NEXA CORE AI Computing Cloud Privacy Policy

Publication Date: April 1, 2025

Effective Date: April 1, 2025

Update Date: April 1, 2025

Introduction

NEXA CORE AI Computing Cloud Platform (hereinafter referred to as "this Product" or "NEXA CORE AI Computing Cloud") is an image generation and video generation service provided by NEXA CORE AI Computing Cloud Company. for users (hereinafter referred to as "You" or "Users"). We attach great importance to protecting your privacy and personal information. Before using this Product, please carefully read and fully understand this Privacy Policy (hereinafter referred to as "this Policy"), especially the terms highlighted in bold. Please ensure that you have fully understood and agreed to the entire content of this Policy before using this Product.

Your agreement to this Policy indicates that you have understood the services and functions we provide, as well as the necessary personal information required for the functions to operate, and have granted the corresponding collection and use authorization. If you or your guardian does not agree to any content in this Policy, please stop using it immediately. When you continue to use this Product or related services, it means that you have agreed to our legal collection, use, and storage of your personal information in accordance with this Policy. When using your information for purposes not covered by this Policy, we will seek your consent in advance.

We will collect and use your personal information in accordance with the principles of legitimacy, legality, openness, transparency, and minimum necessity, based on the purposes stated in this Policy.

In order to provide you with better and more intelligent products and services, we may need to collect the following information. Below we will explain in detail the personal information collected and used by this Product. If you refuse to provide it, you will not be able to enjoy the corresponding business functions and services.

1.1 Personal Information You Actively Provide During the Process of Providing Products and Services

1.1.1 Account Information

(1) When you apply to use this Product, you can log in with a registered account of this Product. You need to provide us with your mobile phone number and verification code to complete registration and login. You may also use a third-party account (such as WeChat account, etc.) to complete registration and login.

(2) In order to meet the mandatory requirements of laws and regulations, for the necessary provision of products or services, or based on your need for enhanced account protection, when using certain services or if you have further requirements, you need to provide your real name, ID number, and facial information to complete account real-name authentication. If you do not complete real-name authentication, it may affect your use of business functions that require real-name authentication. In order to verify the accuracy and completeness of the information you provide, or to protect the security of your account, we may compare and verify the real-name information you provide to NEXA CORE AI Computing Cloud with your corresponding information stored by institutions or government-authorized agencies as permitted by laws and regulations. To ensure the security of your account, please do not transfer or lend your account to others.

(3) If you do not log in to this Product account, we will not collect your above personal information, but functions related to login will not be available.

1.1.2 Image Generation

Unless otherwise specified by laws and regulations, in order to provide you with continuous and consistent user experience and ensure service quality, when you use the services of this Product, we will collect the text information and image information you input during your interaction with this Product, and use this information to output content to you, in order to provide image generation services.

During the image generation process, you can provide feedback and evaluation on the content output by this Product. We will collect your feedback information, including content you actively submit, in order to continuously improve the quality of the output content of this Product. Please note that, depending on the specific application scenario, the content you or your end users input during the use of this Product's services may contain personal information. If you or your end users do not wish us to collect and process the aforementioned personal information, please be cautious when inputting such information and provide comprehensive risk notifications to your end users regarding the aforementioned risks. However, this may affect your normal use of some or all functions of this Product.

1.1.3 Video Generation

Unless otherwise specified by laws and regulations, in order to provide you with continuous and consistent user experience and ensure service quality, when you use the services of this Product, we will collect the text information and image information you input during your interaction with this Product, and use this information to output content to you, in order to provide video generation services.

During the video generation process, you can provide feedback and evaluation on the content output by this Product. We will collect your feedback information, including content you actively submit, in order to continuously improve the quality of the output content of this Product. Please note that, depending on the specific application scenario, the content you or your end users input during the use of this Product's services may contain personal information. If you or your end users do not wish us to collect and process the aforementioned personal information, please be cautious when inputting such information and provide comprehensive risk notifications to your end users regarding the aforementioned risks. However, this may affect your normal use of some or all functions of this Product.

1.1.4 Interactive Dialogue (Large Language Model)

Unless otherwise specified by laws and regulations, in order to provide you with continuous and consistent user experience and ensure service quality, when you use the services of this Product, we will collect the text information you input during your interaction with this Product, and use this information to output content to you, in order to provide language generation services.

During the dialogue generation process, you can provide feedback and evaluation on the content output by this Product. We will collect your feedback information, including content you actively submit, in order to continuously improve the quality of the output content of this Product. Please note that, depending on the specific application scenario, the content you or your end users input during the use of this Product's services may contain personal information. If you or your end users do not wish us to collect and process the aforementioned personal information, please be cautious when inputting such information and provide comprehensive risk notifications to your end users regarding the aforementioned risks. However, this may affect your normal use of some or all functions of this Product.

Please provide comprehensive risk notifications to your end users regarding the aforementioned potential risks.

1.1.5 Other Purposes

(1) We will only retain your personal information for the period necessary to achieve the purposes stated in this Agreement, unless permitted by law. After the above personal information retention period, we will delete or anonymize your personal information.

(2) We will only store the data you upload for the minimum necessary period required to provide you with this service. Once the service purpose is achieved, the above data will be deleted or anonymized. For the avoidance of doubt, we will not use the above data without your explicit authorization, including for model training, optimization, etc.

(3) When we want to use your personal information for purposes not specified in this Policy, or when information collected for a specific purpose is to be used for other purposes, we will seek your consent in advance. Please understand that the services we provide to you will be continuously updated and changed. If you choose to use other functions not yet listed in this Policy, before we collect your personal information, we will inform you in detail about the purpose, method, and scope of information collection through updated agreements, page pop-up prompts, and seek your explicit consent. If you do not agree to provide the aforementioned information, you may not be able to use that particular service, but it will not affect your use of other services.

1.2 Personal Information We Actively Collect During the Process of Providing Products and/or Services

1.2.1 Log Information

When you use the products and services of this Product, we will collect your IP address information to improve our products and services and provide you with a better service experience.

1.2.2 Browser and Operation Information

Please note that when you use the products and services of this Product, for the purpose of ensuring the security of this Product's use, we will read your browser information and operating terminal information.

1.3 Your Personal Information We Obtain from Third Parties

We may collect and use your personal information from third parties (our partners) within the scope of your consent. We guarantee to process your personal information in accordance with relevant laws and regulations, and we also ask you to carefully read the privacy policy and user service agreement of such third parties.

1.4 Personal Information Processing Statement

In accordance with applicable laws and regulations, we may technically process your personal information in a way that cannot precisely identify individual users, and conduct anonymized academic research or statistical analysis (including using dialogue information you input when using the writing function) to continuously improve the algorithm model's recognition and response speed and quality, and enhance the intelligence of the service and understanding of your input content. However, we will not identify you personally based on the dialogue content you input.

2. How We Use Cookies and Similar Technologies

2.1 Cookies

To ensure the normal operation of the website, we may store small data files called cookies on your computer or mobile device. Cookies typically contain an identifier, the site name, and some numbers and characters. With the help of cookies, websites can store user preferences or shopping basket contents, etc.

We will not use cookies for any purpose other than those stated in this Policy. You can manage or delete cookies according to your preferences. You can clear all cookies stored on your computer, and most web browsers have the ability to block cookies. However, if you do so, you will need to change your user settings yourself each time you visit our website.

2.2 Website Beacons and Pixel Tags

In addition to cookies, we may also use website beacons, pixel tags, and other similar technologies on our website. For example, emails we send to you may contain click-through URLs that link to content on our website. If you click on these links, we will track this click to help us understand your product or service preferences and improve customer service. A website beacon is typically a transparent graphic image embedded on a website or in an email. With the help of the pixel tags in emails, we can know whether the email has been opened. If you do not wish your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

2.3 Do Not Track (DNT)

Many web browsers have a Do Not Track function that can send Do Not Track requests to websites. Currently, major internet standardization organizations have not established policies to stipulate how websites should respond to such requests. But if your browser has Do Not Track enabled, then all our websites will respect your choice.

3. How We Share, Transfer, and Publicly Disclose Your Personal Information

3.1 Sharing

We will not share your personal information with any company, organization, or individual outside of NEXA CORE AI Computing Cloud, except in the following situations:

3.1.1 Sharing with Explicit Consent:

After obtaining your explicit consent, we will share your personal information with other parties.

3.1.2 Sharing Based on Legal Requirements:

We may share your personal information in accordance with laws and regulations, litigation, dispute resolution needs, or according to requirements from administrative or judicial authorities.

3.1.3 Sharing with Authorized Partners:

Some of our services will be provided by authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, the third-party authentication platform service we use helps you complete the account login process; the third-party payment service we use helps you complete online payment; the third-party data analysis service we use helps us analyze our user behavior; and the third-party customer service system we use provides online customer service. We will only share your personal information for legitimate, proper, necessary, specific, and explicit purposes, and will only share the personal information necessary to provide the service. Our partners have no right to use the shared personal information for any other purposes. If our partners want to change the purpose of personal information processing, they will seek your authorization and consent again.

We will carefully examine the qualifications of our partners and sign strict confidentiality agreements with them, requiring them to process your personal information in accordance with this Policy, our relevant instructions, and any other relevant confidentiality and security measures.

3.2 Transfer

We will not transfer your personal information to any company, organization, or individual, except in the following situations:

3.2.1 Transfer with Explicit Consent:

After obtaining your explicit consent, we will transfer your personal information to other parties;

3.2.2 In the case of merger, acquisition, bankruptcy liquidation, reorganization, etc., if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this Policy, otherwise, we will require that company or organization to seek authorization from you again.

3.3 Public Disclosure

We will only publicly disclose your personal information under the following circumstances:

3.3.1 After obtaining your explicit consent, or based on your proactive selection, we may publicly disclose your personal information;

3.3.2 If we determine that you have violated laws, regulations, or our service agreement, or to protect the personal and property safety of users or the public from infringement, we need to disclose your personal information in accordance with laws, regulations, or with your consent, we may publicly disclose your personal information.

3.4 Exceptions to Prior Authorization for Sharing, Transfer, and Public Disclosure

According to relevant laws and regulations, sharing, transferring, and publicly disclosing your personal information without prior authorization from the individual in the following situations:

(1) Directly related to national security and national defense security; (2) Directly related to public safety, public health, and major public interests; (3) Directly related to criminal investigation, prosecution, trial, and judgment enforcement; (4) For the protection of your or other individuals' life, property, and other major legitimate rights and interests, but it is difficult to obtain consent; (5) Personal information that you have disclosed to the public yourself; (6) Personal information collected from legally disclosed information, such as legal news reports, government information disclosure, and other channels.

Please understand that, after your personal information has been shared, transferred, or publicly disclosed, if the third party uses this personal information to conduct further processing, it will be governed by the third party's privacy policy. Please carefully read their corresponding policies.

4. How We Protect Your Personal Information

4.1 Information Security Measures

We have implemented a strict information security system that meets industry standards to safeguard your information. We will take all reasonable and feasible measures to protect your personal information from unauthorized access, public disclosure, use, modification, damage, or loss. For this purpose, we have taken the following technical and organizational security measures:

(1) We employ data security technology such as TLS/SSL encryption and encrypted data storage to ensure the security of your personal information;

(2) We have established specialist data security departments and management systems, and applied access control and permission control mechanisms to ensure that only authorized personnel have access to your personal information;

(3) We regularly conduct security compliance reviews on the collection, storage, and use of your personal information to safeguard your information through third-party security evaluations or penetration testing;

(4) We have established a multi-layered security protection system for our network;

(5) We have established a data classification and grading system, data security management specifications, and data security development specifications.

4.2 Information Security Incidents

In the unfortunate event of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, recommendations for you to independently prevent and reduce risks, and remedial measures for you. We will promptly inform you of the relevant information of the incident through email, letter, phone, push notification, etc. When it is difficult to inform each information subject individually, we will issue announcements in a reasonable and effective manner.

At the same time, we will report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

5. Your Rights

In accordance with relevant laws, regulations, and standards, as well as common practices in other countries and regions, we guarantee that you can exercise the following rights regarding your personal information:

5.1 Access to Your Personal Information

You have the right to access your personal information, except in the following circumstances:

(1) Information directly related to national security or national defense security; (2) Information directly related to public safety, public health, and major public interests; (3) Information directly related to criminal investigation, prosecution, trial, and judgment enforcement; (4) Information where there is sufficient evidence showing that the personal information subject has subjective malice or abuse of rights; (5) Responding to your request would lead to serious damage to the legitimate rights and interests of you or other individuals or organizations; (6) Information involving commercial secrets; (7) Responding to your request would result in serious harm to the legitimate rights and interests of you or other individuals or organizations; (8) Information involving commercial secrets.

5. How We Store Your Personal Information

We will store personal information collected and generated from operations in China within the territory of China. There is no cross-border transfer of personal information collected and processed under this Policy. We promise that, unless required by laws and regulations, the storage period of your personal information will be limited to the minimum time necessary to achieve the purposes you have authorized.

If we cease operations due to business needs or other reasons, unless otherwise provided by laws, regulations, or normative documents, we will inform you of such circumstances and delete the personal information we have collected or anonymize it.

6. How We Protect Your Personal Information

We place great importance on the security of your personal information. For this purpose, we have adopted industry-standard security technology measures and supporting organizational structure and management systems at multiple levels to maximally prevent your personal information from being leaked, damaged, misused, unauthorized accessed, unauthorized disclosed, or altered. These measures include:

6.1 Data Security Technical Measures

In terms of data security transmission, we have adopted transport layer security protocols and other encryption technologies, using methods such as HTTPS to prevent transmission links from being eavesdropped or intercepted, ensuring the privacy and integrity of data; we also use Token technology to protect data during its transmission, and use appropriate protection mechanisms to prevent data from malicious attacks; in addition, we will apply encryption storage and other additional security protection measures to your information.

In terms of security controls for data access and use, we have implemented strict data permission control mechanisms and monitor actions that process your personal information to avoid unauthorized access and use of data. We also monitor the entire lifecycle of data flows, regularly scan the security of all interfaces of this Product, and take protective measures against malicious code, traffic attacks, etc., to prevent your personal information from unauthorized access, public disclosure, use, modification, intentional or accidental damage or loss.

6.2 Data Security Organizational and Management Measures

In accordance with relevant regulatory requirements, we have established departments specifically responsible for personal information protection. We have also established relevant internal control management processes, applying the principle of minimum authorization, strictly setting information access permissions for staff who may come into contact with your personal information, and controlling the scope of knowledge of your personal information.

We have established internal regulatory systems for data security use, ensuring that the processing of your personal information meets the security requirements of laws and regulations at all stages including collection, transmission, use, storage, transfer, and destruction. As required by relevant regulations, for staff who need to access personal information, we require them to be approved by the personal information protection officer or their authorized administrator, record access situations, and take technical measures to avoid illegal copying and downloading of personal information.

We organize staff to participate in security and privacy protection related training and require them to complete specified assessments, enhancing staff awareness of the importance of protecting personal information.

6.3 Security Incident Handling

To address potential risks such as personal information leakage, damage, and loss, we have established a dedicated emergency response team that activates security contingency plans for different security incidents, implementing damage control, analysis, formulating remedial measures, and collaborating with relevant departments for tracing and combating.

Please be aware and understand that the internet is not an absolutely secure environment. We strongly recommend that you use secure methods, complex passwords, and assist us in ensuring the security of your account. In the unfortunate event of a personal information security incident, we will promptly inform you in accordance with legal requirements: the cause of the security incident, potential dangers, measures we have taken or will take, types of personal information involved, our recommendations and measures you can independently take to prevent and reduce risks, etc. We will promptly notify you of relevant information about the incident via email, SMS, phone, notification, etc. When it is difficult to inform each personal information subject individually, we will issue announcements in a reasonable and effective manner. At the same time, we will also proactively report the handling of personal information security incidents to regulatory authorities as required. Please note that, in accordance with applicable laws and regulations, if measures can effectively avoid information leakage, tampering, or loss from causing harm, we may not inform you.

7. How We Protect Minors' Personal Information

This Product is intended for use by adults only. If you are a minor, please do not use this Product. If you are a parent or guardian of a minor and believe that we have collected information from a minor without your consent, please notify us immediately, and we will delete the relevant data after verifying the situation.

If our enterprise customers use our products to provide services to minors, it is the responsibility of our enterprise customers to obtain consent from the parents or guardians of minors. If you, as a parent or guardian of a minor, believe that our enterprise customers have collected information from minors through our products without your consent, please contact our enterprise customers directly for deletion. We will assist in deleting the relevant data after verifying the situation based on the requirements of our enterprise customers.

Special notice for guardians: (1) If your ward uses related services, you as a guardian should guide and supervise the registration and use behaviors of your ward. If your ward applies to register an account, we will have the right to consider that they have obtained your consent; (2) Your ward may use functions such as purchasing products or services while using related services. As a guardian, please safeguard your payment devices, payment accounts, and payment passwords, etc., to avoid situations where your ward uses purchasing or other consumption functions through your account without obtaining your consent.

8. How We Update This Policy

We reserve the right to update or modify this Policy from time to time. However, without your explicit consent, we will not reduce your rights under this Policy. Such changes form part of this Policy. We will publish the updated content of this Policy in this Product.

Please carefully read the changed content of this Policy. If you do not agree with this Policy, or have objections to the modified or updated content of this Policy, you can choose to stop using this Product and related services or cancel your account for this Product. Please note that your behavior and activities before your account cancellation or before you stop using this service are still governed by this Policy.

For major and substantial changes, we will notify you in a prominent manner depending on the specific circumstances.

Major and substantial changes include but are not limited to the following situations:

(1) Significant changes in our service model. Such as the purpose of processing personal information, types of personal information processed, ways personal information is used, etc.;

(2) Significant changes in our control rights, etc. Such as changes in information controllers caused by mergers, reorganizations, etc.;

(3) Changes in the main objects of personal information sharing, transfer, or public disclosure;

(4) Significant changes in your rights regarding participation in personal information processing and the ways to exercise them;

(5) Changes in our departments responsible for handling personal information security, contact methods, and complaint channels;

(6) When personal information security impact assessment reports indicate high risks.

9. How to Contact Us

If you have any questions regarding this Policy while using this Product, you can contact us by sending an email to contact@nexacoreteknologi.com or through the feedback channel in this Product or other contact methods published on the website. We will promptly review the issues involved and provide feedback within 10 working days of receiving your request. If you are not satisfied with our response and we refuse to make improvements, you can file complaints or reports with relevant regulatory authorities.

10. Supplementary Provisions

The interpretation and dispute resolution of this Policy shall be governed by the laws of the People's Republic of China. Any disputes related to this Policy shall be resolved through friendly negotiation between the parties; if negotiation fails, you hereby agree to submit the dispute to the People's Court of Pudong New District, Shanghai.

If any court with jurisdiction rules or judges any provision of this Policy to be invalid, that provision will be removed from this Policy, but the invalidity of that provision does not affect the validity of the remaining provisions of this Policy. The remaining provisions of this Policy will continue to be enforced.