We deeply understand the importance of your personal information and privacy, and we are committed to protecting any personal data you provide while using our software services to the highest standard. This Privacy Policy (referred to as "this Policy") explains how we collect, use, store, share, and protect your personal information, as well as the rights you have to manage your data. Before you start using our services, please read and fully understand this Policy. By continuing to use our services, you acknowledge that you have fully read and agreed to all terms of this Policy. If you do not agree with any part of this Policy, please stop using this software and related services immediately.
If you have any questions, comments, or suggestions regarding this Policy, please contact us using the information provided in the "How to Contact Us" section at the end of this document. We will respond as soon as possible after verifying your identity. This Policy will help you understand the following:
1. How We Collect and Use Personal Information 2. Use of Cookies and Similar Technologies 3. Sharing, Transfer, and Disclosure of Personal Information 4. Storage and Protection of Personal Information 5. How You Can Manage Your Personal Information 6. Third-Party Services Integration 7. Protection of Minors 8. Policy Changes and Notifications 9. How to Contact Us 1. How We Collect and Use Personal InformationThe primary purpose of collecting and using your personal information is to improve the smoothness and satisfaction of your experience with BoomAI, while ensuring legal compliance and safe operation. We obtain your information through the following channels:
1.1 Sources of Information Collection1.1.1 Information you provide voluntarily: including information you provide when registering an account or using specific features (such as mobile number, nickname, profile picture), as well as content you share or store via this software with third parties.
1.1.2 Information shared by third parties: when you log in using a third-party account (e.g., WeChat, QQ), with your authorization we may obtain certain public information from that third-party platform (such as avatar and nickname).
1.1.3 Information automatically collected: while you use our services (including background or silent states), we automatically collect log information, device information, and network environment data to ensure proper operation of the services.
1.1.4 Important note: Unless otherwise specified, personal information is retained on our servers for a maximum period of two years.
1.2 Special Statement on Facial Data ProcessingTo provide features such as singing with a photo, after obtaining your authorization, we analyze facial landmarks (eyes, nose, mouth, etc.) in the images you upload. If you refuse authorization, we will not perform such analysis. Please note:
1.2.1 We do NOT collect or store your raw facial data. All analysis is completed in real time after you upload the image. Once the analysis is complete, the original image and the extracted facial data are immediately and permanently deleted without any backup.
1.2.2 Processing flow: You upload an image → secure server-side analysis and template matching → final visual effect returned to you → immediate deletion of the uploaded image and analysis data. The resulting creation is only stored temporarily until you download or share it, after which it is also destroyed.
1.3 Specific Functions and Information UsageAs our product evolves, we may introduce new features or adjust existing services. If a new feature requires collecting personal information not covered by this Policy, we will obtain your explicit consent again.
1.3.1 Account Registration and Login: You may register using your mobile number, which is necessary for real-name authentication as required by law. You may also choose one-click login (carrier-based) or third-party account authorization; in such cases we will collect your mobile number or third-party public information to create an account.
1.3.2 Basic Operation and Security: To identify abnormal statuses, ensure device compatibility, and maintain network security, we collect log information (e.g., IP address, access time, actions) and device information (including hardware model, OS version, device identifiers (Android ID/IMEI/OAID/IDFA, etc.), MAC address, WLAN access point, Bluetooth info, sensor data, and SD card data). Such information alone cannot identify a specific individual; if combined with other information to identify a person, the combined data will be treated as personal information.
1.3.3 Core Feature Usage: When you use features such as "Anime Avatar", "Gender Swap", we will request storage, photo album, and camera permissions. Saving generated images or videos requires read/write storage permission. Declining these permissions will only affect the relevant feature, not other services.
1.3.4 Payment and Order Services: When you purchase virtual goods or membership services, we generate an order and complete the transaction through third-party payment processors, sharing necessary order and payment information.
1.3.5 Customer Support: If you contact our WeChat customer service or provide feedback via email, we may ask you to provide account information to verify your identity, and we will keep communication records and content to help resolve your issues.
1.3.6 Security Assurance: To prevent cyberattacks, fraud, and other risks, we comprehensively analyze your account information, device information, and log information for risk assessment and identity verification.
1.3.7 Personalized Advertising: To show you more relevant advertisements while keeping our services free, we may create a user profile based on your preferences and usage habits, and serve personalized ads through our advertising system. This profile is difficult to associate with your real identity and is used solely for ad optimization.
Device Permission Management Instructions: You may enable or disable storage, camera, photo album, and other permissions at any time through your device system settings. Disabling a permission revokes your consent, and we will no longer collect information based on that permission. This does not affect processing that occurred prior to revocation.
Exceptions (Consent Not Required): Under applicable laws, we may collect and use your information without prior consent in circumstances such as national security, public safety, criminal investigations, emergency protection of life or property, information you have made public, news reporting, academic research, and other legally specified situations.
Personal Information Retention Period: Unless otherwise required by law, we retain your personal information only as long as necessary for the purposes described in this Policy, up to a maximum of two years. After service termination, we will delete or anonymize your information.
2. Use of Cookies and Similar TechnologiesTo enhance your browsing experience, we and our third-party partners may use cookies, web beacons, or similar technologies to automatically collect and store information (e.g., login status, preferences). A cookie is a small piece of data sent from a web server to your browser and stored locally. We use cookies to: remember your identity so you don’t have to log in repeatedly; analyze your usage patterns to improve our services; and assist in ad performance measurement. You can manage or disable cookies through your browser settings, but this may affect certain functionalities. Third-party advertisers may also place cookies, and their handling of information is governed by their own privacy policies.
3. Sharing, Transfer, and Disclosure of Personal Information 3.1 Sharing Principles(1) Authorized Consent: No sharing of personal information without explicit consent, unless the information has been completely de-identified (verified by a third party as non-re-identifiable) and is limited to compliance scenarios such as technology research and development.
(2) Legal Minimum Necessity: Sharing must comply with regulations, be limited to the minimum data and shortest period necessary to achieve the purpose, and dynamically assess and terminate redundant sharing.
(3) Security and Prudence: Before sharing with a third party, its legality and security qualifications must be assessed, legal agreements signed, and encryption monitoring deployed to ensure transmission security.
3.2 Sharing for Function Realization3.2.1 When using value-added features, anonymized metadata (e.g., preference tags) may be shared to optimize recommendations. Users may request to disable this via customer service channels, and we will process and provide feedback within 15 working days.
3.2.2 Please note: When using the core feature of singing with a photo, you need to grant access to your photo album and select a photo or video from the album as the material for special effects production before proceeding. When using these features, we will send the images or videos you select to our third-party AI partner (Tencent Cloud) for special effects processing. You may refuse authorization and thereby stop using the feature.
The following lists the types and descriptions of service providers. Third-party link services and their privacy policies are the responsibility of the corresponding providers; you need to assess the risks yourself and decide whether to use them.
Platform 1: Tencent Cloud
Reason for use: AI service provider, providing special effects processing capabilities for images and videos
Privacy Policy: https://privacy.qq.com/policy/tencent-privacypolicy
3.3 Sharing for Security and Statistics(1) Account Security: Share encrypted device/login information with certified institutions, used only for risk control defense; partners must maintain confidentiality.
(2) Anonymized Statistics: Share aggregated data (e.g., crash rates) after k-anonymity and differential privacy processing to ensure irreversible identification.
(3) Academic Research: After ethical review, share de-identified data (removing PII) with research institutions, limited to public welfare purposes and prohibited for commercial use.
3.4 Information TransferWithout your explicit consent, we will not transfer your personal information. Only when required by law or truly necessary, the recipient must strictly comply with this Privacy Policy. If the recipient fails to fulfill its protection obligations, we will not transfer; under special circumstances, we need to obtain your authorization and consent again.
3.5 Public Display of InformationWe generally do not publicly disclose your personal information unless required by law or with your voluntary consent. When disclosing, measures such as desensitization will be taken to reduce risks, and disclosure will be limited to necessary information (such as nickname, processing result) when handling violative accounts according to the principle of minimum necessity.
3.6 Exemptions from Consent under Law(1) According to laws and regulations, we may not need to obtain your consent in the following circumstances:
(2) Involving national security, national defense security;
(3) Involving public security, public health, major public interests;
(4) Directly related to criminal investigation, prosecution, trial, and execution of judgments;
(5) To protect your or another person's vital legitimate rights and interests and it is difficult to obtain consent;
(6) Personal information you have made public yourself;
(7) Information obtained from legally publicly available channels;
(8) Necessary for concluding or performing a contract;
(9) Necessary to ensure the safe and stable operation of the service;
(10) Necessary for legitimate news reporting;
(11) Academic research based on public interest with information already de-identified;
(12) Other circumstances stipulated by laws and regulations.
4. Storage and Protection of Personal Information 4.1 Storage Location and DurationPersonal information collected and generated within the territory of China will be stored on servers located in China. Unless permitted by law or with your additional authorization, we retain your information only as long as necessary for the purposes described in this Policy. After service termination, we will promptly delete or anonymize your information.
4.2 Security MeasuresWe have a dedicated information security team and employ industry-standard encryption technologies (such as SSL transmission encryption, storage encryption), access control and audit mechanisms to prevent data loss, leakage, or tampering. We conduct regular staff training to enhance privacy awareness. We have also established a security incident response system and will immediately activate response plans and fulfill legal notification obligations in the event of leaks or damage.
Although we strive to protect your information, no internet transmission is 100% secure. Please safeguard your account and password, use complex passwords and change them periodically. If you notice any abnormal account activity, contact us immediately.
5. How You Can Manage Your Personal Information 5.1 Access, Correction, and DeletionYou can view or modify your nickname, profile picture, and other information through the in-app profile editing function. You may also contact customer service to request corrections or deletions; we will respond after verifying your identity.
5.2 Public Sharing NoticeInformation you post in public areas (e.g., community, comment sections) may be viewed and collected by other users. Please think carefully before sharing any sensitive personal information. We are not responsible for information leakage resulting from your own public disclosures.
5.3 Account DeletionYou may submit a deletion request through "Settings → Account Management → Delete Account" or by sending an email to our customer service email address. We will complete the verification and deletion process within 15 working days. After deletion, we will delete or anonymize your personal information unless otherwise required by law.
5.4 Changing Your Consent ScopeYou can withdraw your consent by managing device permissions or disabling specific functions. Withdrawal does not affect the lawfulness of processing based on consent before the withdrawal.
5.5 Responding to Your RequestsFor security reasons, we may ask you to verify your identity in writing before processing your request. Generally, there is no fee for reasonable requests, but we may charge a cost for excessive or repetitive requests. We may not be able to honor requests that involve national secrets, public security, criminal investigations, trade secrets, or other exempt circumstances.
6. Third-Party ServicesOur services may contain links to third-party websites or services, as well as integrated third-party SDKs (e.g., payment, social login, analytics, ad display). These third-party services are independently provided and governed by their own privacy policies. We are not responsible for the information handling practices of third parties. When you use the "Share" function to send content to other platforms, the privacy policy of that platform will apply. The main types of third-party SDKs we currently integrate include: advertising services, payment services, location/device data collection, third-party authorization login, performance optimization, security risk control, etc. We carefully evaluate the compliance of third-party SDKs and require them to take adequate protective measures.
7. Protection of MinorsWe attach great importance to the protection of minors’ personal information. If you are under the age of 14 (a child), you must obtain explicit written consent from your parent or legal guardian before using this software. If you are a guardian and have any questions regarding the personal information of a minor under your care, please contact us through the contact information provided in Section 9 of this Policy.
8. Policy Changes and NotificationsWe may update this Policy from time to time due to business changes or legal updates. Any revised version will be notified through prominent means (e.g., in-app announcements, pop-ups). Material changes include but are not limited to: significant changes in service model, ownership structure, purposes or methods of processing personal information. We encourage you to review this Policy periodically to stay informed of the latest updates. If you do not agree with the revised Policy, please stop using the services.
9. How to Contact UsIf you have any questions, complaints, or suggestions regarding this Privacy Policy or personal information protection, please contact our Data Protection Officer via the following method:
Email: service@sginda.com