Privacy Policy


Introduction

We highly value the privacy of our users and the protection of their personal information, and we treat this information with diligence and care. When you use our services, we collect and use your relevant personal information and user information (referred to collectively as “information”). In this Privacy Policy (“Policy”), we will explain how we collect, use, store, and share this information when you use our services, as well as how we provide you with access, updates, control, and protection of this information.

【Special Note】Before using the service, please read and fully understand this policy. If you do not agree with the content of this policy, it will prevent our products and services from functioning properly or achieving the intended service effects. You should immediately stop accessing/using our services. By using or continuing to use the service, you indicate that you agree to our collection, use, storage, sharing, transfer, and disclosure of your personal information in accordance with this policy (including any updated versions).

This Privacy Policy will help you understand the following:

1. Facial Data Collection and Use Policy

2. How We Collect and Use Personal Information

3. How We Use Cookies or Similar Technologies

4. Sharing, Transfer, and Disclosure of Information

5. How We Store and Protect Your Personal Information

6. How to Manage Your Personal Information

7. Third-Party Services

8. Minors’ Protection Clause

9. Notice and Revision of This Privacy Policy

10. How to Contact Us

1. Facial Data Collection and Use Policy

(1). What face data does our app collect?

We only analyze the images uploaded by users, such as facial contours, eyes, and nose.

(2). What is the purpose of collecting this information?

We collect face data solely for the purpose of generating realistic portrait effects. When users use our service, we first analyze the images they upload to our cloud server (e.g., identifying the face, eyes, and nose). Then, we use AI to combine this data with the selected templates to generate the realistic effects that users need. We and our partners require users’ images to be generated and to improve the realistic effect, and we will not share your face images with any third parties. Once the final effect is generated, the uploaded images will be immediately deleted. However, the effect images will be stored on the cloud server for free for 10 days, and users are advised to save the effect images to their phone albums in a timely manner. The user’s own uploaded image history is stored on the user’s local device, and we do not store any facial information of the user. Please note that users will need to re-upload their local avatar each time they use the service.

(3). Will the data be shared with any third parties? Where will this information be stored?

We and our partners require users’ images to be generated and to improve the realistic effect, and we will not share your face data with any third parties. Before generating the effects, your images are temporarily stored on an encrypted cloud server. After the effects are generated, your images will be immediately deleted.

(4). How long will face data be retained?

Once the final effect is generated, the uploaded images will be immediately deleted. However, the effect images will be stored on the cloud server for free for 10 days, and users are advised to save the effect images to their phone albums in a timely manner. The user’s own uploaded image history is stored on the user’s local device, and we do not store any facial information of the user.

2. How We Collect and Use Personal Information

We collect your personal information mainly to facilitate your and other users’ easier and more satisfying use of the services. Our goal is to provide a safe, enjoyable, and educational internet experience for all internet users. And this information helps us achieve this goal.

(1) We will collect and obtain your personal information through the following methods:

a. Information provided by you, including:

- Information you provide when registering an account or using the service.

- Shared information you provide to other parties through the service and information stored by you when using the service.

Please note that if you disclose your information in the public areas visible to other users in the service or in response to information uploaded or posted by others, such information will be collected and used by others. If you find that others are collecting or using your information improperly, you can contact us through the feedback channels listed in the “How to Contact Us” section of this policy.

b. Information shared by other parties. This refers to shared information about you provided by other parties when using the service.

c. Information we obtain from you. When you use the service, we collect, aggregate, and record information including but not limited to log information, location information, and device information.

(2) We collect and use the following types of personal information for the following purposes:

a. Providing network security and operational security safeguards for you:

- To protect the security of your account, network, operation, and system, and to prevent phishing, fraud, and Trojan viruses, we collect information related to your device, including device model, operating system version, software version number, device configuration, device network information, network status, application list, and device environment. This includes immutable device identifiers (IMEI number, IDFA, GUID, OPENUDID, SIM card IMSI information), hardware serial number, and MAC address, which are used to understand product compatibility and identify account abnormal states.

- Maintaining product security and promptly troubleshooting faults. To maintain the normal operation of our service, protect the security of your account, troubleshoot product faults, and improve and optimize our service, we collect your EXIF data, subscription status, and service logs. This type of information is necessary for providing the service, used to identify account abnormal states and comply with relevant laws and regulations. After collection, it will be de-identified and will not be used to identify any specific user.

- To better understand the operation and security of this software and service, and to ensure the security of operation and service provision, we will record network log information (the date and time you use this software and related services) as well as the frequency of use, crash data, overall installation and usage information, performance data, and other information.

b. Permission and personal information collected:

- To import photos, pictures, or videos for video editing, we need to access your phone’s gallery and multimedia permissions. If you do not use the above-mentioned services provided by us, you do not need to provide this authorization, and you can also revoke the authorization to access your phone’s gallery at any time. Once you revoke the authorization, you will not be able to use the service of importing photos, pictures, or videos for editing.

- To allow you to use the camera to take videos or photos and edit videos or photos, we need to access your camera permission. When you use the video shooting service, we need to access your device’s microphone permission to collect your voice information. This permission requires your authorization. If you refuse to provide it, you will only be unable to use this function, but it will not affect your normal use of other functions of the product and/or service. You can refuse the authorization when we request it or disable this permission authorization through your device.

- To save the completed works on your device, we need to access your phone’s storage permission. If you refuse to provide it, you will not be able to use the storage function. You can refuse the authorization when we request it or disable this permission authorization through your device.

- In order to provide you with accurate and smooth video services, we will analyze the facial features of your face for facial analysis:

- In order to set effects such as filters, props, and makeup on your face, your facial data will be returned in real-time within the application when you use the shooting function.

- To create artwork using the image or video cutout function, we will collect your portrait photos or videos. The server will analyze your photos or videos and return the facial data processing result. The application will automatically combine the facial data processing result with the material to create the final effect. After the synthesis process is completed, we will immediately delete your facial data.

- In order for you to use the search service of this software, we will collect your search keyword information and log records. To provide efficient search services, some of the aforementioned information will be temporarily stored on your local storage device, and search results content and search history will be displayed to you.

- For other purposes, we will seek your separate consent through page prompts, interactive processes, website announcements, or other means if we want to use your personal information for other purposes not specified in this policy or collect additional personal information not mentioned.

c. Exceptions to obtaining authorized consent

According to relevant laws and regulations, obtaining your authorized consent is not required in the following situations:

- Related to national security and national defense security.

- Related to public safety, public health, and significant public interests.

- Related to criminal investigation, prosecution, trial, and execution of judgments.

- Necessary to protect the life, property, and other significant legitimate rights and interests of information subjects or other individuals, but it is difficult to obtain the consent of the individuals.

- The collected information is publicly disclosed by yourself.

- Collected from legally disclosed information, such as legal news reports, government information disclosure, and other channels.

- Necessary for signing a contract at your request.

- Necessary for maintaining the secure and stable operation of the service, such as discovering and handling product or service faults.

- Necessary for legitimate news reporting.

- Necessary for academic research conducted by academic research institutions in the public interest, and when providing research or descriptive results to the public, the information contained in the results is de-identified.

- Other circumstances as stipulated by laws and regulations.

3. How We Use Cookies or Similar Technologies

We or our third-party partners may use cookies or similar technologies to collect and use your information, which will be stored as log information.

Through the use of cookies, we provide users with a simple and convenient online experience. A cookie is a small amount of data that is sent from a web server to your browser and stored on your computer’s hard drive. We use cookies to benefit our users. For example, to make the login process of this software application faster, you can choose to store your username in a cookie. This way, the next time you want to log in to our service, it will be more convenient and quick. Cookies help us determine the pages and content you access, the time you spend on the website, and the specific content or services you choose on this software service.

Cookies enable us to serve you better and faster. However, you should be able to control whether cookies are accepted by your browser and how they are accepted. Please refer to the files accompanying your browser for more information on this.

We and our third-party partners collect and use your information through cookies or similar technologies and store this information.

We use our own cookies or similar technologies for the following purposes:

(1). Remembering your identity, including: Cookies or similar technologies help us identify you as a registered user of our service or store preferences or other information you provide to us when using the service.

While using cookies or similar technologies for the above purposes, we will share with advertisers and other partners the de-identified information collected through cookies or similar technologies for analyzing how you and other users use this software service and for advertising services.

This software service may contain cookies or similar technologies placed by advertisers or other partners. The collection and use of such information by these third-party cookies or similar technologies is not governed by this Policy but by their own information protection statements. We are not responsible for third-party cookies or similar technologies.

4. Sharing, Transfer, and Disclosure of Personal Information

(1) Sharing

Except for the following circumstances, we will not share your personal information with any third parties without your consent:

a. Providing services to you. We will share your information with partners and other third parties to fulfill the functions of our products and/or services, enabling you to use the services you need, including payment institutions providing payment services, partners providing data services (including network advertising monitoring, data statistics, and data analysis), partners providing advertising services, and other service providers.

The specific situations of third-party information sharing are as follows:

b. Necessary sharing with affiliates. In order to provide you with a unified account system and facilitate unified management, system and account security, your personal information will be shared between us and our affiliates.

c. Achieving the purposes stated in the first section of this policy.

d. Fulfilling our obligations and exercising our rights under this policy or other agreements reached with you.

e. Sharing with commissioned partners for promotion purposes, etc., to allow such partners to understand the coverage and effectiveness of promotions. For example, we may inform the partner of how many people have viewed their promotional information or purchased the partner’s products after seeing such information, or provide them with statistical information that cannot identify specific individuals, helping them understand their audience or customers.

f. Sharing for compliance with applicable laws, regulations, or legal requirements from government agencies or authorized organizations.

g. Sharing based on your legitimate needs or with your authorized consent.

h. Sharing at the request of your guardian.

i. Provided in accordance with the single-service agreement (including electronically signed electronic agreements and corresponding platform rules) or other legal documents signed with you.

j. Based on academic research and necessary for public interest, when providing academic research or descriptive results to the public, the information contained in the results is de-identified.

k. Other circumstances as stipulated by laws and regulations.

We will share your personal information with companies, organizations, and individuals who share personal information with us based on strict confidentiality agreements. They are required to handle information in accordance with our instructions, this policy, and any other relevant confidentiality and security measures.

(2) Transfer

a. With the continuous development of our business, we may conduct transactions including but not limited to mergers, acquisitions, asset transfers, or similar transactions, and your information will be transferred as part of such transactions. We will require the new company or organization holding your personal information to continue to be bound by this policy. Otherwise, we will require the company or organization to seek your consent again.

b. With your explicit consent, we will transfer your personal information to other parties.

(3) Disclosure

We will only disclose your personal information in the following circumstances, and only after taking industry-standard security measures:

a. Disclose the information you specified in the manner you explicitly agreed to disclose.

b. Disclose your information as required by laws, regulations, mandatory administrative enforcement, or judicial requirements. We will disclose your information in accordance with the required information type and disclosure method. When we receive a request for the above-mentioned disclosure of information, we will require the recipient to provide corresponding legal documents, such as subpoenas or investigation letters. We believe that for the information we are requested to provide, we should strive to maintain transparency within the scope permitted by law. We have carefully reviewed all requests to ensure that they have a legitimate basis and are limited to data that law enforcement agencies have the legal right to obtain for specific investigative purposes.

(4) Exceptions to obtaining prior consent for sharing, transfer, and disclosure of information

Sharing, transferring, and disclosing de-identified personal information that ensures the data recipient cannot restore and reidentify the information subject does not constitute sharing, transfer, and public disclosure of personal information. The storage and processing of such data will not require separate notification and your consent.

5. How We Store and Protect Personal Information

We only store your personal information for the necessary period required for the purposes stated in this policy and the shortest period required by laws and regulations. However, in the following situations, we may change the storage time of personal information to comply with legal requirements:

1). To comply with applicable laws and regulations, including the requirement that technical measures for monitoring, recording network operation status, and network security incidents specified in Article 21, Paragraph 3 of the Cybersecurity Law of the People’s Republic of China shall be retained for no less than six months.

2). To comply with the provisions of court judgments, rulings, or other legal procedures.

3). To comply with the requirements of government agencies or legally authorized organizations.

If we terminate the service or operation, we will promptly stop collecting your personal information and comply with relevant laws and regulations by notifying you in advance. After the service or operation is terminated, we will delete or anonymize your personal information, except as otherwise provided by laws, regulations, or regulatory authorities.

The personal information we collect and generate during our operation within the People’s Republic of China is stored within China, except for the following situations:

a. Clear provisions in laws and regulations.

b. Obtaining your authorization and consent.

c. Your use of products or services involving cross-border transfer, and this software needs to provide your personal information to entities outside the country.

For the above situations, we will ensure that your personal information receives sufficient protection in accordance with this policy and national laws and regulations.

We attach great importance to information security and have established a dedicated security team. We take all reasonable and feasible measures to protect your personal information:

(1) Data security technical measures

We adopt security measures that comply with industry standards to prevent unauthorized access, use, modification, damage, or loss of your personal information. These measures include establishing reasonable system specifications and security technologies.

Our services use various encryption technologies. For example, in some products, we will use encryption technology (such as SSL) to protect your personal information, encrypt and store your personal information, and isolate it using isolation technologies.

In the use of personal information, such as information display and information correlation calculation, we use various data de-identification technologies to enhance the security of information during use.

We also protect personal information through strict control of data access permissions and multi-factor authentication technologies, preventing unauthorized use of personal information.

(2) Other security measures we take to protect personal information

We manage and regulate the storage and use of personal information by establishing data classification and grading systems, data security management specifications, and data security development specifications.

We exercise comprehensive security control over data through information access confidentiality agreements, monitoring, and audit mechanisms. We also provide personal information protection training courses to enhance employees’ security awareness and their understanding of the importance of protecting information.

(3) We only allow employees and partners who need to know this information to access your personal information and set strict access control and monitoring mechanisms. We also require anyone who comes into contact with your personal information to fulfill their confidentiality obligations. Failure to fulfill these obligations may result in legal liability or suspension of cooperation.

(4) We take all reasonable and feasible measures to ensure that unrelated personal information is not collected.

(5) The internet is not an absolutely secure environment, and communication methods such as email, instant messaging, social software, or other service software cannot guarantee complete encryption when communicating with other users. We recommend that you use complex passwords when using such tools and pay attention to protecting your information security.

(6) The internet environment is not completely secure. We will make every effort to ensure or guarantee the security of the personal information you send to us. If our physical, technical, or managerial protection facilities are compromised, resulting in unauthorized access, public disclosure, tampering, or destruction of personal information, and causing damage to your legitimate rights and interests, we will bear corresponding legal responsibilities.

(7) Security incident response

To respond to risks such as personal information leaks, damage, and loss, we have established information security management systems to clarify the classification and grading standards of security incidents and vulnerabilities and the corresponding processing procedures. We have also established a dedicated emergency response team for security incidents. According to the requirements of security incident response specifications, we initiate security plans for different security incidents, including containment, analysis, positioning, remedial measures, traceability, and countermeasures in cooperation with relevant departments.

In the event of an information security incident, we will notify you in a timely manner in accordance with legal and regulatory requirements, including the basic information and impact of the security incident, the measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will also notify you of the incident through website announcements, push notifications, pop-up prompts, SMS, phone calls, or other methods, and if it is difficult to notify each affected individual, we will use reasonable and effective means to make announcements. At the same time, we will actively report the handling of information security incidents in accordance with the requirements of regulatory authorities.

Please understand that due to technological limitations and the limitations of risk prevention, even if we have made every effort to strengthen security measures, we cannot guarantee the security of information one hundred percent of the time. You need to understand that the system and communication network you use to access our services may sometimes encounter problems beyond our control.

Please be sure to keep your account, password, and other identity elements secure. When you use the service, we identify your identity through your account, password, and other identity elements. Once you disclose the above information, you will suffer losses and be at a disadvantage. If you find any risks of account, password, and/or other identity elements being disclosed or have been disclosed, please contact us immediately so that we can take appropriate measures to avoid or reduce related losses.

6. How to Manage Your Personal Information

(1) Protection

We attach great importance to your management of personal information and do our best to protect your rights to query, access, modify, delete, withdraw consent, cancel your account, lodge complaints, and set privacy functions, so that you have the ability to protect your privacy and information security.

You can directly cancel your account in this software. The specific path is “Settings — Cancel Account”. Before canceling your account, we will verify your account information. You understand and agree that canceling your account is an irreversible action. After you cancel your account, we will delete or anonymize your personal information, except as otherwise provided by laws, regulations, or regulatory authorities.

(2) Complaints and Reports

If you believe that your personal information rights are at risk of or have been violated, or if you find clues to the infringement of personal information rights, you can contact us through “Settings — Contact Us”. We will handle and respond to your complaints and reports within 15 working days after verification.

(3) Changing or Withdrawing Sensitive Permission Settings

You can disable location access, access to photos, microphone usage, camera usage, and notification permissions in the device’s operating system.

(4) Accessing the Privacy Policy

You can view the full content of this privacy policy in “Settings — Privacy Policy”.

(5) Notification of Service Termination

If we cease operation, we will promptly stop collecting your personal information, notify you of the cessation of operation through individual notification or public announcement, and delete or anonymize your personal information.

(6) Public Sharing

We provide video sharing functions, allowing you to share the short videos you create in this software with your friends or share them on social networks. Other users or third parties beyond our control may independently cache, copy, or store them, or save them in the public domain. If you publicly share or distribute your works created in this software through the above channels, resulting in the disclosure of your information, we are not responsible for it. Therefore, we remind you to carefully consider whether to publicly share or distribute your information through the above channels.

7. Third-Party Services

This software service may occasionally link to social media or other services provided by third parties (including websites or other service forms). This includes:

1). You can use the “Share” button to share certain content to third-party services, or you can use third-party services to log in to this software service. These functions will collect your information (including your log information) and store cookies on your device to ensure the normal operation of the above functions.

2). We provide links through advertisements or other means of service to enable you to link to third-party services or websites.

3). Other situations involving access to third-party services. For example, we may access third-party SDK services and share the de-identified personal information collected in accordance with this policy with them to provide better customer service and user experience.

These third-party social media or other services are operated by the relevant third parties. Your use of these third-party social media services or other services (including any information you provide to these third parties) is subject to their own terms of service and information protection statements (not this policy), and you should carefully read their terms.

We remind you again that the personal information protection measures provided in this Privacy Policy only apply to this software and related services. Once you leave this software and related services and browse or use other websites, services, and content resources, we do not have the ability or obligation to protect the personal information you submit to software or websites other than this software, regardless of whether you access such software, websites through links or guidance from this software.

8. Protection of Minors

We recommend that any minors participating in online activities obtain prior consent from their parents or legal guardians (“guardians”). We encourage parents or guardians to guide minors under the age of eighteen in using our services. We recommend that minors encourage their parents or guardians to read this Privacy Policy and seek their consent and guidance before submitting personal information.

According to the relevant laws and regulations, if you are a child under the age of 14, you should obtain the prior consent of your parents or legal guardians and have your parents or legal guardians help you read this privacy policy before using the products or services provided. If you are the guardian of a child, before helping the child complete the use of the product or service, you should carefully read this policy and decide whether to agree to this policy.

If you have any questions or requests regarding the personal information protection of the children you are responsible for, please contact us through the contact information disclosed in this privacy policy. We will handle and respond to it within a reasonable time.

9. Notice and Revision

In order to provide you with better services, we may modify the terms of this policy in a timely manner based on the updates of products or services and the requirements of laws and regulations. Such modifications will become part of this policy. If these updates result in a substantial reduction or significant changes to your rights under this policy, we will notify you through website announcements, push notifications, pop-up prompts, or other means before this policy takes effect, so that you can understand the latest version of this privacy policy.

Any modifications we make will prioritize your satisfaction. We encourage you to review our privacy policy each time you use the service.

We will make announcements when necessary (including when we temporarily suspend a certain service due to system maintenance). You will not be able to unsubscribe from these non-promotional service announcements.

10. How to Contact Us

We will protect your personal information in accordance with this policy. If you have any questions, opinions, or suggestions regarding this policy, your information, or related matters, please feel free to contact us. In general, we will handle and respond to your questions, opinions, or suggestions within 10 working days after receiving them and verifying your user identity.

Please contact us at talentediartist@gmail.com.
Report abuse