Updated: November 11, 2024
In accordance with the Personal Information Protection Law and other relevant laws and regulations, in order to protect your rights, the Privacy Policy (hereinafter referred to as the "Policy") will explain to you how we collect, use and store your personal information and what rights you have.We attach great importance to the protection of users' personal information and will treat this information with diligence and prudence. When you download, install, open, browse, register, log in, and use (hereinafter collectively referred to as "using") the "MystShow" software and related services, we will collect, store, use, share, disclose and protect your personal information in accordance with this Privacy Policy. This policy is closely related to your use of our services, and we recommend that you carefully read and understand all the contents of this policy and make choices you think are appropriate.
If you are a minor, your guardian needs to carefully read this policy and agree to your use of our products and services in accordance with this policy.
This privacy agreement shows you the following contents:
1. Introduction
2. Use and protection of facial data
3. How we collect and use personal information
4. How we use Cookies and similar technologies
5. Methods for sharing, transferring, and publicly disclosing personal information
6. How we store your personal information
7. How we protect your personal information
8. How you can manage your personal information
9. Handling of policy changes
10. Contact us
2. Use and protection of facial data
3. How we collect and use personal information
4. How we use Cookies and similar technologies
5. Methods for sharing, transferring, and publicly disclosing personal information
6. How we store your personal information
7. How we protect your personal information
8. How you can manage your personal information
9. Handling of policy changes
10. Contact us
1. Introduction
Personal information: If the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; When your information can identify your personal identity alone or in combination with other information, or when we use data that cannot be linked to any specific personal information in combination with other your personal information, such information will be treated and protected as your personal information in accordance with this policy during the period of combined use.
In the process of your using this application and services, we will, in accordance with the principles of legality, propriety, and necessity, collect the information you actively provide when using the services or generated due to the use of services in the following ways, so as to ensure the normal operation and functions of the product, improve the products and services, and ensure the safety of users' use.
2. Use and protection of facial data
2.1 Facial data collected by MystShow
We analyze your photos to find the feature points of the face in the photos (such as eyes, nose, mouth points) for face processing. We do not collect any facial data. After the analysis process is completed, all data will be permanently deleted. Refusing to provide the above information may prevent you from using some functions, but it will not affect the normal use of other main functions and services.
2.2 Purpose and process of collecting facial data
In order to provide you with effects similar to the template, we need to find facial feature points (such as eyes, nose, mouth points). The complete process is:
(1) You submit the selected photos to our server in an encrypted manner;
(2) The server analyzes the facial data in your photos and applies it to the template you selected;
(3) After the synthesis is completed, the server will return the final rendering effect to you through the application;
(4) The final synthesized effect (i.e., your "work") will be temporarily stored in encrypted storage and will be permanently deleted after a certain period of time.
2.3 Sharing and storage of facial data
We will not share your facial data with any third party. This information is temporarily stored in encrypted storage, and after the analysis process is completed, the photos you upload will be permanently deleted.
2.4 Retention of facial data
We will not collect, store, or retain your facial data on the server. After the analysis process is completed, all the information and photos you upload will be deleted immediately.
3. How we collect and use personal information
3.1 Personal information we collect
We will collect the information you actively provide when using the services and the information generated during the process of using functions or receiving services through automated means in the following ways:
3.1.1 When you use the functions of this application, you may obtain the following permissions of your terminal device:
(1) Camera permission
When you use the shooting business function, we will need to obtain your device's camera permission and collect the picture content information (personal information) you provide. This permission requires your authorization. If you refuse to provide it, you will only be unable to use this function, but it will not affect your normal use of other functions of the product and/or service. You can refuse when we request authorization from you or turn off the permission authorization through your device.
(2) Privacy tracking permission
During your use of this application, in order to remember your identity, analyze your usage of this application, and identify you as a user of this application, we will need to obtain your privacy tracking permission and collect your device's advertising identifier IDFA. This permission requires your authorization. If you refuse to provide it, it will not affect your normal use of other functions of the product and/or service. You can refuse when we request authorization from you or turn off the permission authorization through your device.
(3) Network permission
During your use of this application, we will need to obtain your network permission. This permission requires your authorization. If you refuse to provide it, you will be unable to use the relevant functions of this application. You can refuse when we request authorization from you or turn off the permission authorization through your device.
(4) Photo permission
When you add pictures from your mobile phone album to this application for making videos or photo functions, we will need to obtain your device's photo permission and collect the picture information (personal information) in your mobile phone's storage space. This permission requires your authorization. If you refuse to provide it, you will only be unable to use this function, but it will not affect your normal use of other functions of the product and/or service. You can refuse when we request authorization from you or turn off the permission authorization through your device.
3.1.2 Personal information we collect and use
(1) Product security guarantee function
In order to ensure the normal operation of the software and services, we will collect yourhardware model, operating system version number, International Mobile Equipment Identity (IMEI), network device hardware address (MAC), IP address, software version number, network access method and type, and operation log information.Please understand that this information is the basic information we must collect to provide services and ensure the normal operation of the product. The above function permissions are all necessary permissions for using the corresponding product functions and services. If you do not grant the corresponding permissions, you will be unable to use the relevant functions, but it will not affect the use of other functions or your use of basic business functions. If you agree to provide your sensitive personal information (*), it means that you agree to our processing of your sensitive personal information in accordance with the purposes and methods described in this agreement.
(2) Using functions related to this application
Video synthesis function is one of the core functions of this application. To realize this function, we may collect and use the following information or permissions:
- Information about your operations and usage behaviors, including browsing preferences and production preferences;
- Information you actively provide, including uploaded photos;
- When you import pictures to make and synthesize videos, we will request your authorization for the sensitive permission to read/modify contents in the SD card. If you refuse to authorize, you will be unable to use the video synthesis function and the function of saving the finally synthesized video to the album, but it will not affect your normal use of other functions of this application.
- We will collect the avatar photos you choose to upload or voluntarily take, for providing you with services of modifying or editing short videos on the platform using technology. If you do not use the above services provided by us, we will not collect your avatar photos.
- We will collect your avatar information to verify that the photo you uploaded is yourself, to protect your portrait right from being misused. We will not store your personal facial feature information.
- We will neither store nor share/process your personal facial information with any third party. Such information is collected only for the facial recognition function of the video synthesis function (including but not limited to face fusion effect, AI face swapping effect, filter effect, beauty effect). Your personal facial information is saved by the carrier (such as mobile phone or other smart handheld terminal devices) and its system when you upload the avatar photo, and we will not save your personal facial information.
Refusing to provide the above information may prevent you from using core functions, but it will not affect the normal use of other functions and services.
We will conduct feature analysis and user profiling of your preferences, habits, and location based on the collected information to show or recommend search results and video content that are more relevant to you.
For this purpose, the information we need to collect includes your device information (such as hardware model, device MAC address, IMEI, IDFA, IMSI, necessary software list), browser model, log information, browsing history, search terms, and personal location information (among which precise location information is sensitive personal information).
Please understand that when we collect and use the above information, we have performed de-identification processing. Data analysis only corresponds to specific codes that cannot be directly associated with user identities, and cannot and will never be associated with your real identity.
3.1.3 Third-party SDKs used
- Umeng+ SDK, used for event statistics. Types of personal information collected: device information (IMEI/Mac/android ID/IDFA/OPENUDID/GUID/SIM card IMSI/geographical location information). Privacy policy link: https://www.umeng.com/page/policy
- Reyno Engine SDK, used for attribution. Personal information collected: OAID/IMEI/GAID/MAC/AndroidID/IDFV/IDFA. Privacy policy link: Reyno Engine Privacy Policy
- ByteDance Fusion Conversion SDK, used for attribution. Personal information collected: IDFA, IDFV and other device feature fields. Privacy policy link: ByteDance Engine Conversion SDK Privacy Agreement
3.2 Use of personal information
3.3.1 Necessary for realizing product functions
The information we collect follows the principles of "legality, propriety, and necessity" and will be used to realize the aforementioned business functions or services.
3.2.2 Handling of changes in the purpose of using personal information
If we use your personal information beyond the scope claimed at the time of collection and its directly or reasonably related scope, we will inform you again and obtain your explicit consent before using your personal information.
It is particularly important to note that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; When your information can identify your personal identity alone or in combination with other information, or when we use data that cannot be linked to any specific personal information in combination with other your personal information, such information will be treated and protected as your personal information in accordance with this privacy statement during the period of combined use.
3.3.3 Personal information collected and used with exemption from obtaining consent in accordance with the law
Please understand that in the following circumstances, in accordance with laws, regulations and relevant national standards, we may collect and use your personal information without your authorization and consent:
(1) Directly related to national security and national defense security;
(2) Directly related to public security, public health, and major public interests;
(3) Directly related to criminal investigation, prosecution, trial, and execution of judgments;
(4) Necessary for safeguarding the major legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the consent of the person;
(5) The personal information collected from you is publicly disclosed by you to the public;
(6) Collecting your personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
(7) Necessary for signing or performing a contract at your request;
(8) Necessary for maintaining the safe and stable operation of the "this application" software and related services, such as detecting and handling faults of the "this application" software and related services;
(9) Necessary for legitimate news reporting;
(10) Necessary for academic research institutions to carry out statistical or academic research for public interests, and when providing the results of academic research or description to the public, de-identifying the personal information contained in the results;
(11) Other circumstances stipulated by laws and regulations.
4. How we use Cookies and similar technologies
Cookies and similar technologies are common technologies used on the Internet. When you use this software and related services, we may use related technologies to send one or more Cookies or anonymous identifiers to your device to collect and store information when you access and use this application. We use Cookies and similar technologies mainly to achieve the following functions or services:
4.1 Ensure the safe and efficient operation of products and services
We may set Cookies or anonymous identifiers for authentication and security assurance to confirm whether you are safely logged into the service or whether you encounter illegal acts such as theft and fraud. These technologies will also help us improve service efficiency and enhance login and response speeds.
4.2 Help you get a more convenient access experience
Using such technologies can help you save the steps and processes of repeatedly filling in personal information and frequent logins (realizing one-click login process, recording video production history).
4.3 Recommend and display content you may be interested in
We may use Cookies and similar technologies (including Beacon, Proxy) to understand your preferences and usage habits, conduct consultations or data analysis to improve product services and user experience, and optimize your choice of advertisements.
We promise that we will not use Cookies for any other purposes beyond those described in this privacy policy.
5. Methods for sharing, transferring, and publicly disclosing personal information
5.1 Basic content
(1) Except as specified in this policy, we will not actively share, provide, or transfer your personal information to third parties. If there are other circumstances where your personal information needs to be shared, provided, or transferred to third parties, or you need us to share, provide, or transfer your personal information to third parties, we will directly or confirm that the third party has obtained your explicit consent for the above actions.
(2) Except as otherwise provided in this policy, or in accordance with national laws and regulations or with your consent, we will not publicly disclose the collected personal information. If public disclosure is necessary, we will adopt security protection measures that meet industry standards, and we will inform you of the purpose of this public disclosure, the type of information to be disclosed, and the possible sensitive information involved, and obtain your explicit consent.
(3) We will not transfer your personal information to any other third party unless we obtain your explicit consent.
5.2 Sharing
(1) If your personal information is shared with our affiliates or third parties, your authorization and consent are required, unless the shared personal information is de-identified information and the sharing third party cannot re-identify the natural person subject of such information. If affiliates or third parties use the information for purposes beyond the original scope of authorized consent, they need to obtain your consent again.
(2) The data we share with affiliates and third parties will have a legitimate and proper purpose, and the shared data will be limited to what is necessary to achieve the purpose.
(3) We will carefully evaluate the purpose of affiliates and third parties in using the shared information, conduct a comprehensive assessment of their security assurance capabilities, and require them to comply with cooperative legal agreements. We will conduct strict security monitoring on the software development kits (SDKs) and application programming interfaces (APIs) through which partners obtain information to protect data security. Please note that third-party SDKs will collect some of your information when you use this application. Refusing to provide it may prevent you from logging into this application or restrict your use of this application. The third-party SDKs that provide services to you through this application will store, use, process, and protect your personal information in accordance with the standards described in their own privacy policies. This policy cannot replace the privacy policies of the above third parties. We will carefully select the third-party SDKs to access and make every effort to require third-party SDKs to provide sufficient protection for the security of your personal information.At the same time, it is strongly recommended that you read their relevant privacy policies before using the services of the above third-party SDKs. Please carefully understand and confirm their privacy protection situation, make the choice you think appropriate, and you clearly understand that any consequences arising from your free choice shall be borne by you, and we shall not bear any responsibility for this.
(4) We may share information with partners who entrust us with promotion and advertising. However, we will not share information used to identify your personal identity (name, ID card number), and will only provide these partners with de-identified or anonymized information that cannot identify your personal identity.
5.3 In accordance with relevant laws, regulations, and national standards, in the following circumstances, we may share, transfer, or publicly disclose personal information without prior authorization and consent from you:
(1) Directly related to national security and national defense security;
(2) Directly related to public security, public health, and major public interests;
(3) Directly related to criminal investigation, prosecution, trial, and execution of judgments;
(4) Necessary for safeguarding the major legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the consent of the person;
(5) The personal information subject has publicly disclosed his/her personal information to the public;
(6) Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
6. How we store your personal information
6.1 In accordance with the provisions of laws and regulations, we will store your personal information collected and generated during domestic operations within the territory of the People's Republic of China. If we transmit it overseas, we will comply with relevant national regulations or seek your consent.
6.2 We will store your information in a secure manner, including local storage (such as data caching using APP), databases, and server logs.
6.3 During your use of the company's services, we will continue to store your personal information. If you cancel your account or the company's products stop serving, we will keep the network logs for [1] year from the date of cancellation or service suspension. For the retention period of other data, we promise that it is the shortest period necessary to realize the provision of services. After the above period, we will delete or anonymize your relevant information.
7. How we protect your personal information
7.1 We strive to provide protection for users' information security to prevent information leakage, loss, improper use, unauthorized access, and disclosure. We use multiple security protection measures to ensure that users' personal information protection is at a reasonable security level, including identity authentication, data encryption, access control, malicious code prevention, security audit, technical protection means, management system control, security system guarantee, and many other aspects.
7.2 Although we take the above reasonable and effective measures and comply with the standards required by relevant laws and regulations, please understand that due to technical limitations, possible various malicious means, systems and communication networks outside our control, it is difficult for us to always ensure 100% security of information. However, we will do our best to ensure the security of the personal information you provide to us. We also recommend that you pay full attention to the protection of personal information when using products and services, and suggest that you take active measures to protect the security of personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and related personal information to others.
7.3 In the event of a security incident such as personal information leakage, we will activate an emergency response plan to prevent the expansion of the security incident. After the security incident occurs, we will inform you of the basic situation of the security incident, the disposal measures and remedial measures we are about to take or have taken, and our suggestions for you through announcements, push notifications, or emails. If it is difficult to inform each individual, we will issue a warning through announcements and other means.
7.4 Once you leave this application and related services to browse or use other websites, services, and content resources, regardless of whether your login, browsing, or use of the above software or websites is based on links or guidance from this application, we will have no ability or obligation to protect any personal information you submit to such software or websites.
8. How you can manage your personal information
During your use of this application and services, we may provide you with corresponding operation settings depending on the specific situation of the application product, so that you can query, delete, correct, or withdraw your relevant personal information, cancel your account, and withdraw the authorization you have agreed to. You can refer to the specific guidelines of this application for operation. In addition, we have set up complaint, request, and report channels, and your opinions will be handled in a timely manner.
The specific operation methods are:
8.1 Query/delete function: Contact us through the email provided in the privacy policy and send a request to us for query and deletion;
8.2 Change the scope of authorization: Change the scope of authorization through the mobile phone system permission settings. If you need any help, you can contact us through email at any time.
8.3 Complaints and reports: Send complaints and reports about relevant behaviors to us through email;
9. Policy changes
9.1 We will revise, supplement, or change this policy from time to time. These revisions, supplements, or changes form part of this policy and have the same effect as this policy. Without your explicit consent, we will not reduce the rights you are entitled to under the currently effective policy.
9.2 Before this policy is updated, we will notify you through a prominent position on the application page or by sending an email to you, so that you can timely understand the latest version of this policy. After obtaining your explicit consent again, we will collect, process, or use your personal information in accordance with the updated privacy policy.
10. Contact us
If you have complaints, suggestions, or questions about personal information protection, you can contact our customer service email to feedback. We will review the issues involved as soon as possible and reply within fifteen working days after verifying your user identity.
Our customer service email is: huangsn777@163.com