Yohoo AI privacy policy

The Yohoo AI software (hereinafter referred to as"The software") is provided by the Yohoo AI operator (hereinafter referred to as"US") . We take your personal information and data security very seriously, comply with global and local privacy laws and regulations such as the General Data Protection Act (GDPR) , the California Consumer Privacy Act (CCPA) , and the Artificial Intelligence Act -AIBAct Act) , is committed to providing global users with safe and reliable AI video services. This Yohoo AI software privacy agreement (hereinafter referred to as"This agreement") is intended to clearly inform you of our complete rules for the collection, use, storage, protection, sharing and transfer of your personal information, and the related rights you enjoy. Please read and fully understand this agreement before you register, click"Agree" or actually use this software service. Your use of this software service is deemed to be your full understanding and consent to be bound by this agreement in its entirety. If you are a minor, you must be accompanied by a legal guardian to read this agreement and use this software service with the express consent of the legal guardian.

1. Scope of application

1.1 service coverage

This agreement applies to all services of this software that you use through any terminal device (including smartphone, tablet, PC, etc.) , it covers AI video generation, Ai intelligent editing, video shooting, local and cloud storage, cross-device synchronization, video sharing, AI material library calling, account management and related additional functions.

Exclusion of third-party services

This agreement does not apply to independent services provided by third parties through this software, such as services shared to third-party platforms such as YouTube, Facebook, or integrated third-party payment, statistics, etc. . Third-party services set their own privacy rules, and we recommend that you read their privacy policies carefully before using them.

1.1.2 definition of liability for disclosure of information

This agreement does not cover the video content, comments and other information that you make publicly available through this software. The dissemination, use and risk of such public information are at your own risk. We only provide technical support, and are not responsible for its legality or authenticity.

Collection and types of information

2.1 account registration information

In order to provide account management and personalized services, we collect the necessary information at the time of your registration to ensure the security of the account and the normal provision of services.

Basic registration information

When you register, you will need to provide a valid email address and password. This email address will be used for login verification, password retrieval, push service notifications, and will be encrypted and stored.

2.1.2 third-party login information

If you log in through a third-party account such as Google or Apple, we only obtain the account identification information authorized by the platform (such as user name and desensitized email) , and do not collect core privacy data such as third-party account passwords and payments, information processing is subject to third-party privacy rules.

2.2 information in service usage

In order to ensure the operation of the service, optimize the experience and improve security, we will automatically collect the relevant information when you use the service.

2.2.1 equipment and technical information

To ensure compatibility and account security, collect device model, operating system version, unique device identifier (e.g. OAID, IDFV) , hardware configuration (e.g. camera parameters, storage space) , network type, IP address, software version number, etc. . This type of information is not directly related to personal identity, for troubleshooting and malicious attack prevention.

2.2.2 service log information

Log operations automatically, including AI function usage records (such as instructions, parameters, length of video generation) , video upload/download/delete time and size, cloud storage usage, sharing records, login and logout time and IP address, etc. . Logs are used only for service optimization, troubleshooting, and security auditing and are not individually identifiable.

2.2.3ai functional information

When using AI video generation, editing and other functions, we will temporarily collect your input text instructions, upload reference material (such as pictures, clips) , used to generate or optimize the output. This information is only used for the current service process. If you do not save it after the service is completed, the temporary data will be automatically cleaned. If you save the generated results, the relevant instructions and materials will be stored in association with the results and managed by you.

2.3 description of sensitive information

Scope of sensitive information

If your video or footage contains sensitive information such as biometrics, medical records, or financial information, you need to ensure that it is collected, used, and authorized in accordance with regulations.

Methods of handling sensitive information

We only encrypt and store sensitive information for technical services. We do not actively identify, extract or analyze it, nor do we use it for other purposes, such as AI model training, unless expressly authorized by you.

Rules for the use of information

3.1 core service purposes

Provision and maintenance of services

Based on the account information, it provides services such as login and password retrieval; based on the equipment and technical information, it ensures the normal operation of AI function; based on log processing consultation and fault repair.

3.1.2 service optimization and experience enhancement

For non-identity identification information (such as Operation Log, equipment information) summary analysis, optimize the AI model response speed, improve the accuracy of the generated results, improve material compatibility, etc. . Analysis is done anonymously and aggregated, with no specific user involved.

3.2 AI model training purposes

Rules for the use of training data

If you need to use user data for AI model training, we will obtain your express authorization, clearly inform the scope of data use, way and period. The training data will be anonymized and de-identified to ensure that no personal identity can be associated. User data is not used for model training without authorization.

3.3 safety purpose

3.3.1 security of accounts

Using device information, IP and log to identify abnormal login (such as remote strange device login) , send early warning through the mailbox, restrict login when necessary, and ensure account security.

3.3.2 risk management

Through the log and device data to prevent the use of this software to generate illegal content, malicious attacks and other behaviors, to maintain service ecological security.

3.4 prohibited circumstances

Non-authorized use restrictions

Personal information shall not be used for purposes other than those agreed upon without your express and written consent, in particular for commercial advertising, third-party marketing, etc. .

Storage and protection of information

4.1 storage-related specifications

4.1.1 storage locations and service providers

Your account information, logs, and unsolicited content are stored in clusters of compliant cloud servers such as Amazon S 3 and Microsoft Azure in the United States, the European Union, Singapore, and other jurisdictions that meet international privacy standards. Cross-border transport shall comply with relevant laws and regulations to ensure legality and safety.

4.1.2 storage period rules

Follow the"Minimum necessary" principle: account information stored in the duration of the account, deleted within 15 working days after the cancellation; Service log stored for no more than 12 months, overdue anonymous processing; AI function temporary data service is not saved after the completion of the immediate cleaning.

4.1.3 treatment of dormant accounts

If the account has not been used for 24 consecutive months, we will send a hibernation notice via registered email. If no action is taken within 90 days, encrypt the video content and archive it and suspend the cloud service. Activating the account can be restored.

4.2 safety precautions

4.2.1 data encryption

AES-256 encryption algorithm is used in storage, and TLS 1.3 protocol is used in transmission to prevent data interception, tampering or leakage.

4.2.2 access rights management

Establish a strict authority system, only authorized personnel within the scope of their responsibilities to access information, access to multiple authentication and the whole trace; with the contact information staff, partners sign confidentiality agreements, clear responsibilities.

4.2.3 safety technical support

Regular security testing, vulnerability scanning and penetration testing, deployment of firewalls, intrusion detection systems and other protection tools; the establishment of emergency response mechanisms for security incidents, when a data security incident occurs, remedy it immediately and notify you and the regulatory authorities in accordance with regulations.

Information sharing and transfer

5.1 rules for sharing information

Basic principles of sharing

Do not share personal information or content with third parties without your permission, except as provided by law or agreement.

5.1.2 limited sharing scenarios

Only share the"Minimum necessary" and require third parties to comply with privacy rules in the following scenarios: (1) payment services: when purchasing a paid service, share transaction order information (such as order number, amount) with Stripe, PayPal, etc. , (2) third-party sdks: integrated push, share, and other sdks (e.g. Google Firebase Cloud Messaging) that may collect device information, subject to the SDK provider's privacy policy, which we will evaluate for privacy capabilities (3) compliance requirements: Disclosure of information pursuant to a lawful request by the judicial or administrative authorities.

5.2 rules on the transfer of information

5.2.1 premise of assignment and duty of notification

If you need to transfer information due to business changes such as mergers, acquisitions, and asset transfers, notify you of the purpose of the transfer, the recipient, and protection measures 30 days in advance through the registered email.

5.2.2 liability of the transferee

Sign a data protection agreement with the transferee, requiring it to comply with the terms of this agreement. If the transferee can not meet the same protection standards, terminate the transfer and take encryption, deletion and other safeguards.

6. Users' information-related rights

6.1 access to information and search rights

Access and scope

You can log into your account in the"Settings-privacy center" to search for account information, log records, cloud content list and service logs; if you want a complete copy of your personal information, you can apply through Article 10 contact information, we will provide it in 5 working days.

Right to correct and supplement information

6.2.1 modalities for correction

Account information error can be modified in the"Settings-account management"; correction log information to submit applications and supporting materials, we review the feedback within 3 working days.

6.3 information deletion and account cancellation rights

6.3.1 ways of deleting information

You can delete the contents and records, delete the front-end immediately, 30 working days to completely clear; found illegal collection of information can apply for deletion, timely processing after verification.

6.3.2 process for closing accounts

Through the"Set-account management-cancel account" to submit an application, can be revoked within 7 days of a cooling-off period; 15 working days after the completion of the audit cancellation and data cleaning, data can not be recovered.

6.4 withdrawal of consent

Method of revocation of authority

The permissions of cameras and microphones can be withdrawn by setting the device system. The consent of information collection and use can be withdrawn by contact method, which may affect the use of some functions.

6.42ai withdrawal of training authorization

If you are authorized to use your data for AI training, you can revoke your authorization at any time. After that, we will stop using your data, but it will not affect the trained model (because it has been anonymized) .

7. Third-party technologies and services

7.1 third party SDK integration instructions

The software may integrate a third party SDK for certain functions. We evaluate its privacy capabilities and ask for compliance. The main sdks include: (1) push class: Google Firebase Cloud Messaging, which collects device information for notification push; (2) Share: Facebook Share SDK, which collects basic information about devices and shared content; (3) statistics: Google Analytics for Firebase, which anonymizes the collection of device and action logs. The SDK provider's privacy policy will govern.

Definition of third-party liability

The SDK provider is solely responsible for the processing of the information and we accept no responsibility. If you believe that the SDK infringes, you may contact us to assist in communication or terminate the cooperation.

7.2 third-party link tips

This software may contain links to third-party sites, we are not responsible for the authenticity of its content, legality, you need to check its privacy policy and access at your own risk.

8. Protection of information on minors

8.1 restrictions on the use of minors

Minors under the age of 13 can not be registered by themselves. They must be registered with the assistance of their guardians under the guidance of their guardians' consent. The Guardians Bear Full Responsibility.

8.1 rights and responsibilities of guardians

Guardians supervise the use of minors to ensure that they do not generate content that is offensive to dissemination; if they detect unauthorized or inappropriate use, they can contact us and submit a guardianship certificate, we help with account freezes, content deletions, etc. .

Measures for the protection of minors

We do not push commercial advertisements to minors, limit the scope of their AI function, and prohibit the creation of inappropriate content. If we discover illegal use, we will immediately delete the content and notify the guardian, and limit the account function if necessary.

9. Protocol updates

9.1 updating the trigger conditions and the way of publicity

Due to the revision of laws and regulations, service upgrades or privacy protection optimizations, we may amend the agreement, the revised on the official website and the client"Settings-legal terms-privacy agreement" publicity, publicity period is not less than 7 days.

9.1.1 notification of change in core terms

When the core terms (such as the scope of information collection, AI training rules) change, in addition to publicity, you will also be notified through the registered e-mail; you continue to use the service as a change in acceptance, do not agree to stop using and cancel the account.

9.1.2 historical version

You can check the history of the Privacy Agreement and Change Records through the official website"Legal terms-privacy agreement history version".

10. Contact Information and dispute resolution

10.1 channels of communication and complaints

If you have questions, comments, requests for access to information, corrections, cancellations, or complaints about privacy issues, please contact our privacy team at wanqlogyu@outlook.com.

10.1.1 response time commitment

We will provide an initial response within 5 working days of receipt of the email, and a solution or progress statement for complex issues (such as infringement complaints, AI training authorization disputes) within 10 working days.

10.2 means of dispute settlement

If the dispute can not be settled through friendly negotiation, any party shall have the right to bring an action in the court of the main operating place of the software service. This agreement shall apply the law of the place of operation of the service (excluding conflict of laws rules) .