The core values that guide how we handle your personal information
Your personal information is protected with military-grade AES-256 encryption and zero-knowledge architecture.
We clearly explain what data we collect, how we use it, and give you full control over your information.
You own your data. Access, modify, or delete your information anytime with simple, user-friendly tools.
We only collect data that's essential for providing you with the best AI companion experience.
When you create an account, we collect your email address, username, and basic profile information to personalize your experience.
Your conversations with AI companions are stored locally on your device and encrypted. We never read or analyze your personal conversations.
We collect anonymized usage statistics to improve our service, including feature usage, session duration, and performance metrics.
Basic device information like browser type, operating system, and IP address for security and optimization purposes.
Your data enables us to provide personalized AI companion experiences, remember your preferences, and maintain conversation context.
Anonymized usage data helps us improve our AI models, fix bugs, and develop new features that enhance your experience.
We use your data to detect and prevent fraud, abuse, and security threats to protect you and our community.
We may use your contact information to send important service updates, security alerts, and optional product announcements.
We never sell, rent, or trade your personal information to third parties. Your data is not a commodity to us.
We may share limited data with trusted service providers (hosting, analytics) who are bound by strict confidentiality agreements.
We may disclose information when required by law, court order, or to protect our rights and the safety of our users.
In the event of a merger or acquisition, your data would be transferred under the same privacy protections.
All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption with regularly rotated keys.
Strict access controls ensure only authorized personnel can access systems, with all access logged and monitored.
We conduct regular security audits, penetration testing, and vulnerability assessments to maintain the highest security standards.
We have a comprehensive incident response plan and will notify you within 72 hours of any data breach affecting your information.
Request a complete copy of all personal data we have about you in a machine-readable format.
Update or correct any inaccurate personal information through your account settings or by contacting us.
Request deletion of your personal data. We'll permanently remove it within 30 days, except where legally required to retain it.
Export your data to use with other services. We provide standard formats for easy migration.
Control marketing communications, data processing for analytics, and other optional data uses through your privacy settings.
We meet and exceed international privacy and security standards
European General Data Protection Regulation
California Consumer Privacy Act
Service Organization Control 2
Information Security Management