Language:
Parrot Group User Agreement

1. Introduction
Welcome to use the "Parrot Group" software and related services! "Parrot Group" software and related services refer to the products and services provided to you by Hong Kong Fire Dragon International Co., Ltd. and/or its affiliates (hereinafter referred to as the "Company" or "We") in the form of music and dance games driven by user-generated content (UGC) and artificial intelligence, including but not limited to AI-generated text/images, custom avatar creation, dance and music sheet design, and interaction with other users. This User Agreement is the agreement entered into between you and the Company regarding the registration, login, and use (hereinafter collectively referred to as "Use") of this software and related services (hereinafter referred to as "this Agreement").
To better provide services to you, please read and fully understand this Agreement carefully before you start using this software and related services, especially the clauses regarding exemption or limitation of liability, rights and licenses, legal application and dispute resolution. Important clauses such as those exempting or limiting liability will be highlighted in bold for your attention. You should read them carefully.
If you do not agree to this Agreement, this will result in our inability to provide you with complete products and services, and you may choose to stop using them. If you voluntarily agree to or use this software and related services, it is deemed that you have fully understood this Agreement and agree to be bound by this Agreement and other agreements and rules related to this software and related services as a party to this Agreement.
If you have any questions, comments, or suggestions regarding the content of this Agreement, you can contact us through the feedback and complaint entry in this software.
2. This Software and Related Services
2.1 This software and related services rely on generative artificial intelligence models, and may also rely on other models and services to provide you with AI-generated technical services and other services.
2.2 The content generated by this software and services is for your reference only. You shall not use the output as professional advice, for commercial purposes, or for other purposes.
2.2.1 If it involves situations that may have a significant impact on you or relevant parties (e.g., scenarios or purposes related to medical care, finance, investment, insurance, law, food safety, nutrition, etc.), it is recommended that you consult relevant professionals. The output of this software and content output by other users shall not be used as a basis for your further action or inaction.
2.2.2 The consequences and liabilities arising from your subsequent actions based on the generated content shall be borne by you, including risks arising from reliance on the authenticity, accuracy, reliability, non-infringement, or fitness for a particular purpose of the output content, as well as risks arising from using the output content for commercial purposes. You should scientifically and rationally understand and use generative artificial intelligence technology in accordance with the law.

2.3 When you use a specific function of this service, there may be separate agreements, rules, etc. for that specific function (if any, "Specific Agreements"). Please carefully read and fully understand the relevant Specific Agreements before using that specific function. If there is any conflict between this Agreement and the content of a Specific Agreement, the Specific Agreement shall prevail.
2.4 To better enhance user experience and services, or for security assurance, the Company will provide updates or changes to part or all of this software and related services from time to time. We will notify you in an appropriate manner where feasible.
2.5 You may stop using this software and related services at any time, although the Company regrets this. The Company may also stop providing services to you at any time, or add or impose new restrictions on this software and related services at any time.
2.6 Unless expressly authorized in writing by the Company in advance, you shall not engage in any unauthorized access or use of this software and related services in any form, including but not limited to adaptation, copying, dissemination, vertical search, mirroring, or trading.
2.7 You understand that using this software and related services requires you to prepare the terminal devices (such as computers, mobile phones, etc.) related to the software and related services. Once you access this software and related services on a terminal device, it is deemed that you are using this software and related services. To fully realize all functions of this software and related services, you may need to connect your terminal device to the internet, and you understand that you shall bear the required costs (such as data charges, internet access fees).
2.8 The Company attaches great importance to the quality of content generated by artificial intelligence models and will endeavor to take reasonable security measures to filter inappropriate content. If you find that the content output by this software and related services or the returned processing results are unreasonable, defective, or have other issues, you are welcome and we thank you for providing feedback at any time through the feedback entry of this software and related services.
2.9 Paid features within this game (such as purchasing virtual items, subscriptions, etc.) will be completed through the payment channels provided by the Steam platform, with the specific payment method subject to the Steam Wallet. You shall comply with the relevant payment terms of Valve Corporation.
3. Protection of User Personal Information
The Company is committed to working with you to protect your personal information (i.e., information that can identify you independently or in combination with other information). Protecting user personal information is one of the Company's basic principles. During your use of this software and related services, you may need to provide your personal information so that the Company can provide you with better services and corresponding technical support. The Company will protect your rights to browse, view, copy, correct, modify, supplement, delete relevant personal information, and withdraw authorization in accordance with the law. It will use encryption technology, anonymization, and other security measures matching this software and related services to protect your personal information. For more information on the protection of user personal information, please refer to the "Privacy Policy."
4. User Code of Conduct
4.1 User Conduct Requirements You shall be responsible for your conduct when using this software and related services. Unless permitted by law or with the Company's prior written permission, your use of this software and related services shall not involve the following behaviors:
4.1.1 Using any plug-ins, add-ons, systems, or third-party tools not authorized or permitted by the Company to interfere with, disrupt, modify, or otherwise affect the normal operation of this software and related services.
4.1.2 Engaging in any activities that compromise computer network security using or targeting this software and related services, including but not limited to:
(1) Illegally intruding into networks, interfering with normal network functions, stealing network data, and other activities that endanger network security;
(2) Providing programs or tools specifically used for intruding into networks, interfering with normal network functions and protective measures, stealing network data, and other activities that endanger network security;
(3) Providing technical support, advertising promotion, payment settlement, or other assistance to others knowing that they are engaged in activities that endanger network security;
(4) Using unauthorized data or accessing unauthorized servers/accounts;
(5) Accessing public computer networks or others' computer systems without permission and deleting, modifying, or adding stored information;
(6) Attempting to probe, scan, or test the vulnerabilities of this software system or network, or engaging in other activities that compromise network security without permission;
(7) Attempting to interfere with or disrupt the normal operation of this software system or website, intentionally spreading malicious programs or viruses, and other behaviors that disrupt normal online information services;
(8) Forging TCP/IP packet names or partial names;
(9) Reverse engineering, reverse assembling, reverse compiling, translating, or otherwise attempting to discover the source code, models, algorithms, and source code or underlying components of this software;
(10) Developing, servicing applications, products, services, or models that may be competitive with the Company and/or its affiliates;
(11) Violating laws and regulations, this Agreement, the Company's relevant rules, and other acts that infringe upon the legitimate rights and interests of others.
4.1.3 Displaying or otherwise providing any user information to any non-original user without the original user's consent;
4.1.4 Impersonating others or gaining access to this software and related services without authorization;
4.1.5 Engaging in fraudulent, deceptive, or misleading activities using or targeting this software and related services, including but not limited to impersonating or representing AI-generated answers as human-generated, plagiarism or academic dishonesty, phishing, and/or engaging in any other illegal or non-compliant activities;
4.1.6 Using this software and related services in any way that may infringe upon any third party's privacy, such as illegally collecting or disclosing personal identification information or education, financial, or other protected records, such as addresses, phone numbers, email addresses, numbers and characteristics in personal identification documents (e.g., ID card numbers, social security account numbers, passport numbers) or credit card numbers;
4.1.7 If the Company has reason to believe that you are using the generative AI service to engage in illegal activities or may violate the above agreements, the Company may independently judge and has the right to take action without prior notice to you. Such actions include but are not limited to warnings, restricting functions, suspending or terminating the provision of services to you, and pursuing relevant legal liabilities.
4.2 Information Content Standards
4.2.1 The Company is committed to civilized, rational, friendly, and high-quality interactions. While promoting business development, it continuously strengthens corresponding information security management capabilities, earnestly fulfills social responsibilities, complies with national laws and regulations, respects citizens' legitimate rights and interests, and respects social order and good customs.
4.2.2 The information you input, output/generate, produce, comment on, upload, publish, or disseminate shall consciously comply with laws and administrative regulations, adhere to public order, respect social morality and ethical standards, socialist core values, national interests, respect others' legitimate rights and interests, moral trends, and the "seven bottom lines" requirements of information authenticity. Otherwise, the Company has the right to take appropriate measures immediately. You shall not engage in or allow or assist anyone in engaging in the following behaviors using this software and related services:
(1) Opposing the basic principles established by the Constitution;
(2) Endangering national security and interests, leaking state secrets;
(3) Subverting state power, overthrowing the socialist system, damaging the national image, inciting secession, undermining national unity and social stability;
(4) Damaging national honor and interests;
(5) Promoting terrorism and extremism;
(6) Promoting ethnic hatred and undermining ethnic unity;
(7) Promoting discrimination, hatred, exploiting the vulnerability of specific groups based on their age, social, physical, or mental characteristics, to substantially distort the behavior of a person belonging to that group, causing or likely causing physical or psychological harm to that person or another, including but not limited to civil discrimination, religious discrimination, national origin discrimination, gender discrimination, sexual orientation discrimination, age discrimination, occupational discrimination, health discrimination, regional discrimination;
(8) Engaging in or assisting illegal or high-risk activities, such as: military and warfare, development of weapons, explosives, or hazardous materials, management or operation of critical infrastructure (e.g., transportation, energy), creating or distributing controlled substances or services, generating or disseminating information related to self-harm, activities with high economic damage risk, including gambling, automated determination of credit eligibility, employment, and educational decisions;
(9) Undermining national religious policies, promoting cults and feudal superstitions;
(10) Fabricating, spreading rumors and false information, disrupting economic and social order, undermining social stability;
(11) Spreading, disseminating, promoting violence, obscenity, pornography, explicit content, gambling, murder, terror, or inciting crime;
(12) Exploiting, harming, or attempting to exploit or harm minors, harming the physical and mental health of minors, infringing upon the legitimate rights and interests of minors;
(13) Insulting, defaming, offending, abusing, provoking others, bullying or controlling others, infringing upon the legitimate rights and interests of others;
(14) Engaging in violent intimidation, threats, or doxxing;
(15) Involving others' privacy, personal information, or materials;
(16) Spreading obscene language, damaging social order and good customs;
(17) Violating business ethics, infringing upon trade secrets, privacy rights, reputation rights, honor rights, portrait rights, intellectual property rights, trade controls, and other legitimate rights and interests;
(18) Spreading commercial advertisements, similar commercial solicitation information, excessive marketing information, and spam;
(19) Content completely unrelated to the information being commented on;
(20) Content with no meaning or deliberately using character combinations to evade technical review;
(21) Secretly photographing or recording others without their permission, infringing upon their legal rights;
(22) Content containing terror, violence, gore, high danger, endangering the physical and mental health of the performer or others, including but not limited to:
i. Any violent and/or self-harming behavior content;
ii. Any content that endangers life and health, uses dangerous props such as knives to endanger oneself or others' personal and/or property rights;
iii. Content that incites or induces others to participate in dangerous or illegal activities that may cause personal injury or death;
(23) Other information that violates laws, regulations, policies, and public order and good customs, interferes with the normal operation of this software and related services, or infringes upon the legitimate rights and interests of other users or third parties.
4.3 You can report various illegal and non-compliant acts, illegal dissemination activities, illegal harmful information, etc., to the Company. The Company will promptly accept and handle your reports and complaints to jointly create a clean and righteous cyberspace.
4.4 If you find and believe that any content within Parrot Group infringes upon your rights (including: user-created agents, other user-generated content), you can use the in-game reporting function to initiate an infringement notice on the corresponding user content page and provide proof of your rights. We will handle your complaint promptly in accordance with relevant legal provisions. If the content you publish on Parrot Group is complained about by a rights holder for infringement and is processed, and you do not accept the processing result, you can refer to the guidelines mentioned above to report to Parrot Group and submit a non-infringement declaration and relevant rights proof materials. We will also handle your appeal promptly in accordance with relevant legal provisions.
5. Information Content Usage Standards
5.1 Without the Company's written permission, no user or third party shall authorize, permit, or assist any other person in engaging in the following behaviors regarding the information content of this software and related services:
(1) Copying, reading, or using the information content of this software and related services for purposes including but not limited to promotion, increasing readership, page views, etc., for commercial purposes;
(2) Unauthorized editing, organizing, or arranging the information content of this software and related services and displaying it outside the source page of this software and related services;
(3) Using any form of identification methods, including but not limited to special identifiers, special codes, etc., to generate, guide, transfer, or hijack traffic or page views for the information content of this software and related services, to the detriment of the Company;
(4) Other illegal acquisition or use of the information content of this software and related services.
5.2 Without the Company's written permission, no user or third party shall directly or indirectly steal the text, images, videos, and other information content of this software and related services in any way (including but not limited to hotlinking, redundant theft, illegal crawling, simulated downloading, deep linking, fraudulent registration, etc.), or delete, conceal, or change the rights management electronic information of the relevant information content, or delete, conceal, or change any patent, copyright, trademark, or other ownership declarations displayed on or contained in this software and related services in any way (including but not limited to hiding or modifying domain names, platform-specific logos, usernames, and patent, copyright, trademark, or other ownership declarations).
5.3 After obtaining written permission from the Company, any user or third party sharing, forwarding, etc., of the information content of this software and related services shall also comply with the following specifications:
(1) For captured, counted, or obtained related data, without the Company's prior written consent, such data shall not be disclosed, provided, or disclosed to any third party in any way;
(2) No modifications shall be made in any form to the source page of this software and related services, including but not limited to the homepage (profile page) links and other entries of this software and related services, nor shall any form of blocking, insertion, pop-up, etc., be performed on the display of the source page of this software and related services;
(3) Secure, effective, and stringent measures shall be taken to prevent the information content of this software and related services from being illegally obtained by third parties through any form, including but not limited to "spider" programs;
(4) The relevant data content shall not be used for purposes beyond the scope permitted by the Company's written permission, nor sold or commercially used in any way, nor disclosed, provided to, or allowed to be used by third parties in any way;
(5) Sharing, forwarding, or copying the information content of this software and related services to any third party shall comply with other specifications and standards established by the Company for this purpose.
5.4 For content generated or synthesized by this software through artificial intelligence technology, such as text, images, audio, video, etc., we have the right to add AI-generated identifiers as required by laws and regulations (if necessary), including adding prominent identifiers that users can clearly perceive on the generated/synthesized content or interactive scene interface, and adding implicit identifiers in the file metadata of the generated/synthesized content (collectively "AI Identifiers"). You should carefully read and understand the requirements of laws and regulations regarding AI identifier management. You shall not use new technologies and applications based on generative AI to create, publish, or disseminate false, inaccurate, infringing, or other information that violates laws and regulations. When you publish or disseminate information generated using new technologies and applications such as generative AI, you should clearly mark or indicate it. You shall not modify the AI Identifiers added by us based on new technologies and applications such as generative AI by deleting, altering, falsifying, or otherwise misleadingly modifying them.
6. Service Changes, Interruptions, and Termination
6.1 You understand and agree that the software and related services provided by the Company are provided based on the status achievable with existing technology and conditions. The Company will make its best efforts to provide you with services and ensure the continuity and security of the services. You understand that the Company cannot foresee and prevent technical and other risks at all times, including but not limited to force majeure, network issues, third-party service defects, third-party website issues, which may lead to service interruption, inability to normally use the software and services, and other losses and risks.
6.2 You understand and agree that for overall service operation and platform operational security needs, the Company has the right to determine the service/function settings and scope, and to modify, interrupt, suspend, or terminate this software and related services as appropriate.
7. Intellectual Property
7.1 During your use of this software and related services, you may submit text, audio, or other content or information (collectively "Input") to this software and related services, and receive content generated in response to your Input (referred to as "Output"). Between you and the Company, to the extent permitted by applicable law, the intellectual property rights in the Input you provide belong to you or the rights holders who legally own such intellectual property rights. The Company does not claim ownership of the Output. If the Input and/or Output itself contains content in which the Company enjoys intellectual property rights or other legal rights, the corresponding rights in the aforementioned Input and/or Output remain with the Company, and the ownership thereof does not change by being included in the Output.
7.2 You understand and agree that all content uploaded and published by you during the use of this software and related services belongs to you, and the act of uploading or publishing does not change the rights you hold over your content. Meanwhile, to enhance your user experience when using this software and related services, and to enable better sharing and promotion of your content, you grant the Company and/or its affiliates a free, worldwide, transferable, sub-licensable, and re-sublicensable right to use your content to the extent permitted by law, for purposes such as model service optimization, brand promotion and publicity, and information database entry.
7.3 You understand and agree that the Input shall be content for which you own the intellectual property rights or have obtained legal authorization from the rights holder, and does not contain any content that violates applicable laws and regulations, infringes upon the legitimate rights and interests of others (including but not limited to intellectual property rights such as copyrights, patents, trademarks, and other rights such as personality rights, personal information rights), or violates public order and good customs.
7.4 Except as otherwise provided in Article 8.1 of this Agreement, the intellectual property rights and related rights and interests in the content provided by the Company in this software and related services (including but not limited to software, technology, programs, web pages, text, pictures, images, audio, video, charts, layout designs, electronic documents, etc.) belong to the Company. The copyrights, patent rights, and other intellectual property rights in the software relied upon by the Company to provide this software service belong to the Company, the Company's affiliates, or other respective rights holders. Without the Company's permission, no one may use the content in this software and related services (including but not limited to adapting, copying, disseminating, crawling, deep-linking, mirroring, or trading).
7.5 Please do not use any of the Company's trademarks, service marks, trade names, domain names, website names, company logos (LOGOs), URLs, or other significant brand features (hereinafter collectively referred to as "Marks") without the Company's permission. Without the Company's prior written consent, you shall not display, use, or apply for trademark registration, domain name registration, etc., for the Marks mentioned in this clause, whether alone or in combination, nor shall you engage in any behavior that implies to others that you have the right to display, use, or otherwise dispose of such Marks. If you cause losses to the Company or others by using the Company's aforementioned trademarks, Marks, etc., in violation of this Agreement, you shall bear all legal liabilities.

7.6 Based on the characteristics of certain functions, the content you upload and publish through Parrot Group may be used by other users. Other users may create new generated content by using your content for functions such as "Create Similar," using as a reference image, reusing prompts, etc., and further publish, forward, copy, or download it. Given the nature of generative AI technology, if other users' input is the same as or similar to yours, we may generate the same or similar output for different users. If other users include your publicly posted reference images or prompts as reference content in their input, their output may also have varying degrees of similarity to the reference content. The quality, accuracy, and legality of AI-generated content are not guaranteed. You bear the risk of relying on the accuracy of the generated content. Parrot Group may restrict or delete content deemed infringing, threatening, offensive, discriminatory, or objectionable. Content used for deep fakes, impersonation, harmful political content, or defamation may be deleted. Accounts violating this provision may be suspended or deleted.
7.7 The Company provides technical support for the development and operation of this software and holds all rights to all data and information generated during the development and operation of this software and related services to the extent permitted by laws and regulations.
8. Breach Handling
8.1 Regarding your violation of this Agreement or other service terms, the Company has the right to independently judge and take measures such as pre-warning, refusing publication, immediately stopping information transmission, deleting information content or comments, temporarily prohibiting the publication of content or comments, restricting some or all functions of the account up to terminating service provision, permanently closing the account, etc., as deemed appropriate. The Company does not bear any responsibility for any consequences arising from your inability to use the account and related services normally, or your inability to obtain assets or other rights within your account normally as a result. The Company has the right to announce the handling results and has the right to decide whether to restore the use of the relevant account based on the actual situation. For behaviors suspected of violating laws and regulations or suspected of criminal offenses, the Company will retain relevant records and has the right to report to relevant competent authorities, cooperate with investigations by competent authorities, report to public security organs, etc., in accordance with the law. The Company has the right not to restore deleted content.
8.2 If third-party complaints or litigation claims arise due to your violation of this Agreement or other service terms, you shall handle it yourself and bear all legal liabilities that may arise. If your illegal, infringing, or defaulting acts cause the Company and its affiliates, controlling companies, and successor companies to compensate any third party or suffer penalties from state authorities, you shall also fully compensate the Company and its affiliates, controlling companies, and successor companies for all resulting losses.
8.3 The Company respects and protects the intellectual property rights, reputation rights, name rights, privacy rights, portrait rights, and other legitimate rights and interests of users and others. You warrant that when using this software and related services, the input, generation, upload, production, comments, publication, or dissemination of text, images, videos, audio, links, etc., do not infringe upon any third party's intellectual property rights, reputation rights, name rights, privacy rights, etc., and/or legitimate rights and interests. Otherwise, the Company has the right to remove the suspected infringing content upon receipt of a notice from the rights holder or relevant party. For all rights claims raised by third parties, you shall handle them yourself and bear all legal liabilities that may arise; if your infringing acts cause losses to the Company and its affiliates, controlling companies, and successor companies (including economic, reputational losses, etc.), you shall also fully compensate the Company and its affiliates, controlling companies, and successor companies for all resulting losses.

9. Disclaimer
9.1 You understand and agree that this software and related services may be affected or interfered with by various factors, and the Company does not warrant (including but not limited to):
9.1.1 That this software and related services completely suit your usage requirements;
9.1.2 That this software and related services will be uninterrupted, timely, secure, reliable, or error-free; that any software, services, or other materials obtained by you through the Company will meet your expectations;
9.1.3 That any errors in this software and related services will be corrected.
9.2 If there is information, account passwords, advertisements, or promotions suspected of involving loans, investment, financing, or other property-related matters, please treat them with caution and make your own judgment. The Company does not bear any direct, indirect, incidental, special, derivative, or punitive liability for any loss of profits, commercial reputation, data, or other tangible or intangible losses you may suffer.
9.3 You understand and agree that during the use of this software and related services, you may encounter force majeure factors (force majeure refers to objective events that cannot be foreseen, overcome, or avoided), including but not limited to natural disasters (such as floods, earthquakes, typhoons), governmental actions, wars, strikes, riots, etc. In the event of force majeure, the Company will endeavor to repair the situation promptly. However, the Company is exempt from liability within the scope permitted by laws and regulations for any suspension, interruption, termination of services, or any losses caused by force majeure.
9.4 The Company's right to handle illegal or non-compliant content as stipulated in this Agreement does not constitute an obligation or commitment of the Company, and the Company cannot guarantee timely detection of illegal acts or corresponding handling.
9.5 You understand and agree that regarding this software and related services, the Company does not provide any kind of express or implied warranty or condition, including but not limited to merchantability, fitness for a particular purpose, etc. You bear the corresponding risk for your use of this software and related services.
9.6 You understand and agree that this Agreement aims to ensure compliance with national laws and regulations, maintain public order and good customs, and protect the legitimate rights and interests of users and others. The Company makes its best efforts to judge in accordance with relevant laws and regulations within its capacity, but does not guarantee that the Company's judgment will be entirely consistent with the judgment of judicial or administrative authorities. You understand and agree to bear the consequences thereof.
9.7 Under no circumstances shall the Company or its affiliates or licensors be liable for any direct, indirect, consequential, punitive, incidental, special, exemplary, or penal damages, including but not limited to loss of profits, goodwill, data, or other losses incurred by you due to your use of this software and related services, even if the Company has been advised of the possibility of such damages. Except as otherwise expressly provided by laws and regulations, the Company's total liability to you, regardless of the cause or manner of action, shall not exceed the fees you paid to the Company during your use of this software and related services (if any).

10. Minor Provisions
10.1 The Company attaches great importance to the protection of minors' personal information. Minor users should strengthen their personal protection awareness and act cautiously when filling in personal information.
10.2 Minor users and their guardians understand and confirm that if you violate laws, regulations, or the content of this Agreement, you and your guardian shall bear all legal liabilities that may arise in accordance with the law.
10.3 Special Note for Minor Users: Teenagers should use this software and related services for appropriate learning and usage, avoid addiction to the virtual online space, and develop good internet habits.
10.4 To better protect the privacy rights of minors, the Company reminds you to strictly comply with relevant laws and regulations and carefully publish content containing minors' materials. Once published, it is deemed that you have obtained the rights holder's consent to display the minors' portraits, voices, and other information within this software and related services, and permit the Company to use and process such content related to minors in accordance with this Agreement.
11. Miscellaneous
11.1 The formation, validity, performance, interpretation, and dispute resolution of this Agreement shall be governed by the laws of the People's Republic of China. If any provision of this Agreement is invalid or unenforceable due to conflict with the laws of the People's Republic of China, such provisions shall be interpreted and used, to the extent possible without violating the law, in a manner that closely follows the original intent of this Agreement, and the other provisions of this Agreement shall remain in full force and effect.
11.2 If any dispute arises between you and the Company, both parties shall endeavor to resolve it amicably through negotiation. If negotiation fails, you agree to submit the dispute to the people's court in the place where this Agreement is signed for litigation resolution.
11.3 To provide you with better services or due to changes in national laws, regulations, policies, technical conditions, product features, etc., the Company will revise this Agreement from time to time. The revised content constitutes an integral part of this Agreement. For your convenience in staying informed about the latest version of this Agreement, you can view it on the relevant pages of this software and related services. If you continue to use this software and related services, it means you have agreed to accept the revised content of this Agreement. If you disagree with the revised terms, please immediately stop logging in to or using this software and related services. If you continue to log in or use this software and related services, it is deemed that you recognize and accept the revised terms.
11.4 The Company has the right, based on the needs of this software and related services or its operations, to unilaterally decide to arrange or designate its affiliates, controlling companies, successor companies, or a third-party company recognized by the Company to continue operating this software. Furthermore, for certain services covered under this Agreement, they may be provided to you by the Company's affiliates, controlling companies, successor companies, or a third-party company recognized by the Company. You acknowledge and agree that by accepting the relevant services, you accept that the related rights and obligations are also governed by this Agreement.
11.5 The headings in this Agreement are for convenience and readability only and do not affect the meaning or interpretation of any provision of this Agreement.
11.6 You and the Company are independent entities. Under no circumstances does this Agreement constitute an express or implied warranty or condition from the Company to you, nor does it establish an agency, partnership, joint venture, or employment relationship between the parties.
Privacy Policy
Parrot Group (hereinafter referred to as "We") deeply understands the importance of personal information to you. Your trust is very important to us. We will protect your personal information and privacy in accordance with laws and regulations and with reference to industry best practices. We have formulated this "Privacy Policy" and specifically remind you: We hope you will read and understand this Privacy Policy carefully before using Parrot Group and related services, so as to make appropriate choices.
This Privacy Policy will help you understand:
We will collect and use your information in accordance with the Privacy Policy, but we will not bundle the collection of personal information in a mandatory manner just because you agree to this Privacy Policy.
When you use or enable certain functions or use services, we will collect and use relevant information as necessary to realize the functions and services. Unless it is necessary information for realizing business functions or as required by laws and regulations, you can refuse to provide it without affecting other functions or services. We will explain the information to be collected item by item in the Privacy Policy.
Microphone, album (storage), and Bluetooth permissions are not enabled by default. They will only be used to realize specific functions or services after your explicit authorization, and you can also withdraw authorization. It is particularly important to note that even after we obtain your authorization, we will not collect your information when the relevant functions or services do not require it.
In addition to this Privacy Policy, in specific scenarios, we will also explain the corresponding purpose, scope, and method of information collection to you through real-time notifications (including pop-ups, page prompts, etc.), function update descriptions, etc. These real-time notifications and function update descriptions constitute a part of this Privacy Policy and have the same legal effect as this Privacy Policy.
The actual functions of specific versions of Parrot Group (if any, not yet open for now) services may vary slightly. If a related version does not have an independent privacy policy, we will follow this Privacy Policy to collect and process your personal information. If a specific version has an independent privacy policy, that version's privacy policy will apply concurrently. If there is any inconsistency between this Privacy Policy and the privacy policy of that specific version of Parrot Group, the specific version's privacy policy shall prevail.
The following text will help you understand in detail how we collect, use, store, transfer (if applicable), and protect personal information; and help you understand how to manage your personal information. This policy is closely related to your use of our services. We recommend that you carefully read and understand the full content of this policy and make the choices you deem appropriate. Important terms concerning your personal information rights and interests have been highlighted in bold for your special attention.
1. How We Collect and Use Personal Information
2. How We Use Cookies and Similar Technologies
3. Partners Involved in Data Use, Transfer, and Public Disclosure of Personal Information
4. How We Store Personal Information
5. How We Protect the Security of Personal Information
6. Exercising Your Personal Information Rights
7. Minors' Clauses
8. Revision and Notification of the Privacy Policy

1. How We Collect and Use Personal Information
We will collect information you actively provide when using the service, as well as information generated during your use of functions or receipt of services through automated means, in the following ways:
1.1 Smart Conversations
We provide related services to you based on generative artificial intelligence model technology. You can provide us with text, voice, images, files or directly send operation instructions via operation buttons within the software through the "Software" itself. We collect this information to provide you with smart conversations in text and voice (including real-time calls) forms, as well as image and music generation services.
When you actively take photos or input images or voice, depending on the function's needs, we will request your authorization for the camera, album (storage), and microphone permissions (primarily on mobile devices) based on the type of information you input. If you refuse to authorize, you will not be able to take photos, input image information, or voice information, but this will not affect your use of other functions of Parrot Group.
1.2 User Feedback and Services
a. Customer Service and Issues: To facilitate communication with you, help resolve your issues as quickly as possible, or record the solutions and results of related issues, we may retain your communication/call records and related content (including account information, feedback information, other information you provide to prove relevant facts, or your contact information) . To provide you with services such as problem consultation and exception diagnosis, and to resolve your issues in a timely manner, we may need to collect and use your operation, usage, service log information, or other necessary information that can prove the facts (this depends on the type of issue you communicate with us about).
b. When you complain about others or are complained about by others, to protect your and others' legitimate rights and interests, we may provide your account/identity information, contact information, and complaint-related content to consumer rights protection departments and regulatory authorities to resolve the complaint dispute promptly, unless explicitly prohibited by laws and regulations.
c. Questionnaire Surveys: For the reasonable need to provide services and improve service quality, we may send questionnaires to you on Parrot Group or partner platforms. When analyzing questionnaires, we will use your questionnaire response information, as well as other information you provided when contacting customer service; if you prefer not to, you may decline to participate in the questionnaire survey.
1.3 Other Functions
1.3.1 Message Notifications
You acknowledge and agree that during our operations, we may send you one or more types of notifications through the contact information (e.g., phone number) you provided during your use of the products and/or services, such as for user message notifications, identity verification, security verification, and user experience surveys. In addition, we may also use the phone numbers collected during the aforementioned process to send you commercial information via SMS or phone calls, such as services, functions, or activities you may be interested in. However, please rest assured that if you do not wish to receive such information, you can unsubscribe through the method provided in the SMS or contact us directly through the customer service system to unsubscribe.
1.3.2 Payment Services
Paid features within this game (such as purchasing virtual items, subscriptions, etc.) will be completed through the payment channels provided by the Steam platform, with the specific payment method subject to the Steam Wallet. You shall comply with the relevant payment terms of Valve Corporation.
1.4 Operation and Security Operation/Assurance
1.4.1 Operation and Security Assurance

We are committed to providing you with a safe and trustworthy product and usage environment. Providing high-quality and reliable services and information is our core goal. To maintain the normal operation of our services and protect your or other users' or the public's legitimate interests from harm, we will collect necessary information for maintaining the safe and stable operation of the products or services.
1.4.2 Device Information and Log Information
a. To ensure the safe operation of the software and services, as well as the quality and efficiency of operations, we will collect your hardware model, operating system version number, device identifier, GAID, IP address, WLAN access points (such as SSID, BSSID), Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, usage, service logs, and device sensor data (such as accelerometer, gyroscope sensors).
b. To prevent malicious programs and ensure operational quality and efficiency, during your use of Parrot Group, we will collect information on installed applications, software lists or running process information, overall page operation, usage status and frequency, page crash status, overall usage status, and performance data.
1.5 Changes in Purposes of Collecting and Using Personal Information
Please understand that as our business develops, the functions and services provided by Parrot Group may be adjusted or changed. In principle, when new functions or services are related to our currently provided functions or services, the collection and use of personal information will have a direct or reasonable connection with the original processing purpose. In scenarios where there is no direct or reasonable connection with the original processing purpose, we will inform you again and obtain your consent through page prompts, interaction processes, or agreement confirmation in accordance with laws, regulations, and national standards when collecting and using your personal information.
1.6 Exceptions for Obtaining Authorized Consent
Please understand that in the following circumstances, according to laws, regulations, and relevant national standards, we may collect and use your personal information without obtaining your prior authorized consent:
a. Where it is related to our performance of obligations under laws and regulations;
b. Where it is directly related to national security and national defense security;
c. Where it is directly related to public safety, public health, or major public interests;
d. Where it is directly related to criminal investigations, prosecutions, trials, and the execution of judgments;
e. Where it is necessary to protect the life, property, or other significant legitimate rights and interests of you or others, but it is difficult to obtain your authorization and consent;
f. Where the personal information is disclosed to the public by you yourself;
g. Where it is necessary for the conclusion and performance of a contract at the request of the personal information subject;
h. Where the personal information is collected from legally publicly disclosed information, such as legitimate news reports, government information disclosure, etc.;
i. Where it is necessary for maintaining the safe and stable operation of the software and related services, such as discovering and handling faults in the software and related services;
j. Where it is necessary for conducting legitimate news reporting;
k. Where it is necessary for academic research institutions to conduct statistics or academic research based on the public interest, and when providing the results of academic research or descriptions externally, the personal information contained in the results is de-identified;
l. Other circumstances stipulated by laws and regulations.
Special Reminder: If information cannot identify your personal identity alone or in combination with other information, it does not constitute your personal information under the law. When your information can identify your personal identity alone or in combination with other information, or when we combine data that cannot be linked to any specific individual with your other personal information, such information will be treated and protected as your personal information under this Privacy Policy during the period of combined use.
2. How We Use Cookies and Similar Technologies
Cookies, device identifiers, and similar technologies are commonly used technologies on the internet. When you use Parrot Group and related services, we may use relevant technologies to send one or more cookies or anonymous identifiers to your device to collect, identify, and store information about your access to and use of this product. We promise not to use cookies for any purposes other than those described in this Privacy Policy. We use cookies and similar technologies mainly to achieve the following functions or services:
2.1 Ensuring the Safe and Efficient Operation of Products and Services
We may set cookies or anonymous identifiers for authentication and security purposes to confirm whether you have securely logged into the service, or whether you have encountered theft, fraud, or other illegal acts. These technologies also help us improve service efficiency and enhance login and response speed.
2.2 Helping You Obtain a More Effortless Access Experience
Using such technologies can help you avoid the steps and processes of repeatedly filling in personal information and inputting search content (example: recording conversations).
2.3 Clearing Cookies
You can manage or reject cookies and similar technologies through your browser settings. Specifically, go to the browser's "Settings" page, find the privacy and security settings page, and disable the settings that allow websites to save and read cookies.
Please note that the specific method of disabling depends on the type of browser you choose. Taking Google Chrome as an example, you can refer to the following steps for related operations:
• Enter the browser's built-in "Settings" page;
• Click "Advanced" to expand the settings list;
• Click "Privacy and Security";
• Click "Cookies and other site data";
• Click "Block all cookies". However, please note that if you disable cookies or similar technologies, you may not be able to enjoy the best service experience, and some services may not function properly.
3. Partners Involved in Data Use, Transfer, and Public Disclosure of Personal Information
3.1 Partners Involved in Data Use
3.1.1 Principles

a. Principle of Legality: Data use activities involving cooperation with partners must have a legitimate purpose and comply with the legal basis. If the partner's use of information no longer complies with the principle of legality, it shall no longer use your personal information, or shall do so only after obtaining the corresponding legal basis.
b. Principle of Legitimacy and Minimal Necessity: Data use must have a legitimate purpose and shall be limited to what is necessary to achieve that purpose.
c. Principle of Security and Prudence: We will carefully evaluate the purposes for which partners use data, comprehensively assess the security capabilities of these partners, and require them to comply with cooperative legal agreements.
3.1.2 Entrusted Processing
For scenarios involving entrusted processing of personal information, we will sign relevant processing agreements with entrusted partners in accordance with legal provisions and supervise their use of personal information.
3.1.3 Joint Processing
For scenarios involving joint processing of personal information, we will sign relevant agreements with partners in accordance with legal provisions and stipulate their respective rights and obligations, ensuring compliance with relevant legal provisions and data security during the use of relevant personal information.
3.1.4 Scope of Partners
If specific functions and scenarios involve services provided by our affiliates or third parties, the scope of partners includes our affiliates and third parties.
3.1.5 Data Use for Function or Service Realization
When you use functions provided by our partners within Parrot Group, such as providing audio or video content in conversations, our partners may use information necessary to achieve business purposes to return more relevant content or query results to you.
3.1.6 Information Provision for Security and Analytical Statistics
a. Ensuring Security of Use: We attach great importance to the security of accounts, services, and content. To protect the security of your and other users' accounts and property, and to safeguard your and our legitimate rights and interests from unlawful infringement, our partners may use necessary device, account, and log information.
b. Analyzing Product Performance: To analyze the usage and performance of our products, our partners may need to use product usage information (crashes, freezes), device identification information, application installation and usage information, etc.
3.2 Transfer
As our business continues to develop, we may undergo mergers, acquisitions, or asset transfers, and your personal information may be transferred as a result. In the event of such changes, we will, in accordance with laws and regulations and security standards not lower than those set forth in this Privacy Policy, require the successor to continue to fulfill the obligations of a personal information processor. If the successor changes the original processing purpose or method, we will require the successor to obtain your authorization and consent again.
3.3 Public Disclosure
a. We will not publicly disclose your personal information unless required by national laws and regulations or with your consent. When we publicly disclose your personal information, we will adopt security protection measures that comply with industry standards.
b. When announcing penalties for non-compliant accounts or fraudulent activities, we may disclose relevant account information.
3.4 Exemptions from Obtaining Consent for Provision and Public Disclosure
Please understand that in the following circumstances, according to laws, regulations, and national standards, we may provide or publicly disclose your personal information to partners without obtaining your authorization and consent:
a. Where it is necessary for concluding or performing a contract at your request;
b. Where it is necessary for performing statutory duties or obligations;
c. Where it is directly related to national security and national defense security;
d. Where it is directly related to criminal investigations, prosecutions, trials, and the execution of judgments;
e. Where it is necessary for responding to public health emergencies, or for protecting the life, health, and property safety of natural persons in emergency situations;
f. Where it involves processing personal information within a reasonable scope for implementing news reporting, public opinion supervision, and other such activities in the public interest;
g. Where it involves processing personal information that you have publicly disclosed or that has been otherwise lawfully disclosed, in accordance with relevant legal provisions;
h. Where personal information is collected from legally publicly disclosed information;
i. Other circumstances stipulated by laws and administrative regulations.
4. How We Store Personal Information
4.1 Storage Location

In accordance with laws and regulations, we store your personal information collected and generated during our domestic operations within the territory of the People's Republic of China. Currently, we do not transfer the aforementioned information overseas. If we do transfer it overseas, we will strictly comply with relevant Chinese laws and regulatory policies, and will follow relevant national regulations or obtain your consent.
4.2 Storage Period
We are committed to making every effort to protect the security of your personal information. We will retain your personal information only for the period necessary to provide Parrot Group services and will not retain it beyond the principle of necessity. For example:
For information you input, feedback you provide, likes, dislikes, and related information, we will retain such information to provide you with continuous business functions until you withdraw, delete, or cancel your account.
If you cancel your account, proactively delete personal information, or after the necessary retention period expires, we will delete or anonymize your personal information, except in the following circumstances:
Compliance with legal and regulatory requirements for information retention.
Reasonable extension of the retention period for purposes such as finance, auditing, or dispute resolution.
5. How We Protect the Security of Personal Information
5.1 We attach great importance to the security of your personal information and will endeavor to take reasonable security measures (including technical and managerial aspects) to protect your personal information, preventing improper use or unauthorized access, public disclosure, use, modification, damage, loss, or leakage of the personal information you provide.
5.2 We will use encryption technologies, anonymization, and other reasonable and feasible means not inferior to industry standards to protect your personal information, and use security protection mechanisms to prevent your personal information from malicious attacks.
5.3 We will establish a dedicated security department, security management systems, and data security processes to ensure the security of your personal information. We adopt strict data use and access policies to ensure that only authorized personnel can access your personal information, and we conduct regular security audits of data and technology.
5.4 Although we have taken the reasonable and effective measures described above and complied with the standards required by relevant laws and regulations, please understand that due to technological limitations and the existence of various malicious means, in the internet industry, even if we do our utmost to strengthen security measures, it is impossible to guarantee one hundred percent security of information. We will endeavor to ensure the security of the personal information you provide to us.
5.5 You acknowledge and understand that the systems and communication networks you use to access our services may have issues beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and related personal information to others.

5.6 We will formulate emergency response plans and activate them immediately in the event of a user information security incident, striving to prevent the expansion of the impact and consequences of such incidents. Once a user information security incident (leakage, loss) occurs, we will promptly inform you in accordance with legal and regulatory requirements: the basic situation and possible impact of the security incident, the measures we have taken or will take, suggestions for you to prevent and mitigate risks on your own, and remedial measures for you. We will promptly inform you of the relevant circumstances of the incident via push notifications, emails, letters, SMS, and related methods. If it is difficult to inform you individually, we will issue a notice in a reasonable and effective manner. At the same time, we will also report the handling of the user information security incident to relevant regulatory authorities as required.
6. Exercising Your Personal Information Rights
We attach great importance to your management of personal information and do our utmost to protect your rights to access, copy, correct, supplement, delete, withdraw authorization, cancel your account, file complaints and reports, and set privacy functions, so that you have the ability to protect your privacy and information security.
6.1 Accessing, Copying, Correcting, Supplementing, and Deleting Your Personal Information
You can access, copy, correct, supplement, or delete your personal information through the software's internal operations:
a. Access/Correct/Supplement Account Information
b. Access/Copy/Delete Chat History
c. Manage/Delete Your Creations
*If you are unable to complete the above operations through these methods, you can contact us through customer service.
6.2 Account Cancellation
If you need to cancel your account in this game (i.e., delete in-game data), you can apply for cancellation through the in-game settings or by contacting customer service. After cancellation, your game progress, UGC content, etc., will be deleted, but your Steam account will remain under the management of Valve.
6.3 Accessing the Privacy Policy
(1) You can access the Privacy Policy on the Parrot Group software or official website.
(2) Please understand that to meet operational needs, we may develop different versions based on factors such as the device model and system version you are using. A specific version of Parrot Group may only support some of the functions described in this Privacy Policy. The specific available functions are subject to your actual use. We are always committed to service innovation and upgrading to better meet your needs. As our service scope continues to expand, you may encounter new services not yet specifically described in this Privacy Policy. In this process, if such services require the collection of your personal information, we will inform you of the specific scope, purpose, and use of the information collection through page prompts, interaction processes, and other methods.
6.4 Cessation of Operations and Notification to You
If we cease operations, we will promptly stop collecting your personal information, notify you of the cessation of operations by individual notice or public announcement, and delete or anonymize your personal information held by us.
7. Minors' Clauses
We also attach great importance to the protection of minors' personal information.
7.1 We protect minors' personal information in accordance with relevant national laws and regulations. We will only collect, use, or disclose minors' personal information when permitted by law, with the explicit consent of parents or other guardians, or when necessary to protect minors. If we discover that we have collected a minor's personal information without obtaining verifiable guardian consent, we will endeavor to delete the relevant information as soon as possible.
7.2 If you are a guardian of a minor and have other questions about the personal information of the minor under your guardianship, please contact us through the contact information published in Article 9 of this Privacy Policy.
8. Revision, Notification, and Application of the Privacy Policy
8.1 To provide you with better services, Parrot Group and related services will be updated and changed from time to time. We will revise this Privacy Policy as appropriate. These revisions constitute a part of this Privacy Policy and have the same legal effect as this Privacy Policy. Without your explicit consent, we will not reduce the rights you are entitled to under the currently effective version of this Privacy Policy.
8.2 After this Privacy Policy is updated, we will release the updated version on Parrot Group and remind you of the updated content through official website announcements or other appropriate means before the updated terms take effect, so that you can promptly understand the latest version of this Privacy Policy.