Overview
Welcome to the Tuya Claw software and services (hereinafter collectively referred to as "Tuya Claw" or "this Service")!
Tuya Claw is an AI productivity tool developed and operated by Tuya Smart Inc. (hereinafter referred to as "Tuya" or "we", with its registered address at 333 West San Carlos Street Suite 600 San Jose, CA 95110).
If you are a customer located in the European Economic Area (“EEA”) or the United Kingdom (“UK”), the following corporate affiliate of Tuya may also process your personal data, including for purpose of provision of our products, services and support:
Tuya GmbH, in its role as the Data Controller, with its registered address at: Peter-Müller-Straße 16/16a, 40468 Düsseldorf, Germany.
Through an intelligent conversational interface, Tuya Claw helps you bridge and call upon local devices or third-party software, easily realizing the automated execution of local and cloud tasks.
Safeguarding your personal data security is our top priority. We will unswervingly fulfill our compliance obligations and defend your privacy security in all aspects. We recommend that you carefully read this Tuya Claw Privacy Policy (hereinafter referred to as "this Policy"). It clearly and transparently outlines our data processing rules to help you manage your privacy settings with fully informed consent.
Please note that we have specifically highlighted content that may significantly affect your rights and interests, as well as personal sensitive information, in bold. Please read them carefully.
Key Note: We will strictly abide by the principle of data minimization. This means that we will only collect and process relevant personal information within the minimum scope necessary to provide you with a specific function, and only when you actively use that function.
You can understand our privacy policy by reading the following overview:
I. How We Collect and Use Your Personal Information
II. How We Store and Protect Your Personal Information
III. How We Entrust, Share, Transfer, and Publicly Disclose Your Personal Information
IV. How You Manage Your Personal Information
V. Protection of Minors
VI. Revisions and Updates
VII. Contact Us
I. How We Collect and Use Your Personal Information
1. Description of Personal Information Collection and Use
During your use of the Tuya Claw service, we will follow the processing principles of legality, legitimacy, minimum necessity, good faith, openness, and transparency. For the information you actively provide during business interactions or that is generated due to the use of the service, we will only process it for the purposes of realizing the core functions of the product, continuously improving the service experience, and maintaining account risk control security.
If we need to use your personal data for other business scenarios beyond the original collection purpose and without reasonable derivative relevance in the future, we promise to fulfill the obligation of secondary notification in accordance with the law and will only carry out relevant data processing activities after obtaining your explicit consent.
In addition, due to possible differences in operating systems and hardware devices, the functions supported by Tuya Claw on Mac and Windows clients may be inconsistent. Please refer to the actual service scope you obtain on your current terminal. We will strictly collect the personal information necessary to provide the corresponding service based on the specific business functions you actually trigger.
1.1 Registration and Login
When you register and log in to a Tuya Claw account, we will collect your account identifier, avatar, and nickname. This is used to verify user information, adapt to different operating system functions, and establish a service account for you, facilitating your login and use of the complete product or services.
1.2 Smart Dialogue
The Smart Dialogue function aims to understand your input and generate output that can be used to execute tasks. Depending on the model you use, data processing methods are as follows:
Using Tuya Claw built-in models: When you use the large model provided by default in this software, your input content (text, voice, files, keystroke commands, scheduled tasks, etc., actively sent through the dialogue box or authorized for us to obtain, collectively referred to as "Input Content") will be collected and processed by us to return the corresponding output content to you. To provide you with a continuous service experience, we will record your dialogue history with Tuya Claw, including your Input Content, the output content of the default model, and the dialogue topics formed based on the above information.
Using third-party custom models: When you configure and use a third-party large model obtained by yourself (referred to as a "Custom Model"), the model API Key you fill in will be strictly limited to local storage on your device, and we will never collect it in the cloud. During this process, your Input Content is sent directly by you to the third-party large model, which will process it itself and directly return the output content to you. Tuya Claw does not participate in this process, nor does it have any direct data interaction with the third party. After the third-party large model service provider returns the output content to you, in order to provide you with a continuous and consistent service experience, implement subsequent operations, and ensure service quality, we will collect the dialogue history of this interaction from your local device, including your Input Content, the output content of the Custom Model, and the dialogue topics formed based on the above information.
If the instructions you input, the feedback you submit, or the materials you upload inevitably contain the personal information of other subjects, please ensure that you fulfill the statutory notification obligations in advance and obtain sufficient authorization from the subject to avoid the risk of infringement caused by improper data disclosure.
When you use the system's copy and paste function to enter content into the smart dialogue box, we will locally collect your clipboard information to complete your requested content input.
1.3 Smart Operations
The Smart Operations function aims to assist you in executing corresponding tasks or completing corresponding operations based on the output content formed in the "Smart Dialogue" phase. Depending on the operation type, the data processing methods are as follows:
Local operations: If the task corresponding to the output content is an operation that can be completed within your local device environment, such as opening a local file or modifying system settings, the corresponding output content will be executed by tools local to your device. During this operation, we only provide technical assistance such as tool calling and will not collect your information.
Third-party software operations: If the task corresponding to the output content involves third-party operations, such as accessing a website or operating software, the corresponding output content will be executed by third-party software (such as a browser) on your device. During this process, your interaction information with the third-party website or software is directly collected and independently processed by the third party, and we will not collect information (unless you actively submit new Input Content to us through the Tuya Claw dialogue box during this process).
1.4 Tuya / SmartLife Remote Functions
The remote functions aim to provide you with the ability to remotely send Input Content to Tuya Claw through the "Tuya" APP / "SmartLife" APP. When you use this function and actively scan the QR code to bind your Tuya account, we will collect your account identifier, avatar, and nickname to bind your Tuya account with your Tuya Claw account, so that you can send Input Content to the Tuya Claw installed on your local device through the Tuya Claw customer service account. The Input Content you send through the "Tuya" APP / "SmartLife" APP will be collected and processed in accordance with the relevant provisions of Section 1.2 (Smart Dialogue) of this guideline.
2. Terminal Permission Request Description
To ensure the normal implementation of the functions of this Service, we need to call the corresponding necessary permissions based on the specific scenarios of collecting and using information mentioned above, and we will prompt you via a pop-up window before calling. Sensitive permissions will not be enabled by default and will only be authorized to us after your explicit consent. Please note that our obtaining a specific sensitive permission does not mean we will inevitably collect your relevant information; even if we have obtained sensitive permission, we will only collect your relevant information when necessary and in accordance with this guideline. The specific permission calls are as follows:
2.1 Windows Client Permission List
| Permission Name | Purpose of Use | Optional | Use Scenario | Impact of Rejection |
|---|
| Network Access Permission | Used to connect to Tuya Claw servers for account registration/login verification, send input to large models, receive output, and access third-party software or online services. | No (Required) | Registration/login, smart dialogue, smart operations. | You cannot use any online functions of Tuya Claw; the product cannot operate normally. |
| System Clipboard Read Permission | Used to read the contents of the clipboard and fill it into the smart dialogue input box when the user actively performs a paste operation. | Yes (Optional) | Triggered when the user performs a "paste" operation in the input box. | You will not be able to input content via pasting, but can still input via manual typing, dragging files, etc. |
| Local File Read Permission | Used to read file content to provide smart dialogue services when the user actively uploads or drags a file (e.g., document, picture) to the dialogue box. | Yes (Optional, triggered on demand) | Triggered when the user uploads files or pictures in a smart dialogue. | You will not be able to send local files or pictures to the dialogue box, but can still use dialogue services via text input, etc. |
| Local File Delete Permission | Used when a user instructs the deletion of a local file. Tuya Claw will prioritize moving it to the Recycle Bin rather than permanently deleting it to protect data security. | Yes (Optional, triggered on demand, requires secondary confirmation) | When the user explicitly requests the deletion of a file in the dialogue. | You cannot execute file deletion via Tuya Claw; you must manage files manually in the system. |
| Local File Write/Modify Permission | Used to create, edit, or save files (e.g., code files, documents) under user instructions, or to export model output as a local file. | Yes (Optional, triggered on demand) | When the user requests Tuya Claw to create a file, edit code, or save output locally. | You will not be able to use commands like "write file" or "edit code and save," but you can view generated content and manually copy/save it. |
| System Command/Code Execution Permission | Used to execute code and run command-line instructions on the local device under user instructions, supporting background tasks. | Yes (Optional, triggered on demand) | When the user requests Tuya Claw to run code, execute system commands, or start background tasks. | You will not be able to use code execution and command-line functions, but other functions are unaffected. |
| Geolocation Permission | Used to obtain the device's current geolocation information under user instructions to provide location-related smart services (e.g., local weather queries, nearby information searches). | Yes (Optional, triggered on demand) | When the user asks location-related questions like "near me..." or "current location weather". | You will not be able to use location-based smart services, but you can manually input address info as an alternative. |
| Browser Control/Automation Permission | If a legally invoked browser allows automation/smart operations, used to execute web browsing, page info collection, and automated operation instructions issued by the user via standard browser control protocols. | Yes (Optional, triggered on demand) | Triggered when the user initiates the smart operation function in the smart dialogue. | You will not be able to use the smart operation function; other dialogue, tool calling, and scheduled task functions are unaffected. |
2.2 Mac Client Permission List
| Permission Name | Purpose of Use | Optional | Use Scenario | Impact of Rejection |
|---|
| Network Access Permission | Used to connect to Tuya Claw servers for account registration/login verification, send input to large models, receive output, and access third-party websites or online services. | No (Required) | Registration/login, smart dialogue, smart operations. | You cannot use any online functions of Tuya Claw; the product cannot operate normally. |
| System Clipboard Read Permission | Used to read the contents of the clipboard and fill it into the smart dialogue input box when the user actively performs a paste operation. | Yes (Optional) | Triggered when the user performs a "paste" operation in the input box. | You will not be able to input content via pasting, but can still input via manual typing, dragging files, etc. |
| Local File Read Permission | Used to read file content to provide smart dialogue services when the user actively uploads or drags a file (e.g., document, picture) to the dialogue box. | Yes (Optional, triggered on demand) | Triggered when the user uploads files or pictures in a smart dialogue. | You will not be able to send local files or pictures to the dialogue box, but can still use dialogue services via text input, etc. |
| Local File Delete Permission | Used when a user explicitly instructs the deletion of a local file. Tuya Claw will prioritize moving it to the Trash rather than permanently deleting it to protect data security. | Yes (Optional, triggered on demand, requires secondary confirmation) | When the user explicitly requests the deletion of a file in the dialogue. | You cannot execute file deletion via Tuya Claw; you must manage files manually in the system. |
| Local File Write/Modify Permission | Used to create, edit, or save files (e.g., code files, documents) under user instructions, or to export model output as a local file. | Yes (Optional, triggered on demand) | When the user requests Tuya Claw to create a file, edit code, or save output locally. | You will not be able to use commands like "write file" or "edit code and save," but you can view generated content and manually copy/save it. |
| System Command/Code Execution Permission | Used to execute code and run command-line instructions on the local device under user instructions, supporting long-running background tasks. | Yes (Optional, triggered on demand) | When the user requests Tuya Claw to run code, execute system commands, or start background tasks. | You will not be able to use code execution and command-line functions, but other functions are unaffected. |
| Geolocation Permission | Used to obtain the device's current geolocation information under user instructions to provide location-related smart services (e.g., local weather queries, nearby information searches). | Yes (Optional, triggered on demand) | When the user asks location-related questions like "near me..." or "current location weather". | You will not be able to use location-based smart services, but you can manually input address info as an alternative. |
| Browser Control/Automation Permission | If a legally invoked browser allows automation/smart operations, used to execute web browsing, page info collection, and automated operation instructions issued by the user via standard browser control protocols. | Yes (Optional, triggered on demand) | Triggered when the user initiates the smart operation function in the smart dialogue. | You will not be able to use the smart operation function; other dialogue, tool calling, and scheduled task functions are unaffected. |
II. How We Store and Protect Your Personal Information
1. Storage Method and Retention Period
Under normal circumstances, we will only store your personal information for the time necessary to achieve the purpose of the service or under the conditions stipulated by laws and regulations. If you choose to cancel your account, we will delete your information or anonymize it, except for information that must be retained for a certain period according to relevant laws and regulations. For the aforementioned information that must be retained, we will delete or anonymize it after the retention period prescribed by laws and regulations expires.
We will store the personal information of users collected in mainland China within mainland China in accordance with laws and regulations. Currently, we do not transmit or store any of your data across borders. If cross-border transmission or storage is required due to business needs in the future, we will inform you of the purpose, recipient, security measures, and security risks of the data export in accordance with the requirements of laws and regulations, and obtain your prior consent.
2. Security Protection Measures
2.1 We strive to guarantee the security of your information to prevent leakage, loss, improper use, unauthorized access, and disclosure. We use multifaceted security protection measures to ensure that your personal information is protected at a reasonable security level, including technical protection means, management system controls, security system guarantees, and many other aspects.
2.2 The technical means we use include but are not limited to firewalls, access control measures, etc. In addition, we will continuously enhance the security capabilities of this software.
2.3 We establish specialized management systems, processes, and organizations to ensure information security. For example, we strictly limit the scope of personnel who can access information, require them to comply with confidentiality obligations, conduct audits, and regularly provide information security education and training for relevant personnel.
3. Security Incident Handling Measures
To prevent security incidents, we have formulated proper early warning mechanisms and emergency response plans in accordance with the provisions of laws and regulations. If a security incident such as a personal information leak occurs, we will launch an emergency response plan and take remedial measures to prevent the security incident from expanding, and fulfill relevant reporting and notification obligations in accordance with the law.
4. Notification Upon Cessation of Products or Services
When our products or services cease operations, we will notify you in the form of push notifications, announcements, etc., and delete your personal information or anonymize it within a reasonable period, unless otherwise stipulated by laws and regulations.
III. How We Entrust, Share, Transfer, and Publicly Disclose Your Personal Information
1. Entrusted Processing
When you actively use features such as AI dialogue, we will only transmit the necessary information to the model service providers listed below for model computation and service optimization. Each model service provider will process your information in accordance with its own privacy policy. You can review their respective policies via the following links:
Microsoft Corporation(GPT series models)
Google LLC (Gemini series models)
In our cooperation with third parties, we will comply with legal provisions and carefully and safely process relevant data in accordance with the principle of minimum necessity. We will impose strict restrictions on third parties involved in data processing in accordance with laws and regulations. We require them to strictly comply with our measures and requirements regarding data privacy protection, including but not limited to processing data based on data protection agreements, letters of commitment, and relevant data processing policies, to ensure data security.
2. Sharing
Currently, we do not actively share your personal information with any third party.
3. Transfer
With the continuous development of our business, we may engage in mergers, acquisitions, asset transfers, or other transactions. We will inform you of relevant circumstances and continue to protect or require new personal information processors to continue to protect your personal information in accordance with laws, regulations, and standards no lower than those required by these guidelines.
4. Public Disclosure
We will not publicly disclose the collected personal information. If disclosure is necessary, we will inform you of the purpose of the public disclosure, the type of information disclosed, and possible sensitive information involved, and obtain your explicit consent.
5. Exceptions to Obtaining Prior Authorized Consent for Sharing, Transfer, and Public Disclosure of Personal Information
According to relevant laws, regulations, and national standards, in the following circumstances, sharing, transferring, and publicly disclosing personal information does not require your prior authorized consent:
Necessary for the conclusion and performance of a contract to which you are a party;
Necessary to fulfill legal obligations;
Necessary to respond to public health emergencies, or to protect the life, health, and property safety of natural persons in an emergency;
Processing your personal information within a reasonable scope for public interest acts such as news reporting and public opinion supervision;
Processing personal information that you have voluntarily disclosed or that has otherwise been legally disclosed within a reasonable scope in accordance with the provisions of the Personal Information Protection Law;
Other circumstances stipulated by laws and administrative regulations.
IV. How You Manage Your Personal Information
We attach great importance to and guarantee your relevant rights regarding personal information. During your use of this Service, you can query your personal information (such as your avatar) in the lower left corner of the software. If you cannot realize your personal rights through the above paths or operations, or if you need to file a complaint, you can contact us through the methods listed in the "Contact Us" section. For security purposes, you may need to provide a written request or prove your identity in other ways. We may require you to verify your identity before processing your request.
V. Protection of Minors
Protecting the privacy of young children is especially important to us. The Services are not directed to individuals under the age of sixteen (16) (or such other age provided by applicable law in your country/region of residence), and we request that these individuals do not provide any Personal Data to us. We do not knowingly collect Personal Data from any child unless we first obtain permission from that child’s parent or legal guardian. If we become aware that we have collected Personal Data from any child without permission from that child’s parent or legal guardian, we will take steps to remove that information.
VI. Revisions and Updates
We may revise these guidelines from time to time. When the terms of these guidelines change, we will appropriately notify you of the revised privacy protection guidelines upon version updates and explain the effective date to you.
VII.Contact Us
We have established a dedicated personal information protection team and a personal information protection officer. If you have any questions, complaints, or suggestions regarding these guidelines or issues related to personal information protection, you can contact us in the following ways:
Contact Information and Address:
Tuya Smart Inc.
Postal Mailing Address: 333 West San Carlos Street Suite 600 San Jose, CA 95110
For European Union or United Kingdom data subjects, you have the right to lodge a complaint with a supervisory authority concerning Tuya’s data processing activities. For questions, or to exercise your rights as an EU or UK data subject, please contact our DPO here: