VideoFlow video software (hereinafter referred to as"The software") by the VideoFlow operator (hereinafter referred to as"US") to provide. We understand the importance of personal information and data security to you, comply with global and local privacy laws and regulations such as the General Data Protection Ordinance (GDPR) and the California Consumer Privacy Act (CCPA) , we are committed to providing secure and reliable video services to users worldwide. The purpose of this VideoFlow software privacy agreement is to clearly inform you of our full rules for the collection, use, storage, protection, sharing and transfer of your personal information, and the related rights you enjoy. Please read and fully understand this agreement before you register, click"Agree" or actually use this software service. Your use of this software service is deemed to be your full understanding and consent to be bound by this agreement in its entirety. If you are a minor, you must be accompanied by a legal guardian to read this agreement and use this software service with the express consent of the legal guardian.
1. Scope of application
1.1 service coverage
This agreement applies to all services of this software that you use through any terminal device (including, but not limited to, smartphones, tablets, pcs, etc.) , covers video shooting, editing, local and cloud storage, cross-device synchronization, video sharing, account management and related additional features (such as material library use, special effects download, etc.) .
Exclusion of third-party services
This agreement does not apply to independent services provided by third parties through this software (e.g. services shared to third party platforms such as YouTube, Facebook, or integrated third party payment services) . The privacy policies of third-party services are set by the third-party services themselves. You are advised to read their privacy policies or statements carefully before using them.
1.1.2 definition of liability for disclosure of information
This agreement does not cover the video content, comments and other information that you make publicly available through this software. The dissemination, use and risk of such public information are at your own risk. We only provide technical support for the release of information, and are not responsible for the legality and authenticity of such information.
Collection and types of information
2.1 account registration information
In order to provide you with account management and personalized services, we will collect the necessary information when you register your account, to ensure that you can use the service and protect the security of your account.
Basic registration information
When you register for an account, you will need to provide a valid email address and password. This email address is used for account login verification, password retrieval, service notification push and important information delivery. We will encrypt the email address.
2.1.2 third-party login information
If you choose to log in to this software via a third-party account such as Google or Apple, we only have access to account identification information (such as usernames, desensitization of associated mailboxes, etc.) that the third-party platform is authorized to provide in accordance with its privacy policy, will not collect third-party account passwords, payment information and other core privacy data. This information is only used for login verification and account binding and is handled in accordance with the privacy rules of third-party platforms.
2.2 information in service usage
In order to ensure the normal operation of the service, optimize the service experience and enhance the safety protection ability, we will automatically collect the relevant information when you use the service.
2.2.1 equipment and technical information
In order to ensure service compatibility and account security, we will collect your terminal device information using this software, including device model, operating system version, unique device identifier (such as OAID, IDFV, etc. , only for device identification and security verification) , device hardware configuration (such as camera parameters, storage space size) , network type and status, IP address, the software version number, etc. . This kind of information is only used to identify the abnormal state of the equipment, troubleshooting and preventing malicious attacks, not directly related to personal identity information.
2.2.2 service log information
Automatically record the log of your operation using this software service, it includes video capture time, editing operation record (such as the filter used, the type of transition effect) , file upload/download/delete time and size, cloud storage usage, video sharing object and sharing time, login and exit time, operating device and IP address, etc. . Such log information is used only for service optimization, troubleshooting, and security auditing and is not used for individually identifiable analysis.
2.2.3 editing relevant information
When you use the editing function, to save the editing progress, we will temporarily store the intermediate file during the video editing process. This file is only used for service continuity guarantee. After you finish editing and delete the final video, intermediate files will be cleared automatically.
2.3 description of sensitive information
Scope of sensitive information
If the video content captured, edited or stored by the software contains personal sensitive information (such as biometric information, medical records, financial information, etc.) , such information is sensitive personal information. You should ensure that the collection, storage and use of such sensitive information are in accordance with the relevant laws and regulations, and have obtained the necessary authorization from the relevant rights holders.
Methods of handling sensitive information
We only provide storage and editing technology services for the purpose of your video content containing sensitive information encryption, will not take the initiative to identify, extract, analyze the sensitive information, such sensitive information shall not be used for purposes other than those specified in this agreement.
Rules for the use of information
3.1 Core Service purposes
The information collected by US will be strictly used to provide you with the core services of this software and guarantee the security of the services. The specific usage scenarios include:
Provision and maintenance of services
Based on the collected account information to provide you with account login, password retrieval and other account management services; Based on the equipment information and technical information to ensure the normal operation of video playback, editing, storage, synchronization and other core functions; based on the service log information to handle your service consultation, complaints and troubleshooting requests.
3.1.2 service optimization and experience enhancement
Collect and analyze the non-identification information (such as Operation Log, device information, etc.) , for optimizing the response speed of video editing features, improve filter and special effects compatibility, adjust the cloud storage strategy to improve your use experience. These analyses are anonymous and aggregated and do not relate to specific user identities.
3.2 safety purpose
3.2.1 security of Accounts
Using device information, IP address and log information to identify abnormal login behavior (such as strange device login, multiple login failures in a short period of time, etc.) , and send you a security warning notice through the e-mail, if necessary, take temporary measures such as login restrictions to protect the security of your account.
3.2.2 risk management
By analyzing the service log and device behavior data, we can prevent and combat malicious attacks and spread illegal content by using this software, and maintain the service ecological security.
3.3 prohibited circumstances
Non-authorized use restrictions
We will not use your personal information for purposes other than those specified in this agreement without your express written consent, in particular, will not be your personal information or video content for commercial advertising push, third-party marketing purposes.
Storage and protection of information
4.1 storage-related specifications
4.1.1 storage locations and service providers
Your account information, service logs, and unsolicited video content will be stored on the server farms of globally compliant cloud service providers such as Amazon S 3 and Microsoft Azure, servers are distributed in the United States, the European Union, Singapore and other regions that meet international privacy protection standards. Cross-border data transmission will strictly comply with the laws and regulations of the relevant regions to ensure the legality and security of data transmission.
4.1.2 storage period rules
We store your personal information and video content according to the"Minimum necessary" storage policy:
- account information: during the life of your account, we will continue to store your account information to protect your normal use of the service. If you cancel your account, we will completely delete your account information within 15 working days after the completion of the account cancellation, except where laws and regulations require otherwise.
- video content: video content that you voluntarily upload to the cloud will be managed by you for the duration of your account; video content that you delete will be removed from the front-end display immediately, and in 30 working days from the server completely clear, during which will not be accessed or used by others.
- service logs: service logs will be stored for up to 12 months, after which they will be anonymized (removing personally identifiable information) and the processed data will be used for service optimization analysis.
4.1.3 treatment of dormant accounts
If your account does not have any login and use records for 24 consecutive months, we will send you an account hibernation notice via registered email, we will encrypt and archive the video content in your account and suspend the cloud storage service; if you need to resume use, you can unlock it through the account activation process, and the archived content will be accessible again.
4.2 safety precautions
4.2.1 data encryption
Use multi-level encryption technology to protect your data security: video content and personal sensitive information storage using AES-256 encryption algorithm for encryption processing; data transmission process to enable TLS 1.3 protocol for encryption transmission, prevent data from being intercepted, tampered with, or leaked during transmission.
4.2.2 access rights management
Establish a strict rights management system, only authorized technical and operation and maintenance personnel can access your personal information in the necessary range to perform their duties, and access behavior requires multiple authentication and the whole process. We have signed a strict confidentiality agreement with all employees and partners who have access to user information, clarifying confidentiality obligations and liability for breach of contract.
4.2.3 safety technical support
Regular system security testing, vulnerability scanning and penetration testing, deployment of firewalls, intrusion detection systems (IDS) , data leakage (DLP) and other security protection tools, to prevent network attacks, virus intrusion, data leakage and other security risks. Establish an emergency response mechanism for security incidents. If a data security incident occurs, remedial measures will be taken in a timely manner, and you and the regulatory authorities will be notified in accordance with relevant laws and regulations.
Information sharing and transfer
5.1 rules for sharing information
Basic principles of sharing
We will not share your personal information or video content with any third party without your explicit authorization, unless otherwise provided by law or this agreement.
5.1.2 limited sharing scenarios
Only in the following specific scenarios, we will share your relevant information with a compliance third party, subject to the"Least necessary" principle, the third party will be required to comply strictly with the terms of this agreement and relevant privacy laws and regulations:
- payment service: If you purchase the payment service of this software, we will share your transaction order information (such as order number, transaction amount) with third-party payment agencies such as Stripe and PayPal to complete payment processing and order confirmation, this information does not include your complete payment account information.
Third-party SDK services: for Messaging, video sharing, etc. , the software may integrate third-party sdks (e.g. Google Firebase Cloud Messaging, Facebook Share SDK, etc.) . These sdks may collect your device information (e.g. device model, operating system version, unique device identifier) . Please refer to the third-party SDK provider's privacy policy for the scope of collection and rules of use. Third-party sdks will be rigorously evaluated for their ability to protect privacy and will be required to use the information for service purposes only.
- compliance requirements: We may disclose your personal information to relevant third parties to comply with our legal obligations under laws and regulations, judiciary or administrative authorities.
5.2 rules on the transfer of information
5.2.1 premise of assignment and duty of notification
If you need to transfer your personal information due to business changes such as company mergers, acquisitions, asset transfers, bankruptcy liquidations, etc. , we will send you a written notice 30 days in advance through our registered email address, informing of the purpose of the transfer, the recipient's information and privacy protection measures.
5.2.2 liability of the transferee
We will enter into a strict data protection agreement with the assignee, requiring the assignee to continue to comply with all privacy provisions of this agreement, we will terminate the transfer, and take encryption, deletion and other measures to protect your information security.
6. Users' information-related rights
6.1 access to information and search rights
Access and Scope
You can log into the software account at any time, in the"Settings-privacy center" page, query your account registration information (such as bound email) , log records, cloud storage video list and service log. If you need a complete copy of your personal information, you can apply through the contact information provided in Article 10 of this agreement, and we will provide it to you within 5 working days.
Right to correct and supplement information
6.2.1 modalities for correction
If you find that your account registration information (e.g. , your email address) is incorrect or incomplete, you can change it directly in the settings-account management page, application for correction can be submitted through the contact information provided in Article 10 of this agreement, and relevant supporting documents will be provided. We will review and feedback the result within 3 working days.
6.3 information deletion and account cancellation rights
6.3.1 ways of deleting information
You can delete video content, editing records and other information in your account. Once the deletion is confirmed, the relevant information will be removed from the front-end display immediately and completely removed within 30 working days. If you find that the information we collected is in violation of laws and regulations or this agreement, you can apply to delete such information, we will promptly delete after verification.
6.3.2 process for closing accounts
You can submit an account cancellation request through the"Setup-account management-account cancellation" page. After the application is submitted, we will provide you with a 7-day cooling-off period during which you can withdraw your application at any time, we will complete the account cancellation and data cleaning work within 15 working days, after the account cancellation, the related data can not be restored.
6.4 withdrawal of consent
Method of revocation of authority
You may revoke the authorization of the software camera, microphone, storage space, etc. through the system settings of the terminal equipment, or through the contact information specified in Article 10 of this agreement, withdrawal of consent to the collection and use of information. After withdrawal of consent, we will no longer collect or use the corresponding information, but may affect the normal use of some service functions.
7. Third-party technologies and services
7.1 third party SDK Integration Instructions
For specific service functions, the software may integrate third-party sdks, the use of which may involve information gathering. We will rigorously evaluate the privacy protection capability of third-party SDKS, select only SDK providers that meet international privacy protection standards, and require them to comply with relevant privacy protection rules.
7.1.1 description of the main third party SDK
- push sdks (such as Google Firebase Cloud Messaging) : Used to push necessary information to your device, such as account security notifications, service update alerts, etc. , device model, operating system version, unique device identifier, and push log information may be collected, depending on the SDK provider's privacy policy.
Sharing sdks (e.g. Facebook Share SDK, Twitter Share SDK-RRB- : basic information (e.g. video titles) that enables you to Share video content with third-party social platforms, potentially gathering information about your device and the content you are sharing, subject to the SDK provider's privacy policy.
- statistical SDK (e.g. Google Analytics for Firebase) : Used to monitor the usage of services and optimize their functionality. The information collected, including device information, logs, etc. , is anonymized and not personally identifiable, subject to the SDK provider's privacy policy.
Definition of third-party liability
The third party SDK provider is independently responsible for the operation and information processing of its SDK. We are not responsible for the information processing of the third party SDK. If you feel that a third party SDK violates your privacy rights, you may contact the SDK provider directly, or notify us through the contact method specified in Article 10 of this agreement. We will assist you in communicating with a third party, or terminate the cooperation with the third party.
7.2 third-party link tips
This software may contain links to third-party websites or resources (such as links to sources of third-party material in the material repository) . We provide such links only to facilitate your access to information, it shall not be responsible for the authenticity, legality or level of privacy protection of the content of such third-party websites or resources, nor shall it imply our approval of such websites or resources. When you visit a third-party link, you should view its privacy policy and assume the risks associated with its use.
8. Protection of information on minors
8.1 restrictions on the use of minors
Minors under the age of 18(hereinafter referred to as"Minors") shall not register to use this software service on their own, and must be under the consent and guidance of the legal guardian, by the Guardian to assist in the completion of account registration and use of related operations, the legal guardian of minors using the software services bear full responsibility.
8.1 rights and responsibilities of Guardians
The Guardian shall supervise the use of this software by minors and ensure that minors do not edit, store or share videos that contain illegal, violent, pornographic or other harmful content and do not infringe on the legitimate rights and interests of third parties. If the Guardian finds that a minor is using this software without permission or is using it improperly, he or she may contact us through the contact information specified in Article 10 of this agreement, after submitting guardianship certificate material (such as account book, Id Card Copy) , we will assist to take measures such as account freezing, content deletion, account cancellation, etc. .
Information Protection Measures for Minors
We do not actively collect additional personal information from minors, nor do we send any commercial or marketing messages to minors. If we find that the video content uploaded by minors violates the laws and regulations or this agreement, we will immediately remove the content and notify the guardian in a timely manner; if the situation is serious, the account will be restricted or terminated.
9. Protocol updates
9.1 updating the trigger conditions and the way of publicity
This agreement may be modified or updated due to legal and regulatory changes, service upgrades, privacy practices, etc. . The revised agreement will be in the software official website and the client's"Settings-legal terms-privacy agreement" page for publicity, publicity period is not less than 7 days.
9.1.1 notification of change in core terms
If the amendment of this agreement involves the core terms (such as the scope of information collection, sharing rules, user rights, etc.) , we will send you notice of the change through your registered email at the same time of publicity, clearly inform of the changes and when they will take effect. If you continue to use the software service after receiving the notice, you have agreed to the updated agreement. If you do not agree to the change, you can stop using the software service and cancel your account.
9.1.2 historical version
You can use the"Legal terms-privacy agreement history version" column of the official website of this software to check the history version and change record of this agreement, and understand the modification of the agreement.
10. Contact Information and dispute resolution
10.1 channels of communication and complaints
If you have any questions, comments or suggestions about the content of this agreement, or need to submit an application for information access, correction, deletion, account cancellation, or complain about privacy issues, contact our privacy team at: developer.moan@gmail.com.
10.1.1 response time commitment
We will provide an initial response within 5 working days of receipt of your email, confirming your request and informing you of the process, we will give a complete treatment plan or progress statement within 10 working days.
10.2 means of dispute settlement
Due to the performance of this agreement or any privacy disputes related to this software service, both parties shall first resolve the matter through friendly negotiation, any party shall have the right to bring an action in the court of the main operating place of this software service. The formation, entry into force, performance, interpretation and dispute settlement of this agreement shall be governed by the laws of the country where the main operation is located (excluding conflict of laws rules) .