JeekAI Ltd. Privacy Policy

Last updated: July 22, 2025

This privacy policy is intended to explain how JeekAI Ltd. (hereinafter referred to as "we") collects, uses, stores and shares your personal information. We are fully aware of the importance of personal information and will strictly comply with relevant laws and regulations to fully protect the security of your personal information.

Please be sure to read this policy carefully to fully understand the specific rules regarding our processing of your personal information. If you do not agree with any part of this policy, please do not use our services; your use or continued use of our services shall be deemed as having read, understood and agreed to all terms of this policy.

1. Collection of Personal Information

Types of information collected:
  • Device information (model, system version, identifiers, etc.);
  • Network information (IP address, operator, network type, etc.);
  • Geolocation information (collected when relevant functions are enabled);
  • Log information (operation records, access duration, error logs, etc.);
  • Account information (username, password, nickname, etc.);
  • Personal profile (avatar, gender, date of birth, etc.);
  • Transaction information (orders, payment records, etc.);
  • Feedback information (opinions, complaints, etc.);
  • Other information required by laws, regulations and contracts (such as contact information).
Methods of collection:

Provided by you actively, automatically collected during use, obtained from legal third-party channels (with your authorization).

Impact of information provision:

Failure to provide some information may affect the use of certain functions (such as registration, payment, etc.).

2. Use of Personal Information

Purposes of use:

Providing services (device linkage, AI interaction, etc.), achieving collection purposes, processing transactions, handling feedback, personalized recommendations, improving services, and meeting compliance requirements.

Security measures:

Encryption and other measures are taken to protect information security, and information is not used beyond the specified scope.

Experience optimization:

Optimize product functions and user experience based on user usage data

3. Information Sharing and Transfer

Sharing principles:

We will not share/transfer your information to third parties without your consent, except in the following cases:

  • You have given explicit authorization;
  • Required by laws, regulations or administrative/judicial authorities;
  • Shared with affiliated companies (subject to this policy);
  • Shared with partners (such as logistics and payment providers, bound by confidentiality agreements);
  • Necessary circumstances to protect legitimate rights and interests, public interests, etc.
Security measures:

Clarify the scope of use by third parties, supervise their security measures, and strictly review the qualifications of third parties.

4. Information Storage and Protection

Protection measures:

Adopt technical and management measures (firewalls, permission management), standardize access by authorized personnel, ensure the security of equipment and systems, and encrypt stored and transmitted information.

Risk statement:

Although security measures are taken, we cannot fully guarantee the absolute security of information. In case of security incidents, we will handle them promptly and inform you.

Incident handling:

In the event of a security incident, we will take remedial measures, inform you, and report to regulatory authorities if necessary.

5. Protection of Minors

This application is not suitable for minors. If it is discovered that a minor is using the application, we will immediately stop collecting and delete their information.

6. Your Rights

Access and correction:

You can operate through the application functions or contact customer service, and we will respond within 15 working days.

Deletion request:

You can apply for deletion in cases such as illegal processing, collection and use without consent, serious breach of contract, or no longer using the service (except as otherwise provided by laws and regulations).

Withdrawal of authorization:

You can withdraw authorization at any time, which will not affect the legal processing during the authorization period.

Restrictions on rights:

Rights may be restricted in cases involving national security, public interests, criminal investigation, and malicious abuse of rights.

Other rights:

You can request information on sources and processing methods, etc., through feedback channels or customer service.

7. Cross-border Data Transfer

Services may involve cross-border transmission of information. We will ensure that the receiving party has protective measures, complies with regulatory requirements, and obtains your consent when necessary.

8. Policy Updates

The policy may be updated according to business and regulatory changes. After the update, it will be published and reminded to you, and your consent will be sought before major changes. Please check regularly.