Command Palette
Search for a command to run...
Privacy Policy
Last Updated: February 9, 2026
Important Notice
Welcome to HyperAI! We highly value the protection of your personal information and privacy. This Privacy Policy explains how we collect, use, store, and protect your personal information, as well as your rights regarding such information. Please take a moment to read this policy carefully to ensure you fully understand our practices.
1. To provide our services, we collect, use, and store information as described in this Privacy Policy.
2. With your explicit consent, we may request access to certain device permissions to enable specific features of our services. You have the right to refuse or withdraw your authorization.
3. You may access, correct, and delete your personal information; withdraw your consent; deactivate your account; submit complaints; and manage other privacy preferences.
4. We implement industry-standard security measures to safeguard your personal information.
5. If you are under the age of majority in your jurisdiction, please review this Privacy Policy with your legal guardian and use our services only after obtaining their consent.
Please review the full HyperAI Terms of Service and this Privacy Policy for detailed information.
By clicking “Agree”, you confirm that you have read, understood, and agree to be bound by both the HyperAI Terms of Service and this Privacy Policy, and you may begin using our products and services. We are committed to protecting and securing your personal information in accordance with applicable laws and industry standards.
HyperAI Privacy Policy
We take the protection of our users’ personal information and privacy (hereinafter “you”) very seriously. When you use HyperAI, we collect, use, store, and share your personal information. To clearly set forth how we handle your information, we have established this HyperAI Privacy Policy (hereinafter referred to as the “Privacy Policy”), and we are committed to processing your personal information strictly in accordance with this Privacy Policy.
We hereby remind you:
Before using HyperAI, please read this Privacy Policy carefully and ensure that you fully understand its provisions, including but not limited to those clauses that may exempt or limit our liability. By clicking “Agree” to this Privacy Policy and using HyperAI, you acknowledge that you have read and understood this Privacy Policy, and consent to our processing of your personal information as described herein.
Please note that this Privacy Policy applies only to information collected by us when providing services through HyperAI. It does not apply to information collected by third-party providers of products or services via HyperAI.
This Privacy Policy will help you understand the following:
1. How we collect and use your personal information
2. How we store your personal information
3. How we use Cookies
4. How we share, transfer, or disclose your personal information
5. How we protect your personal information
6. How you can manage your personal information
7. How we handle the personal information of minors
8. How this Privacy Policy is updated
9. How to contact us
1. How We Collect and Use Your Personal Information
1.1 How We Collect Your Personal Information
When you use HyperAI, we collect your personal information in the following ways:
1.1.1 Account Registration
When you register a HyperAI account, we collect the necessary personal information based on your chosen registration method:
- Email Registration: We collect your email address and the password you set (stored using industry-standard encryption).
- Third-Party Account Login: If you choose to log in using a third-party account (e.g., Google, GitHub), we collect information from the third-party platform as authorized by you to identify you. This typically includes your unique account identifier, display name, profile picture, and associated email address. We do not collect or store your third-party account passwords.
- Purpose and Legal Basis: We collect the above information to help you register a HyperAI account and to protect your account security. Without this information, we cannot create your account or provide you with our services.
1.1.2 Content and Information Services
When you browse or use our free content-related services, we collect information to optimize content recommendations and improve your user experience:
- Browsing and Interaction Data: This includes the articles, papers, entries, or assessments you view, your search history, clicks, and time spent on pages.
- User-Generated Content: If you share tutorials, comments, or upload datasets in the community, we process the content you actively post and its associated metadata. Please ensure that any content you share complies with applicable laws. Publicly shared information may be accessible to others.
- Legal Basis and Purpose: This processing is based on our legitimate interests (optimizing your service experience and recommending relevant content). All data used for service optimization is anonymized and aggregated.
1.1.3 Cloud Computing Services
When you use our core paid computing services, we process the following information to execute tasks, ensure system stability, and perform accurate billing:
- Computing Task and Resource Configuration: Information about the computing tasks you submit, including selected resource specifications (e.g., GPU type, memory size), runtime environment image identifiers, task duration, and other related metadata. This information is used to schedule and allocate computing resources.
- Resource Consumption Metrics: Quantitative usage data generated during task execution, including but not limited to GPU/CPU computation time, storage usage, and network data transfer. This data is anonymized, aggregated, and used solely for billing and service capacity planning.
- System Operation and Performance Logs: To ensure service stability and troubleshoot issues, we collect system-level performance metrics (e.g., resource utilization, error codes) and task status logs (e.g., task start/end times, execution status). These logs do not contain your code, models, or training data.
- Data Security and Isolation Commitment: Your computing tasks are executed in isolated and controlled environments. We implement technical and organizational measures to ensure the confidentiality of your code, training data, models, and any input/output data. Access to such data will occur only when required by applicable law or when you explicitly request assistance to resolve specific technical issues.
- Legal Basis and Necessity: Processing the above information is necessary for the performance of the contract between you and us (providing computing resources) and to comply with financial and tax obligations (accurate billing). Without this information, you will not be able to use our cloud computing services.
1.1.4 Network and Service Security
To ensure the security of the network and HyperAI services, we may collect device identifiers, IP addresses, access timestamps, browser types, user activity logs, and security event information (e.g., abnormal login attempts). We collect this information to maintain a fair, safe, and secure service environment. If you refuse to provide this information, it may affect our ability to ensure the security and stable operation of our services, and consequently impact the normal use of certain features.
1.1.5 Account Top-Up and Payments
When you top up your account, we process relevant information to ensure that transactions are completed securely and smoothly:
- Payment Record Information: We record your top-up order number, transaction amount, date and time, and selected payment channel.
- Sensitive Payment Data: We do not directly collect or store your bank card password, CVV/Security Code, or full card number. Such sensitive payment information is provided directly to qualified third-party payment platforms (e.g., Stripe, WeChat Pay). We only receive payment status notifications from the payment platform to complete the transaction.
1.2 Device Permissions
When you use HyperAI, we may request access to certain device permissions within the necessary scope. Please note that HyperAI will not enable any device permissions by default. Permissions will only be accessed when you explicitly grant them. The permissions we request, the purposes for which they are requested, and how we notify you before requesting them are summarized in the table below:
| Device Permission | Purpose of Access | User Prompted | Can Users Disable |
|---|---|---|---|
| Local File System (Read) | To allow you to select and upload data files, model files, or configuration files from your device to the platform for computation or storage. | When you click “Upload” or “Select File,” the browser will open a file picker, effectively requesting permission to read the files you select. | Yes. You can manage this in your browser settings. |
| Local File System (Write/Save) | To allow you to download and save result files, logs, or model outputs generated by the platform to a specified location on your device. | When you click “Download” or “Export,” the browser will open a save dialog, requesting permission to write files to your chosen directory. | Yes. You can manage this in your browser settings. |
If you wish to withdraw your authorization, you can do so in your browser settings for our website (hyper.ai). Disabling permissions may affect the corresponding functionality.
1.3 How We Use Your Personal Information
1.3.1 We use the personal information we collect for the purposes described in this Privacy Policy and as necessary to provide our services.
1.3.2 Please note that any personal information you provide while using our services will remain authorized for our use while you use our services, unless you delete it or refuse collection through system settings. Upon account deactivation, we will stop using and delete your personal information.
1.3.3 We may collect statistical data regarding the use of our services, and may share these statistics with the public or third parties for product development, service optimization, and security purposes. Such statistical information does not contain any personally identifiable information.
1.3.4 If we intend to use your personal information for purposes not described in this Privacy Policy, or to use information collected for a specific purpose for other purposes, we will first obtain your explicit consent via an opt-in mechanism.
1.4 Other Rules
In accordance with applicable laws, regulations, and national standards, we may collect and use your personal information without your consent under the following circumstances:
1.4.1 To fulfill legal obligations imposed on us by law or regulations;
1.4.2 When necessary to protect national security or defense security;
1.4.3 When necessary to protect public safety, public health, or significant public interests;
1.4.4 When necessary for criminal investigation, prosecution, trial, or enforcement of judgments;
1.4.5 When necessary to protect the vital interests of the data subject or another person, but obtaining consent is impractical;
1.4.6 When the data subject or their legal guardian has made the personal information publicly available;
1.4.7 When necessary to perform or enter into a contract at the request of the data subject;
1.4.8 When collected from legally publicly available sources, such as news reports or government information disclosure;
1.4.9 When necessary to maintain the secure and stable operation of the products or services, such as detecting or resolving system faults.
2. How We Store Your Personal Information
2.1 We will retain your personal information only for as long as necessary to fulfill the purposes described in this Privacy Policy and to comply with applicable laws and regulations. Once the retention period expires, we will delete or anonymize your personal information.
2.2 As a global cloud computing platform, HyperAI may transmit the personal information we collect or generate to jurisdictions outside your country or region for storage and processing in order to provide efficient and reliable services. We are committed to protecting your personal information in accordance with this Privacy Policy and applicable local laws, regardless of where the data is located. If personal information needs to be transferred across borders to regions where data protection standards may differ from those in your jurisdiction, we will adopt legally recognized safeguards under applicable law to ensure the security and compliance of the data during transmission and processing.
3. How We Use Cookies
3.1 How We Use Cookies
3.1.1 By using Cookies, we provide users with a secure and personalized service experience. We and our third-party partners may store Cookies, Flash Cookies, or other local storage provided by your browser (or associated applications), which typically contain identifiers, site names, and other numbers or characters (collectively, “Cookies”). We and our third-party partners may collect information via Cookies and use it for the following purposes:
- Security Cookies: Cookies help us ensure the safe and efficient operation of our products and services.
- Recommendation Cookies: Cookies help us recommend, display, or push content that may be of interest to you.
3.1.2 Information collected and used by third-party partners through Cookies is not governed by this Privacy Policy but is subject to their own privacy policies. We are not responsible for third-party Cookies or similar technologies.
3.1.3 If your browser or browser add-ons allow, you can modify your acceptance of Cookies or reject them altogether. However, doing so may, in some cases, affect your ability to securely use our products and services. You will still receive information about products and services, but such information may be less relevant to you.
4. How We Share, Transfer, or Disclose Your Personal Information
4.1 Outsourced Processing
We may engage third-party service providers to process your personal information on our behalf, in order to provide infrastructure, technical support, data analysis, advertising, marketing, or other services. Such outsourced processing is bound by the purposes stated in this Privacy Policy, and we supervise these third-party service providers through contractual agreements.
4.2 Sharing
We may share your personal information in the following circumstances:
4.2.1 When you have explicitly consented or authorized us, or requested us via email or other means to share your personal information with third parties;
4.2.2 As required by applicable laws, regulations, or mandatory requests from government authorities;
4.2.3 With our affiliates: We may share your personal information with our affiliates, but only the personal information necessary for the stated purposes. Affiliates will apply equivalent security measures to protect your personal information in accordance with this Privacy Policy;
4.2.4 With our business partners: We may share your personal information with business partners where necessary to provide services.
4.3 Transfer
We will not transfer your personal information to any company, organization, or individual, except in cases involving mergers, acquisitions, asset transfers, or bankruptcy. In such cases, we will notify you of the relevant transfer and require that the new holder of your personal information continue to abide by this Privacy Policy, or otherwise obtain your consent.
4.4 Public Disclosure
Unless otherwise agreed in this Privacy Policy or required by law, we will not publicly disclose your personal information.
4.5 Exceptions
In addition, in accordance with applicable laws and national standards, we may share, transfer, or disclose your personal information without obtaining your prior consent in the following circumstances:
4.5.1 To fulfill legal obligations imposed on us;
4.5.2 When necessary to protect national security or defense security;
4.5.3 When necessary to protect public safety, public health, or significant public interests;
4.5.4 When necessary for criminal investigation, prosecution, trial, or enforcement of judgments;
4.5.5 When necessary to protect the vital interests of the data subject or another person, and obtaining consent is impractical;
4.5.6 When the data subject or their legal guardian has made the personal information publicly available;
4.5.7 When collected from publicly available sources in accordance with law, such as news reports or government information disclosures.
4.6 Voluntary Sharing
Please note that information you voluntarily share or publicly disclose while using our services may involve personal information of yourself or others, including sensitive personal information. Please exercise caution when sharing or disclosing, and obtain consent from others if their personal information is involved.
4.7 De-Identified Data
Please note that if we process personal information using technical or other necessary measures to make it impossible for recipients to re-identify specific individuals, and the data cannot be restored, such de-identified data may be shared, transferred, or disclosed without further notice or consent.
5. How We Protect Your Personal Information
We take the security of your personal information seriously and implement all reasonable and feasible measures to protect it:
5.1 Such measures include industry-standard technical and administrative safeguards, such as network isolation, data encryption, and employee access controls, to prevent unauthorized access, disclosure, alteration, loss, or destruction.
5.2 Please be aware that although we strive to ensure the security of any information you provide to us, no internet environment is completely secure. We are not responsible for any risks or losses that arise from or are related to such circumstances.
5.3 In the event of a personal information security incident, we will notify you in a timely manner as required by laws and regulations, including the basic situation of the incident, potential impact, measures we have taken or plan to take, recommendations for you to mitigate risks, and any remedies provided to you. We will communicate this information via app push notifications, email, SMS, phone, or other appropriate channels. If it is impractical to notify each individual, we will publish announcements through reasonable and effective means. We will also report the handling of the personal information security incident to relevant regulatory authorities as required.
6. How You Can Manage Your Personal Information
During your use of HyperAI, you may contact us through the corresponding page prompts or as described in this Privacy Policy to access, correct, or delete your personal information, as well as to exercise your rights to modify the scope of consent or deactivate your account. Your requests will be addressed promptly.
6.1 Modifying the Scope of Your Consent
You may change the scope of your consent or withdraw your consent by adjusting device permission settings or contacting us as described in this Privacy Policy.
Please understand that HyperAI may require certain permissions and the collection of necessary personal information to provide specific services. If you withdraw your consent, we will no longer be able to provide the services corresponding to the withdrawn consent, but this will not affect the processing of personal information that was carried out based on your prior consent.
6.2 Responding to Your Requests
If you are unable to exercise your rights through the above methods, you may contact us using the contact information provided in this Privacy Policy. For security purposes, you may need to submit a written request or otherwise verify your identity. We may first require identity verification before processing your request.
In principle, we will not charge fees for reasonable requests. However, for repeated requests, requests exceeding reasonable limits, or requests that require excessive technical resources or pose a risk to the legitimate rights of others, we reserve the right to charge a reasonable fee or refuse to process the request.
6.3 Exceptions to Our Response
We will not be able to respond to your request under the following circumstances:
6.3.1 When necessary to fulfill legal obligations imposed on us;
6.3.2 When necessary to protect national security or defense security;
6.3.3 When necessary to protect public safety, public health, or significant public interests;
6.3.4 When necessary for criminal investigation, prosecution, trial, or enforcement of judgments;
6.3.5 Where we have sufficient evidence that the data subject has acted with malice or abused their rights;
6.3.6 To protect the vital interests of the data subject or others where obtaining consent is impractical;
6.3.7 Where responding to the request would cause serious harm to the legitimate rights of the data subject or others;
6.3.8 Involving trade secrets.
7. How We Handle the Personal Information of Minors
We place great importance on the protection of minors’ personal information. In accordance with applicable laws and regulations, the collection and use of personal information of minors under the age of 14 requires parental or guardian consent. For minors aged 14 to under 18, consent may be provided either by the minor or by their guardian.
If you are a minor (especially under 14), we ask that you have your parents or other guardians carefully read this Privacy Policy and use our services or provide information only after obtaining their consent.
If you are a parent or guardian, please ensure that the minors under your supervision use our products or services only after you have provided authorization. If you have any questions regarding the personal information of the minors under your care, please contact us using the methods described in this Privacy Policy.
8. How This Privacy Policy Is Updated
Our Privacy Policy may be updated from time to time. Any changes will be published on this page. For significant changes, we will provide more prominent notice (for example, by special prompts on the browsing page to explain the specific changes). We will not reduce your rights under this Privacy Policy without your explicit consent.
Significant changes include, but are not limited to:
8.1 Major changes to our service model;
8.2 Changes to the primary recipients of shared, transferred, or publicly disclosed personal information;
8.3 Major changes to your rights regarding personal information and how you can exercise them;
8.4 Changes to our contact information or complaint channels;
8.5 Situations where a personal information security impact assessment indicates high risk.
We will also archive previous versions of this Privacy Policy for your reference.
9. How to Contact Us
If you have any questions about this Privacy Policy or the protection of your personal information, you may contact us via the following email:
Email: [email protected]