Privacy Policy
Updated: April 15, 2026 | Effective: April 22, 2026
Update Notes
Thank you for using Aria2 Work. We have made the following key updates to this guide:
1. Updated the "How We Collect and Use Your Personal Information" section based on product iterations and new features.
To better protect your rights, we recommend that you carefully read the updated privacy protection guidelines. If you have any questions or suggestions regarding this privacy protection content, you may contact us through the methods published in the "Contact Us" section of this privacy protection guide.
Overview
Welcome to Aria2 Work software (hereinafter referred to as "this software") and services (hereinafter referred to as "this service" or "Aria2 Work")!
Aria2 Work is an AI technology tool operated by the Aria2 Work team (hereinafter referred to as "we"), assisting you in invoking local devices or third-party tools through AI intelligent dialogue to perform local or cloud-based operations.
We fully understand that personal information is crucial to you. We commit to strictly complying with laws and regulations, following privacy protection principles, and doing our utmost to protect the security of your personal information, providing you with safe and reliable services. You can learn about how we collect and process personal information in detail by reading this "Aria2 Work Privacy Protection Guide" (hereinafter referred to as "this guide"), so that you can better understand our services and make appropriate choices. For key content that may be related to your personal information rights, we have used bold special reminders, and we hope you will pay special attention when reading.
It should be specially noted that we will process your relevant personal information according to the principle of minimum necessity, only when you use specific functions, for the purpose of providing services to you.
You can learn about our privacy protection guidelines by reading the following summary:
I. How We Collect and Use Your Personal Information
II. How We Store and Protect Your Personal Information
III. How We Entrust Processing, Share, Transfer, and Publicly Disclose Your Personal Information
IV. How You Manage Your Personal Information
V. Protection of Minors
VI. Revisions and Updates
VII. Miscellaneous
VIII. Contact Us
I. How We Collect and Use Your Personal Information
1. Personal Information Collection and Usage
In the process of using this service, we will follow the principles of legality, legitimacy, minimum necessity, good faith, and transparency, and collect and use the information you actively provide when using the service or generated because of using the service in the following ways, to provide services to you, optimize our services, and ensure the security of your account. Please note that due to possible differences between different operating systems and device terminals, the functions we provide on different terminals may vary. Please refer to the actual scope of functions provided, and we will collect the necessary information to provide corresponding functions based on the specific functions you use.
1.1 Registration and Login
When you register and log in to your Aria2 Work account, we need to collect your WeChat account identifier, avatar, and nickname to verify user information, adapt to different operating system functions, and establish your service account for you, facilitating your login and use of the complete product or service.
1.2 Intelligent Dialogue
The intelligent dialogue function aims to understand your input content and generate output content that can be used to execute tasks. You can actively send or authorize us to obtain input content through the dialogue box (text, voice, files, key operation commands, scheduled tasks, etc., specifically based on your input, collectively referred to as "input content"), and we will process the input content and display the output content to you.
1.3 Intelligent Operations
The intelligent operation function aims to assist you in executing corresponding tasks or completing corresponding operations based on the output content generated in the "intelligent dialogue" stage. Depending on the type of operation, the data processing methods are as follows:
1) Local Operations: If the task corresponding to the output content is to open local files, modify system settings, or other operations that can be completed within your local device environment, the task will be executed by tools on your local device. During this operation, we will provide technical assistance such as tool invocation and collect information about which tools the task calls, to provide you with feedback on task execution results, but we will not collect the specific content corresponding to the task (such as the content of local files you open).
2) Third-Party Service Operations: If the task corresponding to the output content involves accessing websites, operating software, calling Skills/API/plugins, or other operations involving third-party services, we will collect and process page information related to task execution as needed to complete automated operations and provide you with feedback on task execution results. Some third-party services may require you to log in before accessing them. If you actively log in and continue to use related functions, it means you authorize Aria2 Work to assist you in accessing relevant pages and executing corresponding operations within the scope necessary to complete that task based on your instructions.
1.4 Remote Functions
To facilitate remote dialogue interaction with Aria2 Work on mobile devices and in different chat tools, and to remotely use intelligent operation functions, we have connected multiple remote control channels that you can choose and use according to your needs:
1) WeChat Customer Service Channel: When you use this function and actively scan the QR code to bind your WeChat account, we need to collect your WeChat account identifier, avatar, and nickname to bind your WeChat account with your Aria2 Work account, so that you can send input content to your installed Aria2 Work PC client through the Aria2 Work Enterprise WeChat customer service account.
2) WeChat Mini Program Channel: When you log in to the same Aria2 Work account through the Aria2 Work WeChat Mini Program, you can remotely send input content to your installed Aria2 Work PC client through the Aria2 Work WeChat Mini Program.
3) Chat Tool Channel: When you use this function and connect to enterprise WeChat, QQ, WeChat, and other chat tools in the remote control channel, we will configure and bind accounts based on the AppID and AppSecret of the corresponding chat tools that you actively provide, so that you can send input content to your installed Aria2 Work PC client through the corresponding chat tools.
The input content you send or authorize us to obtain through the above remote control channels will be collected and processed in accordance with the relevant provisions of Article 1.2 (Intelligent Dialogue) of this guide.
1.5 Connected App Functions
To facilitate your integration of third-party applications with Aria2 Work, we provide a connected application function. You can authorize Aria2 Work to connect to QQ Mail, online meetings, online documents, online questionnaires, and other functionally supported applications through OAuth, authorization codes, and other methods. We will configure and bind accounts based on your active authorization or input authorization code, to perform intelligent operations such as information retrieval, content understanding, and assisted operations according to your instructions.
The input content you send or authorize us to obtain when using the connected application function, and the corresponding task execution or operations, will be collected and processed in accordance with the relevant provisions of Article 1.2 (Intelligent Dialogue) and Article 1.3 (Intelligent Operations) of this guide.
1.6 File Management Functions
We provide file upload, download, and other management services in the file management function. When you use the file management function, you can upload or transfer files (for example, you input to send xx file to my phone, upload xx file, etc.), and also view and download uploaded files. We only provide you with network storage space. Your files are uploaded, managed, and controlled by you independently, and you can delete uploaded files in the Aria2 Work WeChat Mini Program at any time.
1.7 Cloud File Space (AI-Generated File Auto-Backup)
When you use AI to generate files, to facilitate your viewing of AI-generated file content at any time and saving and managing files, we will automatically back up AI-generated files to your cloud file space. We only provide you with network storage space. All backup files are managed and controlled by you independently, and you can view, download, or delete backed-up files in the file space at any time. If you need to turn off AI-generated file automatic backup, you can turn it off in "Settings - General Settings - Cloud Sync".
1.8 Aria2 Work Functions
We provide security detection and security audit capabilities in the Aria2 Work function to help you improve the security of using AI technology tools. When you use the Aria2 Work function, we will perform security detection based on your input content, the skill information used by AI execution commands, and AI-generated script code, helping to identify and analyze whether the corresponding content has security risks such as viruses and Trojans, and return security detection results to you. If AI may perform risky operations are identified, we will intercept the corresponding risky behaviors, and you can view risk behavior details and security audit logs in the function. If you wish to stop using the Aria2 Work function, you can turn it off in "Settings - General Settings - Aria2 Work" at any time.
Please also understand that the Aria2 Work function will do its best to help you prevent security risks such as malicious skills, but due to the complexity of AI technology and the network environment, and the continuous iteration and upgrading of malicious programs, we cannot guarantee to identify and avoid all potential security risks. We recommend that you remain cautious when using AI technology tools and do not casually execute instructions or code from unknown sources.
1.9 Memory Enhancement Functions
In order to make the output content of intelligent dialogue more aligned with your needs, enhance the user experience of intelligent dialogue, and make task execution or operations in intelligent operations smarter, we provide you with cross-session personalized memory capabilities in the memory enhancement function.
When you enable the memory enhancement function, we will automatically extract and remember valuable information based on your dialogue content with Aria2 Work through large models and AI technology (such as your name, title, personal preferences, professional attributes, etc. that you actively inform us of, and you can ask Aria2 Work to remember corresponding information in the dialogue, for example, "Please remember xx", hereinafter collectively referred to as "memory data"). In subsequent dialogues, memory data will serve as background information, and you will provide the input content along with memory data to the large model, making the output content of the large model more aligned with your personal preferences.
You can turn off this function in "Settings - General Settings - Memory Enhancement" at any time. After turning it off, Aria2 Work will no longer extract memories from new dialogues; if you need to delete memory data, you can issue commands through dialogue (such as "Clear Memory", "Delete xx Memory").
1.10 Dialogue Query and Management
To facilitate your querying of historical dialogues, provide you with continuous and consistent service experience, and ensure service quality, we need to record your dialogue records with Aria2 Work, including your input content, model output content, and dialogue topics formed based on the above information. You can manage dialogues within the Aria2 Work product.
1.11 When you choose to paste content from the system clipboard of your local device to the intelligent dialogue input box, we will only collect your clipboard information locally.
1.12 Issue Feedback
We provide different problem feedback methods in the product. When you provide feedback through the "Like/Dislike" function, we will collect your "Like/Dislike" operation information and problem description information that you actively submit to understand your feedback; when you provide feedback through the "Problem Feedback" function, we will collect the feedback content that you actively submit (such as problem descriptions, images) to investigate and respond to your feedback in a timely manner. You can also choose to actively upload logs to help you solve problems quickly.
1.13 When you use this service, to ensure your normal use of our services, maintain the secure operation of our services, and fulfill legal obligations for network security protection, we will collect and process your log information, usage information (including service crash and exception information, operation behavior information), device identifiers (device GUID), system information (including operating system version, system settings, system attributes), device information (including device model, CPU model, memory size, graphics card and disk information, screen resolution), network information (network type, carrier, IP address), and Aria2 Work application version.
1.14 If your input content, submitted information, or other content contains others' personal information, please be sure to obtain others' legal authorization before providing it, to avoid improper leakage of others' personal information.
2. Information Usage Rules
We may use the information collected in the process of providing services to you for the following purposes:
2.1 We strictly comply with the provisions of laws and regulations and agreements with you, and use the collected information for the services described in "I. How We Collect and Use Your Information".
2.2 Under the premise of taking security encryption, de-identification, and other security technical measures, and being unable to re-identify specific personal identities, we may perform statistical analysis or other necessary data analysis processing on the collected data to help research, develop, provide, and operate our products and services.
2.3 Please understand that the functions and services we provide to you are constantly updated and developed. If a certain function or service is not in the aforementioned description and collects your information, we will separately explain to you the content, scope, and purpose of information collection through page prompts, interaction processes, website announcements, etc., to obtain your consent.
3. Terminal Permission Application
To ensure the normal implementation of this service function, we need to call the corresponding necessary permissions according to the specific scenarios of collecting and using information described above, and ask you through pop-up windows before calling them. Sensitive permissions among them will not be enabled by default and will only be authorized to us with your explicit consent. Please also note that our obtaining a specific sensitive permission does not mean that we will necessarily collect your relevant information; even if we have obtained sensitive permissions, we will only collect your relevant information when necessary and in accordance with this guide. The specific permission calling situations are as follows:
3.1 Windows Permission List
| Permission Name | Purpose | Optional | Usage Scenario | Impact if Denied |
|---|---|---|---|---|
| Network Access Permission | Used to connect to Aria2 Work servers for account registration/login verification, and to send input content to and receive output content from large models, and to access third-party software or online services | No (Required) | Registration & Login, Intelligent Dialogue, Intelligent Operations | Will be unable to use any online functions of Aria2 Work; the product cannot operate normally |
| System Clipboard Read Permission | Used to read clipboard content and fill it into the intelligent dialogue input box when the user actively performs paste operations | Yes (Optional) | Triggered when the user performs a "Paste" operation in the intelligent dialogue input box | You will be unable to input content to the dialogue box through pasting, but can still input content through manual typing, dragging files, and other methods |
| Local File Read Permission | Used to read file content to provide intelligent dialogue services when the user actively sends or authorizes us to obtain files (such as documents, images, etc.) to the dialogue box | Yes (Optional, Triggered on Demand) | Triggered when the user uploads files or images in intelligent dialogue | You will be unable to send local files or images to the dialogue box, but can still use dialogue services through text input and other methods |
| Local File Delete Permission | Used when the user instructs to delete local files; Aria2 Work will prioritize moving files to the Recycle Bin (Trash) rather than permanently deleting them, to protect user data security | Yes (Optional, Triggered on Demand, Secondary Confirmation Before Execution) | When the user explicitly requests to delete a specific file in the dialogue | You will be unable to execute file deletion operations through Aria2 Work; you will need to manage files manually in the system |
| Local File Write/Modify Permission | Used to create, edit, and save files (such as code files, documents, etc.) under user instructions, or to export model output content as local files | Yes (Optional, Triggered on Demand) | When the user asks Aria2 Work to create files, edit code, or save output content locally | You will be unable to use commands such as "Write File" and "Edit Code and Save", but can view generated content in the dialogue box and manually copy and save it |
| System Command/Code Execution Permission | Used to execute code and run command line instructions on local devices under user instructions; supports background task execution | Yes (Optional, Triggered on Demand) | When the user asks Aria2 Work to run code, execute system commands, or start background tasks | You will be unable to use code execution and command line functions, but other functions will not be affected |
| Geolocation Permission | Used to obtain the device's current geographic location information under user instructions, to provide location-related intelligent services (such as local weather queries, nearby information searches, etc.) | Yes (Optional, Triggered on Demand) | When the user asks dialogue related to geographic location such as "near me..." or "current location weather" | You will be unable to use location-based intelligent services, but can manually input address information as an alternative |
| Browser Control/Automation Permission | If the browser that supports legal invocation allows automated operations/intelligent operations, used to execute user-issued web browsing, page information collection, and automated operation instructions through the browser standard control protocol | Yes (Optional, Triggered on Demand) | When the user triggers the intelligent operation function in intelligent dialogue | You will be unable to use the intelligent operation function; other dialogue, tool invocation, scheduled task, and other functions will not be affected |
3.2 Mac Permission List
| Permission Name | Purpose | Optional | Usage Scenario | Impact if Denied |
|---|---|---|---|---|
| Network Access Permission | Used to connect to Aria2 Work servers for account registration/login verification, as well as sending input to and receiving output from large language models, and accessing third-party websites or online services | No (Required) | Registration & Login, Intelligent Dialogue, Intelligent Operations | Will be unable to use any online functions of Aria2 Work; the product cannot operate normally |
| System Clipboard Read Permission | Used to read clipboard content and fill it into the intelligent dialogue input box when the user actively performs paste operations | Yes (Optional) | Triggered when the user performs a "Paste" operation in the intelligent dialogue input box | You will be unable to input content to the dialogue box through pasting, but can still input content through manual typing, dragging files, and other methods |
| Local File Read Permission | Used to read file content to provide intelligent dialogue services when the user actively sends or authorizes us to obtain files (such as documents, images, etc.) to the dialogue box | Yes (Optional, Triggered on Demand) | Triggered when the user uploads files or images in intelligent dialogue | You will be unable to send local files or images to the dialogue box, but can still use dialogue services through text input and other methods |
| Local File Delete Permission | When deleting local files under explicit user instructions, Aria2 Work will prioritize moving them to Trash rather than permanent deletion to protect user data security | Yes (Optional, Triggered on Demand, Secondary Confirmation Before Execution) | When the user explicitly requests to delete a specific file in the dialogue | You will be unable to execute file deletion operations through Aria2 Work; you will need to manage files manually in the system |
| Local File Write/Modify Permission | Used to create, edit, and save files (such as code files, documents, etc.) under user instructions, or to export model output content as local files | Yes (Optional, Triggered on Demand) | When the user asks Aria2 Work to create files, edit code, or save output content locally | You will be unable to use commands such as "Write File" and "Edit Code and Save", but can view generated content in the dialogue box and manually copy and save it |
| System Command/Code Execution Permission | Used to execute code and run command line instructions on local devices under user instructions, supporting long-running background tasks | Yes (Optional, Triggered on Demand) | When the user asks Aria2 Work to run code, execute system commands, or start background tasks | You will be unable to use code execution and command line functions, but other functions will not be affected |
| Geolocation Permission | Used to obtain the device's current geographic location information under user instructions, to provide location-related intelligent services (such as local weather queries, nearby information searches, etc.) | Yes (Optional, Triggered on Demand) | When the user asks dialogue related to geographic location such as "near me..." or "current location weather" | You will be unable to use location-based intelligent services, but can manually input address information as an alternative |
| Browser Control/Automation Permission | If the legitimately invoked browser supports automated/intelligent operations, used to execute user commands for web browsing, page information collection, and automated operations through the browser standard control protocol | Yes (Optional, Triggered on Demand) | When the user triggers the intelligent operation function in intelligent dialogue | You will be unable to use the intelligent operation function; other dialogue, tool invocation, scheduled task, and other functions will not be affected |
II. How We Store and Protect Your Personal Information
1. Methods and Duration of Information Storage
1.1 Storage Duration
We will only store your personal information for the time necessary to achieve the service purpose or under the conditions stipulated by laws and regulations. If you choose to cancel your account, we will delete your information or anonymize it, except for information that must be retained for a certain period according to relevant laws and regulations.
1.2 Storage Location
We will store user personal information collected within the territory within China in accordance with laws and regulations. If cross-border transmission or storage is required for business purposes, we will inform you of the purpose of information export, the recipient, security protection measures, and security risks in accordance with the requirements of laws and regulations, and obtain your consent in advance.
2. Security Protection Measures
2.1 We strive to provide protection for your information security to prevent information leakage, loss, improper use, unauthorized access, and disclosure. We use multi-faceted security protection measures to ensure that your personal information protection is at a reasonable security level, including technical protection means, management system control, security system guarantees, and many other aspects.
2.2 The technical means we use include but are not limited to firewalls, access control measures, etc. In addition, we will continue to strengthen the security capabilities of this software.
2.3 We have established specialized management systems, processes, and organizations to ensure information security. For example, we strictly limit the scope of personnel who can access information, require them to comply with confidentiality obligations, and conduct audits, while regularly providing information security education and training to relevant personnel.
3. Security Incident Handling Measures
To prevent the occurrence of security incidents, we have formulated proper early warning mechanisms and emergency plans in accordance with the provisions of laws and regulations. In the event of security incidents such as personal information leakage, we will activate emergency plans and take remedial measures to prevent the expansion of security incidents, and fulfill relevant reporting and notification obligations in accordance with the law.
4. Notification When Product or Service Ceases Operation
When our products or services cease operation, we will notify you through push notifications, announcements, and other forms, and delete your personal information or anonymize it within a reasonable period, unless otherwise stipulated by laws and regulations.
III. How We Entrust Processing, Share, Transfer, and Publicly Disclose Your Personal Information
1. Third-Party Services
If you configure or use third-party services (including third-party large models, Skills, plugins, APIs, programs, software, etc.) through Aria2 Work on your own, your use of third-party services and their data processing rules will be subject to the privacy policy between you and that third party. We only act as a technology tool provider, providing technical assistance for the interaction between you and third-party services, and we do not participate in the collection and processing of your data by third-party services. If you have questions about the data processing methods of third parties, you can consult the privacy policy of the corresponding third party or contact the third party directly.
2. Entrusted Processing
In the process of cooperating with third parties, we will comply with legal provisions, handle relevant data safely and prudently according to the principle of minimum necessity. We will strictly restrict third parties involved in data processing in accordance with laws and regulations. We require them to strictly comply with our measures and requirements regarding data privacy protection, including but not limited to processing according to data protection agreements, commitment letters, and relevant data processing policies, to ensure data security.
3. Sharing
Currently, we will not proactively share your personal information with any third parties.
4. Transfer
With the continuous development of our business, we may conduct transactions such as mergers, acquisitions, and asset transfers. We will inform you of the relevant circumstances and continue to protect or require new personal information processors to continue protecting your personal information in accordance with laws and regulations and standards no lower than those required by this guide.
5. Public Disclosure
We will not publicly disclose collected personal information. If disclosure is necessary, we will inform you of the purpose of this public disclosure, the type of information disclosed, and the sensitive information that may be involved, and obtain your explicit consent.
6. Exceptions for Sharing, Transferring, and Publicly Disclosing Personal Information Without Prior Authorization
According to relevant laws, regulations, and national standards, in the following circumstances, sharing, transferring, and publicly disclosing personal information do not require your prior authorization and consent:
1) Necessary for concluding and performing a contract in which you are a party;
2) Necessary for fulfilling legal obligations;
3) Necessary for responding to public health emergencies, or for protecting the life, health, and property safety of natural persons in emergency situations;
4) Processing your personal information within a reasonable scope for news reporting, public opinion supervision, and other acts in the public interest;
5) Processing your personal information that you have made public on your own or that has already been legally made public within a reasonable scope in accordance with the provisions of the Personal Information Protection Law;
6) Other circumstances stipulated by laws and administrative regulations.
IV. How You Manage Your Personal Information
We attach great importance to and protect your relevant rights regarding personal information. During your use of this service, you can query your personal information (such as avatar, etc.) in the lower left corner of the software, and also exercise your other personal rights within the software. If you are unable to realize your personal rights through the paths or operations within the software, or if you need to file a complaint, you can contact us through the methods listed in the "Contact Us" section. For security purposes, we may first require you to verify your identity before processing your request.
V. Protection of Minors
We attach great importance to the protection of minors' personal information. This service is primarily aimed at adults.
According to the provisions of relevant laws and regulations, if you are a minor under 18 years old, you should obtain the consent of your parent or legal guardian before using this service.
According to the provisions of relevant laws and regulations, if you are a minor under 14 years old, we have also specially formulated the "Children's Privacy Protection Statement" for you. Children and their guardians should also carefully read the "Children's Privacy Protection Statement" when using our products or services. Only after obtaining the consent of the guardian to the "Children's Privacy Protection Statement" can children under 14 years old use our services.
If you are the guardian of a minor, please pay attention to whether the minor under your guardianship uses this service after obtaining your authorization and consent. If you have questions about the personal information of the minor under your guardianship, please contact us through the contact information in this guide.
VI. Revisions and Updates
We may revise this guide from time to time. When the terms of this guide change, we will prompt you with the updated privacy protection guidelines in an appropriate manner during version updates, and explain the effective date to you. Please note that the interval between the update date and effective date of this guide is intended to fully protect users' right to know and choose. If you actively enable or use new or changed functions before the effective date, the relevant updated content of this guide will take effect for you from the date you actually use the corresponding functions.
VII. Miscellaneous
1. The "Privacy Policy" is a general privacy clause uniformly applicable to our products and services. The user rights and information security protection measures stipulated therein apply to Aria2 Work users. If there are inconsistencies or contradictions between the "Privacy Policy" and this guide, this guide shall prevail.
2. Under certain specific services or functions of this service, we may also separately inform you of the purpose, method, or scope of processing personal information through interactive copy, product interfaces, or pop-ups. If the separately informed content is inconsistent with this guide, the separately informed content shall prevail.
3. This guide applies to the services we provide to you through Aria2 Work. If a certain terminal, product, and/or service of ours has separately set up privacy protection guidelines, the separate privacy protection guidelines shall take precedence over this guide; content not mentioned in the separate privacy protection guidelines shall be governed by this guide.