Any Talk privacy policy

Welcome to AnyTalk AI Software (hereinafter referred to as “This Software”). This Privacy Agreement (hereinafter referred to as “This Agreement”) is designed to ensure the privacy security and legitimate interests of users by clarifying the rules for the operators of this Software (hereinafter referred to as “Operators”) to collect, use, store, transmit, and disclose users‘ personal data and related information (hereinafter referred to collectively as “User Data”). This Agreement, in accordance with the International General Privacy Protection Principles, the relevant requirements regarding privacy protection in the United Nations Human Rights Charter, and mainstream global data protection regulations (such as GDPR, OECD Privacy Principles), applies to all users using this Software globally, without involving any specific legal constraints of any specific country or region (except as expressly stipulated in this Agreement).

By downloading, installing, registering, logging in, or using any functionality of this Software, the User is deemed to have fully read, understood, and fully agreed to all terms and conditions of this Agreement. If the User does not agree to this Agreement, the User should immediately stop downloading, installing, and using this Software. Users can contact the operator for privacy-related questions, submit a complaint, or make a complaint via the following email address: kafedzhiev@ju2012.com.

1. Definition and Scope

1.1 Core Definitions

1.1.1 User Data: Means all information that users actively provide, produce, or are legally collected by operators in the course of using this Software, including but not limited to personal identification information, usage records, operating behavior, device information, etc., in accordance with the International General Data Protection Regulations definition of “personal data”.

1.1.2 Data Controller: Means the operator, that is, the entity that determines the purpose and method of processing user data, is responsible for processing user data in accordance with this agreement and relevant international regulations, and assumes responsibility for data protection.

1.1.3 Data Processing: Means all related operations performed on user data, such as collection, storage, use, transmission, encryption, anonymization, deletion, etc., in accordance with the core principles of legality, fairness, and transparency.

1.2 Applicability Scope

1.2.1 This Agreement applies to all user data collected, processed, and stored by operators through this Software, covering the entire process of users registering, logging in, and using various features of this Software.

1.2.2 This Agreement does not apply to services provided by third parties through this Software. The privacy policies for third-party services are independently established by third parties, and operators are not responsible for protecting the privacy of third-party services. Users should review the third-party privacy policies on their own.

1.2.3 This Agreement adheres to the principle of “not below the privacy protection standards of the country/region in which the user resides”, and if the country/region in which the user resides has stricter privacy protection requirements, the relevant regulations of that country/region will have priority.

2. Data Collection and Acquisition

2.1 Collecting Principles

2.1.1 Legitimacy Principles: Operators collect user data only on a legitimate basis such as obtaining explicit user consent, fulfilling contractual obligations, and complying with legal requirements. Illegal collection and theft of user data are strictly prohibited.

2.1.2 Minimum Required Principle: Only the user data necessary to provide this Software Service is collected, and no redundant data unrelated to the Service is collected, in accordance with the “Collection Limit Principle” in the OECD Privacy Principles.

2.1.3 Transparency Principle: Before collecting user data, clearly inform the user of the purpose, scope, method, and purpose of the collection of user data. Users can freely choose whether to provide it, without concealing or misleading users.

2.2 Scope and method of collection

2.2.1 Registration Login Data: When users register and log in to this Software, they voluntarily provide identity information such as their name, email address, and contact information for account authentication, identity identification, and service connection.

2.2.2 Usage Process Data: Activity records, conversation content, query history, preferences, etc. generated when users use this software feature are used to optimize the service experience, improve the accuracy of AI responses, and comply with the “purpose limitation principle”.

2.2.3 Device-Related Data: Information about the device model, operating system, IP address, network environment, etc. used by users to use this Software is automatically collected to ensure the proper operation of the Software, troubleshooting and preventing security risks, and no other irrelevant information is collected within the Device.

2.2.4 Other Data: Feedback, Complaints, and Additional Information that Users Proactively Submitted, as well as Additional Information that is Collected for the Implementation of Certain Features (such as Personalized Recommendations) with explicit User Consent. Users can withdraw their consent at any time and stop the Collection of Related Data.

3. Data Usage Rules

3.1 Purpose of Use

3.1.1 Basic Service Usage: Used to provide core functions of this Software to users, including account management, AI interactions, service responses, etc., ensuring that the service runs properly.

3.1.2 Service Optimization Upgrade: Based on user usage data, analyze user needs, optimize AI algorithms, improve software functionality, improve service quality, and comply with the “Data Quality Principles”.

3.1.3 Security Assurance: Used to identify and prevent security risks such as account theft, fraud, malicious attacks, protect the security of user accounts and data, and fulfill accountability obligations for data protection.

3.1.4 Compliance Disclosure: Disclosure of relevant user data pursuant to lawful requirements, judicial authority directives, or with the user‘s explicit consent, without exceeding the legal authorization scope.

3.2 Use Restrictions

3.2.1 Non-Extraordinary Use: User data is used only for the purposes expressly stipulated in this Agreement, without the explicit consent of the user, and may not be used for other unrelated purposes, subject to the “Restriction of Use Principles”.

3.2.2 No misuse of data: The use of user data for illegal marketing, harassment of users, violation of user privacy, or other behavior that harms users‘ legitimate rights is strictly prohibited.

3.2.3 Anonymization Processing: User data used for service optimization and data analysis will be anonymized and de-identified to ensure that specific users cannot be identified and protect user privacy.

4. Data Storage and Security

4.1 Storage Rules

4.1.1 Storage locations: User data is stored on servers that comply with international data security standards, distributed in global compliant regions, and is not stored in any region that has not obtained international privacy protection certifications.

4.1.2 Storage Period: User Data will be stored only for the period necessary to fulfill the purposes of use stipulated in this Agreement. After the period is exceeded, User Data will be legally deleted or anonymized in accordance with the “Storage Limit Principles”.

4.1.3 Storage technologies: Adopting internationally advanced cryptographic storage technologies (such as AES-256 encryption), user data is protected by full-scale encryption, preventing data leakage, tampering, and loss, following the “Security Principles”.

4.2 Security Assurance Measures

4.2.1 Technical Assurance: Establish a complete data security defense system, deploy firewall, intrusion detection, data backup, and other security technologies, and conduct regular security testing and upgrades to prevent cyber attacks, data leakage, and other risks.

4.2.2 Management Guarantees: Establish a strict data security management system, clarify the rights and responsibilities of data processing personnel, conduct security training and confidentiality constraints on those who access user data, and implement “accountability system.”

4.2.3 Emergency Handling: Establish a data security emergency response mechanism. If security events such as data leakage or loss occur, emergency procedures will be immediately initiated, remedial measures will be taken, and affected users will be promptly notified (as required by law and regulations), while relevant regulatory authorities will be notified.

5. Data Transfer and Disclosure

5.1 Data Transfer

5.1.1 Transport security: User data is transmitted using encrypted transmission technologies (such as TLS 1.3 encryption) to ensure security during the data transmission process and prevent illegal intercepts and theft.

5.1.2 Cross-Border Transfers: When it comes to cross-border transfer of user data, we will strictly comply with international cross-border data transfer rules and the laws and regulations of the relevant countries/regions, ensuring that the recipient of the data has the appropriate privacy protection capabilities and meets the compliance requirements for cross-border data transfer.

5.2 Data Disclosure

5.2.1 With explicit user consent: After obtaining the user‘s written or verbal explicit consent, user data may be disclosed to third parties, and the disclosure is limited to content with the user‘s consent.

5.2.2 Legal Compliance Requirements: Disclosure of user data in accordance with the instructions of laws, regulations, judicial authorities or administrative regulatory departments, without rejecting legal compliance disclosure requests.

5.2.3 Third-Party Service Disclosure: When the provision of this Software-related services requires the processing of some user data by a third party, a third party with privacy protection qualifications will be selected, a confidentiality agreement will be signed, the third party‘s responsibilities and obligations will be clarified, the third party’s compliance with the processing of user data will be monitored, and the third party‘s use of user data for other purposes will be prohibited.

5.2.4 Prohibition of Unlawful Disclosure: It is strictly prohibited to disclose, sell, rent, or transfer User Data to any third party without authorization, ensuring the confidentiality of User Data.

6. User Data Rights

6.1 Core Rights

6.1.1 Right to be informed: Users have the right to be informed about the specific circumstances under which operator collects, uses, stores, and transfers user data, including the scope of data collection, usage, and storage duration, and operator should inform them truthfully.

6.1.2 Access rights: Users have the right to query and obtain a copy of their user data, which can be requested by contacting the email address of the operator, who will provide it within a reasonable period.

6.1.3 Correction Right: When users discover that their user data is inaccurate or incomplete, they have the right to request the operator to correct and supplement it, which the operator should promptly verify and handle.

6.1.4 Right to delete: Users have the right to request the operator to delete their user data (except when required by law and regulations to retain it), and the operator should promptly delete or anonymize the relevant data upon receiving the request.

6.1.5 Right to Revoke Consent: Users have the right to revoke their consent to data collection and use. Upon revoking consent, the operator will stop the collection and use of the relevant data, but this will not affect the validity of the data that has been processed in compliance before the revocation.

6.2 Ways of exercising your rights

6.2.1 Users can submit their rights application via the Software-related features or by contacting kafedzhiev@ju2012.com, explaining the application matters, contact information, and relevant documentation.

6.2.2 Upon receiving a user application, the operator will verify and process it within 7 working days and provide feedback on the processing results; if the application materials are incomplete, the user will be notified to supplement the materials and promptly process them.

6.2.3 Operators do not charge any fees for users to exercise their data rights, and may require users to bear the necessary costs if the user‘s application exceeds the reasonable scope (under explicit notice to the user in advance).

7. Third-party service descriptions

7.1 Access to Third-Party Services

7.1.1 This Software may access third-party services (such as payments, push, maps, etc.), third-party services may collect user-related data, and their data processing behavior follows the third-party‘s own privacy policy.

7.1.2 Operators provide only technical connections to third-party services, do not participate in third-party data collection and processing processes, and do not take responsibility for the privacy protection of third-party services. Users should review the third-party privacy policies on their own and choose carefully whether to use third-party services.

7.2 Third Party Responsibility Constraints

7.2.1 When operators connect to third-party services, they will review the third-party‘s privacy protection qualifications, sign confidentiality agreements, clarify the third-party‘s data protection responsibilities, and require the third-party to strictly comply with international privacy protection regulations.

7.2.2 If third parties engage in unlawful collection and use of user data, users may notify the operator by contacting the email address. The operator will promptly terminate cooperation with that third party and assist users in maintaining their legitimate interests.

8. Agreement Updates and Dispute Resolution

8.1 Agreement Updates

8.1.1 The Operator has the right to amend this Agreement in accordance with changes in international privacy protection regulations, updates to this Software service, and will notify users of the amended Agreement through this Software notice, mail, etc.

8.1.2 The user‘s continued use of this Software is considered to agree to the revised agreement; if the user does not agree to the revised agreement, the user should immediately stop using this Software, and the operator will process the user‘s data in accordance with the terms of this agreement.

8.2 Dispute Resolution

8.2.1 The establishment, execution, interpretation and dispute resolution of this Agreement are governed by the principles of international general civil and commercial law and relevant international conventions on privacy protection, and are not governed by the laws of any particular country or region (except as otherwise stipulated in this Agreement).

8.2.2 Any dispute arising between the user and the operator due to this Agreement shall first be resolved through friendly negotiation; if negotiation fails, either party has the right to file a lawsuit in the courts of jurisdiction where the operator resides.

8.3 Other Agreements

8.3.1 This Agreement constitutes the complete agreement between the User and the operator regarding the protection of User data, replacing any previous verbal or written agreement reached by the two parties on the relevant matters.

8.3.2 If any provision of this Agreement is deemed invalid or unenforceable, without affecting the effectiveness of the other provisions, the other provisions shall continue to be enforceable.

8.3.3 If users have any questions, objections or complaints regarding this Agreement, they can communicate with the Operator by contacting the email kafedzhiev@ju2012.com, and the Operator will respond to them promptly.