Privacy Policy

Date: October 30, 2025

HiMate (referred to as “we” or “this product”) fully understands the importance of personal information to you, and your trust is crucial to us. We will protect your personal information and privacy security in accordance with legal and regulatory requirements and with reference to industry best practices. We have formulated this “Privacy Policy” and specifically remind you: Please read and understand this Privacy Policy carefully before using HiMate and related services to make appropriate choices.

This Privacy Policy will help you understand:

We will follow the Privacy Policy to collect and use your information, but we will not adopt a forced bundling method to collect personal information in a blanket manner solely because you agree to this Privacy Policy. Please ensure that the personal information you provide to us, and that you authorize us to collect, process, use, and store within the scope described in this Privacy Policy, does not infringe upon the legitimate rights and interests of others.

When you use or enable relevant functions or use the services, we will collect and use relevant information as necessary to realize the function or service. Unless it is necessary information required to achieve the business function or according to legal and regulatory requirements, you can refuse to provide it without affecting other functions or services. We will explain the information to be collected item by item in the Privacy Policy.

Microphone and Bluetooth permissions will not be enabled by default. They will only be used for specific functions or services upon your explicit authorization, and you can also withdraw your authorization. It is particularly important to note that even after your authorization grants us these sensitive permissions, we will not collect your information when the relevant functions or services do not require it. For details, please refer to: Application Permission Requests and Usage Description.

The following sections will help you understand in detail how we collect, use, store, transfer (if applicable), and protect personal information; and help you understand how to manage your personal information. This policy is closely related to your use of our services. We recommend that you read and understand the entire content of this policy and make choices you deem appropriate. Please pay special attention.

1.  How We Collect and Use Personal Information

2.  How We Use Cookies and Similar Technologies

3.  Partners Involved in Data Use, Transfer, and Disclosure of Personal Information

4.  How We Store Personal Information

5.  How We Protect the Security of Personal Information

6.  Managing Your Personal Information

7.  Minor Clauses

8.  Revision and Notification of the Privacy Policy

9.  Contact Us

1. How We Collect and Use Personal Information

We will collect information you actively provide when using the services, as well as information generated automatically during your use of functions or receipt of services, in the following ways:

1.1 Registration, Login

1.1.1 When you register and log in to HiMate and related services, you can create an account and complete registration using your mobile phone number. The mobile phone number is necessary information to fulfill the national legal and regulatory requirements for internet real-name systems. If you do not provide a mobile phone number for registration and login, we may not be able to provide you with functions such as AI dialogue.

1.1.2 You can use a third-party account to log in and use HiMate. With your consent, we will obtain the public information you registered on the third-party platform (such as avatar, nickname, and other information you authorize) to bind with your HiMate account, allowing you to log in directly and use this product and related services.

1.1.3 We provide services to you through multiple associated products with closely connected functions. To provide a consistent service experience and ensure interoperability between products, these associated products use a unified account service, collectively collecting and processing your account information in the aforementioned products. The account you use to register for this product will also become the universal identifier for using the unified account service, allowing you to log in synchronously, use associated products, and obtain related services. For the scope of the aforementioned associated products, please refer to: Understanding the Unified Account Service System.

1.2 Interactive Entertainment Functions

1.2.1 We provide interactive entertainment services to you based on generative artificial intelligence model technology. To provide you with interactive entertainment services, we may collect information you actively input (including text or voice), content instructions, your behavioral information when using the model (including your click, browse, edit and other operation records), and feedback information you provide (including likes, dislikes, submitted feedback). We will analyze and calculate the above information to better understand your instructions and context, thereby providing you with more relevant information content (including text or pictures).

1.2.2 To provide you with the character image generation function, we may transmit the text and images you actively input back to the server for processing. We will not use the aforementioned information for any other purpose without your authorized consent and will process it with full security encryption.

1.2.3 You can view and learn in detail about the basic principles, purpose, intent, and main operating mechanism of the model technology used by HiMate through the Usage Instructions.

1.2.4 According to laws, regulations, and relevant national standards, and under the premise of being processed by secure encryption technology, strictly de-identified, and unable to re-identify specific individuals, we may use the data collected in paragraph a above for algorithmic model optimization and continuously adjust the algorithm’s effects. If you do not wish your input or provided information to be used for model training and optimization, you can contact us through the contact method publicized in this Privacy Policy to request the withdrawal of your data for algorithmic model optimization.

1.2.5 When you actively take photos, or input pictures or voice, we will request your authorization for album and microphone permissions according to the type of information you input. If you refuse authorization, you will be unable to input picture information and voice information, but this will not affect your use of other functions of HiMate.

1.3 User Feedback and Service

1.3.1 Customer Service and Issues: To facilitate contact with you, help you solve problems as soon as possible, or record the handling plan and results of related issues, we may save our communication/call records and related content with you (including account information, feedback information, other information you provide to prove relevant facts, or contact information you leave).

1.3.2 When you complain about others or are complained about by others, to protect your legitimate rights and interests and those of others, we may provide your account/identity information, contact information, and complaint-related content to consumer rights protection departments and regulatory authorities to resolve complaint disputes in a timely manner, unless expressly prohibited by laws and regulations.

1.4 Message Notifications

1.4.1 You acknowledge and agree that during our operations, we may use the contact information you provide during the process of using the product and/or services (e.g., phone number) to send you one or more types of notifications simultaneously, such as user experience research. But please rest assured, if you do not wish to receive these messages, you can unsubscribe using the method provided in the SMS, or contact us directly to unsubscribe.

1.5 Operation and Security Operation/Safeguarding

1.5.1 We are committed to providing you with a safe and trustworthy product and usage environment. Providing high-quality and reliable services and information is our core goal. To maintain the normal operation of our services and protect the legitimate interests of you, other users, or the public from loss, we will collect necessary information to maintain the safe and stable operation of the product or service.

1.5.2 Device Information and Log Information

1.5.3 To ensure the secure operation of the software and services, and the quality and efficiency of operations, we will collect your hardware model, operating system version number, device identifier (Android such as Android ID, OAID, IMSI, SIM card information (such as ICCID), GAID, hardware serial number (SN); iOS such as IDFV, IDFA; different identifiers vary in validity period, whether they can be reset by the user, and how they are obtained), network device hardware address (device MAC address), IP address, WLAN access point (such as SSID, BSSID), Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, use, service logs, device sensor data (such as acceleration sensor), mobile app installation list, uninstalled applications, updated applications.

1.5.4 To prevent malicious programs and ensure operational quality and efficiency, we will collect information about running processes, overall page operation, usage and frequency, page crashes, overall usage, and performance data.

1.6 Changes in the Purpose of Collecting and Using Personal Information

Please understand that as our business develops, there may be adjustments and changes to the functions and services provided by HiMate. In principle, when new functions or services are related to the functions or services we currently provide, the collection and use of personal information will have a direct or reasonable connection with the original processing purpose. In scenarios where there is no direct or reasonable connection with the original processing purpose, we will again inform and explain to you separately through page prompts, interactive processes, and agreement confirmation as required by laws, regulations, and national standards, and obtain your consent before collecting and using your personal information.

1.7 Exceptions to Obtaining Authorization and Consent

Please understand that in the following circumstances, according to laws, regulations, and relevant national standards, we may collect and use your personal information without obtaining your prior authorization and consent:

a. Related to our fulfillment of obligations under laws and regulations;

b. Directly related to national security and national defense security;

c. Directly related to public safety, public health, and significant public interests;

d. Directly related to criminal investigation, prosecution, trial, and execution of judgments;

e. Necessary for protecting the life, property, and other significant legitimate rights and interests of you or others, but where it is difficult to obtain the consent of the individual;

f. Personal information that you have voluntarily disclosed to the public;

g. Necessary for concluding and performing a contract at the request of the personal information subject;

h. Collected from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels;

i. Necessary for maintaining the safe and stable operation of the software and related services, such as discovering and handling faults of the software and related services;

j. Necessary for lawful news reporting;

k. Necessary for academic research institutions to conduct statistical or academic research based on public interests, and when providing the results of academic research or description to the outside, the personal information contained in the results is de-identified;

l. Other circumstances stipulated by laws and regulations.We specifically remind you to note that if information cannot individually or in combination with other information identify your personal identity, it does not constitute your personal information in the legal sense; when your information can individually or in combination with other information identify your personal identity, or when we combine data that cannot be linked to any specific personal information with your other personal information, such information will be treated and protected as your personal information in accordance with this Privacy Policy during the period of combined use.

1.8 Clipboard Invocation

1.8.1 Sharing and Activity Participation

When you share or receive shared information, participate in activities, etc., we need to access your clipboard and read the links contained therein to achieve functions or services such as jumping, sharing, and activity linkage.

1.8.3 Statistical Analysis

To analyze statistical indicators such as new app additions, activations, retention, and performance, we may invoke the clipboard for attribution analysis of relevant statistical information. Please rest assured that we will not collect your private information.

2. How We Use Cookies and Similar Technologies

Cookies and similar technologies such as device information identifiers are commonly used on the Internet. When you use HiMate and related services, we may use related technologies to send one or more Cookies or anonymous identifiers to your device to collect, identify, and store information when you visit and use this product. We promise not to use Cookies for any purposes other than those described in this Privacy Policy. We use Cookies and similar technologies mainly to achieve the following functions or services:

2.1 Ensuring the Secure and Efficient Operation of Products and Services

We may set authentication and security cookies or anonymous identifiers to confirm whether you have logged into the service securely or whether you have encountered theft, fraud, and other illegal activities. These technologies also help us improve service efficiency and enhance login and response speed.

2.2 Helping You Obtain a Easier Access Experience

Using such technologies can save you the steps and processes of repeatedly filling in personal information and inputting search content (example: recording conversations).

2.3 Clearing Cookies

Most browsers provide users with the function to clear browser cache data. You can perform corresponding data clearing operations in the browser settings. If you perform a clear, you may not be able to use services or corresponding functions provided by the company that rely on Cookies due to these modifications.

3. Partners Involved in Data Use, Transfer, and Disclosure of Personal Information

3.1 Partners Involved in Data Use

3.1.1 Principles

3.1.2 Legality Principle: Data use activities involved in cooperation with partners must have a legal purpose and comply with statutory legality bases. If a partner’s use of information no longer complies with the legality principle, it should no longer use your personal information, or should only use it after obtaining the corresponding legality basis.

3.1.3 Legitimacy and Minimum Necessity Principle: Data use must have a legitimate purpose and should be limited to what is necessary to achieve the purpose.

3.1.4 Security Prudence Principle: We will prudently assess the purpose of partners’ data use, comprehensively evaluate the security assurance capabilities of these partners, and require them to follow cooperative legal agreements.

For details, please refer to: Third-Party Information Sharing List.

3.1.5 Entrusted Processing

For scenarios involving entrusted processing of personal information, we will sign relevant processing agreements with the entrusted partners according to legal provisions and supervise their personal information use activities.

3.1.6 Joint Processing

For scenarios involving joint processing of personal information, we will sign relevant agreements with partners according to legal provisions and stipulate their respective rights and obligations to ensure compliance with relevant legal provisions and protection of data security during the use of relevant personal information.

3.1.7 Scope of Partners

If specific functions and scenarios involve services provided by our affiliates or third parties, the partner scope includes our affiliates and third parties.

3.1.8 Data Use for Realizing Functions or Services

When you use functions provided by our partners within HiMate, our partners may use information necessary to achieve business purposes to return more relevant content to you.

3.1.9 Data Use for Realizing Advertising and Promotion Business

(1) Advertising Push and Delivery: To achieve advertising and promotion and related analysis services, and to optimize and improve the effective reach rate of advertising and promotion, the following partners need to use de-identified or anonymized device, network, channel information, location and tag information, mobile app installation list, uninstalled applications, updated applications:

Advertisers/promoters, or partners providing advertising and promotion and related analysis services;

Partners providing advertising and promotion and related analysis services cooperating with advertisers/promoters.(2) Statistical Analysis: Partners conducting advertising and promotion and providing related analysis services may need to use your device, network, advertising and promotion click, browse, display, and conversion data and other information for analyzing, measuring, and improving the effectiveness of advertising and promotion services.

(3) Partners’ Use of Information: Advertising and promotion partners may combine the above information with other data they legally obtain to optimize advertising and promotion effects. We will require their use of information to follow the principles of legality, legitimacy, and necessity, ensuring that users’ legal rights are not infringed. When you click on an advertisement, we may detect whether the target application is installed (for example, directly jumping to the installed application or helping the user download and install the application). This process is limited to the instant of the current operation and does not continuously monitor your application installation/uninstallation behavior. We will not collect or store your application list information.

3.1.10 Providing Information for Security and Analysis Statistics

(1) Ensuring Usage Security: We attach great importance to account, service, and content security. To protect the account and property security of you and other users, and to protect your and our legitimate rights and interests from illegal infringement, our partners may use necessary device, account, and log information. To ensure user account security, when we identify that the mobile phone number you use to log in to your account has a risk of secondary number allocation, we will provide your mobile phone number and account registration time to the communication operator for secondary number verification to protect your account security.

(2) Analyzing Product Situation: To analyze the usage and performance of our products, our partners may need to use the product usage situation (crashes, flash exits), device identification information, and overall application installation and usage information.

3.2 Transfer

With the continuous development of our business, we may undergo mergers, acquisitions, or asset transfers, and your personal information may be transferred as a result. When such changes occur, we will require the successor to continue to perform the obligations of the personal information processor in accordance with laws and regulations and security standards no lower than those stated in this Privacy Policy. If the successor changes the original processing purpose or method, we will require the successor to re-obtain your authorized consent.

3.3 Disclosure

3.3.1 We will not disclose your personal information unless required by national laws and regulations or with your consent. When we disclose your personal information, we will adopt security protection measures that comply with industry standards.

3.3.2 When issuing penalty announcements for违规 accounts and fraudulent behaviors, we will disclose information about the relevant accounts.

3.4 Legally Exempted Circumstances for Providing and Disclosing Personal Information Without Consent

Please understand that in the following circumstances, according to laws, regulations, and national standards, we may provide and disclose your personal information to partners without obtaining your authorized consent:

a. Related to our fulfillment of obligations under laws and regulations;

b. Directly related to national security and national defense security;

c. Directly related to public safety, public health, and significant public interests;

d. Directly related to criminal investigation, prosecution, trial, and execution of judgments;

e. Necessary for protecting the life, property, and other significant legitimate rights and interests of you or other individuals, but where it is difficult to obtain the consent of the individual;

f. Personal information that you have voluntarily disclosed to the public;

g.  Collected from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels.

4. How We Store Personal Information

4.1 Storage Location

We store the personal information collected and generated during our operations within the territory of the People’s Republic of China in accordance with the provisions of laws and regulations. Currently, we will not transfer the aforementioned information overseas. If we need to transfer it overseas, we will follow relevant national regulations or seek your consent.

4.2 Storage Period

We only retain your personal information for the period necessary for the purpose of providing HiMate and its services: information you publish, comments, likes, and related information will be retained by us during the period when you have not withdrawn, deleted, or deactivated your account. After the necessary period expires, we will delete or anonymize your personal information, unless otherwise stipulated by laws and regulations.

5. How We Protect the Security of Personal Information

5.1 We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and managerial aspects) to protect your personal information, preventing the improper use or unauthorized access, public disclosure, use, modification, damage, loss, or leakage of the personal information you provide.

5.2 We will use encryption technology, anonymization processing, and related reasonably feasible means that are not inferior to industry peers to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.

5.3 We will establish dedicated security departments, security management systems, and data security procedures to protect your personal information security. We adopt strict data usage and access systems to ensure that only authorized personnel can access your personal information, and we conduct security audits of data and technology in a timely manner.

5.4 Although we have taken the above reasonable and effective measures and have complied with the standards required by relevant laws and regulations, please understand that due to technical limitations and the possible existence of various malicious means, it is impossible to always guarantee 100% security of information in the internet industry, even if we do our best to strengthen security measures. We will strive to ensure the security of the personal information you provide to us.

5.5 After the occurrence of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation of the security incident and its possible impact, the measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you, etc. We will promptly inform you of the incident-related situation via email, letter, phone, push notification, etc. If it is difficult to inform each personal information subject individually, we will issue an announcement in a reasonable and effective manner.

6. Managing Your Personal Information

We attach great importance to your management of your personal information and will do our utmost to protect your rights to query, access, correct, delete, withdraw consent authorization, cancel your account, complain and report, and set privacy functions regarding your personal information, so that you have the ability to protect your privacy and security.

6.1 Changing or Withdrawing Authorization Scope

6.1.1 Changing or Withdrawing Sensitive Permission Settings

6.1.2 You can turn off microphone permissions in your device’s operating system to change the scope of consent or withdraw your authorization. After withdrawing authorization, we will no longer collect information related to these permissions.

6.1.3 Changing or Withdrawing Authorized Information Processing

(1) You can contact us through the contact method publicized in this Privacy Policy to change the scope of consent or withdraw your authorization.

(2) For your sensitive personal information, after you withdraw your consent, we will no longer process the corresponding sensitive personal information.6.2 Accessing, Deleting, and Correcting Your Personal Information

6.2.1 Accessing Personal Account Information

You can query and access your avatar and nickname. You can query, access, and correct them in the “Edit Profile” section of HiMate. You have the right to cancel your HiMate account. You can do so by yourself in the following way: Enter HiMate, click “Me”, click “Settings”, click “Delete Account”. We will complete the verification and processing within 15 working days.

After account cancellation, we will stop providing you with products or services and, based on your request, delete your personal information, unless otherwise stipulated by laws and regulations.

6.3 Complaints and Reports

You can file a complaint or report according to the system we have publicized. If you believe that your personal information rights may have been infringed, or if you discover clues of infringement of personal information rights, you can report it through the following via. After verification and feedback, we will reply to your request within 15 working days: Enter HiMate, click “Me”, click “Settings”, click “Complaints and Suggestions”, and contact us through the user feedback interface.

6.4 Accessing the Privacy Policy

You can view the full content of this Privacy Policy on the registration page or in the “Settings” interface after logging into your personal account.

6.5 Notification Upon Cessation of Operations

If we cease operations, we will promptly stop collecting your personal information, notify you of the cessation of operations by individual delivery or announcement, and delete or anonymize the personal information we hold about you.

7. Minor Clauses

7.1 General Provisions for Minors

7.1.1 If you are a minor under the age of 18, you should read and agree to this Privacy Policy under the guidance and supervision of your parents or other guardians before using HiMate and related services.

7.1.2 We protect the personal information of minors in accordance with relevant national laws and regulations. We will only collect, use, store, transfer, or disclose the personal information of minors where permitted by law, with the explicit consent of parents or other guardians, or where necessary to protect the minor. If we discover that we have collected the personal information of a minor without prior verifiable parental consent, we will endeavor to delete the relevant information as soon as possible.

7.1.3 If you are the guardian of a minor, please contact us through the contact method publicized in this Privacy Policy if you have any questions regarding the personal information of the minor under your guardianship.

7.2 Special Protection for Minors

We highly value the protection of minors’ personal information. Given the specific nature of AI dialogue services, we do not recommend that minors use HiMate and related services. If you are a minor, please do not use HiMate and related services.

8. Revision and Notification of the Privacy Policy

8.1 In order to provide you with better services, HiMate and related services will be updated and changed from time to time. We will timely revise this Privacy Policy accordingly. Such revisions form part of this Privacy Policy and have effect equivalent to this Privacy Policy. Without your explicit consent, we will not reduce the rights you are entitled to under the currently effective Privacy Policy.

8.2 After this Privacy Policy is updated, we will release the updated version on HiMate and remind you of the updated content through appropriate means before the updated terms take effect, so that you can timely understand the latest version of this Privacy Policy.

9. Contact Us

If you have complaints, suggestions, or questions regarding personal information protection, you can send them to (shengyingdadev@outlook.com). We will verify your user identity and promptly respond to your complaints and reports.