AkeySpace Privacy Policy (V1.2)

Updated Date: Sep 11, 2025

Introduction

This Privacy Policy applies to the software and services provided by AkeySpace which is legally owned and developed by Hangzhou Ansiyuan Technology Co., Ltd. (hereinafter referred to as "AkeySpace" or "We").

We value the protection of our users' privacy. When using our services (hereinafter referred to as "this application"), we may need to collect and use your relevant information in accordance with this Privacy Policy. We hope to explain to you how we collect, use, store, and share this information, as well as the ways in which we provide you with access, update, control, and protect this information.

This Privacy Policy is related to the services you use. We hope you will read it carefully, especially the terms marked in bold, to ensure that you fully understand and agree before using it. If you have any questions, comments, or suggestions about this Privacy Policy, please contact us through the contact information provided at the end of this policy.

When necessary, please follow the guidance of this Privacy Policy to make the choices you deem appropriate. Regarding the relevant technical terms involved in this Privacy Policy, we try to present them concisely and provide links for further explanations to help you understand. In order to help you better understand how we collect, use, and protect your personal information, we have also provided AkeySpace Privacy Policy Abstract for your reference.

To use or continue to use our services, you are deemed to have agreed and authorized us to collect, use, store and share your relevant information in accordance with this Privacy Policy.

This Policy will help you understand the following contents:

I. The scope of application of the Privacy Policy

1. This Policy applies to all products and services we provide to you through the AkeySpace app, akeyim.com, akeyclub.com websites, as well as new forms that emerge with technological development.

Except for certain specific services, this Privacy Policy applies to all of our services. These specific services will be subject to specific privacy policies. Specific privacy policies for certain specific services will explain in more detail how we use your information in the services. The specific privacy policy for this service constitutes part of this Privacy Policy. If there is any inconsistency between the privacy policy of the relevant specific service and this Privacy Policy, the privacy policy of the specific service shall apply.

2. Please note that this Privacy Policy does not apply to the following situations:

II. How we collect and use information

To provide you with the basic functions of our products or services, you must authorize us to collect and use the necessary information that you actively provide when using our services and that is collected through automated means during your use of the functions or acceptance of the services. If you refuse, you will not be able to use our products or services normally. We will collect your information in the following ways:

1. Registration and Login

To help you register an account for this application so that you can use the software features of this application, we need to collect the following information from you:

You need to register an AkeySpace account with your mobile phone number, If you do not provide your mobile phone number for registration and login, we may not be able to provide you with services. You can bind your WeChat or AppleID as login credentials for your AkeySpace account. We can obtain the personal information you provide to fulfill the account management responsibility. The third-party SMS verification code service provider can only obtain the mobile phone number and cannot obtain any associated account information other than the mobile phone number.

2. Security certification

To comply with laws, regulations, and regulatory requirements, ensure the authenticity of user identities, prevent fraud, and safeguard the security of systems and services, when you use specific services or functions, we will collect your relevant information for identity verification, such as:

When applying to create a space, you can choose to create a space as an individual or as a business. You need to complete identity verification according to the prompts on the product page based on the type you choose and different scenarios.

Personal identity verification: You need to provide your true identity information (name, ID number, and facial recognition information, subject to the page prompts) to complete real-person verification. When conducting facial information real-person verification, we need to obtain your light sensor data to determine if the light source is sufficient.

Enterprise verification: You need to provide the basic information of your enterprise (business license, enterprise name, unified social credit code, name of legal representative, legal representative's ID number, photo of legal representative holding ID card, subject to the page prompts) to complete enterprise verification, and we will review this information.

If there is a scenario where it is necessary to determine your essential identity information according to law (such as protecting the rights and interests of minors, combating online fraud, identifying relevant subjects in administrative law enforcement or judicial litigation), you authorize us to obtain the necessary authentication information of your corresponding account for the above purposes.

3. Instant messaging

The instant messaging function provides you with a chat function with your friends, including private chat and group chat. You can send text, voice, and video messages in the chat interface. We will use this function to meet your real-time communication needs with your friends.

If you need to send voice messages, make voice or video calls, or send instantly captured photos or videos, you need to authorize AkeySpace to access the microphone or camera permissions of your device. During audio and video calls, AkeySpace needs to access your proximity sensor to implement automatic screen dimming. If you need to send photos or files, you need to authorize AkeySpace to access the album or file storage permissions of your device, otherwise, you will not be able to use it normally.

We will not collect your chat records (i.e., chat records, including text, voice, video, pictures, and various documents). However, when we have reasonable grounds to suspect that you are engaged in illegal criminal activities or infringing upon the legitimate rights and interests of others through this application (such as receiving reports and complaints from others and having been filed by public security, procuratorial, and judicial departments), we may prohibit you from using some or all functions of this application.

4. Device information and log information

(1) For the following reasons, we need to collect your device information and log information.

Device information and log information will be used for fault analysis, identity verification, registration and login, customer service, security protection, fraud monitoring, archiving, and backup purposes to ensure the security of the products and services we provide to you; help us design new services and improve our existing services; allow us to better understand how you access and use our services; used for software authentication or managing software upgrades. Device information and log information are the basis for us to provide services. If you refuse to provide them, you will not be able to use this application.

Usage information of this application: the version number of this application you are using, the overall operation of the software, usage, and frequency. This type of data is confidential.

Log information related to network security incidents. This type of information is information required by law to be collected. If you do not want this information to be collected by us, you will not be able to use this application.

(2) Device information refers to the device information used when you use this application.

We will collect your device brand, device model, screen resolution, system version, IP address, Wi-Fi MAC address, and device unique identification information including Andriod ID. The specific usage is as follows:

Use Android ID to identify the uniqueness of the device, prevent user accounts from being stolen by other devices, enhance user security, and protect user privacy;

To provide communication functions, a network is required, and the MAC address will be automatically obtained when using the network;

When the App connects to the server, the server will automatically obtain the IP address. Since IP addresses are usually allocated based on regions, they can be used to distinguish the approximate login location source of users. By obtaining IP addresses, servers can prevent illegal elements from logging in through risky IP addresses, enhance software security, and ensure the security of user information. At the same time, the server will encrypt and save the IP addresses, without the risk of leakage of user personal information.

5. Clipboard Content

To enhance user experience or enable specific features (e.g., quick pasting, content sharing), we may access your clipboard content in the following scenarios:

When you actively use the paste function within the app (e.g., pasting text, links, or images);

When the app detects clipboard content related to your current operation (e.g., verification codes, shared links) and automatically fills it with your explicit consent.

6. Third-party service support

During your utilization of AkeySpace services, we engage third-party service providers to deliver functionalities including : push notification systems, geolocation services (encompassing current position display, location sharing, and location search capabilities) , audio and video call service , behavioral CAPTCHA , facial recognition authentication, and in-app web browsing functionality. The specific categories of personal information collected, methodologies employed, and purposes for processing are comprehensively detailed in the Third-Party Shared List.

6.1. Location Services

Product Name: AutoNavi/Amap

Operator: Beijing AutoNavi Tuqiang Technology Co., Ltd.

Personal information collected: location information, device identification information (IMEI, IDFA, IDFV, Android ID, MEID, MAC address, OAID, IMSI, ICCID, hardware serial number), current application information (application name, application version number), device parameters and system information (system properties, device model, operating system, operator information).

Purpose: Help users view current location, send location, and search location.

Use scenario: Used when users use positioning-related functions.

Collection method: SDK collection (if you are an Android operating system user)/API interface acquisition (if you are an iOS operating system user)

Privacy Policy: Click to view

 

Product name: Google Maps

Operator: Google LLC

Personal information collected: location information (precise or approximate location information of the device), device information (including device model, operating system version, screen resolution, unique device identifier), usage data (map zoom, pan operation, search location keywords, set route preferences, map browsing time, etc., used to analyze user usage habits and optimize services), network information (device IP address, network connection type).

Purpose : Help AkeySpace users in Google Play view current location, send location, and search location.

Use scenario: Used when users use positioning-related functions.

Collection method: SDK collection

Privacy policy: Click to view

 

6.2 Document browsing

Product name: Tencent Browsing Service

Operator: Shenzhen Tencent Computer Systems Co., Ltd.

Personal information collected: device information (operating system version, CPU type, screen width and height, screen orientation, screen pixels), application information (host application package name, version number).

Purpose : Browsing common file types such as PDFs, PPTs, XLSs, and TXTs.

Usage scenario: Used when users browse files.

Collection method: SDK collection

Privacy policy: Click to view

 

6.3 Message Push

Product name: Ali Mobile Push SDK

Operator: Alibaba Cloud Computing Co., Ltd.

Personal information collected: network information, operating system, device model, Android system device identification, operator information.

Purpose : Push information to users; obtain crash logs and analysis.

Usage scenario: Used to identify push devices and implement push functions to a single device; used for reporting and analysis of crash logs.

Collection method: SDK collection

Privacy policy: Click to view

 

Product name: Huawei Push SDK

Operator: Huawei Terminal Co., Ltd.

Personal information collected: device information (SSID, BSSID, IMEI, Android_ID), running application list information, operating system version, current network type, message sending results, notification bar status (such as notification bar permissions, user click behavior), lock screen status (such as whether the screen is locked, whether lock screen notifications are allowed).

Purpose : Push information to Huawei devices.

Use scenario: Remind users to check when new messages arrive on the device.

Collection method: SDK local collection

Privacy policy: Click to view

 

Product name: VIVO push SDK

Operator: Vivo Mobile Communications Co., Ltd.

Personal information collected: Push SDK version number, device model, operating system version, current network type, message sending result, notification bar status (such as notification bar permissions, user click behavior), lock screen status (such as whether the screen is locked, whether lock screen notifications are allowed).

Purpose : Push information to VIVO devices.

Use scenario: Remind users to check when new messages arrive on the device.

Collection method: SDK local collection

Privacy policy: Click to view

 

Product name: OPPO Push SDK

Operator: Guangdong HuanTai Technology Co., Ltd.

Personal information collected: device identification code, device model, operating system version, application usage information (application ID, APP package name and version number, running status, installation status), push SDK version number, network related information, message sending results, notification bar status (such as notification bar permissions, notification switch status), user behavior data (notification click behavior, notification deletion behavior), lock screen status (such as whether the screen is locked, whether lock screen notifications are allowed).

Purpose : Push information to OPPO devices.

Use scenario: Remind users to check when new messages arrive on the device.

Collection method: SDK local collection

Privacy policy: Click to view

 

Product name: Xiaomi Push SDK

Operator: Beijing Xiaomi Mobile Software Co., Ltd.

Personal information collected: device model, operating system version, Xiaomi Push SDK version, WiFi information, device information (BSSID, SSID), list of running applications.

Purpose : Push information to Xiaomi devices.

Usage scenario: Remind users to check when new messages arrive on the device.

Collection method: SDK local collection

Privacy policy: Click to view

 

Product name: Meizu Push SDK

Operator: Zhuhai Meizu Communication Equipment Co., Ltd.

Personal information collected: device identifier (PUSH_ID generated by related identifiers and not associated with users), device information (model, system, version type, network status, application information, system language).

Purpose : Push information to Meizu devices.

Usage scenario: Remind users to check when new messages arrive on the device.

Collection method: SDK local collection

Privacy policy: Click to view


Product name: Google Push SDK/Firebase Cloud Messaging (FCM)

Operator: Google LLC

Personal information collected: device model, operating system version, current network type, message sending results, notification bar status (such as notification bar permissions, user click behavior).

Purpose : Push information to AkeySpace users in Google Play.

Use scenario: Remind users to check when new messages arrive on the device.

Collection method: SDK local collection

Privacy policy: Click to view

 

6.4 Login Service

Product name: WeChat login SDK

Operator: Shenzhen Tencent Computer Systems Co., Ltd.

Personal information collected: basic account information, device information (device identifier, device model, operating system and version), network information (IP address, network type), information provided or authorized by the user (avatar, nickname, gender, region).

Purpose : Support user WeChat authorization login.

Use scenario: Used when the user uses WeChat account to authorize login.

Collection method: SDK collection

Privacy policy: Click to view

 

6.5 Verification Service

Product name: NetEase Yidun Behavioral Verification Code SDK

Operator: Hangzhou NetEase Zhiqi Technology Co., Ltd.

Personal information collected: browsing content information, device identifiers IMEI, IDFV, device information, user behavior and network information.

Purpose : When users verify their identity through mobile phone verification codes, use NetEase Yidun behavioral verification code to prevent collision.

Use scenario: When users verify their identity by accepting mobile phone verification codes.

Collection method: SDK local collection

Privacy policy: Click to view

 

Product name: Tencent Cloud Tianyu Captcha JS SDK

Operator: Tencent Cloud Computing (Beijing) Co., Ltd.

Personal information collected: Types of Personal Information Involved: System settings, system attributes, user operation data (only involving mouse movements related to captcha operation events such as "clicks," slides, and interface switches, as well as orientation sensor data), operating system, dynamic JS data (e.g., loading initialization and verification time, detailed settings and version information), IP address.

Purpose : When users verify their identity through mobile phone verification codes, use Tencent next-generation behavioral captcha (Captcha) to prevent collision.

Use scenario: When users verify their identity by accepting mobile phone verification codes.

Collection method: SDK local collection

Privacy policy: Click to view

 

Product name: Baidu Real Person Authentication

Operator: Beijing Baidu Netcom Technology Co., Ltd.

Personal information collected: face photos and video information, device information, browser information, network information and operation record information.

Purpose : To ensure the authenticity of user identity, prevent fraud and ensure the security of systems and services.

Collection method: Provided by users

Privacy policy: Click to view

 

6.6 Crash Capture

Product Name: Bugly SDK

Operator: Shenzhen Tencent Computer Systems Co., Ltd.

Personal information collected: device model, operating system version, remaining memory space, network type, Wi-Fi status, the name and PID of the process currently running the application.

Purpose : problem location and analysis of crash logs.

Use scenario: Crash capture.

Collection method: SDK collection

Privacy policy: Click to view

 

6.7 Audio - Visual Communication Services

Product name: Real-time audio and video TRTC SDK

Operator: Shenzhen Tencent Computer Systems Co., Ltd.

Personal information collected: Wi-Fi status, system properties, device model, operating system, IP address, camera, recording, sensor information, PCI_ID of graphics card hardware device, CPU information, GPU information.

Purpose and functional scenarios: Provide real-time audio and video communication services

Collection method: SDK collection.

Privacy policy: Click to view

7. Timing of Information Acquisition

All information acquisition will only occur after the user starts the AkeySpace App, browses the user service agreement and privacy policy, and clicks the "Agree" button, and will only be acquired once each time the application is started.

The collected device information will not be stored in plain text but encrypted before being sent to the server for storage, eliminating the risk of user personal information leakage. The frequency of transmission is once per application startup.

Once again, we will minimize our reliance on the above-described device information and device permissions during the service process.

We ask for your understanding that the collection of device information is a prerequisite and basis for our service provision. As long as you install and open this application, we will collect your device information.

Individual device information cannot identify or determine the identity of a specific natural person, and we will de-identify, anonymize, and encrypt this information.

 

III. Circumstances of obtaining information in the "background state"

1. The main program of this application will not collect user personal information without user permission in silent and background states. The real-time communication function of this application App itself does not require additional user information.

2. When this application enters a silent or background state, if the network connection is restricted due to the phone system's energy saving or sleep, the App will not repeatedly attempt to access the network to maximize the power saving of the phone and improve the user experience.

 

IV. How you access and control your personal information

1. Access, correction, and deletion of personal information

We will take all possible appropriate technical means to ensure that you can access, correct, and delete your registered information or other personal information provided when using our services. You can access, correct, and delete your personal information by opening the edit icon on the personal settings page of the client software of this application. When accessing, correcting, and deleting the aforementioned information, we may ask you to verify your identity to ensure account security. If you want to obtain a copy of your personal information or transfer your personal information, you can contact us by email.

2. Change the scope of authorization

You can revoke our authorization by the permission request prompt window when this application is first run on your device or by modifying the permission settings corresponding to this application in the device settings. However, your denial of authorization may result in the unavailability of certain functions, such as the inability to take pictures and send pictures in real-time during chat if the camera permission is not enabled.

Among them, for the storage permission (photos, media, content, and files), it can be used to restore historical accounts, making it easier for users to retrieve and log in. If you are sensitive to this permission, you can deny authorization and log in directly by entering your account.

3. Account cancellation

You can complete the self-initiated cancellation application through [Settings]/[Account Settings] - [Accounts and Security] - [Delete your account]. If the self-cancellation fails due to server version issues, you can contact us by email.

After you cancel your account, we will stop providing you with products or services and delete or anonymize your personal information as required by law.

 

V. Partners involved in the data processing process and the transfer and disclosure of personal information

1. Basic Principles of Cooperation Handling

(1) Legal Principle: In the process of cooperating with partners, if data usage activities are involved, they must have a legal purpose and comply with the legal basis for legitimacy. If the partner's use of information no longer complies with the legal principle, they should not use your personal information anymore, or use it after obtaining the corresponding legal basis.

(2) Proper and Minimum Necessary Principle: Data usage must have a proper purpose and should be limited to what is necessary to achieve the purpose.

(3) Safe and Prudent Principle: We will carefully evaluate the purpose of the partner's use of data, comprehensively assess the partner's security and protection capabilities, and require them to follow the legal agreement of cooperation. We will conduct strict security monitoring of the software development kit (SDK) used by the partner to obtain information to ensure data security.

2. Scope of Partners

We may share your personal information with third-party service providers, contractors, and agents to provide you with our services and achieve the purposes described in the "How We Collect and Use Information" section, fulfill our obligations and exercise our rights under this Privacy Policy, and understand, maintain, and improve our services.

If we share your personal information with any of the above third parties, we will strive to ensure that the third party complies with this Privacy Policy and other appropriate confidentiality and security measures when using your personal information. For details, please refer to the Third-Party Shared List and the third-party privacy policy.

3. Information Transfer

If we need to transfer personal information due to reasons such as merger, division, dissolution, or declaration of bankruptcy, we will notify you of the name and contact information of the recipient. The recipient will continue to comply with this Policy and other legal obligations. If the recipient changes the original processing purpose or method, the recipient shall obtain your consent again.

4.Information Disclosure

We will not disclose your personal information publicly unless required by law, regulations, or upon your proactive choice or otherwise obtaining your separate consent. When we disclose your personal information, we will use industry-standard security protection measures.

5. Circumstances where your consent is waived by law

Please understand that in the following circumstances, we do not need to obtain your authorization and consent to provide or disclose your personal information to partners or third parties:

(1) Necessary for the conclusion or performance of a contract at your request;

(2) Necessary for the performance of legal duties or obligations;

(3) Directly related to social security;

(4) Necessary to protect the life, health, and property safety of natural persons in emergency situations or emergencies;

(5) Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;

(6) Processing personal information within a reasonable scope for the implementation of news reporting and public opinion supervision in the public interest;

(7) Other circumstances stipulated by laws, administrative regulations.

6. Complaints submitted by you voluntarily

If you encounter any violation behavior while using this product, you can report it at any time. In this case, we may disclose the complaint information you submit at the request of relevant judicial authorities in accordance with administrative and judicial orders and laws and regulations.

 

VI. Information security

1. We will only retain your personal information for the period necessary for the purposes described in this Privacy Policy and the time limit required by laws and regulations. When the storage period of your personal information expires or our product or service stops operating, we will delete your personal information or anonymize it, except as otherwise provided by law.

2. We use various security technologies and procedures to prevent the loss, improper use, unauthorized access, or disclosure of information. In some services, we will use encryption technology to protect the personal information you provide. However, please understand that due to technological limitations and the possibility of various malicious means, in the Internet industry, despite our best efforts to enhance security measures, it is impossible to always guarantee 100% information security. You need to know that the system and communication network you use to access our services may have problems due to factors outside our control.

3. The personal information we collect will be stored in China.

 

VII. Prevention of account security risks

When using AkeySpace for communication and collaboration, please properly protect your personal information and only provide it to others when necessary to avoid information theft or even telecommunication network fraud.

Please consider carefully the important personal privacy you upload, publish, and exchange through our services. In some cases, you can control the scope of users who have access to the information you share through the privacy settings of some of our services. If you request to delete your relevant information from our services, please operate through the method provided in the special service terms.

 

VIII. How we process children's personal information

1. AkeySpace is a business tool application, and its functions and content are not suitable for children. Therefore, if you are a child under the age of 14, please stop using AkeySpace immediately and cancel the corresponding account.

2. We will strictly abide by relevant laws and regulations, will not actively seek to collect children's personal information, and have not designed any functions or services for children. If you think we may have collected children's personal information or found that children are using AkeySpace, please contact us in time, and we will respond quickly and handle it properly.

 

IX. Policy updates

We may update and revise the terms of this Privacy Policy from time to time, and the revised terms will form part of this Privacy Policy. If the revision results in a substantial reduction of your rights under this Privacy Policy, we will notify you by prominently displaying a prompt on the homepage or sending you an email or otherwise before the revision takes effect. In such a case, if you continue to use our services, it means that you agree to be bound by the revised Privacy Policy.

 

X. Contact us

If you have any questions, comments, or suggestions about the content of this Policy, including complaints or contacting the Personal Information Protection Responsibility Team, you can contact us through the "Feedback" in AkeySpace App and our official website https://akeyim.com. You can also contact us in the following ways, and we will respond to your request within 15 days:

1. Company name: Hangzhou Ansiyuan Technology Co., Ltd.

2. Address: Room 201, 2nd Floor, No. 108 Quanfengyuan Residential Area, Xianlin Subdistrict, Yuhang District, Hangzhou City

3. Contact information for the Personal Information Protection Responsibility Team:

If any dispute or controversy arises between you and AkeySpace or the server operator regarding this Policy, you shall first resolve it through friendly negotiation; if the negotiation fails, you agree to submit the dispute or controversy to the Hangzhou Arbitration Commission.

(ENDS)