The Yohoo AI software (hereinafter referred to as"The software") is provided by the Yohoo AI operator (hereinafter referred to as"US") . We take your personal information and data security very seriously, comply with global and local privacy laws and regulations such as the General Data Protection Act (GDPR) , the California Consumer Privacy Act (CCPA) , and the Artificial Intelligence Act -AIBAct Act) , is committed to providing global users with safe and reliable AI video services. This Yohoo AI software privacy agreement (hereinafter referred to as"This agreement") is intended to clearly inform you of our complete rules for the collection, use, storage, protection, sharing and transfer of your personal information, and the related rights you enjoy. Please read and fully understand this agreement before you register, click"Agree" or actually use this software service. Your use of this software service is deemed to be your full understanding and consent to be bound by this agreement in its entirety. If you are a minor, you must be accompanied by a legal guardian to read this agreement and use this software service with the express consent of the legal guardian.
1. Scope of application
1.1 service coverage
This agreement applies to all services of this software that you use through any terminal device (including smartphone, tablet, PC, etc.) , it covers AI video generation, Ai intelligent editing, video shooting, local and cloud storage, cross-device synchronization, video sharing, AI material library calling, account management and related additional functions.
Exclusion of third-party services
This agreement does not apply to independent services provided by third parties through this software, such as services shared to third-party platforms such as YouTube, Facebook, or integrated third-party payment, statistics, etc. . Third-party services set their own privacy rules, and we recommend that you read their privacy policies carefully before using them.
1.1.2 definition of liability for disclosure of information
This agreement does not cover the video content, comments and other information that you make publicly available through this software. The dissemination, use and risk of such public information are at your own risk. We only provide technical support, and are not responsible for its legality or authenticity.
Collection and types of information
2.1 account registration information
In order to provide account management and personalized services, we collect the necessary information at the time of your registration to ensure the security of the account and the normal provision of services.
Basic registration information
When you register, you will need to provide a valid email address and password. This email address will be used for login verification, password retrieval, push service notifications, and will be encrypted and stored.
2.1.2 third-party login information
If you log in through a third-party account such as Google or Apple, we only obtain the account identification information authorized by the platform (such as user name and desensitized email) , and do not collect core privacy data such as third-party account passwords and payments, information processing is subject to third-party privacy rules.
2.2 information in service usage
In order to ensure the operation of the service, optimize the experience and improve security, we will automatically collect the relevant information when you use the service.
2.2.1 equipment and technical information
To ensure compatibility and account security, collect device model, operating system version, unique device identifier (e.g. OAID, IDFV) , hardware configuration (e.g. camera parameters, storage space) , network type, IP address, software version number, etc. . This type of information is not directly related to personal identity, for troubleshooting and malicious attack prevention.
2.2.2 service log information
Log operations automatically, including AI function usage records (such as instructions, parameters, length of video generation) , video upload/download/delete time and size, cloud storage usage, sharing records, login and logout time and IP address, etc. . Logs are used only for service optimization, troubleshooting, and security auditing and are not individually identifiable.
2.2.3ai functional information
When using AI video generation, editing and other functions, we will temporarily collect your input text instructions, upload reference material (such as pictures, clips) , used to generate or optimize the output. This information is only used for the current service process. If you do not save it after the service is completed, the temporary data will be automatically cleaned. If you save the generated results, the relevant instructions and materials will be stored in association with the results and managed by you.
2.3 description of sensitive information
Scope of sensitive information
If your video or footage contains sensitive information such as biometrics, medical records, or financial information, you need to ensure that it is collected, used, and authorized in accordance with regulations.
Methods of handling sensitive information
We only encrypt and store sensitive information for technical services. We do not actively identify, extract or analyze it, nor do we use it for other purposes, such as AI model training, unless expressly authorized by you.
Rules for the use of information
3.1 core service purposes
Provision and maintenance of services
Based on the account information, it provides services such as login and password retrieval; based on the equipment and technical information, it ensures the normal operation of AI function; based on log processing consultation and fault repair.
3.1.2 service optimization and experience enhancement
For non-identity identification information (such as Operation Log, equipment information) summary analysis, optimize the AI model response speed, improve the accuracy of the generated results, improve material compatibility, etc. . Analysis is done anonymously and aggregated, with no specific user involved.
3.2 AI model training purposes
Rules for the use of training data
If you need to use user data for AI model training, we will obtain your express authorization, clearly inform the scope of data use, way and period. The training data will be anonymized and de-identified to ensure that no personal identity can be associated. User data is not used for model training without authorization.
3.3 safety purpose
3.3.1 security of accounts
Using device information, IP and log to identify abnormal login (such as remote strange device login) , send early warning through the mailbox, restrict login when necessary, and ensure account security.
3.3.2 risk management
Through the log and device data to prevent the use of this software to generate illegal content, malicious attacks and other behaviors, to maintain service ecological security.
3.4 prohibited circumstances
Non-authorized use restrictions
Personal information shall not be used for purposes other than those agreed upon without your express and written consent, in particular for commercial advertising, third-party marketing, etc. .
Storage and protection of information
4.1 storage-related specifications
4.1.1 storage locations and service providers
Your account information, logs, and unsolicited content are stored in clusters of compliant cloud servers such as Amazon S 3 and Microsoft Azure in the United States, the European Union, Singapore, and other jurisdictions that meet international privacy standards. Cross-border transport shall comply with relevant laws and regulations to ensure legality and safety.
4.1.2 storage period rules
Follow the"Minimum necessary" principle: account information stored in the duration of the account, deleted within 15 working days after the cancellation; Service log stored for no more than 12 months, overdue anonymous processing; AI function temporary data service is not saved after the completion of the immediate cleaning.
4.1.3 treatment of dormant accounts
If the account has not been used for 24 consecutive months, we will send a hibernation notice via registered email. If no action is taken within 90 days, encrypt the video content and archive it and suspend the cloud service. Activating the account can be restored.
4.2 safety precautions
4.2.1 data encryption
AES-256 encryption algorithm is used in storage, and TLS 1.3 protocol is used in transmission to prevent data interception, tampering or leakage.
4.2.2 access rights management
Establish a strict authority system, only authorized personnel within the scope of their responsibilities to access information, access to multiple authentication and the whole trace; with the contact information staff, partners sign confidentiality agreements, clear responsibilities.
4.2.3 safety technical support
Regular security testing, vulnerability scanning and penetration testing, deployment of firewalls, intrusion detection systems and other protection tools; the establishment of emergency response mechanisms for security incidents, when a data security incident occurs, remedy it immediately and notify you and the regulatory authorities in accordance with regulations.
Information sharing and transfer
5.1 rules for sharing information
Basic principles of sharing
Do not share personal information or content with third parties without your permission, except as provided by law or agreement.
5.1.2 limited sharing scenarios
Only share the"Minimum necessary" and require third parties to comply with privacy rules in the following scenarios: (1) payment services: when purchasing a paid service, share transaction order information (such as order number, amount) with Stripe, PayPal, etc. , (2) third-party sdks: integrated push, share, and other sdks (e.g. Google Firebase Cloud Messaging) that may collect device information, subject to the SDK provider's privacy policy, which we will evaluate for privacy capabilities (3) compliance requirements: Disclosure of information pursuant to a lawful request by the judicial or administrative authorities.
5.2 rules on the transfer of information
5.2.1 premise of assignment and duty of notification
If you need to transfer information due to business changes such as mergers, acquisitions, and asset transfers, notify you of the purpose of the transfer, the recipient, and protection measures 30 days in advance through the registered email.
5.2.2 liability of the transferee
Sign a data protection agreement with the transferee, requiring it to comply with the terms of this agreement. If the transferee can not meet the same protection standards, terminate the transfer and take encryption, deletion and other safeguards.
6. Users' information-related rights
6.1 access to information and search rights
Access and scope
You can log into your account in the"Settings-privacy center" to search for account information, log records, cloud content list and service logs; if you want a complete copy of your personal information, you can apply through Article 10 contact information, we will provide it in 5 working days.
Right to correct and supplement information
6.2.1 modalities for correction
Account information error can be modified in the"Settings-account management"; correction log information to submit applications and supporting materials, we review the feedback within 3 working days.
6.3 information deletion and account cancellation rights
6.3.1 ways of deleting information
You can delete the contents and records, delete the front-end immediately, 30 working days to completely clear; found illegal collection of information can apply for deletion, timely processing after verification.
6.3.2 process for closing accounts
Through the"Set-account management-cancel account" to submit an application, can be revoked within 7 days of a cooling-off period; 15 working days after the completion of the audit cancellation and data cleaning, data can not be recovered.
6.4 withdrawal of consent
Method of revocation of authority
The permissions of cameras and microphones can be withdrawn by setting the device system. The consent of information collection and use can be withdrawn by contact method, which may affect the use of some functions.
6.42ai withdrawal of training authorization
If you are authorized to use your data for AI training, you can revoke your authorization at any time. After that, we will stop using your data, but it will not affect the trained model (because it has been anonymized) .
7. Third-party technologies and services
7.1 third party SDK integration instructions
The software may integrate a third party SDK for certain functions. We evaluate its privacy capabilities and ask for compliance. The main sdks include: (1) push class: Google Firebase Cloud Messaging, which collects device information for notification push; (2) Share: Facebook Share SDK, which collects basic information about devices and shared content; (3) statistics: Google Analytics for Firebase, which anonymizes the collection of device and action logs. The SDK provider's privacy policy will govern.
Definition of third-party liability
The SDK provider is solely responsible for the processing of the information and we accept no responsibility. If you believe that the SDK infringes, you may contact us to assist in communication or terminate the cooperation.
7.2 third-party link tips
This software may contain links to third-party sites, we are not responsible for the authenticity of its content, legality, you need to check its privacy policy and access at your own risk.
8. Protection of information on minors
8.1 restrictions on the use of minors
Minors under the age of 13 can not be registered by themselves. They must be registered with the assistance of their guardians under the guidance of their guardians' consent. The Guardians Bear Full Responsibility.
8.1 rights and responsibilities of guardians
Guardians supervise the use of minors to ensure that they do not generate content that is offensive to dissemination; if they detect unauthorized or inappropriate use, they can contact us and submit a guardianship certificate, we help with account freezes, content deletions, etc. .
Measures for the protection of minors
We do not push commercial advertisements to minors, limit the scope of their AI function, and prohibit the creation of inappropriate content. If we discover illegal use, we will immediately delete the content and notify the guardian, and limit the account function if necessary.
9. Protocol updates
9.1 updating the trigger conditions and the way of publicity
Due to the revision of laws and regulations, service upgrades or privacy protection optimizations, we may amend the agreement, the revised on the official website and the client"Settings-legal terms-privacy agreement" publicity, publicity period is not less than 7 days.
9.1.1 notification of change in core terms
When the core terms (such as the scope of information collection, AI training rules) change, in addition to publicity, you will also be notified through the registered e-mail; you continue to use the service as a change in acceptance, do not agree to stop using and cancel the account.
9.1.2 historical version
You can check the history of the Privacy Agreement and Change Records through the official website"Legal terms-privacy agreement history version".
10. Contact Information and dispute resolution
10.1 channels of communication and complaints
If you have questions, comments, requests for access to information, corrections, cancellations, or complaints about privacy issues, please contact our privacy team at wanqlogyu@outlook.com.
10.1.1 response time commitment
We will provide an initial response within 5 working days of receipt of the email, and a solution or progress statement for complex issues (such as infringement complaints, AI training authorization disputes) within 10 working days.
10.2 means of dispute settlement
If the dispute can not be settled through friendly negotiation, any party shall have the right to bring an action in the court of the main operating place of the software service. This agreement shall apply the law of the place of operation of the service (excluding conflict of laws rules) .