Phanthy Privacy Policy
- Updated Date: January 23, 2026
- Effective Date: January 23, 2026
This Phanthy Pantheon Platform Privacy Policy (hereinafter referred to as the "Policy") applies to the vertical scenario AI service platform launched by 4Paradigm (Beijing) Technology Co., Ltd. and its affiliated companies (hereinafter referred to as the "Pantheon Platform" or the "Service"). Before using the Service, please carefully read this Policy to understand the details of how we process your personal information.
Unless otherwise specified in this Privacy Policy, this Policy applies to the Pantheon Platform's websites, applications, mini-programs, Software Development Kits (SDKs) and Application Programming Interfaces (APIs) provided for third-party websites and applications, as well as products and services provided through innovative forms emerging with technological development. If you use certain services (including general dialogue and professional vertical Q&A services) of the Pantheon Platform provided by us or our affiliated companies that have independent privacy policies, such services or products shall be governed by the corresponding privacy policies; if no independent privacy policy is established, this Policy shall also apply to such products or services.
Please note that the processing rules for personal information collected from end users when they access downstream systems or applications developed by developers using our open platform services are not within the scope of this Privacy Policy. The developer operating such applications, as the processor of the personal information processing activities, shall disclose the relevant personal information protection rules to end users. In addition, if you access third-party webpages, products, or services through links on the Pantheon Platform (including links to professional vertical Q&A services integrated within the platform), you shall be bound by the relevant agreements or other documents of such third parties, which will process and disclose your personal information in accordance with their respective agreements or policies.
When you use or enable relevant functions or services, we will collect and use relevant information as necessary to implement the functions and services. Except for necessary information required to implement business functions or as mandated by laws and regulations, you may refuse to provide such information without affecting other functions or services. We will specify the information to be collected item by item in this Privacy Policy.
Sensitive permissions are not enabled by default and will only be used to implement specific functions or services with your explicit authorization. You may also revoke such authorization. It is particularly important to note that even if we obtain these sensitive permissions with your authorization, we will not collect your information when such permissions are not required for the relevant functions or services.
The following content will help you understand in detail how we collect, use, store, transfer (if applicable), and protect your personal information; and how you can inquire about, copy, delete, correct, and revoke authorization for your personal information. This Policy is closely related to your use of our services, so we recommend that you carefully read and understand the entire content of this Policy and make appropriate choices. Important clauses regarding your personal information rights and interests have been highlighted in bold for your special attention.
This Policy will help you understand the following:
- How we collect and use your personal information
- How we use Cookies and similar technologies
- How we entrust the processing of, share, transfer, and publicly disclose your personal information
- How we protect your personal information
- How we store your personal information
- How you can exercise your rights to manage your personal information
- How we protect minors' personal information
- How we update this Policy
- How to contact us
- Others
I. How We Collect and Use Your Personal Information
As a processor of personal information, the Phanthy Pantheon Platform adheres to the principles of legality, legitimacy, necessity, and good faith, and collects and uses your personal information for the purposes described below.
1. Account Registration, Login, and Authentication
To ensure the security of your account usage, you need to register and log in before using the relevant services normally. During registration and login, you need to provide us with your mobile phone number or email address, set a login password, and enter a verification code to allow us to verify your user identity. A mobile phone number or email address is necessary information to comply with the real-name registration requirements stipulated by national laws and regulations. If you refuse to provide a mobile phone number or email address for registration and login, we may not be able to provide you with AI services.
You can log in to and use the Pantheon Platform using a third-party account. With your consent, we will obtain the public information you registered on the third-party platform (such as avatar, nickname, and other information you authorize) to bind with your Pantheon Platform account, enabling you to log in directly and use this product and related services.
When you use the "one-click login" function, with your consent, we will process your mobile phone number together with our partners to provide you with a convenient login service. If you refuse such processing, you will not be able to register or log in via the "one-click login" method, but this will not affect your ability to register or log in through other methods or the normal use of other functions.
2. Vertical Scenario AI Services
The Pantheon Platform provides you with multiple vertical scenario AI service functions, including general dialogue and professional field Q&A services. When you use relevant AI services, we will collect the content you input during interactions with the AI system (including but not limited to text, images, files, voice, and videos). We will analyze and compute the above information to better understand your needs and contextual context, thereby providing you with more relevant service content. In particular, we will not extract or mine voiceprints, facial recognition information, or other unique biometric features or identifiers used to identify specific individuals from the voice inputs or photos you provide to us.
When you choose to paste content from the system clipboard into the input box, we will collect your clipboard information. When you use the search service, we will automatically receive the information you actively input to provide you with real-time search results.
Sensitive permissions are not enabled by default and will only be used to implement specific functions or services with your explicit authorization. You may also revoke such authorization. It is particularly important to note that even if we obtain the following sensitive permissions with your authorization, we will not collect your information when such permissions are not required for the relevant functions or services:
- Camera permission: When you actively take photos, we will request your authorization for camera permission. If you refuse authorization, you will not be able to take photos, but this will not affect your use of other functions of the platform.
- Album permission: When you need to upload images or videos, we will request your authorization for album permission. If you refuse authorization, you will not be able to upload relevant content, but this will not affect your use of other functions of the platform.
- Microphone permission: When you wish to use the voice input function, we will request your authorization for microphone permission. If you refuse authorization, you will not be able to input voice to interact with the AI, but this will not affect your use of other functions of the platform.
- Storage permission: When you need to upload or save files, we will request your authorization for storage permission. If you refuse authorization, you will not be able to use relevant file functions, but this will not affect other functions of the platform.
During use, you can provide feedback and evaluations on the content output by the AI system. We will collect your feedback information, including content you actively submit, as well as like and dislike records, to continuously improve the quality of the output content of the AI services.
To provide you with continuous and high-quality services, after being processed by secure encryption technology and de-identification, we may use the inputs collected through the services and their corresponding outputs for AI model training and service optimization. If you refuse to allow your data to be used for model training, you can opt out by disabling "Data Used for Experience Optimization" within the product. After disabling, your inputs and outputs will no longer be used for our model training. At the same time, we recommend that you do not actively input your personal sensitive information (such as ID card number, bank card number, health information, etc.) or others' personal information during AI interactions. If the information you actively input contains others' personal information, please ensure that you obtain the legal authorization of the relevant individuals in advance to avoid the improper disclosure of others' personal information.
3. Scenario Customization and Personalized Services
To provide you with more personalized vertical scenario AI services, we may collect information such as your scenario preference settings, usage habits, and historical interaction records to analyze your needs and characteristics and recommend more suitable AI scenario functions for you. You can manage your personalized preferences in the settings at any time.
4. Open Platform Services
When you use the open platform services of the Pantheon Platform, we may collect the following information:
We need to authenticate your identity. You can choose to authenticate as an individual account or as an enterprise account on behalf of an enterprise. In accordance with relevant laws and regulations, if you choose to authenticate as an individual developer, we may collect your real identity information (including real name, ID number, phone number, and other necessary identity information) to complete real-name verification; if you authenticate as an enterprise developer on behalf of an enterprise, we may collect the real names of the legal representative and enterprise contact person of your company, as well as the enterprise business license information to complete enterprise real-name verification. Some of this information is personal sensitive information, and you may refuse to provide it. If you refuse to provide it, you may not be able to obtain the relevant services, but this will not affect the normal use of other functions and services.
To push functional updates, commercial information, and product notifications of the open platform to you, we will collect your email information and bind it to your account. You may refuse to provide and bind your email address. If you refuse to provide it, you may not be able to obtain the relevant services, but this will not affect the normal use of other functions and services.
When you use paid services for pre-recharge, we will collect your payment order and transaction information to provide you with services such as order placement, payment, customer service, and after-sales for recharge orders, and display and provide you with specific paid services.
The collection and processing of the above personal information only apply to the open platform of the Pantheon Platform. If you do not use the open platform services, the collection and processing of the above data will not be involved.
5. Feedback
When you use the feedback function, we will collect your problem description, supporting document attachments, mobile phone number, email address, and contact person's name to understand the content and needs of your feedback. Such information is necessary for the feedback function service. To verify your identity, clarify your needs and the handling plan for relevant issues, or help you solve other problems, we will use your mobile phone number or email address. To provide you with feedback services related to your usage information, we will query your usage information, including interaction records and feedback records.
If you contact us directly through the methods described in Chapter IX of this Policy to provide feedback, make complaints, appeals, or consult about platform-related issues, to ensure the security of your account and the system, you need to provide us with your account information to allow us to verify your user identity. Such information is necessary for identity verification in user feedback. During the feedback, complaint, or consultation process, to help you solve the problem or record the handling plan and results of relevant issues, you may need to provide us with corresponding supporting document attachments, and the system may record the communication records between you and us to better help you solve the consulted issues and improve service quality. If you do not provide the above information, we may not be able to timely feedback the results of your consultation, but this will not affect your normal use of the platform services. At the same time, we recommend that you do not actively provide your personal sensitive information in the feedback. If the information you actively provide contains others' personal information, please ensure that you obtain the legal authorization of the relevant individuals in advance to avoid the improper disclosure of others' personal information.
6. Message Notifications
You acknowledge and agree that for the contact information you provide during the use of the products and/or services (such as phone number, email address), we may send various notifications to one or more of them during operation for purposes such as user message notification, identity verification, security verification, user experience research, and dispute resolution; in addition, we may also send you commercial information about services, functions, or activities via SMS, phone calls to the mobile phone number collected above, or emails to the email address collected above. However, please rest assured that if you do not wish to receive such information, you can unsubscribe through the unsubscribe method provided in the SMS or email, or contact us directly to unsubscribe.
7. Operation and Security Assurance
To ensure the security of your account and better provide you with high-quality services, we will automatically collect the following information generated during your use of the Pantheon Platform services as network logs:
To ensure the safe operation, operation quality, and efficiency of the software and services, we will collect your hardware model, operating system version number, device identifiers (such as AndroidID and OAID for Android; IDFV for iOS; different identifiers vary in terms of validity period, whether they can be reset by users, and acquisition methods), IP address, software version number, network access method, type, status, network quality data, operations, usage, and service logs.
To prevent malicious programs and ensure operation quality and efficiency, we may collect information about running processes, overall page operation, usage frequency, page crash conditions, overall usage, and performance data. To determine account and transaction security, conduct identity verification, identify illegal and irregular activities, detect and prevent security incidents, and take necessary recording, analysis, and disposal measures in accordance with the law, we may use your account information, device information, and service log information.
To analyze statistical indicators such as application new additions, activations, retention, and performance, we may conduct attribution analysis of relevant statistical information. Please rest assured that during this statistical process, we will not upload any of your private information to our servers.
We may use the above network log information to count the usage of the platform, troubleshoot problems, and conduct operational analysis, improvement, and optimization of product interaction experience through data statistics.
8. Other Rules for Collecting and Using Personal Information
Please understand that as our business develops, we may adjust and change functions and services provided. In principle, when new functions or services are related to the functions or services we currently provide, the personal information collected and used will have a direct or reasonable connection with the original processing purpose. In scenarios where there is no direct or reasonable connection with the original processing purpose, we will, in accordance with the requirements of laws, regulations, and national standards, separately inform you through page prompts, interactive processes, agreement confirmation, etc., and obtain your consent before collecting and using your personal information.
Please understand that in the following circumstances, in accordance with laws, regulations, and relevant national standards, we may collect and use your personal information without prior authorization from you: (1) It is necessary for us to fulfill obligations stipulated by laws and regulations; (2) It is directly related to national security and national defense security; (3) It is necessary to safeguard public security, public health, and major public interests; (4) It is directly related to criminal investigation, prosecution, trial, and execution of judgments; (5) It is necessary to protect the life, property, and other major legitimate rights and interests of you or others but it is difficult to obtain the authorization consent of the person concerned; (6) Personal information that you voluntarily disclose to the public; (7) It is necessary to sign and perform a contract at the request of the personal information subject; (8) Personal information collected from legally publicly disclosed information, such as legal news reports and government information disclosure channels; (9) It is necessary for conducting legitimate news reports; (10) Other circumstances stipulated by laws and regulations.
It is particularly important to note that if information cannot identify your personal identity alone or in combination with other information, it is not your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information, or when we combine data that cannot be associated with any specific personal information with other personal information of yours, such information will be treated and protected as your personal information in accordance with this Privacy Policy during the period of combined use.
II. How We Use Cookies and Similar Technologies
1. Use of Cookie Technology
We will collect and use your information through Cookies and store such information as log information. We use our own and third-party Cookies for the following purposes: (1) To remember your identity. For example: Cookies help us identify you as our registered user or save other information you provide to us; (2) To ensure service security. For example: Cookies can help us identify malicious users or malicious access behaviors, and detect and prevent attacks and damage to the website; (3) To optimize user experience. For example: Cookies can help us remember your preference settings and provide you with a more personalized service experience.
2. Use of Cookie-like Technologies
The Cookie-like technologies we use include web beacons and pixel tags. We use the above similar technologies to understand your product or service preferences and improve customer service.
3. Clearing Cookies
Most browsers provide users with the function to clear browser cache data. You can perform corresponding data clearing operations in the browser settings. If you clear Cookies, due to these changes, you may not be able to use services or corresponding functions that rely on Cookies.
III. How We Entrust the Processing of, Share, Transfer, and Publicly Disclose Your Personal Information
1. Principles of Data Sharing
(1) Legality principle: Data usage activities involved in cooperation with partners must have a legitimate purpose and comply with the legal basis for legitimacy. If the partner's use of information no longer complies with the legality principle, it shall cease to use your personal information or obtain the corresponding legal basis before using it. (2) Legitimacy and minimum necessity principle: Data usage must have a legitimate purpose and be limited to what is necessary to achieve the purpose. (3) Safety and prudence principle: We will carefully evaluate the purpose of the partner's data usage, conduct a comprehensive assessment of the partner's security assurance capabilities, and require them to comply with the cooperative legal agreement. We will conduct strict security monitoring of the Software Development Kits (SDKs) and Application Programming Interfaces (APIs) through which partners obtain information to protect data security. (4) For scenarios involving entrusted processing of personal information, we will sign relevant processing agreements with entrusted partners in accordance with legal provisions and supervise their personal information usage activities. (5) For scenarios involving joint processing of personal information, we will sign relevant agreements with partners in accordance with legal provisions and agree on their respective rights and obligations to ensure compliance with relevant legal provisions and data security during the use of relevant personal information. (6) If specific functions and scenarios involve services provided by our affiliated companies or third parties, the scope of partners shall include our affiliated companies and third parties.
2. Data Usage for Implementing Functions or Services
(1) When you use functions provided by our partners on the Pantheon Platform, or services jointly provided to you by software service providers, smart device providers, system service providers, and us, we may use the information necessary to achieve business purposes with them. (2) When you use the "one-click login" function, with your consent, we will process your mobile phone number together with our partners to provide you with a convenient login service. If you refuse such processing, you will not be able to register or log in via the "one-click login" method, but this will not affect your ability to register or log in through other methods or the normal use of other functions. (3) When you use the identity authentication function of the open platform or related services, in accordance with relevant laws, regulations, and security requirements, you may need to complete real-name verification to verify your identity. During the real-name verification process, the authentication service provider cooperating with us needs to use your real name, ID number, and mobile phone number. Some of this information is personal sensitive information. Refusing the above use will result in your inability to complete identity authentication and may prevent you from obtaining relevant services, but it will not affect the normal use of other functions of the open platform. Such information is only used for real-name verification and purposes stipulated by laws and regulations, and will not be used for other purposes without your explicit authorization. (4) AI capability providers: We may cooperate with third-party AI model, technical service, and professional knowledge providers to provide you with AI services in various vertical scenarios. In this process, we will provide partners with necessary interaction content and technical parameters to implement AI functions. We require all partners to strictly comply with data protection agreements and not use your data for other purposes.
3. Data Usage for Implementing Promotion Business
(1) To implement product promotion and related analysis services, and optimize and improve the effective reach rate of promotion, the product promoter or partner providing promotion and related analysis services may need to use de-identified or anonymized device, network, channel information, and conversion data. (2) Promotion partners may combine the above information with other legally obtained data to optimize promotion effects. We will require them to use the information in accordance with the principles of legality, legitimacy, and necessity to protect the legitimate rights and interests of users from infringement.
4. Providing Information for Implementing Security and Analysis Statistics
(1) Ensuring usage security: We attach great importance to account, service, and content security. To protect the account and property security of you and other users and safeguard the legitimate rights and interests of you and us from infringement, our partners may use necessary device, account, and log information. (2) Analyzing product performance: To analyze the usage and performance of our products, our partners may need to use information such as product usage (crashes, flashbacks), device identification information, and overall application installation and usage.
5. Transfer
As our business continues to develop, we may conduct mergers, acquisitions, or asset transfers, and your personal information may be transferred accordingly. In the event of the aforementioned changes, we will require the successor to continue to fulfill the obligations of a personal information processor in accordance with laws, regulations, and security standards no lower than those specified in this Privacy Policy. If the successor changes the original processing purpose or method, we will require the successor to re-obtain your authorization consent.
6. Public Disclosure
(1) We will not publicly disclose your personal information unless required by national laws and regulations or with your consent. When publicly disclosing your personal information, we will adopt security protection measures that meet industry standards. (2) We may publicly disclose your personal information in the event of legal proceedings, litigation, or mandatory requirements from government authorities. (3) If we determine that you have violated laws and regulations or seriously violated the relevant agreement rules of this product, or to protect the personal and property safety of users of this product and its affiliated companies or the public from infringement, we may disclose your personal information in accordance with laws, regulations, or the relevant agreement rules of this product, including relevant illegal acts and measures taken against you by this product. (4) When using the "content sharing" or similar public content functions, if you choose to publicly publish content to the public network, such content may be at risk of being obtained by third parties through technical means such as web crawlers. We have adopted industry-general anti-crawling mechanisms to make commercially reasonable efforts to prevent third parties from crawling content publicly shared by users, but due to technical limitations commonly existing in the industry, such risks cannot be completely eliminated. Therefore, we recommend that when using this function: (1) avoid inputting or sharing your personal information or others' personal information, especially personal sensitive information; (2) if you must input or share others' personal information, please ensure that you obtain their explicit authorization in advance; (3) carefully screen for information that you do not want third parties to know before publicly publishing relevant content to the public network.
7. Exceptions to Prior Authorization for Entrusted Processing, Sharing, Transfer, and Public Disclosure of Personal Information
In the following circumstances, prior authorization from you is not required for the entrusted processing, sharing, transfer, or public disclosure of your personal information: (1) It is necessary for us to fulfill obligations stipulated by laws and regulations; (2) It is directly related to national security and national defense security; (3) It is necessary to safeguard public security, public health, and major public interests; (4) It is directly related to criminal investigation, prosecution, trial, and execution of judgments; (5) It is necessary to protect the life, property, and other major legitimate rights and interests of you or others but it is difficult to obtain the authorization consent of the person concerned; (6) Personal information that you voluntarily disclose to the public; (7) It is necessary to sign and perform a contract at the request of the personal information subject; (8) Personal information collected from legally publicly disclosed information, such as legal news reports and government information disclosure channels; (9) It is necessary for conducting legitimate news reports; (10) Other circumstances stipulated by laws and regulations.
Please note: According to legal provisions, the entrusted processing, sharing, transfer, and public disclosure of anonymized personal information are not considered as acts of entrusted processing, sharing, transfer, or public disclosure of personal information to external parties. The storage and processing of such data will not require additional notification to you or obtaining your consent.
IV. How We Protect Your Personal Information
1. Protection of Users' Privacy and Personal Information
We attach great importance to the protection of users' privacy and personal information and will take reasonable measures to protect your personal information. Except as stipulated by laws and regulations or agreed in this Policy, we will use various security technologies and procedures to establish a sound management system to protect your personal information from unauthorized access, use, or disclosure. We will not publicly disclose or reveal users' personal information to third parties without users' permission, and we will adopt professional encrypted storage and transmission methods for relevant information to ensure the security of users' personal information.
2. Data Security Measures
(1) We have adopted security protection measures that meet industry standards, including establishing reasonable system specifications and security technologies to prevent your personal information from unauthorized access, use, and modification, and avoid data damage or loss. (2) We have taken all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the period necessary to achieve the purposes described in this Policy, unless an extension of the retention period is required or permitted by law. (3) The Internet is not an absolutely secure environment, and communication methods such as email, instant messaging, and interactions with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us ensure the security of your account. (4) In the event of an unfortunate personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the cause of the security incident, potential hazards, types of personal information involved, disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and measures you can take. We will promptly inform you of relevant incident details via email, SMS, phone call, notification, etc. If it is difficult to inform each individual information subject one by one, we will issue an announcement through reasonable and effective means. At the same time, we will take the initiative to report the disposal of the personal information security incident to the regulatory authorities in accordance with their requirements. Please note that in accordance with the provisions of applicable laws and regulations, if the measures taken can effectively avoid the harm caused by information leakage, tampering, or loss, we may not inform you.
V. How We Store Your Personal Information
1. Storage Location
In accordance with the provisions of laws and regulations, we store the personal information collected and generated during domestic operations within the territory of the People's Republic of China. Currently, we will not transfer the above information overseas. If we transfer it overseas, we will strictly comply with relevant Chinese laws and regulatory policies and follow relevant national regulations or obtain your consent.
2. Storage Period
We only retain your personal information for the period necessary to provide the Pantheon Platform services. For example:
- Mobile phone number/email address: When you register and log in using a mobile phone number or email address, we need to retain your contact information continuously to provide you with normal services, respond to your possible inquiries and complaints, and ensure the security of your account and the system.
- Interaction records: We need to retain your interaction records to display historical content to you.
If you cancel your account, take the initiative to delete your personal information, or after the expiration of the necessary period, we will delete or anonymize your personal information, except in the following cases:
- Comply with the requirements of laws and regulations on information retention (for example: the Cybersecurity Law stipulates: adopt technical measures to monitor and record network operation status and network security incidents, and retain relevant network logs for not less than six months in accordance with regulations).
- It is necessary to reasonably extend the retention period for financial, audit, dispute resolution, and other purposes.
In the event of the termination of the operation of this Service, the Pantheon Platform will notify you through notifications and announcements, and delete the personal information retained on the server within the period required by laws and regulations.
VI. How You Can Exercise Your Rights to Manage Your Personal Information
1. Your Rights to Personal Information
In accordance with relevant Chinese laws, regulations, and standards, you enjoy certain rights in personal information processing activities, including:
- You have the right to know and decide on the processing of your personal information, and the right to restrict or refuse others' processing of your personal information, except as otherwise stipulated by laws and administrative regulations;
- You have the right to request the personal information processor to provide access to and copies of your personal information, except as otherwise stipulated by law;
- You have the right to request the transfer of your personal information to a personal information processor designated by you;
- If you find that your personal information is inaccurate or incomplete, you have the right to request the personal information processor to correct or supplement it;
- You have the right to request the deletion of your personal information;
- You have the right to require the personal information processor to explain its personal information processing rules.
2. Methods of Exercising Rights
We ensure that you can exercise the aforementioned rights over your personal information and provide you with relevant operation paths. Specifically, you can refer to the following steps to perform relevant operations:
2.1 Change or Revoke Authorization Scope
a. You can disable permissions such as camera, album, microphone, and storage in the device's own operating system to change the scope of consent or revoke your authorization. Specifically, you can perform the operation through the following methods:
- Android: System Settings - Application Settings - Application Management - Search for or find Phanthy Pantheon - Permission Management - Select the corresponding permission - Disable
- iOS: System Settings - Phanthy Pantheon - Select the corresponding permission - Disable
Please note that the specific disabling method may vary depending on the device model and system version you use. Please understand that after performing the above operations, we will no longer be able to provide you with the services corresponding to the revoked consent or authorization, and we will stop collecting information related to these permissions, but this will not affect the personal information processing carried out based on your prior authorization.
b. You can refuse to allow your data to be used for model training by clicking the avatar area - selecting "Settings" - selecting "Privacy Settings" - disabling "Data Used for Experience Optimization".
2.2 Access, Copy, Export, Correct, Supplement, or Delete Your Personal Information
You can access, copy, export, correct, supplement, or delete your personal information through the following methods: a. Access/correct/supplement account information: Click the avatar account area to perform the operation. b. Access/delete historical records: Expand the sidebar - select Historical Records - Delete, or click the avatar account area - select Delete All Historical Records. c. Copy/modify historical content: Select the content area - Copy/Modify. d. Export historical data: Click the avatar account area - select "Settings" - select "Privacy Settings" - Export All Historical Data.
Due to application version upgrades and functional changes, the above specific operation steps may vary. Please refer to the actual operation steps within the application. In addition to the above, if you or other authorized subjects have any claims, requests, or questions regarding the exercise of the personal information rights granted to you by relevant laws and regulations, you can contact us through the methods described in Chapter IX of this Policy. We will review the relevant issues as soon as possible and respond to you within fifteen working days after verifying your user identity. We may refuse requests that are unreasonably repetitive, require excessive technical means (such as the need to develop a new system or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical (such as information stored on backup tapes).
3. Protection of Deceased Individuals' Personal Information
We will continue to ensure the security of our users' information. If a user of the Pantheon Platform passes away, their immediate relatives (hereinafter referred to as "deceased's immediate relatives") may contact us through the methods specified in Chapter IX of this Privacy Policy for their own legitimate and proper interests. On the premise of not violating the deceased's prior arrangements and not infringing on the legitimate interests of others and the public, they may exercise rights such as accessing, copying, correcting, and deleting the deceased's corresponding personal information. To fully protect the personal information rights and interests of the deceased, the deceased's immediate relatives applying to exercise such rights need to complete identity verification procedures and commit to and ensure that the exercise of such rights by the deceased's immediate relatives does not violate the deceased's prior arrangements and that the purpose of exercising the rights is legitimate and proper.
4. Cancel Account
You have the right to cancel your account. You can cancel your account through "Homepage" - "Personal Center" - "Settings" - "Account Management" - "Cancel Account" or contact us through the methods described in Chapter IX of this Policy. Before canceling your account, we will verify your personal identity, security status, property settlement status, device information, etc. We will process your application in a timely manner after receiving it and respond to your request within fifteen working days or the time limit required by laws and regulations. You acknowledge and understand that account cancellation is an irreversible action. After you cancel your account, we will delete the relevant information about you or anonymize it. You will not be able to recover the personal information or other content related to the account, except as otherwise stipulated by laws, regulations, and relevant national standards.
VII. How We Protect Minors' Personal Information
- The Phanthy Pantheon Platform is mainly intended for adults, but we still attach great importance to the protection of minors' personal information.
- If you are a minor under the age of 18, please read and agree to this Privacy Policy together with your parents or other guardians before using this product and related services. We will not actively collect personal information from minors under the age of 14 (children). If we discover or receive feedback that we have automatically collected children's personal information without obtaining prior consent from their guardians, we will take steps to delete the relevant information as soon as possible.
- If you are a parent or other guardian of a minor and have any questions, opinions, suggestions, complaints, or reports regarding the matters described in this Policy, please provide feedback to us through the methods described in Chapter IX.
VIII. How We Update This Policy
- To provide you with better services, the Phanthy Pantheon Platform will be updated and changed from time to time. We will revise this Policy as appropriate, and such revisions shall form part of this Policy.
- After this Policy is updated, we will publish the updated version on the Pantheon Platform website and remind you to read the updated Privacy Policy again through announcements of the new version, so that you can timely understand the latest version of this Policy. If you disagree with this Policy or the revised and updated content of this Policy, you may choose to stop using the Pantheon Platform or cancel your account. Your continued use of the products and services of the Pantheon Platform shall be deemed as your acknowledgment and consent to our updates. However, please note that your actions and activities before canceling your account or stopping the use of this Service shall still be governed by this Policy.
- For major changes that will substantially impair your rights under these personal information protection rules, we will provide more prominent notifications (we will explain the specific changes to this Policy through methods including but not limited to email, SMS, or special prompts on the browsing page).
- We encourage you to review this Policy during your use of our products and/or services.
IX. How to Contact Us
If you have any questions or suggestions regarding this Policy or your personal information during the use of the Phanthy Pantheon Platform, please contact us through the following methods:
- Online self-service complaint and feedback portal: Log in to the product interface and click the "Contact Us" button.
- Contact email: phanthy@4paradigm.com
We may require you to submit identification documents, valid contact information, written requests, and relevant evidence. We will process your request after verifying your identity. We will review the relevant issues as soon as possible and respond to you within fifteen working days after verifying your user identity.
X. Others
The title of this Policy is for convenience of reading only and does not affect the meaning or interpretation of any provisions in this Policy.
The term "affiliated companies" as referred to in this Policy means companies directly or indirectly controlled by 4Paradigm (Beijing) Technology Co., Ltd., companies under common control with 4Paradigm (Beijing) Technology Co., Ltd., and companies that directly or indirectly control 4Paradigm (Beijing) Technology Co., Ltd.
This Policy shall be interpreted and disputes resolved in accordance with the laws of the mainland of the People's Republic of China. Any disputes related to this Policy shall be resolved through friendly negotiation between the parties; if negotiation fails, either party may file a lawsuit with the people's court having jurisdiction over the defendant's domicile.
Thank you for your trust and use of the Phanthy Pantheon Platform! We will continue to be committed to protecting the security of your personal information and providing you with a high-quality AI service experience.