QGLocalAI privacy policy

QGLocalAI Privacy Policy

Updated: December 26, 2025

Effective: December 26, 2025

The "QGLocalAI Privacy Policy" (hereinafter referred to as "this Policy") applies to the QGLocalAI mobile app services (hereinafter referred to as "the Service") launched by Shenzhen Qingge Technology Co., Ltd. (hereinafter referred to as "we"). Before using this Service, please read this Policy carefully to understand the details of how we process your personal information.

When you use or enable relevant functions or use the Service, we will collect and use relevant information as necessary to implement functions and services. Unless it is necessary information required for business functions or legal regulations, you may refuse to provide it without affecting other functions or services. we will explain the information to be collected item by item in the privacy policy.

The core functions of QGLocalAI do not require sensitive permissions or runtime permissions; therefore, we do not proactively request runtime permissions.

The following text will help you understand in detail how we collect, use, store, transfer (as applicable), and protect personal information; it will also help you understand how to query, copy, delete, correct, and withdraw authorization for personal information. This Policy is closely related to your use of our services. We recommend that you read and understand the entire content of this Policy carefully and make the choices you deem appropriate. Important content regarding your personal information rights and interests has been highlighted in bold; please pay special attention to these parts.

This Policy will help you understand the following:

1. How We Collect and Use Your Personal Information

2. How We Use Cookies and Similar Technologies

3. How We Entrust, Share, Transfer, and Publicly Disclose Your Personal Information

4. How We Protect Your Personal Information

5. How We Store Your Personal Information

6. How You Can Exercise Your Rights to Manage Your Personal Information

7. How We Protect the Personal Information of Minors

8. How We Update This Policy

9. How to Contact Us

10. Miscellaneous

 

1. How We Collect and Use Your Personal Information

As the processor of personal information, we follow the principles of legality, fairness, necessity, and integrity, collecting and using your personal information for the purposes described below.

1. Account Registration, Login, and Authentication

we have not implemented account registration, login, and authentication features yet.

2. Intelligent Dialogue

When you use the intelligent dialogue service, the content you input during interaction with QGLocalAI (including text and images), the model output, session settings, and chat history are all processed locally on the device and saved locally. We do not collect or store this information on our servers.

Please note that during the intelligent dialogue process:

(1) Your input and the AI model's output are only processed on your device and will not be uploaded to our servers;

(2) Chat records are saved locally on your device. We cannot access, view, or delete the dialogue content on your device. If management is required, please do so through device settings or in-app functions;

(3) Please handle sensitive personal information with caution and avoid entering sensitive information such as bank card numbers, passwords, and ID numbers during conversations;

(4) AI-generated content is for reference only and does not constitute any suggestion or commitment. We cannot control the accuracy, completeness, or applicability of the model output, and you should judge its credibility and availability for yourself.

3. Model Services

When you use QGLocalAI model services, the models you import, configuration information, and downloaded models are all processed locally on the device and saved locally. We do not collect or store this information on our servers.

3.1 Third-party Model Import

You may import AI model files in formats such as GGUF from third-party sources. When using third-party models, please understand and agree to the following:

(1) Disclaimer: We cannot and do not review or guarantee the accuracy, completeness, legality, or security of model content you import from third parties. Any information, data, or content contained in third-party models is the responsibility of the model provider or yourself. We assume no responsibility for any loss or damage caused by third-party models.

(2) Data Security: Imported third-party model files are stored and processed only on your local device. We do not upload, analyze, or share your imported model files. Please ensure models are downloaded from trusted sources and regularly check device security.

(3) Compliance Prompt: Please ensure that the imported third-party models are from legal sources and that you have the right to use the model. If intellectual property or personal information of others is involved, please ensure that appropriate authorization has been obtained.

(4) Risk Warning: Some third-party models may contain risks of generating harmful content, biased speech, or misleading information. We recommend that you understand the source, training data, and usage limitations of the model before use and assess the usage risks yourself.

3.2 Model Configuration and Download

You can configure model parameters, download models locally, or delete downloaded models. These configurations and operation records are saved locally on your device, and we do not collect this information. To manage downloaded models, please operate within the app or in device storage.

4. Operations and Security

To ensure the security of your account and better provide you with high-quality services, we automatically collect the following information generated during your use of QGLocalAI services as network logs:

To ensure the secure operation of software and services, and the quality and efficiency of operations, we collect your hardware model, operating system version number, device identifier (Android such as AndroidID, OAID; iOS such as IDFV; different identifiers vary in validity, whether they can be reset by the user, and acquisition methods), ADID, IP address, software version number, network access method, type, status, network quality data, operations, usage, and service logs.

We may use the above network log information to compile statistics on QGLocalAI usage, perform troubleshooting, and conduct operational analysis, improvement, and optimization of the product interaction experience through data statistics.

5. Other Rules for Collecting and Using Personal Information

Please understand that with the development of our business, functions and services provided may change. In principle, when a new function or service is related to our currently provided functions or services, the personal information collected and used will have a direct or reasonable association with the original processing purpose. In scenarios without a direct or reasonable association with the original processing purpose, we will inform you again through page prompts, interactive processes, or agreement confirmation in accordance with legal regulations and national standards, and obtain your consent.

Please understand that in the following circumstances, according to legal regulations and relevant national standards, we do not need to obtain your prior authorization and consent to collect and use your personal information:

(1) Necessary for us to perform obligations stipulated by laws and regulations;

(2) Directly related to national security or national defense security;

(3) Necessary for maintaining public safety, public health, or significant public interests;

(4) Directly related to criminal investigation, prosecution, trial, and execution of judgment;

(5) Necessary to protect the life, property, or other significant legal rights of you or others but where it is difficult to obtain your consent;

(6) Personal information you disclose to the public on your own;

(7) Necessary for signing and performing a contract as requested by the subject of the personal information;

(8) Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels;

(9) Necessary for carrying out legal news reports;

(10) Other circumstances stipulated by laws and regulations;

Special reminder: if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in a legal sense; when your information can identify your personal identity alone or in combination with other information, or when we combine data that cannot be linked to any specific individual with your other personal information, such information will be treated and protected as your personal information in accordance with this Privacy Policy during the period of combined use.

 

2. How We Use Cookies and Similar Technologies

1. Use of Cookie Technology

We collect and use your information through cookies and store such information as log information. We use our own and third-party cookies for the following purposes:

(1) To remember your identity. For example: cookies help us identify you as our registered user or save other information you provide to us;

(2) To ensure service security. For example: cookies help us identify malicious users or malicious access behavior, detect and prevent attacks and damage to the website.

2. Use of Similar Cookie Technologies

Similar technologies we use include web beacons and pixel tags. The purpose of using these technologies is to understand your product or service preferences and improve customer service.

3. Clearing Cookies

Most browsers provide users with the function to clear browser cache data; you can perform the corresponding data clearing operation in the browser settings. If you clear them, you may not be able to use cookie-dependent services or corresponding functions due to these changes.

 

3. How We Entrust, Share, Transfer, and Publicly Disclose Your Personal Information

1. Principles of Data Sharing

(1) Legality Principle: Any data usage activities involving cooperation with partners must have a legal purpose and comply with statutory legal bases. If the partner's use of information no longer complies with the legality principle, they should no longer use your personal information or should use it only after obtaining a corresponding legal basis.

(2) Fairness and Minimum Necessity Principle: Data use must have a legitimate purpose and should be limited to what is necessary to achieve that purpose.

(3) Security and Prudence Principle: We will prudently evaluate the purpose of data use by partners, comprehensively evaluate their security guarantee capabilities, and require them to follow legal cooperation agreements. We will conduct strict security monitoring on software tool developer kits (SDKs) and application programming interfaces (APIs) through which partners obtain information to protect data security.

(4) For scenarios involving entrusted processing of personal information, we will sign relevant processing agreements with the entrusted partners according to legal provisions and supervise their personal information use activities.

(5) For scenarios involving joint processing of personal information, we will sign relevant agreements with partners according to legal provisions and agree on respective rights and obligations to ensure compliance with legal provisions and protection of data security during the use of relevant personal information.

(6) If specific functions and scenarios involve services provided by our affiliates or third parties, the scope of partners includes our affiliates and third parties.

Third parties we cooperate with and data processing details are as follows:
we have not started to cooperate with third parties yet.

2. Providing Information for Security and Analysis/Statistics

(1) Ensuring Usage Security: We attach great importance to account, service, and content security. To protect the account and property security of you and other users, and to protect our and your legitimate rights and interests from unlawful infringement, our partners may use necessary device, account, and log information.

(2) Analyzing Product Performance: To analyze the use and performance of our products, our partners may need to use product usage information (crashes, freezes), device identification information, overall app installation and usage, etc.

3. Transfer

As our business continues to develop, we may undergo mergers, acquisitions, or asset transfers, and your personal information may be transferred as a result. In the event of such changes, we will require the successor to continue fulfilling the obligations of a personal information processor in accordance with laws, regulations, and security standards no lower than those stated in this Privacy Policy. If the successor changes the original processing purpose or method, we will require them to obtain your authorization and consent again.

4. Disclosure

(1) We will not publicly disclose your personal information unless we follow national laws and regulations or obtain your consent. We will adopt security measures that meet industry standards when disclosing your personal information.

(2) We may publicly disclose your personal information in the event of mandatory requirements by law, legal procedures, litigation, or government authorities.

(3) If we determine that you have violated laws and regulations or seriously violated the relevant agreement rules of this product, or to protect the personal and property safety of the users of this product and its affiliates or the public from infringement, we may disclose personal information about you in accordance with laws and regulations or the relevant agreement rules of this product, including relevant violations and measures taken against you by this product.

(4) When using the "Dialogue Sharing" function, if you choose to publicly post the dialogue content to a public network, there is a risk that the dialogue content may be obtained by third parties through technical means such as web crawlers. We have adopted industry-standard anti-crawler mechanisms (Robots protocol) and made commercially reasonable efforts to prevent third parties from scraping content shared publicly by users, but due to universal technical limitations in the industry, such risks cannot be completely eliminated. Therefore, we recommend that when using this function: (1) Avoid entering or sharing personal information of yourself or others, especially sensitive personal information; (2) If you indeed need to enter or share the personal information of others, please be sure to obtain their explicit authorization beforehand; (3) Before publicly posting relevant dialogues to a public network, please carefully identify whether there is information you do not want third parties to know.

5. Exceptions to Prior Authorization and Consent for Entrusting, Sharing, Transferring, and Publicly Disclosing Personal Information

In the following circumstances, prior authorization and consent are not required for entrusting, sharing, transferring, or publicly disclosing your personal information:

(1) Necessary for us to perform obligations stipulated by laws and regulations;

(2) Directly related to national security or national defense security;

(3) Necessary for maintaining public safety, public health, or significant public interests;

(4) Directly related to criminal investigation, prosecution, trial, and execution of judgment;

(5) Necessary to protect the life, property, or other significant legal rights of you or others but where it is difficult to obtain your consent;

(6) Personal information you disclose to the public on your own;

(7) Necessary for signing and performing a contract as requested by the subject of the personal information;

(8) Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels;

(9) Necessary for carrying out legal news reports;

(10) Other circumstances stipulated by laws and regulations.

Please be informed: According to law, the entrustment, sharing, transfer, and public disclosure of personal information that has been anonymized does not belong to the outward entrustment, sharing, transfer, and public disclosure of personal information. The storage and processing of such data will not require separate notification to you or your consent.

 

4. How We Protect Your Personal Information

1. Protection of User Privacy and Personal Information

We attach great importance to the protection of user privacy and personal information and will take reasonable measures to protect users' personal information. Except for circumstances stipulated by laws and regulations or otherwise agreed in this Policy, we will use various security technologies and procedures to establish a complete management system to protect your personal information from unauthorized access, use, or disclosure. Without user permission, we will not disclose or reveal user personal information to third parties. We will adopt professional encrypted storage and transmission methods for relevant information to ensure the security of user personal information.

2. Data Security Measures

(1) We have adopted industry-standard security protection measures, including establishing reasonable institutional specifications and security technologies to prevent unauthorized access, use, or modification of your personal information, and to avoid data damage or loss.

(2) We have taken all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the period necessary to achieve the purposes described in this Policy, unless an extension of the retention period is required or permitted by law.

(3) The Internet is not an absolutely secure environment, and communication methods such as email, instant messaging, and interactions with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use complex passwords to help us ensure the security of your account.

(4) After the unfortunate occurrence of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the cause of the security incident, the possible harm, the types of personal information involved, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, and measures you can take. We will promptly inform you of the incident details via email, SMS, phone call, or push notification. When it is difficult to inform the personal information subjects one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also proactively report the disposal of personal information security incidents according to the requirements of regulatory authorities. Please be informed that according to applicable laws and regulations, if the measures taken can effectively avoid harm caused by information leakage, tampering, or loss, we may choose not to inform you.

 

5. How We Store Your Personal Information

1. Location of Information Storage

(1) In accordance with laws and regulations, we store your personal information collected and generated during domestic operations within the territory of the People's Republic of China. Currently, we do not transfer the above information overseas. If we do transfer it overseas, we will strictly comply with relevant Chinese laws and regulatory policies, and follow relevant national regulations or seek your consent.

(2) In accordance with laws and regulations, we store your personal information collected and generated during overseas operations outside of China. Currently, we do not transfer the above information domestically. If we do transfer it domestically, we will strictly comply with relevant overseas laws and regulatory policies, and follow relevant national regulations or seek your consent.

2. Period of Information Storage

We only retain your personal information for the period necessary to provide QGLocalAI: for example:

If you cancel your account, proactively delete personal information, or exceed the necessary period, we will delete or anonymize your personal information, except in the following cases:

In the event that this Service stops operation, QGLocalAI will notify you by means including push notifications and announcements, and will delete your personal information stored in the server within the period required by laws and regulations.

 

6. How You Can Exercise Your Rights to Manage Your Personal Information

1. Your Personal Information Rights

You enjoy several rights in personal information processing activities, specifically including:

2. Ways to Exercise Your Rights

We guarantee your exercise of the aforementioned rights over your personal information and provide you with relevant operation paths. Specifically, you can refer to the following steps for relevant operations:

2.1 Access and Delete Your Personal Information

You can access and delete your personal information through the following ways:

a. Access/Correct/Supplement account information: Click on the avatar account area to perform operations.

Due to app version upgrades and function changes, the specific operation steps above may vary; the actual operation steps within the app shall prevail. In addition to the above, if you or other entitled subjects have any claims, requirements, or questions regarding the exercise of personal information rights granted by relevant laws and regulations, you can contact us through the contact details in Chapter 9 of this Policy. We will review the issues involved as soon as possible and respond within fifteen working days after verifying your user identity. QGLocalAI may refuse requests that are pointlessly repetitive, require excessive technical means (for example, requiring the development of new systems or fundamentally changing existing practices), bring risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes).

3. Personal Information Protection of the Deceased

We will continue to ensure the security of our user information. If a QGLocalAI user unfortunately passes away, their close relatives (hereinafter referred to as "close relatives of the deceased") may, for their own legitimate and fair interests, contact us through the methods listed in Chapter 9 of this Privacy Policy to exercise rights such as accessing, copying, correcting, and deleting the corresponding personal information of the deceased, provided it does not violate the arrangements made by the deceased during their lifetime and does not infringe upon the legitimate interests of others and the public. To fully protect the personal information rights and interests of the deceased, the close relatives of the deceased applying to exercise such rights need to complete identity verification procedures and promise and guarantee that their exercise of such rights does not violate the arrangements made by the deceased during their lifetime and that the purpose of exercising the rights is legal and legitimate.

4. Account Cancellation

You can contact us through the contact details in Chapter 9 of this Policy to cancel your account. Before you cancel your account, we will verify your personal identity, device information, etc. We will process your application in a timely manner after receiving it and respond to your request within fifteen working days or the time limit required by laws and regulations. You know and understand that the act of cancelling an account is irreversible. Once you cancel your account, we will delete relevant information about you or perform anonymization. You will not be able to recover personal information or other content related to the account, except as otherwise provided by laws, regulations, and relevant national standards.

 

7. How We Protect the Personal Information of Minors

1. QGLocalAI primarily serves adults, but we still attach great importance to the protection of minors' personal information.

2. If you are a minor under the age of 18, please read and agree to this Privacy Policy together under the supervision and guidance of your parents or other guardians before using this product and related services. We do not proactively collect the personal information of minors under the age of 14 (children). If we discover or receive feedback that we have automatically collected a child's personal information without prior guardian consent, we will try to delete the relevant information as soon as possible.

3. If you are the parent or guardian of a minor, and you have any questions, opinions, suggestions, complaints, or reporting needs regarding the matters described in this Policy, please provide feedback to us through the methods described in Chapter 9.

 

8. How We Update This Policy

1. To provide you with better service, QGLocalAI will update and change from time to time. We will revise this Policy in due course, and these revisions constitute part of this Policy.

2. After this Policy is updated, we will release the updated version on the QGLocalAI website and remind you to read the updated privacy policy again through new version announcements, etc., so that you can keep abreast of the latest version of this Policy. If you do not agree with this Policy, or have objections to the modified or updated content of this Policy, you may choose to stop using QGLocalAI or cancel your account. Your continued use of QGLocalAI products and services is deemed as your knowledge and agreement to our updates. However, please be informed that your behavior and activities before your account is cancelled or before you stop using this Service are still bound by this Policy.

3. We encourage you to review this Policy during your use of our products and/or services.

 

9. How to Contact Us

If you have any questions or suggestions regarding this Policy or your personal information during the use of QGLocalAI, please contact us through the following contact details:

Contact Email: qinggetech@163.com

We may need you to submit proof of identity, valid contact information, a written request, and relevant evidence. We will process your request after verifying your identity. We will review the issues involved as soon as possible and respond within fifteen working days after verifying your user identity.