Viyaa Privacy Policy
Last Updated: December 6, 2025
Effective Date: December 6, 2025
Welcome to Viyaa. Viyaa is a product service provided by TVB MEDIA ENTERTAINMENT COMPANY LIMITED (hereinafter referred to as "we," "our," or "us"). This Privacy Policy
explains how we collect, use, share, and protect your personal information when you use our mobile application and related services (collectively, the "Services"). We
understand the importance of personal information to you and will take corresponding security protection measures in accordance with legal requirements to protect your
personal information security and controllability.
By accessing or using Viyaa, you acknowledge that you have read, understood, and agree to be bound by this Privacy Policy.
Before you agree to this policy, we will not collect any of your privacy information. If you agree to this policy and use Viyaa, we will collect, store, use, disclose,
and protect your personal information in accordance with this policy.
If you do not agree with any part of this policy, please do not use our Services.
Please read and understand this policy carefully before using any of Viyaa's products or services. When you use any service provided by Viyaa, it means that you have
agreed to our collection, use, and protection of your personal information in accordance with this policy.
If you have any questions, comments, or suggestions regarding this policy, please contact us via email at
viyaa2025@gmail.com
.
This policy does not apply to services provided by other third parties to you. For example, when third parties on our platform provide services to you through our
platform (such as third-party payment channels), the personal information you provide to third parties is not subject to this policy. Unless otherwise required by law, we
are not responsible for any third party's use of information provided by you.
For information about third-party SDKs used in our products, please refer to the
Viyaa Third-Party SDK Directory
.
1. Information Collection
1.1 Information You Provide Directly
When you use Viyaa, you may voluntarily provide us with various types of information:
-
Basic Services Without Registration:
If you use Viyaa without registering, you can use basic live streaming and video browsing services.
-
Account Information:
You can register as a Viyaa user through your phone number, or use one-tap login with your device number after authorization. During registration, depending on the
registration method you choose, Viyaa may collect your
phone number
and other personal information. After successful registration, please properly handle your personal account password and other information. Please note that we collect
this information to meet the network real-name system requirements of relevant laws and regulations, and to help you generate efficient and reliable login credentials
to protect your account security.
-
Third-Party Account Login:
You can use third-party accounts (Apple, Google) to authorize login to our platform. If you use a third-party platform account to log in, we will obtain relevant
information from your third-party account (including user ID, nickname, avatar, and account verification information) based on your authorization. The purpose of
obtaining the above information from third parties is to help you quickly generate a user login identity so that you can complete registration and login more quickly.
-
Profile Content:
After registration, you will form a unique Viyaa user ID. You can log in to your account to edit your avatar, nickname, gender, birthday, region, signature, draft box,
published videos, and other personal information. If you do not provide the aforementioned information, it will not affect your enjoyment of our basic services.
-
Storage Permissions:
Registered users who use Viyaa to upload or copy related content need to authorize access to your
storage information (i.e., you need to agree to modify/delete SD card content and read external storage permissions)
. If you have not yet authorized, we will prompt you to grant authorization through a pop-up window. After obtaining your authorization, you can upload videos,
pictures, copy text, etc. in Viyaa. If not authorized, you will not be able to use related functions.
-
Camera and Microphone Permissions:
Registered users who use Viyaa to send voice messages, record videos, and apply for microphone access in live streaming need to authorize
camera and microphone
access permissions.
-
User-Generated Content:
Any content you create, upload, or share through our Services, including text, images, videos, and other media.
-
Communication Data:
Information you provide when contacting our customer support team, participating in surveys, or communicating with other users through our platform, including contact
information and communication records with our customer service personnel.
-
Invoice Information:
After you register as a Viyaa account, when we provide specific services and issue and send invoices to you, we will collect your invoice delivery address, including
recipient name, detailed address, postal code, mobile phone number, etc.
1.2 Third-Party Authentication Information
Viyaa supports multiple third-party authentication methods to provide you with convenient login options. When you choose to sign in using one of these services, we may
collect certain information from the authentication provider:
-
Apple Sign In:
When you authenticate using your Apple ID, we may receive your name, email address (or a private relay email if you choose to hide your email), and a unique
identifier associated with your Apple account. We do not access your Apple ID password or other sensitive Apple account information.
-
Google Sign In:
When you authenticate via Google, we may receive your name, email address, profile picture, and other information you have authorized Google to share with us through
their authentication service.
Please note that the use of third-party authentication services is governed by their respective privacy policies and terms of service. We encourage you to review the
privacy policies of Apple and Google to understand how they handle your information. We only collect the minimum information necessary from these providers to create
and maintain your Viyaa account.
1.3 Audio Recordings and AI Analysis
Audio Collection and Processing:
Viyaa may collect audio recordings that you create, upload, or transmit through our Services. These audio recordings may be processed using artificial intelligence (AI)
technologies for various purposes, including but not limited to:
- Voice analysis and recognition to enhance user experience
- Content moderation and safety monitoring
- Personalization of audio-related features and recommendations
- Quality improvement of our AI models and services
- Providing audio-based functionality and interactions within the app
- Generating insights and analytics related to audio content
Audio data is collected only when you explicitly grant microphone permissions and actively use audio-related features. We implement strict security measures to protect
audio data and use it solely for the purposes described in this Privacy Policy. You can control audio recording permissions through your device settings or application
preferences at any time. Disabling audio permissions may limit your ability to use certain features of Viyaa.
1.4 Automatically Collected Information
When you interact with Viyaa, we automatically collect certain technical and usage information based on the specific permissions you grant during software installation
and use:
-
Device Information:
Device type, model, operating system type and version, screen density and resolution, unique device identifiers (such as IMEI/IDFA, MAC/IMSI/Android ID), network device
hardware address, mobile carrier, and hardware specifications. We also collect device installation lists and network types.
-
Location Data:
With your explicit permission, we may collect approximate or precise location information (including location information obtained through GPS, WiFi signal access
points, and base station sensor information) to provide location-based features.
-
Usage Analytics and Log Information:
How you interact with our Services, including search query content, browsing history, playback records, playback duration, features accessed, time spent, pages viewed,
clicks, taps, navigation patterns, IP address, and other usage data.
-
Network Information:
IP address, internet service provider, network type (Wi-Fi, cellular), connection speed, WLAN information (SSID, BSSID, WLAN access points), WiFi information (WiFi
name, WiFi scan results, WiFi status, nearby WiFi hotspots), and related network data.
-
Log Data:
Server logs containing timestamps, access times, browser type, referring URLs, error messages, and crash reports.
-
Clipboard Information:
When you share or receive shared information, we will access your
clipboard
to read passwords, share codes, links, and other content to help you conveniently share content.
-
Application Information:
To ensure operational security, we collect information about installed
applications or running processes, application running list information, application usage and frequency, application malfunction situations, performance data, and
application sources
.
-
Background Collection:
We may collect your device information (device manufacturer, device model, operating system version, Device_ID, hardware serial number), network type, IP address, WLAN
information, device identifiers (MAC address, IMEI, Android_ID, OAID, ICCID, GAID, MEID, and IMSI), WiFi information, running process information (GET_TASKS), installed
application lists, and sensor information (acceleration, magnetic field, gyroscope, direction, pressure, rotation vector, light, magnetometer, angular velocity,
gravity) in silent/background state to help us provide problem diagnosis and troubleshooting, ensure software and service security, or respond to you in other aspects.
-
Auto-Start Behavior:
To push the latest information or follow-up information to you in a timely manner, Viyaa may have a brief auto-start behavior in the background after you exit the
application. If you want to turn off the auto-start function, it may cause normal reminders to fail. You can turn off the auto-start function in the device settings -
applications - auto-start management.
Please note that device information, log information, etc. alone are information that cannot identify a specific natural person. If we combine such non-personal
information with other information to identify a specific natural person, or combine it with personal information, during the combined use period, such non-personal
information will be regarded as personal information. Except with your authorization or as otherwise provided by laws and regulations, we will anonymize and de-identify
such personal information.
1.5 Information Collected Through Indirect Means
Behavioral information when you use products and services of our affiliates and partners that interact with our products and services.
When you use the above services through our products or services, you authorize us to receive, aggregate, and analyze your personal information or transaction information
from our affiliated companies according to actual business and cooperation needs, which we confirm is from legal sources or that you have authorized to provide to us. We
promise that we have confirmed the legality of the sources of the above personal information.
1.6 Information Collected Through Cookies and Similar Technologies
Cookies:
To make your access experience easier, when you visit our platform website or use services provided by our platform, we may identify your identity through small data
files to help you avoid repeatedly entering registration information, or to help determine your account security. These data files may be Cookies, Flash Cookies, or other
local storage provided by your browser or associated applications (collectively referred to as "Cookies").
Please understand that some of our services can only be realized by using "Cookies." If your browser or browser additional services allow,
you can modify the acceptance level of Cookies or refuse our Cookies, but this action may affect your secure access to our platform-related websites and use of services
provided by our platform in some cases.
2. How We Use Your Information
We use the information we collect for the following purposes:
-
Account Management:
To help you become our user and use the services we provide. To create and manage your account, authenticate your identity, and process your requests.
-
Service Provision:
To provide, operate, maintain, and improve our Services. To provide you with various services (watching live streams, becoming a broadcaster, sending content, etc.),
and to design, maintain, and improve these services.
-
Personalization:
To personalize your experience by tailoring content, features, and recommendations to your preferences. This includes displaying and recommending content and targeted
advertising, pushing messages, specifically including recommending content you may be interested in, sending you product and service information, content
recommendations, partnership information, or displaying personalized third-party promotional information through the system, or providing you with more relevant
advertisements and personalized messages instead of generally delivered advertisements and messages. To provide you with personalized information search and browsing
services, we will extract your browsing and search preferences and behavioral habits based on your browsing and search records, necessary device information, and
location information (with your authorization), perform indirect population profiling based on feature tags, and display and push information to provide you with more
relevant advertisements. You can change services through "Recommendation Settings" or by blocking topics or users.
-
De-identification Processing:
When we collect and use the above information, we perform de-identification processing. Data analysis only corresponds to specific codes that cannot be directly
associated with user identity and cannot be associated with your real identity.
-
Risk Identification:
We may use your personal information to prevent, detect, and investigate fraud, security hazards, illegal activities, or violations of agreements, policies, or rules
with us or our affiliates, such as abnormal account activities, multi-device login, traffic anomalies, etc., to protect you, our other users, or the legitimate rights
and interests of us and our affiliates.
-
Surveys and Activities:
When you choose to participate in surveys, prize draws, online or offline promotional marketing activities, etc. held by us or third parties, you may need to fill in
personal information such as name, communication address, and contact information in relevant forms. If you refuse to provide relevant information, it may affect your
participation in related activities, but it will not affect your use of other functions. Only with your consent will we and third parties collect and process relevant
information to provide you with corresponding product services. The specific personal information processing situation is subject to the content published on the
activity page.
-
Security Assurance:
To improve the security of services provided by us and our partners, ensure a safe operating environment and identify abnormal account status, protect the personal and
property safety of you or other users or the public from infringement, better prevent computer viruses, phishing websites, network attacks, and other security risks,
we may use or integrate your member information, transaction information, device information, relevant network logs, and information obtained by our partners with
your authorization or in accordance with the law to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent
security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.
The above business scenarios 2-6 do not generate new personal information. If you believe that the above automated decision-making mechanism has a substantial adverse
impact on you, you can contact us through in-app private messages or email, and we will provide intervention within a reasonable scope.
-
Public Interest Maintenance:
In special circumstances, we will have the right to use your personal information without your consent. Such special circumstances include: (1) directly related to
national security and defense security; (2) directly related to public safety, public health, and major public interests; (3) directly related to criminal
investigation, prosecution, trial, and judgment execution; (4) for maintaining your or other individuals' major legitimate rights and interests such as life and
property, but it is difficult to obtain consent from you or other individuals; (5) personal information that you yourself disclose to the public; (6) other
circumstances provided by laws and regulations.
-
Legal Compliance:
To comply with legal obligations, respond to legal requests, and protect our rights and the rights of our users.
-
Development:
To develop new features, products, and services.
-
Marketing:
To send you marketing communications (with your consent, where required by law).
In addition to the purposes covered by the above scenarios, if we need to use your personal information for other purposes, we will notify you through an announcement to
re-obtain your express consent.
3. Shared Information and Public Information
You can publish content, establish connections, and share with each other through our services. When you publish content through our services, other Viyaa users or
visitors may see your
avatar, username, gender, number of likes, number of followers
, and other information.
When using Viyaa for browsing, publishing content, commenting, and communicating, personal information may be disclosed.
Please properly protect your personal information and only provide and display your information to others when necessary.
If you find that your personal information has been leaked, especially if your account or password has been leaked, please contact our platform customer service
immediately to take corresponding measures.
Public information refers to
any information you publicly share, such as content you publish, comments you make, your avatar, nickname, username, etc.
Please note that the content and information you share when using our services may involve your personal sensitive information or that of others. For example, when you
upload avatar images, or when you choose to upload images containing personal information when commenting, posting, or sending bullet comments. Please consider more
carefully whether to share or even publicly share relevant information when using our services.
4. Information Sharing and Disclosure
We do not sell your personal information. We bear confidentiality obligations for your information. Except for the following circumstances, we will not share your
personal information with any other third party.
4.1 Sharing and Disclosure
-
With Your Explicit Consent or Authorization:
After obtaining your authorization or explicit consent, we will share your personal information with other companies, organizations, and individuals. For example, if we
entrust third parties to provide you with products or services (such as user activities, prize delivery for prize draws, point redemption prizes), we will share the
above information with third parties after obtaining your consent. If you refuse to provide such information, we will not be able to complete the relevant delivery
services. Only if you choose to agree will we share your personal sensitive information.
With your explicit consent or based on your active choice, we may publicly disclose your personal information.
-
Legal Requirements:
We may share and disclose your personal information in accordance with
legal provisions, litigation dispute resolution needs, or requirements put forward by administrative and judicial organs in accordance with the law.
For example, if you violate laws and regulations or seriously violate our platform's relevant agreement rules, or to protect the personal and property safety of our
platform website and its affiliated company users or the public from infringement, we may disclose your personal information in accordance with laws and regulations or
our platform's relevant agreement rules, including relevant violations and measures we have taken against you. For example, if you or the account you use uploads
illegal content that seriously violates our platform rules, violates laws and regulations and/or violates public order and good customs, causes major social impact, and
causes reputation damage to our platform, we may publicly disclose your information and punishment. (
This should explain the types of personal sensitive information that may be included in public disclosure and the security measures that will be taken
)
-
Affiliated Services:
To facilitate us to provide you with services based on associated accounts (
such as cooperation with third parties through technical methods such as SDK and API
). We will only share
necessary personal information
(for example, to facilitate your use of our account to log in and use our affiliated company's products or services, we will share your necessary personal information
with affiliated companies).
-
Authorized Partners:
We will entrust authorized partners to provide you with certain services or perform functions on our behalf.
We will only share your information for legal, legitimate, necessary, specific, and clear purposes. Authorized partners can only access the information necessary for
them to perform their duties and cannot use this information for any other purpose.
4.2 Types of Authorized Partners
Currently, our authorized partners include the following types:
-
Advertising and Analytics Partners:
Unless we have your permission, we will not share your
personal identity information
(information that can identify you, such as phone numbers, through which you can be contacted or identified) with partners providing advertising and analytics services.
We will only provide these partners with statistical information that cannot identify individuals to help them understand their audience or customers. Limited by the
technical capabilities based on cooperation, depending on the hardware facilities you use, some partners may obtain your
device model, operating system type and version, screen density and resolution, international mobile device identification code (IMEI/IDFA), network device hardware
address (MAC), and other device information. However, we will require partners to technically protect the information and not use it for any illegal purposes.
-
Suppliers, Service Providers, and Other Partners:
We send information to suppliers, service providers, and other partners that support our business, including providing technical infrastructure services, analyzing how
our services are used, measuring the effectiveness of advertising and services, providing customer service, payment convenience, or conducting academic research and
investigations.
For companies, organizations, and individuals with whom we share personal information, we will sign strict data protection agreements with them, requiring them to
process personal information in accordance with our instructions, this policy, and any other relevant confidentiality and security measures.
If we share your personal sensitive information or authorized partners change the purpose of use and processing of personal information, we will seek your authorization
and consent again.
-
Third-Party SDK Service Providers:
Our products may contain third-party SDKs or similar applications. When you use such services provided by third parties on our platform, you agree that they will
directly collect and process your information (such as in the form of embedded code, plugins, etc.). For the third-party SDK services currently included in our
products, please refer to the
Viyaa Third-Party SDK Directory
. The collection and processing of information by the aforementioned service providers comply with their own privacy terms and are not subject to this policy. To
maximize the protection of your information security, we recommend that you review their privacy terms before using any third-party SDK services. To protect your
legitimate rights and interests, if you find that such SDKs or similar applications pose risks, we recommend that you immediately terminate related operations and
contact us.
-
Dispute Resolution:
If the content you publish causes infringement to a third party, and the complaining party, judicial agency, or administrative law enforcement agency requests
information disclosure, we will provide necessary information such as the contact information of the complained user to the above-mentioned agencies to promote the
resolution of disputes. Our platform only bears corresponding legal liability when the law clearly stipulates.
4.3 Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
-
Transfer with Explicit Consent:
After obtaining your explicit consent, we will transfer your personal information to other parties. In the event of a merger, acquisition, reorganization, sale of
assets, or bankruptcy of our platform service provider, or other circumstances involving merger, acquisition, or bankruptcy liquidation, if personal information
transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this policy. Otherwise, we will
require the company, organization, or individual to re-seek your authorization and consent.
4.4 Exceptions to Prior Authorization and Consent
In the following circumstances, sharing, transferring, and publicly disclosing your personal information does not require prior authorization and consent:
- Related to national security and defense security
- Related to public safety, public health, and major public interests
- Related to criminal investigation, prosecution, trial, and judgment execution
- For maintaining your or other individuals' major legitimate rights and interests such as life and property, but it is difficult to obtain consent
- Personal information that you yourself disclose to the public
- Personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels
According to legal provisions, sharing and transferring de-identified personal information and ensuring that data recipients cannot restore and re-identify personal
information subjects does not constitute external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not
require separate notification to you and your consent.
If you do not agree with us providing your personal information to third parties in accordance with the above terms, please stop using our platform services
immediately.
5. Data Security
To ensure the security of your personal information we collect, we promise to strive to reach a reasonable security level. The specific security measures and security
capabilities are described as follows:
5.1 Technical Protection
To protect your information security, we strive to take various reasonable physical, electronic, and management security measures that meet industry standards to protect
your information, so that your information will not be leaked, damaged, or lost, including but not limited to SSL, information encryption storage, and data center access
control. We use encryption technology to improve the security of personal information; we use trusted protection mechanisms to prevent personal information from being
maliciously attacked; we deploy access control mechanisms to ensure that only authorized personnel can access personal information.
5.2 Security System Assurance
We have an industry-leading data security management system centered on data and carried out around the data life cycle, improving the security of the entire system from
multiple dimensions such as organizational construction, system design, personnel management, and product technology.
5.3 Personnel Security Management
We also strictly manage employees or outsourced personnel who may come into contact with your information, including but not limited to adopting different permission
controls according to different positions, signing confidentiality agreements with them, and monitoring their operations. We will provide corresponding security measures
in accordance with existing technology to protect your information and provide reasonable security guarantees. We will do our best to ensure that your information is not
leaked, damaged, or lost. We will hold security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal
information.
5.4 Sensitive Information and Password Protection
-
Personal Sensitive Information Protection:
Information that you voluntarily share or even publicly share when using our services may involve your or others' personal information or even personal sensitive
information, such as when you upload avatar images, or when you choose to upload images containing personal information when commenting, posting, or sending bullet
comments. Please consider more carefully whether to share or even publicly share relevant information when using our services.
-
Use Complex Passwords or Dynamic Verification Codes:
Please use complex passwords or dynamic verification codes to help us ensure your account security. We will do our best to ensure the security of any information you
send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction
of information, causing damage to your legitimate rights and interests, we will bear corresponding legal liability.
-
Account Security:
Your account has security protection functions. Please keep your account and password information properly.
We will ensure that your information is not lost, misused, or altered through measures such as backing up to other servers and encrypting user passwords. Despite the
aforementioned security measures, please also understand that there is no "perfect security measure" on the information network.
5.5 Information Disclosure Reminder and Password Leakage Handling
Please note that the Internet is not an absolutely secure environment. When using certain services of our platform, you will inevitably disclose your personal
information to the transaction counterparty or potential transaction counterparty, such as bank account information, contact information, or postal address.
Please properly protect your personal information and only provide it to others when necessary. If you find that your personal information has been leaked, especially if
your account and password have been leaked, please contact our customer service immediately so that we can take corresponding measures.
5.6 Information Security Incident Handling
After an unfortunate personal information security incident occurs, we will inform you in accordance with legal requirements: the basic situation and possible impact of
the security incident, measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, and remedial measures for you. We will inform you
of the relevant situation of the incident by email, letter, phone, push notification, etc. When it is difficult to inform each personal information subject one by one, we
will take reasonable and effective ways to publish announcements. At the same time, we will also report the handling of personal information security incidents to
regulatory authorities as required.
7. Your Rights and Choices
We provide convenient methods for you to access, correct, and delete your account information or other personal information you provide when using our services. You can
access and manage your personal information in the following ways:
7.1 Access Your Personal Information
You have the right to access your personal information, except as otherwise provided by laws and regulations. You can access your personal information in the following
ways:
You can view your personal information through "My." You can edit and manage your personal information through "Edit Profile" and "Settings."
7.2 Correct or Supplement Your Personal Information
When you find that the personal information we process about you is incorrect, you have the right to request us to make corrections or supplements. You can make
corrections or supplements through the methods listed in "7.1 Access Your Personal Information."
7.3 Delete Your Personal Information
You can delete part of your personal information through the methods listed in "7.1 Access Your Personal Information."
After you delete part of the information, we will retain your personal data for the period necessary to achieve the purposes described in this policy, unless the
retention period is extended as required or permitted by law. You can also choose to cancel your account. After you cancel your account, we will stop providing products
and services based on that account, and unless there are special legal requirements, we will delete or anonymize your corresponding personal data.
7.4 Change the Scope of Your Authorization and Consent
Each business function requires some basic personal information to be completed. In addition, for the collection and use of additional personal information, you can give
or withdraw your authorization and consent in "Settings" or by contacting our platform customer service.
After you withdraw your consent, we will no longer process the corresponding personal information.
However, your decision to withdraw consent will not affect the personal information processing that has been carried out based on your authorization.
7.5 Account Cancellation
If you need to cancel your account, you can also contact our platform customer service. After the customer service verifies the user's identity, they will release the
user's phone number to achieve the cancellation effect.
After you actively cancel your account, we will stop providing you with products or services, delete your personal information in accordance with applicable laws, or
anonymize it.
7.6 Restrict Information System Automatic Decision-Making
In some business functions, we may make decisions solely based on non-manual automatic decision-making mechanisms including information systems and algorithms. If these
decisions significantly affect your legitimate rights and interests, you have the right to request us to make explanations, and we will also provide appeal methods
without infringing on our platform's trade secrets or other user rights and social public interests.
7.7 Withdraw Authorization
Permission Authorization Withdrawal:
Users can withdraw authorization for Viyaa's push notifications, geographic location, storage space, etc. in the device's operating system, or contact us by sending an
email to
viyaa2025@gmail.com
. We will reply to your request within fifteen (15) working days after you make the request, and based on your request, we will no longer collect, use, and/or disclose
your personal information thereafter.
After users withdraw authorization, Viyaa cannot continue to provide services corresponding to the authorization and will no longer process the user's corresponding
information. The user's decision to withdraw authorization does not affect the information processing that has been carried out based on the user's authorization.
7.8 Obtain and Transfer Personal Information Copies
If you need a copy of your personal information, you can contact us by sending an email to
viyaa2025@gmail.com
. After verifying your identity, we will provide you with a copy of your personal information in our services, except as otherwise provided by laws and regulations.
If you need to transfer your personal information, you can contact us by sending an email to
viyaa2025@gmail.com
. After verifying your identity, we will assist you in transferring in accordance with relevant laws and regulations.
7.9 Respond to Your Requests
To ensure security, you may need to provide a written request or prove your identity in other ways. We may first ask you to verify your identity before processing your
request.
We will respond within 15 days. If you are not satisfied, you can also file a complaint through our platform customer service.
For your reasonable requests, we will not charge fees in principle, but for multiple repeated requests that exceed reasonable limits, we will charge a certain cost fee as
appropriate. For those groundless repeated requests, requests that require too many technical means (for example, need to develop new systems or fundamentally change
current practices), requests that bring risks to the legitimate rights and interests of others, or very unrealistic requests, we may refuse.
In the following circumstances, in accordance with legal requirements, we will not be able to respond to your request:
- Related to national security and defense security
- Related to public safety, public health, and major public interests
- Related to criminal investigation, prosecution, trial, and judgment execution
- There is sufficient evidence that the personal information subject has subjective malice or abuse of rights
- Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations
- Involving trade secrets
6. Data Storage
The information and materials we collect about you will be stored on servers controlled, used, or leased by us and/or our affiliated companies. We will strictly maintain
confidentiality and use control over your relevant information and materials. This information and materials may be transmitted to your country, region, or the location
where we collect information and materials, and be accessed, stored, and displayed there. For rules regarding the storage and cross-border transfer of your personal
information, please see Section 9.
Data Retention Period:
We will take reasonable and feasible measures to avoid collecting irrelevant personal information. Generally, we will keep your personal information for three years.
The above retention period is the shortest period required to achieve the purposes described in this policy, unless you agree to extend the retention period or are
permitted by law. After the retention period expires, we will delete or anonymize your personal information.
If our platform service decides to stop operations, we will stop continuing to collect your personal information after the relevant service stops operating. We will
notify you of the cessation of operations in the form of an announcement. We will delete or anonymize your personal information that we already hold.
Factors we consider when determining retention periods include:
- The nature and sensitivity of the information
- The purposes for which we process the information
- Legal and regulatory requirements
- Operational needs and business continuity
- The potential risk of harm from unauthorized use or disclosure
8. Children's Privacy
We attach great importance to the protection of minors' personal information. If you are a minor,
please stop using the services of this product.
In addition, to better protect the privacy rights and interests of minors, Viyaa especially reminds you to carefully publish and forward content related to minors'
privacy. Viyaa will report illegal information involving minors to network information, public security, and other departments as appropriate.
9. International Data Transfers
The personal information we collect and generate during our global operations is stored in Singapore, except in the following circumstances:
- Laws and regulations clearly stipulate otherwise
- We have obtained your explicit authorization
For the above circumstances, we will ensure that we provide sufficient protection for your personal information in accordance with this privacy policy.
Your information may be transferred to and processed in countries other than your country of residence. These countries may have data protection laws that differ from
those in your jurisdiction. By using Viyaa, you consent to the transfer of your information to these countries. We take appropriate safeguards to ensure your information
remains protected in accordance with this Privacy Policy and applicable data protection laws, including the use of standard contractual clauses and other legal
mechanisms.
9. Third-Party Services and Links
Our Services may contain links to third-party websites, applications, or services that are not owned or controlled by Viyaa. This Privacy Policy does not apply to
third-party services. We are not responsible for the privacy practices or content of third-party services. We encourage you to read the privacy policies of any
third-party services you access through Viyaa.
10. Changes to This Privacy Policy
Our platform has the right to modify the privacy policy and will notify you through our official private messages and pop-up reminders before the revision takes effect.
In this case, if you continue to use our services, it means that you agree to be bound by the revised platform privacy policy.
We may update this Privacy Policy from time to time to reflect changes in our practices, technology, legal requirements, or other factors. We will notify you of any
material changes by:
- Posting the updated policy on this page with a new "Last Updated" date
- Sending you a notification through the application or via email (if applicable)
- Displaying a prominent notice within the application
Your continued use of Viyaa after any changes to this Privacy Policy constitutes your acceptance of the updated policy. We encourage you to review this Privacy Policy
periodically to stay informed about how we protect your information.
11. Regional Privacy Rights
11.1 California Privacy Rights (CCPA)
If you are a California resident, you have additional rights under the California Consumer Privacy Act (CCPA), including:
- The right to know what personal information we collect, use, and disclose
- The right to delete personal information we hold about you
- The right to opt out of the sale of personal information (we do not sell personal information)
- The right to non-discrimination for exercising your privacy rights
11.2 European Privacy Rights (GDPR)
If you are located in the European Economic Area (EEA), you have additional rights under the General Data Protection Regulation (GDPR), including:
- The right to access and receive a copy of your personal data
- The right to rectify inaccurate or incomplete data
- The right to erasure ("right to be forgotten")
- The right to restrict processing
- The right to data portability
- The right to object to processing
- Rights related to automated decision-making and profiling
To exercise these rights, please contact us using the information provided below.