1. Personal Information We
Collect
Account
Information:
This includes your username, phone
number, profile picture, email address, and account credentials that you
provide during registration or use of your account. We use this information to
create and manage your account, based on the necessity of performing our
contract with you.
User
Content:
This includes prompts, audio,
images, videos, files, and any content you input or generate while using our
products and services. We process this information to provide and improve the
Services, including training and optimizing our models. The legal basis for
this processing may be our legitimate interests or your consent, depending on
your jurisdiction.
In some regions, you may choose to
use My Voice Feature, which allows you to interact with the Services using your
voice. To activate it, you must voluntarily provide a voice recording of a
specific phrase. This enables us to create a voiceprint to support personalized
voice interactions. Because voiceprint data is considered sensitive personal
information, we will collect and use it only with your explicit consent. You
can withdraw this consent at any time in your settings or by contacting us.
Communication
Data:
When you contact us through email,
support forms, or our social media pages, we collect the information you submit,
such as your name, contact details, and message content. We use this
information to respond to your inquiries and improve our customer service,
based on our legitimate interest or your consent, depending on applicable law.
Surveys,
Research, and Promotions:
If you
choose to participate in surveys, promotions, contests, research studies, or
events sponsored by us, we may collect the information you provide—such as
responses, contact details, or preferences—with your consent. Participation is
voluntary, and you may withdraw your consent at any time.
Information We Collect
Automaticall
When you access or interact with our
Services, we automatically collect certain technical and usage-related
information, including:
Log
Data:
We collect standard log information
sent by your browser, device, or application when you use the Services. This
includes your IP address, browser type, language settings, referring URLs, time
of access, and error logs.
Device
and Usage Information:
We collect
information about your device and how you interact with the Services, such
as:Device type, model, and operating system;Browser version and user
agent;Unique device identifiers (such as device ID, MAC address);Conversation
IDs and session identifiers;Network and telecommunications provider;Clipboard
data (if applicable and permitted by your settings);Date and time of access,
pages viewed, and interaction patterns.This information helps us monitor
service performance, troubleshoot issues, and optimize user experience.
Cookies
and Similar Technologies:
We may use
cookies and similar tracking technologies (e.g., web beacons, local storage,
SDKs) to:Remember your settings and preferences;Understand how you navigate and
interact with our Services;Personalize your experience;Measure performance and
detect technical errors.Some cookies are strictly necessary for the functioning
of our Services, while others (such as analytics or advertising cookies) may
require your prior consent, depending on your location and applicable law.You
can manage or withdraw your consent to cookies through the settings in your
browser or device, or via our cookie banner when required.
Information We Collect from
Third Parties
We may receive personal information
about you from third-party sources as described below:
Third-Party
Login or Authentication Providers:
If
you choose to register or log in using a third-party service (such as Google),
we will collect certain information from that provider with your authorization.
This may include your access tokens, profile photo, username, email address, or
other public profile information. We use this information to create and link
your account, streamline authentication, and personalize your experience. We
may also request additional information if any essential registration details
are missing.
Security
and Fraud Prevention Partners:
We
may receive information from our trusted security partners, such as device
fingerprints, fraud scores, or blacklists, to detect, prevent, and respond to
abuse, fraudulent activity, spam, or other threats to the security and
integrity of our Services.
Publicly
Available Sources:
We may obtain personal or technical
information that is publicly available online (e.g., from public datasets,
published websites, or open forums) for the purpose of improving and training
the models that power our Services. Where such data is used, we apply data
minimization and pseudonymization techniques where feasible.
2.
How we use Personal
Information
We use the personal information we
collect to operate, maintain, improve, and provide our Services, including for
the following purposes:
To
Provide and Manage the Services:
We
use your personal information to create and manage your account, authenticate
your login, and enable you to interact with the features of our Services (such
as chat, content generation, and personalization). This processing is necessary
to perform our contract with you and ensure the core functionality of the
Services.
To
Improve and Develop Our Services:
We
analyze usage data and user interactions to better understand how our Services
are used, identify problems, and develop new features or products. This may
also include training and improving our underlying models, algorithms, and user
interfaces. Where required by law, we obtain your consent for such purposes;
otherwise, we rely on our legitimate interests in enhancing our Services while
respecting your rights and freedoms.
To
Communicate with You:
We may contact you to provide
service-related updates (such as changes to features or terms), respond to your
inquiries or feedback, send administrative notifications, or resolve technical
issues. We may also provide customer support and handle complaints or user
requests. These communications are based on performance of our contract or our
legitimate interest in maintaining service quality.
To
Ensure Security and Prevent Misuse:
We
process personal information to detect, prevent, and respond to fraud, abuse,
spam, unauthorized access, and other harmful activities. This includes
monitoring suspicious behaviors and securing our infrastructure. Such
processing is necessary for compliance with legal obligations and our
legitimate interest in ensuring the integrity and safety of our Services and
users.
To
Comply with Legal Obligations:
We
process your personal information to comply with applicable laws and
regulations, respond to valid legal requests, enforce our terms, and protect
the rights, property, or safety of our users, us, or third parties
To
Promote and Market Our Services:
With
your consent (where required), we may use your information to send promotional
materials about our services or relevant third-party offerings, conduct
marketing campaigns, or invite you to participate in surveys, contests, or
other engagement initiatives. You can opt out of marketing communications at
any time.
3. How we share Personal
Information
We do not sell your personal
information. However, we may share your personal information with third parties
under the following circumstances, in accordance with applicable data
protection laws:
Service
Providers (Processors)
We engage
trusted third-party service providers to support the operation, maintenance,
and improvement of our Services. These providers may process your personal
information on our behalf, strictly under our instructions and only for the
purposes outlined in this Privacy Policy. They are contractually obligated to
implement appropriate security measures and are prohibited from using your
information for their own purposes.
These providers may include:
·
Hosting
and cloud infrastructure providers
·
Customer
support and moderation tools
·
Real-time
communication and push notification services
·
Payment
and subscription processors
·
Email
and communication platforms
·
Analytics,
monitoring, and A/B testing services
·
Security
and anti-fraud partners
For example, service providers help
us: (i) enable account creation and login; (ii) monitor system stability and
detect anomalies; (iii) analyze usage and improve features; and (iv) process
transactions securely.
Affiliates
We may share your personal information with our corporate
affiliates (i.e., entities under common ownership or control), where necessary
for internal administration, consistent product development, and to provide
integrated service experiences. These affiliates are required to honor this
Privacy Policy or implement equivalent protective measures.
Third
Parties You Choose to Share Information With
Some features of our Services allow you to share user-generated content or data
(e.g., conversations or voice outputs) with third parties via sharing links,
social integrations, or embedded widgets. In such cases, those third parties
process your personal data independently, and their use is governed by their
own privacy policies. We encourage you to review their privacy practices before
sharing.
Corporate
Transactions
In the event of a business
transaction (e.g., merger, acquisition, restructuring, or asset sale), we may
transfer your personal information to relevant third parties as part of the
transaction. Where such sharing is required, we will ensure that appropriate
contractual safeguards (e.g., data transfer agreements) are in place. If
required by applicable law, we will notify you or seek your consent prior to
the transfer.
Legal
Requirements and Compliance
We may
disclose personal information to public authorities or other third parties if
we believe, in good faith, that such disclosure is reasonably necessary to:
·
Comply
with legal obligations or lawful requests by public authorities, courts, or
regulators (based on applicable legal standards, including international ones);
·
Protect
the rights, safety, or property of Moonshot AI, our users, or the public;
·
Enforce
our Terms of Service, investigate suspected violations, or detect and prevent
fraud, security, or technical issues;
·
Respond
to legal claims or protect ourselves from legal liability.
4.
Subscription and Payment
Information
When you subscribe to paid services
or make purchases through our platform, we may collect and process the
following information related to your subscription and payment activities:
Payment
Details
We use authorized third-party
payment processors (such as Stripe, Apple Pay, or Google Pay) to process
payments securely. When you make a purchase, these processors may collect
payment information from you, including your name, billing address, payment
method, and transaction identifiers. We do not store your full payment card
details on our servers.
We process this information to:
·
Complete
transactions and manage your subscriptions;
·
Issue
invoices and confirmations;
·
Comply
with tax, accounting, and legal obligations.
The legal basis for this processing
is the performance
of a contract with you and our legal obligations
under applicable financial regulations.
Automatic
Renewal and Cancellation
If you subscribe to a plan with
automatic renewal, we will clearly notify you of the renewal terms at the time
of purchase and, where required by law, again before renewal. You can cancel
your subscription at any time through your account settings or by contacting
our customer support. Upon cancellation, your subscription will remain active
until the end of the current billing cycle.
If your subscription is managed
through a mobile app store (such as the Apple App Store or Google Play),
cancellation and refund policies will be governed by the relevant platform
provider's terms. We do not control or access your full payment information in
such cases.
Retention
of Transaction Information
We retain limited
transaction-related information—such as receipts, billing records, and refund
history—for as long as necessary to fulfill our legal, financial, and
operational obligations. This may include retaining records for accounting, tax
reporting, fraud prevention, or legal compliance purposes, even after your
account has been deleted.
5. Your Rights and Choices
Depending on your jurisdiction, you
may have the following rights regarding your personal information:
Right
of Access:
You have the right to request
confirmation as to whether we process your personal data and to obtain a copy
of that data.
Right
to Rectification:
You may request that we correct or
update any inaccurate or incomplete personal data about you.
Right
to Erasure ("Right to be Forgotten") :
You may request deletion of your personal data, subject to
certain exceptions (e.g., legal obligations, fraud prevention).
Right
to Restrict Processing:
You can
request that we limit the processing of your personal information under certain
circumstances.
Right
to Data Portability:
Where applicable, you may request a
copy of your personal information in a structured, machine-readable format or
request that we transmit it to another data controller.
Right
to Object:
You may object to the processing of
your personal data for direct marketing purposes or on grounds relating to your
specific situation when we rely on legitimate interests.
Right
to Withdraw Consent:
Where we process your data based on
your consent, you have the right to withdraw that consent at any time without
affecting the lawfulness of processing prior to withdrawal.
Right
to Lodge a Complaint:
You can file a complaint with a
supervisory authority or data protection authority in your country.
You may be able to exercise many of
these rights directly through your account settings if you are a registered user.
You can also manage certain permissions (such as device-based identifiers) via
your mobile device settings.You can also submit any privacy-related requests or
inquiries via
😍👇SHOP
NOW😍👇➽➽(Official❤️Website)🧡
Account
Deletion
If you choose to delete your
account, this action is permanent and irreversible. You will lose access to any
associated content or services, and we may not be able to restore data after
deletion. We recommend exporting or saving any personal data or content before
initiating deletion.
Regarding
AI-generated Content and Accuracy
Please note that services like Kimi generate content using probabilistic
machine learning models. The output may not always reflect factual or accurate
information. If you believe the generated content includes inaccurate
information about you and wish to request its correction or removal, please
contact us. We will evaluate your request in accordance with applicable data
protection laws and the technical limitations of our models.
6.
Information Security
We are fully aware that the security
and confidentiality of your personal information are of utmost importance to
you. We will endeavor to avoid collecting irrelevant user information and will
take reasonable technical and organizational measures to protect your personal
information from unauthorized access, public disclosure, use, modification,
damage, or loss, including but not limited to:
Data
Encryption
: We will use industry-leading
encryption algorithms to encrypt users' personal information, ensuring that
even if the data is obtained by unauthorized third parties, they will not be
able to decipher the actual information of the users.
Data
Transmission Security
: We use encryption technology to
provide reliable encrypted protection for communication between users and
servers, ensuring that data is not intercepted or tampered with during
transmission.
System
Security Protection
: We regularly conduct security
checks and vulnerability patches on servers and systems to prevent hacker
attacks and virus intrusions.
Institutional
Safeguards
: We have established a dedicated
data protection department and appointed a person in charge to be responsible
for the protection of users' personal information. We regularly provide
training and education on personal information protection to our employees to
ensure that all staff understand and value the protection of users' personal
information. We strictly limit employees' access to user data, allowing only
specific employees to access relevant data when necessary for business
purposes. We also monitor and assess employees who access users' personal
information, and take prompt action if any improper behavior is detected.
Data
Backup
: We regularly back up users'
personal information data and store the backup data in different physical
locations to reduce the risk of data loss due to accidents or disasters.
Data
Breach Alert
: We have set up a real-time
monitoring system to monitor abnormal data access and leakage situations. Once
signs of data leakage are detected, we will immediately take measures to stop
the leakage, promptly identify the cause, and develop corresponding improvement
measures.
Please note that due to the
limitations of technical and management means, although we have taken the above
measures and made every effort to improve the security level, we cannot
guarantee absolute security. Also, we cannot guarantee the effectiveness of
privacy settings or security measures on third parties related to the services.
Therefore,
you should take special care in deciding what information you send to us.
We strongly recommend that you take more proactive security
measures together with us, such as refusing to lend accounts, disclose verification
codes, or upload sensitive information, which are high-risk operations.