Frame privacy policy

Effective date: 2025-11-11

Contact:chengshuo1947@outlook.com

General

1.1 scope

1.1.1 this policy applies to Frame full-platform clients.

1.1.2 you are deemed to have read and agreed to this policy if you use any video playback, download, upload, or membership service provided by Frame.

1.1.3 if you do not agree to any of the terms, please immediately stop installing, registering or using and contact us through the above email address.

Core principles

2.1 the principle of minimum necessity: collect only personal information necessary to achieve business functions.

2.2 principle of classified protection: classified storage and encryption of ordinary information, sensitive information and minor information.

2.3 user control principle: provide self-help tools such as"One-click closure of personalized recommendations", "Batch deletion of viewing records" and"Account cancellation".

Definitions and key words

3.1 personal information: information recorded electronically or otherwise that can be used to identify a natural person, either alone or in combination with other information.

3.2 sensitive personal information: including biometrics, information on minors under the age of 14, precise location data, etc. .

3.3 de-identification: the technical processing of personal information to make it impossible to identify specific natural persons without the use of additional information.

3.4 behavioral data: a record of non-directly identifiable operations that are generated when you use a Frame, such as decoding mode, subtitle preferences, error logs, etc. .

Scenarios and types of information gathering

4.1 account registration and login

4.1.1 third-party quick access.

4.1.2 mailbox/cell phone number registration: collection of mailbox or cell phone numbers and country/territory codes.

4.2 video playback and interaction

4.2.1 playback record: title, episode number, start/stop time, bitrate, Clarity Switches, track and subtitle language, HDR on/off status.

4.2.2 search data: keywords and screening criteria.

4.3 uploading and content submission

4.3.1 videos, covers, subtitles, voiceovers, filter templates.

4.3.2 video metadata: resolution, bitrate, encoding format, framerate, color space, location (if you choose) .

4.3.3 proof of copyright: Letter of authorization, right-to-image document, business license (for institutional creator) .

4.4 technology and equipment information

4.4.1 device model, operating system version, system language, screen resolution, GPU model, CPU architecture, memory size, free disk space.

4.4.2 network information: IP address (city level) , carrier, network Type (2G/3G/4G/5g/Wi-Fi) , connection method, proxy status.

4.4.3 unique identifier: UUID, AndroidID, IDFA, OAID, imeimeid (MD5 only) , MAC address.

List of permission calls

5.1 storage/album: loading local videos, saving posters, screenshots, generating GIF.

5.2 microphone: Voice Search.

5.3 camera: scan code to log in, take user profile picture.

The above permissions can be closed at any time in the system settings or Frame"Settings-privacy-rights management", only affect the corresponding functions, does not affect the core playback.

Purpose of use of the information

6.1 guarantee basic functions: account login, video decoding, multi-device continuation, download breakpoints.

6.2 personalized recommendation: home page column ranking.

6.3 security and risk control: chain theft identification, traffic identification, remote login verification, DRM, anti-addiction for minors.

6.4 data operation: Statistics of peak concurrency, rate distribution, crash rate, guiding CDN scheduling and codec optimization.

6.5 legal compliance: compliance with judicial investigations, copyright complaints, tax returns, and audit requirements.

Data Sharing, transfer and public disclosure

7.1 sharing

7.1.1 copyright holders and co-producers of content: share de-identified plays, completion rates, and ratings for billing and reproduction decisions.

7.1.2 cloud infrastructure: AWS, Alibaba Cloud, Tencent Cloud, Fastly, all sign DPA (data processing protocol) , use encrypted channels and disk-level AES-256.

7.2 transfer

7.2.1 in the event of a merger, acquisition or transfer of assets, we will inform you of the circumstances and continue to be bound by this policy.

7.3 public disclosure

7.3.1 only show your nickname, Avatar, and ranking when you post public barrages, comments, participate in official events, and participate in the list challenge; the rest will not be made public.

Data storage period and region

8.1 storage locations

The software will store the user information in the security measures of the server, these servers are located in the data storage area of legal compliance, and the software will take reasonable technical means and management measures, ensure that user information is stored in a secure and reliable environment.

8.2 storage life

This software will strictly abide by the relevant laws and regulations on the storage period of user information and the necessity of the principle. For the personal information provided by the user, the software will properly keep the information for the period of validity of the user account or the period of retention required by law; for the behavior data generated by the user in the process of use, etc. , the software will securely delete or anonymize user information for the duration necessary to achieve the stated purposes of this privacy policy.

User rights and Operation Path

9.1 access: Settings-account center-personal information.

9.2 correction: Settings-account center-edit profile; contact customer service if real name information is incorrect.

9.3 delete:

9.3.1 single record: "Viewing history"-deletion.

9.3.2 batch wipe: Settings-privacy-wipe all playback records.

9.3.3 account cancellation: Setup-account center-account cancellation, complete review and delete identifiable information within 15 days (unless otherwise required by laws and regulations) .

Technical Measures for data security

11.1 transports: full link HTTPS (TLS1.3) , HSTS, fixed certificate, no weak encryption packages.

11.2 storage: AES-256-XTS disk encryption + distributed key management system (KMS) with daily key rotation.

11.3 authentication: Multi-factor Authentication (MFA) , single sign-on (SSO) , anti-collision database, fingerprint verification of equipment.

Policy updates and notifications

13.1 update frequency: if it involves major changes (such as processing purposes, shared objects, user rights) , will be prompted by pop-up, email, official website banner, etc. .

14.2 effective date: this policy is effective from the release date of the application. If you continue to use the Frame after the update, you will be deemed to agree to the update. If you do not agree, you can stop using and apply for cancellation.

Contact us

Email: chengshuo1947@outlook.com

Thank you for your trust in Frame. Enjoy the movie!