Privacy Policy
Introduction
The Zero-One Everything Model (hereinafter referred to as "this product") is owned and operated by Beijing Zero-One Everything Technology Co., Ltd. (hereinafter referred to as "our company" or "we"), providing users (hereinafter referred to as "you") with generative artificial intelligence Q&A technology services. Our registered address is Building 1, Floor 10, No. 1001-009, Haidian Street, Haidian District, Beijing.
We highly value your privacy and personal information protection. In accordance with the "Personal Information Protection Law of the People's Republic of China" and other relevant laws and regulations, this Privacy Policy (hereinafter referred to as "this policy") is formulated to safeguard the security of your personal information. This policy applies to your access and use of this product and its related services in any way. We hope to clearly introduce through this policy what personal information we collect from you, how we process this information, and the means we provide for you to exercise your information rights. We also hope this policy helps you decide whether to provide us with your personal information.
For terms that may have a significant relationship with your rights and interests and for the processing of sensitive personal information, we will use bold text in this guide for emphasis, and we ask that you read these carefully. If the personal information you provide is not your own, you should ensure that you have obtained the authorization and consent of the person concerned. Please start using this product only after you fully understand and agree to all the terms of this policy.
This policy will help you understand the following contents:
1. How we collect and use your personal information
2. How we use cookies and similar technologies
3. How we share, transfer, and disclose your personal information
4. How we store your personal information
5. How we protect your personal information
6. How you can manage your personal information
7. How we protect the personal information of minors
8. Privacy policy updates
9. Contact us
10. Supplementary provisions
11. Definitions
Your agreement to this policy will indicate that you have understood the services and functions we provide, the necessary personal information required for the operation of these functions, and you authorize the corresponding collection and use. If you or your guardian do not agree with any content of this policy, please stop using it immediately. Your continued use of this product or related services indicates that you agree to our lawful collection, use, and storage of your personal information in accordance with this policy. When we use your information for purposes not covered by this policy, we will seek your consent in advance.1.How we collect and use your personal information
We collect and use your personal information based on the principles of legality, legitimacy, openness, transparency, and necessity, for the purposes described in this policy. To provide you with higher quality and intelligent Zero-One Everything Model products and services, we will collect and use the following personal information for the purposes described in this policy. If you refuse to provide, you will not be able to enjoy the corresponding business functions and services.
1.1 Registration/Login
(1) When you apply to use the Zero-One Everything Model, we will collect your mobile number and verification code to complete the registration and login of the Zero-One Everything Model account. (2) If you do not register/login to the Zero-One Everything Model account, we will not collect the aforementioned personal information, but you will not be able to use the functions related to registration/login.
1.2 Human-Computer Interaction Dialogue
Unless otherwise stipulated by laws and regulations, to provide you with a continuous and consistent user experience and ensure service quality, we will collect the text dialogue information you enter during the interaction with the Zero-One Everything Model while using its services. We will use this information to output content and provide human-computer interaction services.
Your text dialogue information will also be used to improve the response speed and quality of the Zero-One Everything Model. During the dialogue process, you can provide feedback on the content output by the Zero-One Everything Model. We will collect your feedback information, including the content you actively submit, to continuously improve the output quality of the Zero-One Everything Model. Please note, depending on the specific application scenario, the content you enter while using the Zero-One Everything Model services may contain personal information. If you do not want us to collect and process the aforementioned personal information, please be cautious about entering such information. However, this may affect your normal use of some or all functions provided by the Zero-One Everything Model.
1.3 Question-and-Answer History
To provide you with a continuous and consistent user experience and ensure service quality, we will collect your question-and-answer history, including the text dialogue information you enter and the dialogue topics formed based on this information. You can search for and manage your question-and-answer history that has not been deleted. To fulfill our network information security obligations, we will retain your question-and-answer history and dialogue topics for the time required by law.
1.4. Safe Operation and Statistical Analysis
When you use the products and services of the Zero-One Everything Model, to ensure the safe operation of the products and services, we will actively collect your [browser information (browser type, plugins, language, fonts, domain cache), terminal operation information (operating system, region), IP address information] to troubleshoot problems, ensure service stability and network security, and conduct operational analysis, improvement, and optimization of the product interaction experience through data statistics.
1.5 Obtaining Your Personal Information from Third Parties
If it is necessary to provide services, when we indirectly obtain your personal information from third parties, we will require the third party to make a commitment to the legality and compliance of the source of personal information before collection and inform you of the shared information content. We will provide personal information after obtaining your consent in accordance with the law. At the same time, we will strictly abide by the requirements of laws and regulations and the agreement with the third party to protect and process your personal information.
1.6 Personal Information Processing Statement
(1) We will de-identify or anonymize personal information as necessary through technical means according to the requirements of relevant laws and regulations. After processing, the information will not be able to accurately identify a specific personal information subject. Please understand and agree that under the premise of not disclosing your personal information and not violating relevant laws and regulations, we have the right to analyze and utilize user data, including but not limited to using technically processed dialogue information to improve and enhance the recognition and response speed and quality of algorithm models and the intelligence of services and understanding of your input content.
(2) When we want to use your personal information for other purposes not specified in this policy, or use information collected for a specific purpose for other purposes, we will seek your consent in advance. Please understand that the services we provide to you will continue to be updated and changed. If you choose to use other functions not listed in this policy, before we collect your personal information, we will explain to you in detail the purpose, method, and scope of information collection through updated agreements, pop-up window prompts, and seek your explicit consent. If you do not agree to provide the aforementioned information, you may not be able to use the service, but it will not affect your use of other services.
1.7 Exceptions to Obtaining Consent
According to the provisions of relevant laws and regulations, we do not need to obtain your consent to collect and use your personal information in the following cases:
(1) Necessary for the establishment and performance of a contract to which you are a party, or necessary for the implementation of human resources management in accordance with legally established labor rules and regulations and legally signed collective contracts;
(2) Necessary for us to fulfill statutory duties or legal obligations;
(3) Necessary to respond to sudden public health events, or in emergency situations to protect the life, health, and property safety of natural persons;
(4) Necessary for public interest activities such as news reporting and public opinion supervision, within a reasonable scope, to process your personal information;
(5) Reasonably processing personal information that you have made public or other legally disclosed personal information in accordance with the provisions of the "Personal Information Protection Law";(6) Other circumstances stipulated by laws and administrative regulations.
2.How We Use Cookies and Similar Technologies
Cookies and similar device information identification technologies are commonly used on the Internet. When you use our services, we may use related technologies to send one or more cookies or anonymous identifiers (hereinafter referred to as "Cookies") to your device to collect, identify, and store information when you access and use this product. We mainly use Cookies to ensure the safe and efficient operation of products and services, to confirm the security status of your account, investigate crashes, delays and related anomalies, and help you skip repeating steps and processes of filling out forms and entering search content. At the same time, we may use Cookies to show you information or functions you may be interested in and optimize your choice of advertisements.
You can manage or delete Cookies according to your preferences. Most browsers provide users with the function to clear browser cache data. You can perform the corresponding data clearing operation, or modify the degree of acceptance of Cookies or reject our Cookies, but you may not be able to fully use some of our services that rely on Cookies for convenience and security.
3. How We Share, Transfer, and Disclose Your Personal Information
3.1 Sharing
In principle, we will not share your personal information with third parties, except in the following cases:(1)Sharing with your consent: After obtaining your separate consent, we will share your personal information with other parties.
(2)Sharing as required by legal obligations: We may share your personal information as required by laws and regulations, for litigation dispute resolution needs, or as requested by administrative or judicial authorities in accordance with the law.
Currently, there is no situation where the Zero-One Everything Large Model shares your personal information with third parties.3.2 Transfer
In principle, we will not transfer control of your personal information to third parties, except in the following cases:(1)After obtaining your explicit consent or authorization, we will transfer your personal information to a third party.
(2)In cases involving mergers, divisions, dissolutions, or bankruptcy, we will inform you of the recipient's name or identity and contact information, and require the recipient to continue to be bound by this policy. If the recipient changes the original purpose or method of processing, we will seek your consent again.
3.3 Public Disclosure
In principle, we will not disclose your personal information to the public or unspecified groups, except in the following cases:(1) Public disclosure based on your separate consent.
(2) If we determine that you have violated laws and regulations or severely breached our agreements, or to protect the personal and property safety of our users or the public from harm, we may disclose your personal information based on laws, regulations, or with your separate consent, including information about your violations and the measures we have taken against you.
3.4 Exceptions for Sharing, Transferring, and Publicly Disclosing Personal Information Without Prior Consent
In the following cases, sharing, transferring, and publicly disclosing your personal information does not require your prior consent:
(1) Necessary for the establishment, performance of the contract you are a party to, or for human resources management as required by labor rules and collective contracts according to law.
(2) Necessary for us to fulfill legal duties or obligations.
(3) Necessary to respond to public health emergencies, or to protect the life, health, and property safety of natural persons in emergencies.
(4) For public interest activities such as news reporting and public opinion supervision, within a reasonable scope.
(5) Processing personal information that you have made public or other legally public personal information within a reasonable scope as stipulated by the Personal Information Protection Law.
(6) Other circumstances stipulated by laws and administrative regulations.
4.How We Store Your Personal Information
We store personal information collected and generated during our operations within the territory of China. There is no situation of cross-border transfer of personal information collected and processed under this policy.
We commit to limiting the storage time of your personal information to the shortest necessary duration to fulfill the purposes for which you have authorized its use, except as otherwise required by laws and regulations.
Should we cease operations due to business needs or other reasons, unless otherwise stipulated by laws, regulations, or normative documents, we will inform you of such circumstances and either delete the collected personal information or anonymize it.5.How We Protect Your Personal Information
We attach great importance to the security of your personal information. We adopt industry-standard security technologies and measures, along with corresponding organizational architecture and management systems, to maximally prevent your personal information from being leaked, damaged, misused, unauthorized access, unauthorized disclosure, or alteration. This includes:
5.1 Data Security Technical Measures
In terms of data security transmission, we use encryption technologies such as Transport Layer Security protocols to prevent interception and eavesdropping of transmission links, ensuring data confidentiality and integrity. We also use Token technology to protect data during transmission and deploy adequate protection mechanisms to prevent data from malicious attacks. Additionally, we take extra security protection measures, such as encrypted storage of your information.
For data access and usage security control, we implement strict data access control mechanisms, adopt multi-factor authentication technologies, and monitor the processing of your personal information to prevent unauthorized access and use. We monitor the entire lifecycle of data, regularly scan all interfaces of our product for security, and take measures against malicious codes and traffic attacks, to prevent unauthorized access, public disclosure, usage, alteration, or loss of your personal information.
5.2 Data Security Organization and Management Measures
In accordance with legal requirements, we have established departments responsible for personal information protection and designated specific personnel for the protection of children's personal information. We have also established internal control management processes based on the principle of minimal authorization, strictly setting access permissions for staff who may come into contact with your personal information and controlling the scope of their awareness of such information.
We have established internal standards for data security usage, ensuring that the processing of your personal information at all stages, including collection, transmission, usage, storage, transfer, and destruction, meets legal and regulatory security requirements. As required by relevant laws, we require staff who need to access personal information to be approved by the person in charge of personal information protection or their authorized manager, record access details, and adopt technical measures to prevent illegal copying or downloading of personal information.
We organize training for employees on security and privacy protection and require them to complete designated assessments, enhancing their awareness of the importance of personal information protection.
5.3 Security Incident Handling
To address potential risks of personal information leakage, damage, and loss, we have established a specialized emergency response team to initiate safety plans for different security incidents, undertake damage control, analysis, formulate remedial measures, and work with relevant departments for trace-back and countermeasures.
Please be aware and understand that the Internet is not an absolutely secure environment. We strongly advise you to use secure methods and complex passwords to help ensure the security of your account. In the unfortunate event of a personal information security incident, we will inform you in a timely manner of the incident's cause, potential harm, involved categories of personal information, measures we have taken or will take, and suggestions for you to independently prevent and reduce risks. We will promptly notify you of the relevant details of the incident through email, SMS, phone calls, or notifications. If it is difficult to inform each personal information subject individually, we will adopt reasonable and effective methods to make announcements. At the same time, we will report the handling of personal information security incidents to regulatory authorities as required. Please be aware that if measures are taken that can effectively prevent harm from the leakage, tampering, or loss of information, we may not notify you.
6.How You Can Manage Your Personal Information
6.1 Inquiry, Copying, Correction, or Supplementation of Your Personal Information
You have the right to inquire, copy, correct, or supplement your personal information. If you have such needs, you can take the following steps to inquire, copy, correct, or supplement: Personal Center - Edit Profile. You can also propose your request to us through the contact information indicated in Article 9 of this policy. After verifying your identity and ensuring compliance with relevant laws and regulations, we will respond within 15 working days.
6.2 Transferring Your Personal Information
You have the right to request the transfer of your personal information to a personal information processor you designate, under the premise of legal provisions and technical feasibility. If you have such needs, you can propose your request to us through the contact information indicated in Article 9 of this policy. After verifying your identity and ensuring compliance with relevant laws and regulations, we will respond within 15 working days.
6.3 Deleting Your Personal Information
In the following cases, you can take the following steps to delete your personal information: Personal Center - Account and Security - Cancel Account. You can also propose your request to delete your personal information to us through the contact information indicated in Article 9 of this policy, except for cases where the personal information has been anonymized or as otherwise stipulated by laws and regulations:
(1) The processing purpose has been achieved, cannot be achieved, or is no longer necessary.
(2) We cease to provide products or services, or the retention period has expired.
(3) You withdraw your consent.
(4) We process personal information in violation of laws, administrative regulations, or agreements.
(5) Other circumstances stipulated by laws and administrative regulations.
You hereby agree that once your deletion request is responded to, your personal information will be deleted or anonymized unless otherwise stipulated by laws, regulations, or normative documents.
Please be aware that we may not immediately delete the information from the backup system in response, but will do so when the backup system is updated.6.4 Changing the Scope of Your Consent
You can change the scope of your consent or withdraw your consent in the following ways: Personal Center - Account and Security - Privacy Settings. You can also propose your request to change or withdraw your consent to us through the contact information indicated in Article 9 of this policy. After you change the scope of your consent, we will no longer collect and use your corresponding personal information unless you re-authorize us. You hereby agree that changing the scope of your consent or withdrawing your consent will not affect our processing of your personal information based on your previous consent.
6.5 Account Cancellation
You have the right to cancel your account. If you wish to do so, you can cancel through the "Account Cancellation" feature, or you can make a request through the contact information provided in Section 9 of this policy. After verifying your identity, we will respond to your request within 15 working days.
After the cancellation of your account, unless otherwise stipulated by laws and regulations, we will promptly delete your personal information or process it anonymously. Please be cautious in deciding to cancel your account.
6.6 Responding to Your Requests
To exercise the user rights described in Sections 6.1-6.4 of this policy, you may contact us through the methods provided in Section 9. To ensure security, we will verify your identity before processing your requests. We will generally respond to your requests within 15 working days of receiving them. However, we may refuse requests that are not directly associated with your identity, are repetitively unnecessary, require excessive technical effort (such as developing new systems or fundamentally changing current practices), pose risks to the legal rights of others, or are impractical.
In the following situations, as required by law and regulation, we will not be able to respond to your requests:
(1) Related to the fulfillment of obligations by personal information processors under laws and regulations;
(2) Related to national security and national defense security;
(3) Directly related to public safety, public health, and major public interests;
(4) Directly related to criminal investigation, prosecution, trial, and execution of judgments;
(5) There is sufficient evidence of malicious intent or abuse of rights by the personal information subject;
(6) For the purpose of protecting the life, property, and other major legal rights of the personal information subject or other individuals when it is difficult to obtain consent;
(7) Responding to your request would cause serious harm to the legal rights of you or other individuals or organizations;
(8) Related to trade secrets.7.How to Protect the Personal Information of Minors
We value and are committed to protecting the privacy of minors under the age of 18. If you are a minor under the age of 18, we recommend that your guardian carefully read this privacy policy and use our services or provide us with information only after obtaining your guardian's consent.If we discover that we have collected personal information of a minor without prior consent of a guardian, we will take measures to delete the information as soon as possible. If at any time a guardian believes that we have collected personal information of a minor without their consent, or has any questions regarding the personal information of the minor they are responsible for, please contact us at [support@lingyiwanwu.com], and we will take all reasonable measures to protect the privacy of the minor.
8.How to Update This Policy
We reserve the right to update or modify this policy from time to time. However, without your explicit consent, we will not reduce the rights you are entitled to under this policy. Such changes constitute a part of this policy. We will publish the updated content of this policy on the privacy policy page of this product.Please carefully read the content of the policy after it has been changed. If you do not agree with this policy or have objections to the modified or updated content of this policy, you may choose to stop using the Zero-One Everything Large Model products and services or cancel your Zero-One Everything Large Model account. Please be aware that your activities and actions prior to account cancellation or cessation of service use remain bound by this policy.
In the event of significant or substantial changes, we will notify you in a prominent manner depending on the specific situation.Significant and substantial changes include, but are not limited to, the following situations:
(1) Significant changes in our service model, such as the purpose of processing personal information, the types of personal information processed, and the way personal information is used;
(2) Major changes in our control, such as changes in information controllers due to mergers and reorganizations;
(3) Major changes in the main objects of personal information sharing, transfer, or public disclosure;
(4) Major changes in your rights regarding personal information processing and how they are exercised;
(5) Changes in our department responsible for handling personal information security, contact methods, and complaint channels;
(6) When a personal information security impact assessment report indicates a high risk.9.Contact Us
If you have any questions about this policy while using this product, you can contact us through the following methods:
(1)Contact email: Send an email to[
support@lingyiwanwu.com];
(2)Contact phone: 010-57525366
(3)Online platform:www.lingyiwanwu.com
(4) Contact address: Building 1, Floor 10, Unit 1001-009, No. 3 Haidian Street, Haidian District, Beijing
We will promptly review the issues involved and respond to your request within
15 working days after receiving it. If you are dissatisfied with our response and we refuse to improve, you can file a complaint or report to the relevant regulatory authorities.
10.Supplementary Provisions
The interpretation and dispute resolution of this policy shall be governed by the laws of the People's Republic of China. Any disputes related to this policy shall be resolved through friendly negotiations between both parties; if negotiation fails, you hereby agree to submit the dispute to the People's Court of Haidian District, Beijing.
If any term of this policy is declared invalid or void by a court with jurisdiction, that term will be removed from this policy, but the invalidity of that term will not affect the effectiveness of the remaining terms of this policy. The remaining terms of this policy will continue to be executed.
The titles of this policy are designed for ease of reading and do not affect the meaning or interpretation of any terms of this policy.
11.Definitions
Zero-One Everything Large Model: Refers to the generative artificial intelligence Q&A technology services developed by Beijing Zero-One Everything Technology Co., Ltd. or its affiliated companies.
Affiliated Companies: Refers to the subsidiaries or other affiliated enterprises within the consolidated statement scope of Beijing Zero-One Everything Technology Co., Ltd., and those companies/enterprises that currently or in the future have a relationship of control, being controlled, or under common control with Beijing Zero-One Everything Technology Co., Ltd.
User or You: Refers to the user of Zero-One Everything Large Model products and services.
Minors: Refers to individuals under the age of 18.
Children: Refers to minors under the age of 14.
Personal Information: Refers to various information related to identified or identifiable natural persons, recorded electronically or in other ways. Personal information includes, but is not limited to, basic personal information, personal identification information, personal biometric information, network identity markers, personal health and physiological information, personal education and employment information, personal property information, personal communication information, contact information, personal internet records, personal device information, personal location information, etc. For clarity, personal information includes but is not limited to sensitive personal information, excluding information that has been anonymized.
Sensitive Personal Information: Sensitive personal information is information that, once leaked or illegally used, can easily infringe upon the dignity of natural persons or endanger personal and property safety, including biometric data, religious beliefs, specific identities, medical health, financial account, whereabouts, and personal information of minors under the age of fourteen.
De-identification: Refers to the process of processing personal information so that it cannot identify a specific natural person without additional information.
Anonymization: Refers to the process of processing personal information so that it cannot identify a specific natural person and can not be restored.
China or Mainland China: Refers to the mainland area of the People's Republic of China (for the purpose of this policy only, excluding the Hong Kong Special Administrative Region, Macao Special Administrative Region, and Taiwan Region).
Device: Refers to the equipment that can be used to access the Zero-One Everything Large Model products and/or services.