Update Date: February 19, 2026
Release Date: February 19, 2026
Effective Date: February 19, 2026
KeyBot (hereinafter referred to as "We") is committed to ensuring that your privacy is protected. We collect, use, and share your personal information in accordance with the KeyBot Privacy Policy (hereinafter referred to as "This Privacy Policy"). This Privacy Policy contains terms regarding our collection, storage, use, sharing, and protection of your personal information. We hope to clearly introduce our processing of your personal information through this Privacy Policy, so we suggest you read this Privacy Policy completely to help you understand how to maintain your privacy rights. If you do not agree to any content of this Privacy Policy, you should immediately stop using our products or services. By using any service provided by our products, you agree that we may legally use and protect your personal information in accordance with this Privacy Policy.
Special Note:
1. We need to obtain the SN number to identify certain cache files.
2. We will access clipboard information so that when you paste chat information from the other party while using KeyBot, we can perform AI analysis to polish the reply.
3. We will collect your personal information such as OAID and GAID for the GeTui One-Click Login SDK to push notifications to you, but please rest assured that we will not send marketing advertisements, only for operator one-click login.
4. The webview component will call the vector sensor when the user enters the privacy homepage.
5. The platform uses WeChat / QQ / mobile phone number, etc., for registration and login to retain user profile-related data. If the user no longer uses the platform, they can click in the App's "Settings Page -> Account Cancellation" and follow the guidelines to cancel their platform account.
Permission Call Description:
• Photo Album Permission: Used for uploading avatars / uploading DIY app icons;
• Microphone Permission: Used for real-time voice-to-text, voice dialogue;
• Access Phone Account/App Permission: Used to obtain whether the user has installed WeChat or QQ to display or hide WeChat/QQ login/share buttons;
• Clipboard Information: Used to obtain chat records copied by the user for AI polished replies.
1. How We Collect and Use Personal Information
1. What information we collect:
(1) Relevant personal information you provide to us when registering an account, such as phone number, name, email address, etc.;
(2) Data you provide when using products or services, such as avatars you upload, photos you share, etc.;
(3) Information submitted when you contact our customer service or participate in events held by us. For example, questionnaires filled out when participating in our online events may contain your name, phone number, home address, etc.;
(4) Device information. For example, device model, operating system version, unique device identifier, battery, signal strength, etc.;
(5) Software information. For example, software version number, browser type, and version;
(6) IP address;
(7) Location information. When you use location-related services, we may record your device's location information to provide you with relevant services;
(8) Local file upload, which can upload local audio files to the cloud so that the same files can be accessed on different devices when logged in as a non-guest;
2. Third-party SDK Access Details:
Our product integrates Umeng+ SDK. Umeng+ SDK needs to collect your device Mac address and unique device identifier (IMEI/android ID/IDFA/OPENUDID/GUID/BSSID/SSID/ICCID, SIM card IMSI information) to provide statistical analysis services and provide basic anti-cheating capabilities through geographic location calibration report data accuracy. The detailed list is as follows:
[Ocean Engine Conversion SDK]
Package Name: com.bytedance.ads
Purpose: Ad delivery and ad monitoring attribution, anti-cheating
Personal Information Involved: Device brand, model, OS, software system version, resolution, network signal strength, IP address, MAC address, AndroidID, OAID, IDFV, etc.
Privacy Policy: https://bytedance.larkoffice.com/docx/PfdrdczIHo0wjex3Qwdce5wYnzh
[Mobile Security Alliance OAID]
Package Name: com.bun.miitmdid, com.zui.opendeviceidlibrary
Purpose: Obtain OAID
Personal Information Involved: Device information
Privacy Policy: http://www.msa-alliance.cn/col.jsp?id=105
[WeChat Open Platform]
Package Name: com.tencent.mm
Purpose: Login, Share, Payment
Permissions Used: ACCESS_NETWORK_STATE, ACCESS_WIFI_STATE
Personal Information Involved: Stored personal files, network information
Privacy Policy: https://weixin.qq.com/cgi-bin/readtemplate?lang=zh_CN&t=weixin_agreement&s=privacy
[QQ Open Platform]
Package Name: com.tencent.open
Purpose: Share
Permissions Used: MODIFY_AUDIO_SETTINGS, ACCESS_NETWORK_STATE, ACCESS_WIFI_STATE
Personal Information Involved: Stored personal files, read phone status and identity, network information
Privacy Policy: https://docs.qq.com/doc/p/8ca74fba95bca4a30eeee1044050b510300d5382
[Umeng Statistics]
Package Name: com.uc.crashsdk, com.efs, com.umeng
Purpose: Statistics
Permissions Used: ACCESS_NETWORK_STATE, ACCESS_WIFI_STATE, READ_PHONE_STATE
Personal Information Involved: Device information (IMEI, ANDROID_ID, DEVICE_ID, IMSI, BSSID, SSID), installed app list, network information
Privacy Policy: https://www.umeng.com/page/policy
[Alipay Open Platform]
Package Name: com.alipay
Purpose: Login, Share, Payment
Permissions Used: ACCESS_NETWORK_STATE, ACCESS_WIFI_STATE
Personal Information Involved: Network information, device ID, IP address, OAID, IMSI
Privacy Policy: https://render.alipay.com/p/yuyan/180020010001196791/preview.html?agreementId=AG00000132
3. Android System Permission Call Description:
• android.permission.READ_MEDIA_IMAGES (Android 13+): Read media image files, used for screenshot reply help, avatar upload, complaint feedback.
• android.permission.READ_MEDIA_VIDEO (Android 13+): Read media video files, used for screenshot reply help, avatar upload, complaint feedback.
• android.permission.WRITE_EXTERNAL_STORAGE (Android 10 and below): Write to external storage, used for emoticon download.
• android.permission.READ_EXTERNAL_STORAGE (Android 12 and below): Read external storage content, used for screenshot reply help, avatar upload.
• android.permission.CAMERA: Access camera, used for taking photos or scanning codes.
• android.permission.RECORD_AUDIO: Recording permission, used for voice input.
• android.permission.ACCESS_NETWORK_STATE: Access current network status.
• android.permission.INTERNET: Allow app to access the internet.
• android.permission.ACCESS_WIFI_STATE: View current Wi-Fi connection status.
• android.permission.WAKE_LOCK: Keep device awake (prevent screen off during video playback).
• android.permission.VIBRATE: Control device vibration, used for key feedback.
• com.google.android.gms.permission.AD_ID: Obtain Google Advertising ID.
• com.android.vending.BILLING: Support Google Play in-app purchases.
2. How We Use Cookies
We or our third-party partners may collect some personal information of users through Cookies and related technologies, including: user visits, user browsing information, user login information. Cookies and related technologies collect such information for users to use our products and technologies. We will strictly require third-party partners to comply with the relevant provisions of this policy. You can also manage Cookies through browser settings. But you need to understand and know: this action may in some cases affect your normal use of our products, technologies, and/or services, or prevent you from obtaining the best service experience, and may also have a certain impact on your information protection and account security.
3. How We Share, Transfer, and Publicly Disclose Personal Information
Except for the following circumstances, we will not share your personal information with third parties without your prior consent or authorization.
We may share your personal information with third-party partners (third-party service providers, advertising partners, application developers, etc.) for the following purposes:
1. Sharing with prior explicit consent or authorization from the user or user's active choice;
2. Providing user information at the legal request of the user's guardian;
3. Achieving the purposes described in the "How We Collect and Use Information" section of Article 1 of this "Privacy Policy";
4. Fulfilling our obligations and exercising our rights in this "Privacy Policy" or other agreements reached with users;
5. Understanding, maintaining, and improving our services.
Please understand that in the following circumstances, according to laws, regulations, and national standards, we do not need to obtain your authorized consent to share, transfer, or publicly disclose your personal information:
1. Directly related to national security and national defense security;
2. Directly related to public safety, public health, and major public interests;
3. Directly related to criminal investigation, prosecution, trial, and execution of judgment; or according to the requirements of laws and regulations, administrative agencies, or public security/procuratorate/court or other authorized agencies;
4. Out of maintaining the life, property, and other major legitimate rights and interests of you or other individuals but it is difficult to obtain consent;
5. Personal information disclosed to the public by yourself;
6. Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels;
7. Related to our fulfillment of obligations stipulated by laws and regulations.
4. How We Protect the Security of Personal Information
1. We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent your personal information from being improperly used or accessed, publicly disclosed, used, modified, damaged, lost, or leaked without authorization.
2. We will use encryption technologies, anonymization processing, and other reasonable and feasible means not lower than industry peers to protect your personal information, and use security protection mechanisms to prevent your personal information from malicious attacks.
3. We adopt strict data use and access systems to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in due course.
4. Although the above reasonable and effective measures have been taken and relevant legal provisions and standards have been complied with, please understand that due to technological limitations and various possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to guarantee 100% security of information at all times. We will try our best to ensure the security of the personal information you provide to us.
5. Once you leave our product service and browse or use other websites, services, and content resources, we will have no ability and direct obligation to protect any personal information you submit in software and websites outside of our products, regardless of whether your login, browsing, or use of the above software and websites is based on our product links or guidance.
5. Managing Your Personal Information
1. You have the right to access, correct, and delete your personal information; however, the deletion or modification of relevant information may affect your use of relevant products or services or lead to the realization of partial functions.
2. We will collect and use your information strictly in accordance with this policy only to realize the functions of our products or services. If you find that we violate laws, administrative regulations, or the agreement of both parties to collect and use your personal information, you can ask us to delete it. If you find that the personal information we collect and store about you is wrong, you can also ask us to correct it. Please contact us through the contact information listed in this policy.
6. Minors Clause
We attach great importance to the protection of minors' personal information. According to relevant laws and regulations, if you are a minor under the age of 18, you should obtain the consent of your parent or legal guardian before using our products and services.
If you are a child under the age of 14, you must read this privacy policy or the privacy policy of the corresponding product or service accompanied by a guardian to decide whether to use our product or service. If product and service needs require submitting personal information, please obtain the guardian's consent and complete it under the guardian's guidance.
If you are the guardian of a child, when you help the child complete the registration and use of the product or service, you should carefully read this policy or the specific product's privacy protection policy and decide whether to agree to the privacy policy. When you have questions about the personal information of the child under your guardianship, you can contact us through the contact information in Part 8 of this Privacy Policy.
7. Revision and Notification of Privacy Policy
To provide you with better services, our products will be updated and changed from time to time, and we will revise this privacy policy in due course. These revisions form part of this privacy policy and have the same effect as this privacy policy.
After this privacy policy is updated, we will issue an updated version on the product website. If such changes will lead to a substantial reduction of users' rights under this policy, we will remind you of the updated content through the official website before the changes take effect, so that you can keep abreast of the latest version of this privacy policy.
In this case, if you continue to use our services, you agree to be bound by the revised policy.
8. Contact Us
If you have complaints, suggestions, or questions about personal information protection issues, you can send the question to the email shshduuw1@gmail.com, and we will review the issues involved as soon as possible and reply within one working day after verifying your user identity.