Privacy Policy

Last Updated: February 9, 2026

Introduction

This software (referred to as "we") regards the protection of users' personal information as its core responsibility, and promises to strictly follow national regulations and adopt advanced technology to ensure privacy security. Before using this application and its services (including functions such as wallpaper download, personalized recommendations, etc.), please be sure to read the privacy policy to understand the full process rules for information collection, storage, and use. The policy clearly explains the purpose of information processing, security measures, and your rights. This policy is an important part of the service agreement. If you do not agree with the terms, you may stop using it, and we will prioritize privacy protection. If you have any questions or suggestions, you can contact us through in-app feedback, customer service email, or hotline. A professional team will handle and reply within 15 working days. We will continuously optimize protection measures, update the policy in a timely manner, and notify you of changes to ensure your right to know and choose. Through this policy, you will learn about the following:

1. How We Collect and Use Your Personal Information

2. Use of Cookies and Similar Technologies

3. How We Share, Transfer, and Publicly Disclose Your Personal Information

4. How We Store and Protect Your Personal Information

5. Your Rights (Including Information Management, Authorization Changes, and Account Cancellation)

6. How We Protect Children's Personal Information

7. Transfer of Your Personal Information Globally

8. Notice and Policy Revision

9. How to Contact Us

10. Attachment: List of Third-Party AI Service Providers

 

1. How We Collect and Use Your Personal Information

1.1 To provide you with a high-quality and stable service experience, we will collect and use personal information in accordance with laws and regulations, following the principles of legality, legitimacy, necessity, and minimization. It is only used to realize service functions or improve service levels.

Specific scenarios are as follows:

1.2 Core Function Implementation

1.2.1 Account Registration and Login: The system generates a unique virtual identifier for the device using a timestamp algorithm. It does not collect personal sensitive information such as name or phone number, nor device hardware identifiers (e.g., serial numbers), reducing privacy association risks and ensuring stable cross-scenario account operation.

1.3 Wallpaper Service Related

1.3.1 Wallpaper Download Function: Download requires file storage permission, used only to save network wallpapers to the local device directory for offline use; refusing authorization only affects the download function, while other functions such as browsing and favorites remain normal.

1.4 Custom Wallpaper Function

1.4.1 Selecting photos from the album requires album access permission, used only to read image data for editing and setting, not for automatic upload or backup; refusing authorization will prevent loading album images, but wallpapers can still be changed using built-in materials, and other functions are not affected.

1.5 Account Security and System Optimization

1.5.1 To ensure account security, optimize service response, and locate issues, the following may be collected:

1.5.2 Device Information: Including device model, system version, identification code (e.g., IMEI), resolution, network/sensor information (e.g., IP, GPS), used for compatibility analysis and anomaly diagnosis.

1.5.3 Log Information: Including hardware/software configuration, access IP, search terms, URL, page dwell time, and other usage details, used for behavior backtracking, popularity assessment, and performance optimization.

1.6 Face Data Policy

1.6.1 Special reminder to you, the facial data collected by this software

We analyze your photos to identify facial feature points (eyes, nose, mouth points) for face processing.  We do not collect facial data.  After the analysis is complete, all data will be deleted and no data will be saved.  Refusing to provide the above information may prevent you from using core functions, but it will not affect the normal use of other features and services.

1.6.2 Purpose and process of collecting facial dataIn order to provide you with special effects related effects, we need to find out the complete process of facial feature points (eyes, nose, mouth points):

(1)Users will upload the selected images to our server through secure encryption methods;

(2)The server analyzes the facial features in the image you uploaded and integrates them into the template you selected;

(3)Once the synthesis is complete, the server will feedback the final visual effect to you through the application;

(4)The synthesized result (i.e., your "creation") will be temporarily saved in a secure, encrypted storage space and will be completely cleared after the production process ends.  After the synthesis process is completed, we will immediately delete the facial images you uploaded to the server.1.7 Message Notification Service

1.7.1 Important information such as version updates and activity announcements is pushed through the system notification bar to improve reach efficiency.

1.8 Operational Quality Assurance

1.8.1 Data such as process status, feature usage frequency, crash logs, performance indicators (e.g., CPU/memory usage), and installation channels are collected, some of which are analyzed through third-party platforms (e.g., Umeng) to improve services.

1.9 Other Information Collection

1.9.1 Including application version number, system version, device model, and error logs, used to locate compatibility issues and optimize interaction processes. Special Note: Individual device information and log information are not directly associated with individuals; if combined with identifiable identity information, they are considered personal information and will be anonymized in accordance with the law.

 

2. Use of Cookies and Similar Technologies

2.1 We use cookies and similar technologies (such as local storage, pixel tags) to collect behavioral data (e.g., browsing history, device information) when you use the service, strictly following regulations and this Privacy Policy. Data is only used with your authorization or to ensure basic services for:

1. Security and Optimization: Verify login status, monitor abnormal logins, and improve page loading speed;

2. Personalized Experience: Save settings such as language and theme to reduce repetitive operations;

3. Content Recommendation: Push relevant wallpapers and interface suggestions based on browsing preferences;

4. Service Improvement: Analyze user behavior to optimize algorithms and solve operational issues.

2.2 Cookie Management Tips

2.2.1 You can clear cookies through your browser settings, but this may cause automatic login to fail, reduce recommendation accuracy, or require reconfiguration of quick settings. It is recommended to weigh the operation based on privacy needs and back up important settings.

 

3. How We Share, Transfer, and Publicly Disclose Your Personal Information

3.1 Sharing Principles

(1) Authorized Consent: No sharing of personal information without explicit consent, unless the information is completely de-identified (verified by a third party as non-re-identifiable) and limited to compliance scenarios such as technology research and development.

(2) Legal Minimum Necessity: Sharing must comply with regulations, be limited to the minimum data and shortest period necessary to achieve the purpose, and dynamically assess and terminate redundant sharing.

(3) Security and Prudence: Before sharing with a third party, its legality and security qualifications must be assessed, legal agreements signed, and encryption monitoring deployed to ensure transmission security.

3.2 Sharing for Function Realization

3.2.1 When using value-added features, anonymized metadata (e.g., preference tags) may be shared to optimize recommendations. Users can apply to disable this via customer service channels, and processing and feedback will be provided within 15 working days.

3.2.2 Please note: When using the DIY wallpaper and video face swap features, you need to grant access to your photo album and select a photo or video from the album as the material for special effects production before proceeding to the next step. When using these features, we will send the images or videos you select to our third-party AI partner (Tencent Cloud) for special effects processing. You may refuse to grant authorization and thereby stop using the feature.

3.3 Sharing for Security and Statistics

(1) Account Security: Share encrypted device/login information with certified institutions, used only for risk control defense; partners must maintain confidentiality.

(2) Anonymized Statistics: Share aggregated data (e.g., crash rates) after k-anonymity and differential privacy processing to ensure irreversible identification.

(3) Academic Research: After ethical review, share de-identified data (removing PII) with research institutions, limited to public welfare purposes and prohibited for commercial use.

3.4 Participation in Marketing Activities

3.4.1 When participating in marketing activities, the system may require sensitive information such as name, contact information, shipping address, and bank account to ensure the activity and reward distribution. Sharing of such information strictly follows the "minimum necessity" principle, is only provided to third parties with your authorization, and is limited to identity verification or reward distribution.

3.4.2 Description of Third-Party Types:

(1) Service Platforms: Technical parties such as payment and logistics, only obtain necessary service information (e.g., account, address) and are independently responsible.

(2) Technology Suppliers: Software and hardware service providers, share device/behavior data to optimize activity experience.

(3) Advertising Service Providers: Use only anonymized behavioral data to generate anonymous profiles for precise targeting or functional optimization.

3.5 Appendix

3.5.1 A table lists service provider information types and descriptions. Third-party link services and their privacy policies are the responsibility of the corresponding providers; you need to assess the risks yourself and decide whether to use them.

3.6 Information Transfer

3.6.1 We will not transfer your personal information without your explicit consent. Only when required by law or truly necessary, the recipient must strictly comply with this Privacy Policy. If the recipient fails to fulfill its protection obligations, we will not transfer; under special circumstances, we need to obtain your authorization and consent again.

3.7 Public Display of Information

3.7.1 We generally do not publicly disclose your personal information unless required by law or with your voluntary consent. When disclosing, measures such as desensitization will be taken to reduce risks, and disclosure will be limited to necessary information (such as nickname, processing result) when handling violative accounts according to the principle of minimum necessity.

3.8 Exemptions from Consent under Law: According to laws and regulations, we may not need to obtain your consent in the following circumstances:

1. Involving national security, national defense security;

2. Involving public security, public health, major public interests;

3. Directly related to criminal investigation, prosecution, trial, and execution of judgments;

4. To protect your or another person's vital legitimate rights and interests and it is difficult to obtain consent;

5. Personal information you have made public yourself;

6. Information obtained from legally publicly available channels;

7. Necessary for concluding or performing a contract;

8. Necessary to ensure the safe and stable operation of the service;

9. Necessary for legitimate news reporting;

10. Academic research based on public interest with information already de-identified;

11. Other circumstances stipulated by laws and regulations.

 

4. How We Store and Protect Your Personal Information

4.1 Retention Period of Personal Information

4.1.1 Your personal information will be continuously stored during the service period to ensure normal service operation. When you cancel your account or delete information, we will delete or anonymize it in accordance with the law. However, if laws and regulations provide otherwise (such as compliance audit, tax supervision), necessary information will be retained for the maximum period. If the service is terminated, advance notice will be given, and the information will be properly handled according to regulations (including deletion or anonymization).

4.2 Geographical Protection of Personal Information

4.2.1 Personal information is stored on servers within China to ensure compliance and security. If cross-border transmission is required, it will strictly follow regulations such as the "Personal Information Protection Law," obtain your consent, and inform you of the purpose, recipient, and risks.

4.3 Measures for Protecting Personal Information

4.3.1 Building a multi-dimensional protection system through technology, management, and user education:

4.4 Technical Measures

4.4.1 Full lifecycle protection: Access control (minimum privilege + log monitoring), transmission encryption (SSL/TLS), storage encryption (AES256bit+), sensitive information desensitization (dynamic/static hiding of key fields), security incident response (notification and handling within 72 hours).

4.5 Management Measures

4.5.1 Personnel management (confidentiality agreements + permission grading), operational monitoring (dual review + approval logs), regular security training (covering regulations and cases).

4.6 User Notice

4.6.1 There is no absolute security in the internet environment; we will continuously optimize protection. For risks caused by force majeure or your own reasons (such as leaking passwords), we will assist in mitigating losses.

4.7 Protection of Personal Account Information

4.7.1 Properly keep account information (username, password, etc.), do not disclose it to others or log in on insecure networks. If you notice any abnormality (such as login from an unfamiliar device), please contact customer service to freeze the account. It is recommended to regularly back up important data and avoid performing sensitive functions on public Wi-Fi.

5. Your Rights (Including Information Management, Authorization Changes, and Account Cancellation)

5.1 Your Rights

(1) Access Information: Self-service query (under "Settings") or manual request (reply within 15 days).

(2) Correct Information: Directly edit modifiable content or submit a manual request (with supporting evidence).

(3) Delete Information: Submit a manual request (feedback within 15 days), and if conditions are met, information will be permanently deleted or anonymized.

5.2 You may request deletion of personal information in the following circumstances:

1. Processing violates laws or regulations;

2. Obtained without your explicit consent;

3. Seriously violates the agreement with you;

4. You voluntarily discontinue the service or apply for account cancellation;

5. Service must be permanently stopped due to objective reasons such as business adjustment or operation termination.

5.3 Information Deletion Note: When you request deletion or information needs to be deleted due to service termination as described in items 4 and 5, we will notify partners who have legally obtained your information to delete it simultaneously. However, to ensure system and data security, some information may be necessary backed up (e.g., for disaster recovery, compliance audit), and such backups will be deleted after the retention period (not exceeding the maximum legally required period) or after completing specific purposes.

5.4 Change of Authorization Scope: You can independently control the authorization for information collection and use. If you need to withdraw additional permissions (such as turning off non-essential collection functions) or adjust the authorization scope (such as modifying the types of information that can be collected), submit your request through official customer service channels (online/hotline/email, etc.), and we will adjust it accordingly. Withdrawal of authorization only affects the processing of new information in the future; previously authorized processing activities (such as user profiling, historical order processing) will continue according to the original scope until reasonably concluded to ensure service continuity and compliance.

5.5 Account Cancellation Process and Notes: Submit an application through the app/website via "Settings" - "Cancel Account". After completing identity verification (such as entering password, SMS verification), we will check the account status (unsettled payments, disputes, legal retention obligations, etc.). If approved, the service will be stopped, and information will be deleted/anonymized (except for information required by law to be retained, such as for law enforcement, taxation). Important Note: Cancellation is irreversible. After completion, you cannot log in, view data, or use related services, and account information (chat history, order vouchers, etc.) cannot be recovered. Please back up important information in advance. If the account is involved in disputes (transaction disputes, complaints, judicial investigations, etc.), we may suspend the cancellation until the dispute is resolved.

5.6 Responding to Requests

5.6.1 To ensure security, we may ask you to verify your identity before processing a request. For reasonable requests, we generally do not charge a fee, but may charge a cost fee for repetitive or excessive requests.

In the following circumstances, we may not be able to respond to the request:

1. Involving national security, national defense security;

2. Involving public security, public health, major public interests;

3. Related to criminal investigation, prosecution, trial, and execution of judgments;

4. Evidence shows you have subjective malice or abuse of rights;

5. Responding to the request would seriously harm your or others' legitimate rights and interests;

6. Involving trade secrets.

 

6. How We Protect Children's Personal Information

6.1 This product service is intended for adults with full capacity for civil conduct. Children under the legal age are strictly prohibited from registering and using the service without parental/guardian consent. If children's information is collected with legal authorization, it will only be used in the following circumstances in accordance with the principles of "minimum necessity" and "purpose limitation":

(1) Legally required;

(2) Involving major interests such as children's personal safety. Such processing will take the highest level of security measures and ensure necessity.

6.2 Individuals under the age of 14 are considered child users. If it is discovered that children's information has been collected without consent, an emergency mechanism will be initiated within 24 hours to delete the data and review the process. Technical protection will be strengthened, and age verification measures such as ID verification and facial recognition will be added during registration. Guardians who need to consult about children's information protection can contact us through the contact information in this privacy policy, and we will provide special support and personalized solutions. We will continuously optimize child protection mechanisms to safeguard children's rights in the digital age.

 

7. Transfer of Your Personal Information Globally

7.1 Storage and Cross-Border Transfer of Personal Information

We generally store personal information on servers within China to ensure security and compliance. Cross-border transfer may occur in the following circumstances:

1. Legal Requirements: Transfer according to regulatory or judicial orders based on statutory reasons such as national security, justice.

2. User Authorization: After your explicit consent, transfer necessary data to use overseas services.

3. Cross-Border Transactions: When you actively engage in transactions with overseas parties, transfer necessary information such as orders and payments.

7.2 Cross-border transfers will strictly follow laws such as the "Personal Information Protection Law," inform you in advance of the purpose, recipient, and risks, and obtain your re-authorization. At the same time, technical measures such as encryption and access control will be taken to ensure data security. We adhere to the principles of legality and necessity and continuously optimize protection mechanisms.

 

8. Notice and Policy Revision

8.1 We have the right to reasonably revise this Privacy Policy as needed based on business development and regulatory requirements. All revisions follow the principles of legality, legitimacy, and necessity, and will not reduce your legal rights without your consent. After revision, notifications will be made through the following methods: a pop-up on the official website homepage marked "Updated," with historical versions retained on the policy page; push notifications via the app's startup screen, message bar, and system notifications (marked with a red badge); and update instructions sent to the registered email (if a valid contact method is available).

8.2 Major changes include six categories:

1. Significant adjustment of service model (e.g., business expansion, change to paid system, addition of sensitive permission services);

2. Major change in ownership/corporate structure (e.g., change in control, reorganization, departmental adjustment);

3. Change in the recipients of personal information processing (e.g., cross-border transfer, new sharing parties, change of storage location);

4. Change in the way rights are exercised (e.g., migration of query portal, process adjustment);

5. Change in contact information/responsible department (e.g., team independence, contact information change);

6. High-risk assessment results (e.g., security vulnerabilities, change in compliance requirements).

Obsolete policies are archived in the "Policy Archive" section on the official website (Legal Notices → Historical Versions), numbered and stored for at least three years, with version comparison tools provided. For questions during the transition period, you can contact the data protection officer through the published contact information.

9. How to Contact Us

9.1 If you have any complaints, suggestions, or questions, please contact us by email: service@sginda.com

10. Attachment: List of Third-Party AI Service Providers

Partner Name: Tencent Cloud (Face Fusion)
Purpose of Cooperation: It provides AI-powered image and video processing capabilities.
Method of Cooperation: After obtaining user authorization, the images or videos selected by the user are used as parameters to call Tencent Cloud interfaces for special effects production.
Shared Personal Information Fields: Images or videos selected by the user
Privacy Policy Link:https://privacy.qq.com/policy/tencent-privacypolicy