AI Image
AI Video
Photo Editor
Resources
InspirationPricing

Privacy Policy

Welcome to "insMind" ("this Product and/or Service")! "Insmind Pte. Ltd." (hereinafter referred to as "we" or "us") fully recognizes the importance of personal information to users (hereinafter referred to as "you") and will comply with the requirements of Singaporean laws and regulations to take adequate and appropriate measures to protect your personal information and privacy. This insMind Privacy Policy (hereinafter referred to as "this Policy") aims to help you understand how we collect, use, share, store, and protect your personal information, the terms related to your (potential) rights and interests, and the handling of sensitive personal information. Please review the complete version below.

 

[Special Note] Before using this Product and/or Service, please carefully read and fully understand this Policy (especially the content in bold or underlined) and confirm our rules for handling your personal information. If you understand and agree to accept this Policy, you may click "Agree" to receive our services.

1. Scope of Application

1.1 This Policy applies to:
(a) Users who use the services provided by "insMind";
(b) The website or application form of "insMind".

 

1.2 Please note that this Policy does not apply to the following situations:
(a) Services provided to you by third-party application systems integrated through page embedding, linking, redirecting, etc., do not apply to this Policy. We recommend that you review the information protection statements of third-party application systems to understand how they handle your information. You shall bear the consequences arising from the personal information you provide to third-party application systems or actively share or disclose to others;
(b) Situations where we process various types of personal information on behalf of enterprises when providing services do not apply to this Policy.

2. Types of Data Collected

We will follow the principles of "reasonableness, relevance, and necessity" to collect information with your consent and will not collect information prohibited by laws and regulations. At the same time, in business involving personal information, we have carefully handled the type, purpose, and method of personal information, conducted necessity assessments, and made every effort to prevent the collection of unnecessary information from the source; for information that must be collected unavoidably, we will clearly inform you of the specific purpose of collecting necessary information, allowing you to independently decide whether to agree to the processing. You have the right to refuse to provide information necessary for realizing business functions or required by laws and regulations, but this will not affect your use of other functions or services. As part of our anti-corruption compliance program and to fulfill legal obligations, we will use the collected information based on your valid consent when necessary.

 

During your use of this Product and/or Service, we will obtain your personal information through the following methods:
(a) Information you agree to provide directly: We may collect and store the information you provide to us when using the Product and/or Service, including information provided when filling in information online on our pages, applying for products and/or services, or contacting us, as well as transaction and activity information generated when using our services.
(b) Information we collect: During the use of this Product/Service, we will collect information sent to us by your access devices such as computers and mobile phones.
(c) Information obtained from affiliates, partners, etc.: To jointly provide you with products and/or services, improve product quality, service quality, or ensure product and service security, we may, in accordance with legal provisions or based on your valid authorization, receive your personal information and other information from affiliated companies, partners, and other trusted third-party suppliers. We will require the provider of personal information to explain the source of personal information in advance and confirm the legality of the source and the scope of authorized consent. If the processing of personal information required for business exceeds the scope of authorized consent already obtained, we will, within a reasonable period after obtaining the personal information or before processing the personal information, separately obtain your explicit consent, or obtain your explicit consent through the provider of personal information.

 

If we must use your personal information beyond the scope of your consent, we will inform you again and obtain your explicit consent before using your personal information. Please note that the types of personal information we collect will change with the content of products and/or services, and shall be subject to the actual products and/or services provided.

2.1 Business Scenarios

Registration and Login

When you register for the "insMind" Product and/or Service, depending on the registration method you choose, we will collect relevant information as needed to help you complete the registration of your "insMind" account, enabling you to synchronize your data when logging in to insMind on different devices.

 

If you register and log in to "insMind" using a mobile phone number or email, we will collect your email address, and you need to provide the verification code we send you for verification. We will not use your email address except for account registration and verification login.

 

If you log in to "insMind" using a third-party account, you need to authorize "insMind" to read and share your online identity information posted on the third-party platform in compliance with relevant laws and regulations. At the same time, the nickname and avatar provided by the third-party account will become your default nickname and avatar. After registering an account through a mobile phone number or third-party platform, you can also edit and improve your personal information as needed.

Editing Personal Information

You can choose to fill in information such as your gender, nickname, avatar, birthday, location, and personal signature, which will help us provide you with a more personalized experience. If you do not fill in this information, it will not affect your use of other functions of our products and/or services. When you upload/change your avatar, we will request your camera and storage/photo permissions and collect the image information you upload/replace. If the image you upload involves your sensitive personal information, it may have a significant impact on your privacy and interests. Please protect your privacy and avoid uploading images containing privacy factors or sensitive personal information. We will strictly protect the images you upload in accordance with the law.

2.2 Operation and Security Assurance

(a) To ensure the security of software services and your account, and the quality and efficiency of service operation, we will collect your hardware model, operating system version number, device name, device configuration, International Mobile Equipment Identity (IMEI), unique device identifier, network device hardware address (MAC address), IP address, WLAN access point, Bluetooth, software version number, network access method, type, status, network quality data, operations, usage, and service logs. We may associate your device information or phone number with your account under this Product and/or Service.
(b) To prevent malicious programs, ensure service security, and improve browsing experience, we will collect information about installed applications or running processes, overall operation, usage, and frequency of applications, application crash conditions, overall installation and usage status, performance data, and application sources.
(c) To analyze statistical indicators such as application 新增,activation, retention, and performance, we may call your clipboard, user ID, device ID, and precise location information to conduct attribute analysis of relevant statistical information.
(d) We may use your account information, user ID, device information, service log information, and information legally shared by your authorized affiliates and partners to judge account security, application activation activities and activity levels, perform identity verification, and detect and prevent security incidents.

2.3 User Feedback Service

(a) Customer Service and Problem Handling: To facilitate contacting you, help you solve problems, or record solutions and results of related problems, we may save your communication/call records and related content with us (including account information, feedback information, order information, other information you provide to prove relevant facts, or contact information you leave). If you consult, complain, or make suggestions regarding a specific order, we will use your account information and order information.
(b) When you complain about others or are complained about by others, to protect the legitimate rights and interests of you and others, we have to submit your account/identity information, contact information, and complaint-related content to relevant legal authorities to promptly resolve complaint disputes.
(c) Questionnaires: To complete your order and improve service quality, we may also use other information you provide when contacting customer service and questionnaire responses you send us when participating in questionnaires; if you do not agree, you should refuse to participate in the questionnaire.

2.4 Device Permission Description

2.4.1 To ensure the smooth completion of the services provided to you, we need you to authorize relevant system permissions. Sensitive permissions are not enabled by default. Only after you explicitly agree to authorize us will we ask you whether to enable device permissions and explain the purpose of applying for permissions when calling for the first time. You can turn off corresponding system permissions through system "Settings" at any time, and we will no longer collect and use relevant personal information based on corresponding permissions. The permissions we apply for will be consistent with the service functions provided. If the business functions we provide are adjusted, the device permissions we apply for will also be adjusted accordingly.
2.4.2 Please note that once you turn off any permission, it means you cancel the corresponding authorization, which will prevent us from providing corresponding business function services and directly affect your user experience. However, your decision to turn off permissions will not affect the processing of personal information based on your previous authorization. We hereby guarantee that if you do not choose one of the above functions, it will not affect your normal use of other functions we provide for you, unless it provides basic support for other functions (such as account login, etc.).

2.5 We May Send You Messages

You acknowledge and agree that for the contact information you agree to provide during the use of the service, we may send multiple notifications to one or more of them during operation for purposes such as user message notification, identity verification, security verification, and user experience research. In addition, we may provide you with information about related services, functions, or activities, but please rest assured that if you do not wish to receive such information, you can unsubscribe through the method provided in the message or contact us directly. When necessary (for example, when a service is suspended due to system maintenance), we may issue service-related announcements to you.

2.6 Processing of Facial Data

Please note that when you actively upload photos containing facial information, our application may temporarily analyze the above images to achieve visual effects such as beauty filters, background removal, or cartoon filters. We will not perform facial recognition or identity verification, nor will we collect any biometric identification information. The analysis is performed in the device memory or secure server. After processing, the storage period of the images you generate varies depending on the product terminal you use and your login status, as follows:

 

Web Terminal:
(a) Logged-in status: Your generated content will be stored in our cloud server continuously for your convenient access to your generated content at any time, but you can delete such images at any time;
(b) Not logged-in status: Your generated content will be stored in our cloud server for 7 days and automatically deleted after expiration.

 

App Terminal:
(a) After you finish editing photos containing facial information, our cloud server will immediately delete the content you uploaded.

 

Please note that under no circumstances will we save your facial information or actively collect your facial data.

2.7 Changes in the Purpose of Collecting and Using Personal Information

Please understand that with business development, the relevant product functions and services we provide may be adjusted and changed. In principle, when new functions or services are related to the functions or services we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. In cases where there is no direct or reasonable relationship with the original processing purpose, if we need to collect and use your personal information, we will inform you through reasonable methods such as page prompts, interactive processes, and agreement confirmation in accordance with the requirements of laws, regulations, and national standards, and obtain your consent.

2.8 Exceptions to Authorization and Consent

Please understand that in the following situations, according to regulations and relevant laws and regulations, we process your personal information without your authorization and consent:

 

· Related to our fulfillment of obligations stipulated by laws and regulations;

· Directly related to national security and national defense security;

· Directly related to public security, public health, and major public interests;

· Directly related to criminal investigation, prosecution, trial, and execution of judgments;

· Necessary to protect your or others' major legitimate rights and interests such as life and property but difficult to obtain your authorization and consent;

· Personal information you have publicly disclosed to the public;

· Necessary for signing and performing contracts at the request of the subject of personal information;

· Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure, etc.;

· Necessary to maintain the safe and stable operation of software and related services, such as discovering and handling faults in software and related services;

· Necessary for legal news reporting;

· Necessary for academic research institutions to carry out statistical or academic research for public interests, and when providing academic research or descriptive results to the public, de-identify personal information contained in the results;

· Other situations stipulated by laws and regulations.

3. Use of Cookies

3.1 When you use our products and/or services, we may use Cookies to collect some of your personal information, including your website browsing habits, browsing information, and login information, to provide you with a better service experience. When you use products and/or services, we may use related technologies to send one or more Cookies or anonymous identifiers to your device to collect and store information when you access and use the services. We promise that Cookies will not be used for any other purposes except as described in this Privacy Policy. We use Cookies mainly to achieve the following functions or services:
(a) Ensure the safe and efficient operation of products and services: We may set Cookies or anonymous identifiers for authentication and security assurance to confirm whether you can log in to the service safely or whether you encounter theft, fraud, or other illegal acts. These technologies also help us improve service efficiency and increase login and response speed;
(b) Help you obtain a more convenient access experience: Using such technologies can help you save steps and processes of repeatedly filling in personal information and entering search content (for example: recording searches, form filling).

 

3.2 If your browser allows, you can manage Cookies through browser settings (for example, perform corresponding data clearing operations in browser setting functions).

4. Entrusted Processing, Sharing, Transfer, and Public Disclosure of Personal Information

4.1 Entrusted Processing

Each functional module of the Product and/or Service is independently provided by us, and the personal information required for related functions is also processed by us. If third-party partners need to be introduced for the development of new functions and modules, we will conduct strict qualification reviews, sign strict confidentiality agreements, require them to process personal information in accordance with our requirements, this Policy, and any other relevant confidentiality and security measures, and inform you and obtain your consent before third-party partners process your personal information.

4.2 Sharing

4.2.1 For external processing, we may provide your personal information to third-party partners, allowing them to process the above information for us in accordance with our instructions, privacy policies, and other relevant confidentiality and security measures to provide you with our services and achieve the purposes of collecting and using your personal information described in this Policy. We will only share your personal information for legal, necessary, and specific purposes, and will only share personal information related to the services provided by third parties. Unless otherwise authorized by you or stipulated by laws and regulations, our partners have no right to use the shared personal information for any other purposes. For companies, organizations, and individuals with whom we share personal information, we will sign strict agreements with them, requiring them to process the shared personal information in accordance with our instructions, this Policy, and any other relevant confidentiality and security measures.
4.2.2 Currently, our authorized partners mainly include the following types (subject to actual content):
(a) Advertising and analytics service partners. We entrust these partners to process information related to advertising coverage and effectiveness, but we will not provide your personal identity information, or we will de-identify such information so that it cannot identify you personally. Such partners may combine the above information with other data they legally obtain to perform the advertising services or decision-making suggestions entrusted by us.
(b) Suppliers, service providers, and other partners. When third-party hardware and software/system products or services are combined with our products or services to provide you with services, with your authorization, we may provide your necessary personal information to third-party suppliers, service providers, and other partners to enable them to provide us with infrastructure technical services, data analysis services, security services, customer services, etc., thereby improving your user experience.
(c) Affiliates or users of the same account system. We and our affiliates or users of the same account system have highly consistent data security protection measures and management levels. To improve the security and convenience of your use of products and obtain a consistent service experience, we will share your personal information among affiliates or users of the same account system in accordance with legal requirements.

4.3 Transfer

4.3.1 We will not transfer your personal information to any company, organization, or individual except in the following cases:
(a) Obtain your explicit consent or authorization in advance;
(b) In accordance with applicable laws and regulations, requirements of legal procedures, mandatory administrative or judicial requirements;
(c) In the case of merger, acquisition, asset transfer, or similar transactions or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this Privacy Policy; otherwise, we will require the company or organization to re-request authorization from you.
4.3.2 In the event of the aforesaid changes, we will continue to protect or require the successor of personal information to continue to protect your personal information in accordance with the requirements of laws and regulations and not lower than the security standards required by this Policy; otherwise, we will require the successor to obtain your authorization and consent.

4.4 Public Disclosure

Unless we must comply with laws and regulations or have obtained your consent, we will not publicly disclose the personal information we collect. When we disclose your personal information, we will de-identify your information through content replacement, removal of identifiers, or anonymization to protect your information security. When we encounter any applicable legal requirements or must disclose personal information in response to legal procedures, we will inform you of the purpose of public disclosure, the type of information, and the sensitive personal information that may be involved, and disclose in accordance with the principle of minimum necessity stipulated by relevant laws and regulations.

4.5 Exceptional Circumstances

Please understand that in the following circumstances, in accordance with relevant laws, regulations, and national standards, we do not need to obtain your prior authorization and consent to share, transfer, or publicly disclose your personal information:
(a) Related to our fulfillment of obligations stipulated by laws and regulations and requirements of government authorities, or to meet the needs of litigation and dispute resolution;
(b) Directly related to national security and national defense security;
(c) Directly related to public security, public health, and major public interests;
(d) Directly related to criminal investigation, prosecution, trial, and execution of judgments;
(e) To protect your or others' life, property, or other major legitimate rights and interests, but it is difficult to obtain your consent in advance;
(f) Personal information you have publicly disclosed to the public;
(g) Collected from legally publicly disclosed information, such as legal news reports, government information disclosure, etc.

5. Storage and Protection of Personal Information

5.1 Storage Period

5.1.1 We will only retain your personal information for the shortest time necessary to achieve the purpose of processing your personal information, except in cases where you exercise the right to delete, cancel your account, or as otherwise stipulated by laws and regulations. When the above storage period expires and the law does not require us to continue processing your specific personal information, we will delete your personal information or anonymize it in accordance with applicable legal requirements (anonymized information can no longer be identified as personal information). We take appropriate measures to ensure that we process and retain your information:
(a) The retention period of personal information shall be the shortest time necessary to achieve the purpose;
(b) Comply with the requirements of laws, contracts, or our legal obligations;
(c) Retain information only for the time necessary for the purpose of collecting and processing information, but may be extended according to contractual needs and applicable laws, with appropriate security safeguards;
(d) Temporary storage: When you use our products through the web terminal without logging in to your account, the above information will be temporarily stored in our cloud server for 7 days.

 

5.1.2 If we stop operating this software, we will immediately stop collecting users' personal information and inform users of the stop of operation through individual notifications or announcements. After stopping operation, we will delete users' personal information.

 

5.1.3 Our cloud servers are provided by Alibaba Cloud, and the server address is located in Virginia, USA.

5.2 Security and Protection Measures

5.2.1 In accordance with the requirements of relevant laws and regulations, we have appointed a personal information protection officer and a personal information protection working organization. We have also established a data security management system centered on data and surrounding the data life cycle, improving the security of the entire system from the aspects of organizational construction, system design, personnel management, and product technology. We adopt industry-standard security protection measures to protect your personal information from unauthorized access, public disclosure, use, modification, damage, or data loss. We will take all reasonably feasible measures to protect your personal information. For example, we use encryption technology to ensure confidentiality, use protection mechanisms to prevent malicious attacks, deploy access control mechanisms to ensure that only authorized personnel can access personal information, and conduct security and privacy training to enhance employees' awareness of the importance of protecting personal information. We attach great importance to the security of your personal information and will make every effort to ensure the security of the information you submit, but please understand that the Internet environment is not absolutely safe, and no security measure is perfect.
5.2.2 Specifically, to protect your personal information, we have taken the following measures:
(a) We take reasonably feasible measures to ensure the minimization of personal information collection and do not collect personal information unrelated to the processing purpose;
(b) We will use encryption technology to ensure the security and confidentiality of information during storage or transmission. We will use trusted protection mechanisms to prevent malicious attacks on servers storing information;
(c) We will deploy access control mechanisms to ensure that only authorized personnel can access personal information, control the number of authorized personnel according to business needs and personnel levels through hierarchical management or approval mechanisms, and manage accessible information;
(d) We will select business partners and service providers and implement personal information protection requirements in contracts, audits, evaluations, and other activities between both parties;
(e) We will hold security and privacy protection training courses, tests, and publicity activities to strengthen employees' awareness of the importance of protecting personal information.
5.2.3 Although we are responsible for protecting your personal information, you are also responsible for properly keeping your login information. If you find that your personal information has been leaked, please contact us immediately through the contact information provided in this Policy so that we can take appropriate measures.

5.3 Handling Measures for Security Incidents

5.3.1 We have adopted industry-standard security protection measures, including but not limited to:
(a) We will take feasible technical measures such as encryption, de-identification, and anonymization to ensure the security and confidentiality of information during storage or transmission.
(b) We will strictly restrict information access permissions, adopt hierarchical management or approval mechanisms, minimize the contact scope of necessary personnel, and control accessible information.
(c) We will establish an information security response team and a corresponding system management system, and regularly confirm the protection status of personal information to identify risks.
5.3.2 In case of personal information leakage or other security incidents, we will promptly notify you or announce to you in accordance with the requirements of laws and regulations and take timely remedial measures. We will also actively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

5.4 Notification When Products or Services Stop Operating

When our products or services stop operating, we will notify you in the form of push notifications, announcements, etc., and delete your personal information or anonymize it within a reasonable period, except as otherwise stipulated by laws and regulations.

6. Rights of Personal Information Subjects

We attach great importance to the management of your personal information and strive to protect your rights to access, copy, correct, supplement, delete, withdraw consent and authorization, cancel accounts, complain, and set privacy functions, enabling you to protect your privacy and information security. The management paths we provide in different versions or operating systems may vary, subject to the actual version. If the following operation settings cannot realize or cover your rights to access, copy, delete, correct, withdraw consent to the use of personal information, cancel accounts, complain, or report, you can also contact us through the contact information in this Policy. After verifying your identity, we will provide you with corresponding services, unless otherwise stipulated by laws and regulations or this Policy.

6.1 Copy of Personal Information

6.1.1 You can query your personal information through the paths listed in "Query and Access Personal Information". If you need a copy of your personal information, you can also apply to download your personal information through the path "My - Privacy Settings - Personal Information - Apply for Download". In addition, you can contact us through the contact information 公布 in this Policy. After verifying your identity, we will provide you with a copy of your personal information held by us in the service (including basic information and identity information), unless otherwise stipulated by laws and regulations or this Policy.

6.2 Correction and Supplement of Personal Information

When you find that the personal information we process about you is incorrect or incomplete, you have the right to request correction or supplementation of the incorrect or incomplete information. You can submit a correction or supplementation application through the path "My - Avatar - Edit Profile", or submit your correction or supplementation application to us through feedback and error reporting. You can also contact us through the contact information provided in this Policy. After verifying your personal information, we will promptly correct and supplement your personal information.

6.3 Deletion of Personal Information

6.3.1 You can delete your browsing/favorite/reading history through the path "My - History - More";
6.3.2 In the following cases, you can contact us through the contact information provided in this Policy to request the deletion of your personal information:
A. If we process your personal information in violation of laws, regulations, or agreements;
B. If the purpose of our processing has been achieved, cannot be achieved, or is no longer necessary to achieve the processing purpose;
C. If we stop providing products and/or services, or the retention period has expired;
D. If you withdraw your consent;
E. Other circumstances stipulated by laws and administrative regulations.
6.3.3 Please understand that if the storage period stipulated by laws, regulations, or this Privacy Policy has not expired, or if it is technically difficult to delete personal information, we will stop processing except for storage and necessary security protection measures.

6.4 Change or Withdraw Consent

You can change the scope of your authorization for us to continue collecting personal information or withdraw your consent by deleting information, turning off device permissions, turning off the personalized recommendation switch (if any), etc. You can also withdraw all or part of the authorization for us to continue collecting your personal information by canceling your account.
Please understand that each business function requires some basic personal information to complete, and in this case, we may not be able to respond to your request to change the scope of authorization. After you withdraw your consent or authorization, we will not be able to continue to provide you with the services corresponding to the withdrawn authorization and will no longer process the corresponding personal information. However, your decision to withdraw consent or authorization will not affect the processing of personal information based on your previous authorization.
If you cannot change or withdraw authorization consent through the above paths, you can contact us through the contact information provided in this Policy, and we will review and respond to your request within 15 working days or the time limit stipulated by laws and regulations.

6.5 Account Cancellation

6.5.1 If you are an individual user, you can cancel your account through the path "My - Settings - Cancel Account".
6.5.2 You know and understand that account cancellation is an irreversible action. Once you cancel your insMind account, you will no longer be able to use all products and/or services of the insMind account, so please operate with caution. After your account is canceled, we will stop providing you with all products and/or services of "insMind" and anonymize your personal information in accordance with the requirements of laws and regulations, or delete personal information related to your account, except in cases where laws, regulations, or regulatory authorities have other provisions on the storage time of user information or other processing of customer data according to customer needs.

6.6 Access to Privacy Policy

We will prompt you of this Policy on the account registration/login page. In addition, you can view the entire content of this Policy at any time by clicking "Footer - Support - Privacy Policy". Please understand that the relevant functions of the products and/or services described in this Policy may vary depending on the device model, system version, software application version you use, etc. The final products and/or services shall be subject to the software and related services you use.

6.7 Response to Your Right Requests

6.7.1 Any questions, suggestions, opinions, and complaints can be submitted through our customer service channels or through "Workbench - Help and Resources - Feedback". To ensure security, we will respond to your request within 15 working days after receipt or within the time limit stipulated by laws and regulations. You also acknowledge that in the following cases, we may not be able to respond to your request:
(a) Related to our fulfillment of obligations stipulated by laws and regulations;
(b) Directly related to national security and national defense security;
(c) Directly related to public security, public health, and major public interests;
(d) Directly related to criminal investigation, prosecution, trial, and execution of judgments;
(e) There is sufficient evidence that the subject of personal information has subjective malice or abuses rights;
(f) To protect the major legitimate rights and interests of the subject of personal information or other individuals, but it is difficult to obtain the subject's authorization and consent;
(g) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
(h) Involving trade secrets.
6.7.2 For your reasonable requests, we will not charge fees in principle, but for repeated requests, we may charge certain cost fees depending on the situation. We may refuse requests that are unreasonably repetitive, require excessive technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical (for example, involve information on tape backups).

6.8 Exceptions to Exercising Rights

In the following cases, we may not be able to respond to your requests for rights such as access, correction, supplementation, deletion, copying, portability, withdrawal of consent, 知情权,and decision-making:
(a) Directly related to national security and national defense security;
(b) Directly related to public security, public health, and major public interests;
(c) Directly related to criminal investigation, prosecution, trial, and execution of judgments;
(d) We have sufficient evidence that you have subjective malice or abuse rights (for example, your request will endanger public security and the legitimate rights and interests of others, or your request exceeds the scope covered by general technical means and commercial costs);
(e) Responding to the request of the subject of personal information will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
(f) Involving trade secrets;
(g) Other circumstances stipulated by laws and administrative regulations.

7. Revision and Update of This Policy

7.1 To provide you with better services, this service will be updated and changed from time to time, and we will form part of this Policy and have policy effect. Without your explicit consent, we will not reduce the rights you enjoy under the currently effective policy.
7.2 We may revise and update this Policy from time to time. If this Policy is revised, we will release the updated version and remind you to read the updated content through appropriate means so that you can timely understand the latest version of the Privacy Policy. If you continue to use this Product and/or Service after the update date of this Policy, it means you accept the updated Privacy Policy. When significant changes are made to this Policy, we will notify you in a more prominent way, such as public notice on the main exposure page of the product or service or website, push notification, sending you an email, SMS, etc. If you do not agree to such changes, please stop using the corresponding products or services immediately.
7.3 Major changes referred to in this Policy include but are not limited to:
(a) Significant changes in our service model. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;
(b) Significant changes in our ownership structure, organizational structure, etc. Such as changes in ownership caused by business adjustments, bankruptcy and mergers, etc.;
(c) Significant changes in the main objects of external provision, transfer, or public disclosure of personal information;
(d) Significant changes in your rights in participating in the processing of personal information and the way of exercising them;
(e) Changes in the responsible department, contact information, and complaint channels for personal information security;
(f) Personal information security impact assessment reports indicate high risks.

8. Contact Us

8.1 If you have any opinions, questions, suggestions, or complaints about this Policy or personal information protection, or need to inquire about our processing of your personal information, you can contact us through the email address: support@insmind.com
8.2 To ensure that we can efficiently handle your problem and feedback to you in a timely manner, we will process your request after verifying your identity. Usually, we will respond to your problem within 15 working days after receipt; if the situation is complex and requires delay, we will explain to you within 15 working days.

9. Others

9.1 The interpretation of this Policy and dispute resolution shall be governed by the laws of the Mainland of the People's Republic of China. Any dispute arising from the signing, performance of this Policy, and our processing of your personal information shall be resolved through friendly negotiation between both parties; if negotiation fails, you may file a lawsuit with the people's court with jurisdiction in the place where the defendant is located. If you believe that our processing of personal information has damaged your legitimate rights and interests, you may also report to the relevant government departments.
9.2 During the use of our products and/or services, you may access applications and other services linked to third parties, and such applications and services may involve situations where you provide specific types of personal information to third parties. We recommend that you carefully read the applicable terms and conditions (and any related privacy statements) before using such applications or services to ensure that you fully understand their rules for using your personal information before deciding whether to use them. If you have any questions about how a specific third party uses your personal information, please contact the third party directly.

10. About Us

The company name of insMind is INSMIND PTE.LTD. The registered office address is 139 CECIL STREET #01-03 YSY BUILDING SINGAPORE (069539)