze the information generated during system failures to optimize Aita Technology's services; Security assurance, such as Aita Technology will use your information for identity verification, security prevention, anti-fraud monitoring, archiving backup, customer safety services, etc.; To invite you to participate in surveys about Chat2DB.
4. How We Share, Transfer, and Publicly Disclose Your Personal Information
4.1. For the needs related to business operation audits, related operation needs, and regulatory requirements, such as real-name identity verification, mail, SMS, consultation push or notifications, it is necessary to employ third-party service providers to provide corresponding services. Aita Technology may need to share your enterprise/team or personal information with these companies. Aita Technology will require service providers to provide services according to Aita Technology's instructions, privacy policy, and other relevant confidentiality and security measures. Besides, without your consent, Aita Technology will not share any of your personal information with third parties.
4.2. As Aita Technology's business continues to develop, when mergers, acquisitions, asset transfers, and other transactions lead to third-party sharing of your personal information, Aita Technology will inform you of the relevant situation through push notifications, announcements, etc., and continue to protect your personal information according to the law and standards not lower than those required by this policy, or require the new managers to continue protecting your personal information. The information collected by Aita Technology is considered an asset. If Aita Technology or any of its affiliates, departments, or parts of assets are acquired by another company, such information may become one of the transferred assets. If so, the acquiring company can only use your information according to this privacy policy (or the subsequent policy effective when your information was collected).
4.3. Aita Technology may disclose your personal information for the following purposes:
To comply with applicable laws, regulations, and other relevant provisions; To comply with court judgments, rulings, or other legal procedures; To comply with the requirements of relevant government agencies or other legally authorized organizations; Aita Technology has reason to believe that it needs to comply with laws, regulations, and other relevant provisions; To execute related service agreements or this policy, maintain social public interest, or for the reasonable and necessary purposes of protecting the personal and property safety or other legal rights and interests of Aita Technology's customers, Aita Technology, or Aita Technology's affiliated companies, other users, or employees.
5. How We Protect Your Personal Information
Your personal information security is very important to us. We will strictly comply with relevant laws and regulations, take industry-recognized reasonable and feasible measures to protect your personal information. Prevent information from being accessed, disclosed, used, modified without authorization, or from being damaged or lost.
5.1 Technical Measures and Data Security Measures
We strive to take various security measures that meet industry standards in physical, electronic, and management aspects to protect the security of your personal information. We actively establish data classification and grading systems, data security management specifications, data security development specifications to manage and regulate the storage and use of personal information, ensuring that we do not collect personal information unrelated to the services we provide.
We implement comprehensive security control over data through signing confidentiality agreements with information accessors, monitoring, and auditing mechanisms. Prevent your personal information from being accessed, publicly disclosed, used, modified, damaged, or lost without authorization.
We have used security protection measures that meet industry standards to protect the personal information you provide, to prevent unauthorized access, public disclosure, use, modification of data, and to prevent data damage or loss. We will take all reasonably feasible measures to protect your personal information. For example, the exchange of data (such as credit card information) between your browser and Chat2DB is protected by SSL encryption; we also provide HTTPS secure browsing mode; we use encryption technology to ensure data confidentiality; we use trusted protection mechanisms to prevent data from malicious attacks; we deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we organize security and privacy protection training courses to strengthen employees' awareness of protecting personal information.
5.2 Security Incident Handling
We will try our best to ensure the security of any information you send to us, but please understand that, due to technical limitations and various malicious methods existing in the internet industry, it's not always possible to guarantee 100% security of information. You need to understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control. To prevent the occurrence of security incidents, we have developed proper early warning mechanisms and emergency plans. In the unfortunate event of a personal information security incident, we will inform you in a timely manner according to the requirements of laws and regulations: the basic situation and impact of the security incident, the measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you, and immediately initiate the emergency plan to minimize the loss. We will promptly inform you of the related situation of the event by phone, push notifications, etc. If it's difficult to inform users one by one, we will take reasonable and effective methods to make announcements. At the same time, we will also proactively report the handling situation of personal information security incidents according to the requirements of regulatory departments, and closely cooperate with the work of government agencies.
6. How You Can Manage Your Personal Information
You can manage your information during the use of the service. You can access, modify, and delete your provided registration information and other personal information during the use of Chat2DB services, or contact Aita Technology according to the notification guidelines. The scope and method of accessing, modifying, and deleting your personal information will depend on the specific services you use. When you access, modify, and delete relevant information, Aita Technology may require you to undergo identity verification to ensure account security. Aita Technology will collect and use your information only for achieving the functionality of Aita Technology's products or services, as described in this policy. If you find that Aita Technology collects and uses your personal information in violation of laws, administrative regulations, or the agreements between the two parties, you can request Aita Technology to delete it. If you find that the personal information collected and stored by Aita Technology is incorrect, you can request Aita Technology to correct it. You are responsible for the information you share actively. You can share your relevant information with your colleagues, team members, and other users through Chat2DB's services, such as your documents, uploaded files, etc. Please note that this may include your personal identity information, personal property information, company financial information, and other sensitive information. Please consider carefully before disclosing your personal and company's sensitive information. You can delete the information you publicly shared through Chat2DB's settings function or guidance provided by Aita Technology. However, please note that such information may still be independently saved by other users or non-affiliated third parties not controlled by Aita Technology.
7. Storage of Your Personal Information
We will store the information obtained from within the People's Republic of China within the territory of the People's Republic of China. Except for the following situations:
There are clear provisions in laws and regulations; Obtaining your explicit authorization; Personal active behaviors such as cross-border transactions conducted through the internet. For the above situations, we will ensure that your personal information is provided with sufficient protection according to this Agreement.
Due to our products or services being provided through resources and servers located around the world, this means that after obtaining your authorization and consent, your personal information may be transferred to, or accessed from, jurisdictions outside of the country/region where you use the product or service.
Such jurisdictions may have different data protection laws, or even no relevant laws. In such cases, we will ensure that your personal information is equally protected as in the territory of the People's Republic of China. For example, we will ask for your consent to cross-border transfer of personal information, or implement security measures such as data de-identification before cross-border data transfer.
8. Use of Cookies and SDKs
Chat2DB uses Cookies and related technologies. Chat2DB or Chat2DB's third-party partners may collect your information through placing secure Cookies and related technologies, aiming to provide you with a more personalized user experience and service. Aita Technology will strictly require third-party partners to follow the relevant provisions of this policy. You can also manage Cookies through browser settings. However, please note that if you disable Cookies, you will not be able to use various interactive functions of Chat2DB. Use of SDKs: To ensure the implementation and stable operation of Chat2DB-related functions, allowing you to use and enjoy more services and features, Chat2DB will embed SDKs of third-party partners or directly provide related services through SDKs provided by third-party partners. Chat2DB will conduct strict security inspections on SDKs of third-party partners that obtain relevant information and agree on strict data protection measures with third-party partners, requiring them to process personal information according to this policy and any other relevant confidentiality and security measures.
9. How We Handle Minors' Personal Information
9.1 We mainly provide products and services to adults. Minors are not allowed to create their own user accounts without the consent of their parents or guardians. If you are a minor, we require you to ask your parents or guardians to read this Agreement carefully and use our services or provide information to us with the consent of your parents or guardians.
9.2 For the collection of minors' personal information due to the use of our products or services with the consent of parents or guardians, we will use, share, transfer, or disclose this information only when permitted by law, with the explicit consent of parents or guardians, or necessary to protect minors.
9.3 Although the definition of minors may vary by local laws and customs, we consider anyone under the age of 14 to be a minor.
9.4 If we discover that we have collected personal information from minors without the prior verifiable consent of parents, we will try to delete the relevant data as soon as possible.
10. How Your Personal Information is Transferred Globally
10.1. The personal information we collect and generate in the operation within the People's Republic of China is stored in China, except for the following situations:
There are clear provisions in laws and regulations; Obtaining your explicit authorization; Personal active behaviors such as cross-border transactions conducted through the internet. For the above situations, we will ensure that your personal information is provided with sufficient protection according to this Agreement.
10.2. Since we provide products or services through resources and servers located around the world, this means that, after obtaining your authorization and consent, your personal information may be transferred to or accessed from jurisdictions outside of the country/region where you use the product or service.
These jurisdictions may have different data protection laws, or even no relevant laws. In such cases, we will ensure that your personal information receives protection equivalent to that within the territory of the People's Republic of China. For example, we will request your consent for the cross-border transfer of personal information, or implement security measures such as data de-identification before the cross-border data transfer.
11. How This Agreement is Updated
11.1. Our Privacy Agreement may change.
11.2. Without your explicit consent, we will not reduce your rights under this Agreement. We will post any changes to the Privacy Agreement on a specific page.
11.3. For significant changes, we will also provide more prominent notice (including for some services, we will notify through the website announcement or even provide pop-up prompts to explain the specific changes in the privacy agreement) and will give you a reasonable period to consider whether to accept the changes before they take effect. If you continue to use our products and services after the new version of the privacy agreement and user agreement takes effect, it indicates that you have fully read and are willing to be bound by the updated privacy agreement and user agreement. If you do not agree to such changes, you can stop using our products and services.
11.4. Significant changes referred to in this Agreement include but are not limited to:
Significant changes in our service model. Such as the purposes of processing personal information, types of processed personal information, and the ways in which personal information is used, etc.; Significant changes in our ownership structure, organizational structure, etc. Such as adjustments due to business adjustments, bankruptcy mergers, etc. leading to changes in owners, etc.; Major changes in the main objects of personal information sharing, transfer, or public disclosure; Significant changes in your rights regarding personal information processing and the ways in which they are exercised; Changes in the department responsible for handling personal information security, contact methods, and complaint channels; When the personal information security impact assessment report indicates a high risk.
12. How to Contact Us
If you have any questions or opinions about the content of this Agreement, or if you have any questions and opinions about Aita Technology's practices and operations under this Agreement, you can send your questions to Chat2DB@ch2db.com. Generally, we will reply to your request within 15 days. If you are not satisfied with our reply, especially if you believe that our personal information processing behavior has harmed your legal rights, you can also seek a solution by filing a lawsuit in the People's Court where Aita Technology is located.