# Privacy Policy
## 1. Introduction
This privacy policy details how personal information is collected, used, stored and protected when you use the Yume Room application (hereinafter referred to as "this application").
Please read this privacy policy carefully. Using this application indicates your agreement to the content of this policy.
## 2. Information Collection
### 2.1 Types of Information Collected
#### 2.1.1 Basic Account Information
- **Apple ID Information**: When you log in using Apple ID, your Apple ID, email address, name and other basic information will be collected
- **Device Information**: Device model, operating system version, device identifier, application version, etc.
- **Network Information**: IP address, network type, time zone settings, etc.
#### 2.1.2 Usage Data
- **Application Usage Records**: Feature usage frequency, usage duration, operation logs, etc.
- **Preference Settings**: Your personalized settings, theme choices, audio preferences, etc.
- **Content Data**: Diaries, Todo items, favorite stories, etc. that you create
### 2.2 Information Collection Methods
#### 2.2.1 Direct Collection
- Information you actively provide (registration, settings, feedback, etc.)
- Data generated when you use functions
#### 2.2.2 Automatic Collection
- Device and usage information automatically collected through technical means
- Information collected through Cookies and similar technologies
## 3. Information Use
### 3.1 Purpose of Use
Your information is collected for the following purposes:
#### 3.1.1 Providing Core Services
- **Account Management**: Create and maintain your user account
- **Function Implementation**: Provide core functions such as AI assistants, virtual characters, emotional companionship
- **Data Synchronization**: Synchronize data between your devices
#### 3.1.2 Personalized Experience
- **Content Recommendation**: Recommend appropriate stories, music and other content based on your preferences
- **Interface Customization**: Remember your settings and preferences
- **Smart Reminders**: Provide personalized reminders based on your usage habits
#### 3.1.3 Service Improvement
- **Product Optimization**: Analyze usage data to improve application functions and performance
- **Error Fixing**: Identify and resolve technical issues
- **New Feature Development**: Develop new features based on user needs
#### 3.1.4 Security Assurance
- **Account Security**: Prevent unauthorized access and use
- **Fraud Detection**: Identify and prevent malicious behavior
- **Compliance Requirements**: Meet legal and regulatory requirements
### 3.2 Data Processing Principles
- **Minimization Principle**: Only collect and use necessary information
- **Purpose Limitation**: Use information only within the clearly stated purpose
- **Accuracy**: Strive to ensure the accuracy and timely updating of information
- **Transparency**: Clearly inform about how information is used
## 4. Information Sharing and Disclosure
### 4.1 Sharing Principles
We promise not to sell, rent or otherwise commercialize your personal information.
### 4.2 Limited Sharing Situations
Your information may be shared in the following situations:
#### 4.2.1 Service Providers
- **Cloud Storage Services**: For data backup and synchronization
- **Analytics Services**: To improve application performance (data is anonymized)
- **Push Services**: To send notification messages
#### 4.2.2 Legal Requirements
- Comply with applicable laws and regulations
- Respond to legitimate requests from government departments
- Protect the legitimate rights and interests of relevant parties or others
#### 4.2.3 Business Transfer
In the event of business merger, acquisition or asset transfer, your information may be transferred, but we will ensure that the recipient complies with the same privacy protection standards.
## 5. Data Storage and Security
### 5.1 Storage Location
Your data is primarily stored on secure servers located in mainland China, with some data potentially stored locally on your device.
### 5.2 Security Measures
#### 5.2.1 Technical Protection
- **Encrypted Transmission**: All data transmission uses SSL/TLS encryption
- **Encrypted Storage**: Sensitive data is encrypted when stored
- **Access Control**: Strictly limit access permissions to data
- **Security Monitoring**: 24/7 security monitoring and threat detection
#### 5.2.2 Management Protection
- **Employee Training**: Regular privacy protection training
- **Permission Management**: Implement the principle of minimum permissions
- **Security Audits**: Regular security assessments and audits
- **Emergency Response**: Establish a comprehensive security incident response mechanism
### 5.3 Data Retention
- **Account Data**: Retained during the validity period of your account
- **Usage Data**: Retained according to business needs and legal requirements, usually no more than 3 years
- **Log Data**: Usually retained for 6 months for security and troubleshooting
## 6. Your Rights
### 6.1 Right of Access
You have the right to know what personal information has been collected about you.
### 6.2 Right of Correction
You have the right to request correction of inaccurate or incomplete personal information.
### 6.3 Right of Deletion
In specific circumstances, you have the right to request deletion of your personal information.
### 6.4 Right to Restrict Processing
You have the right to request restriction of the processing of your personal information.
### 6.5 Data Portability Right
You have the right to obtain your personal information in a structured, common format.
### 6.6 Right to Withdraw Consent
For information processing based on consent, you have the right to withdraw consent at any time.
## 7. Cookies and Similar Technologies
### 7.1 Purpose of Use
Cookies and similar technologies are used to:
- Remember your login status and preference settings
- Analyze application usage
- Provide personalized content and advertisements
### 7.2 Management Options
You can manage Cookie preferences through device settings, but this may affect the normal use of certain functions.
## 8. Third-Party Services
### 8.1 Integrated Services
This application may integrate third-party services (such as Apple services, analytics tools, etc.), which have their own privacy policies.
### 8.2 External Links
This application may contain links to third-party websites, and we are not responsible for the privacy practices of these websites.
## 9. Children's Privacy Protection
This application does not provide services to children under 13 years old. If it is discovered that children's personal information has been collected, the relevant information will be deleted immediately.
## 10. Cross-Border Data Transfer
If it is necessary to transfer your data to other countries or regions, appropriate protective measures will be taken to ensure data security.
## 11. Privacy Policy Updates
### 11.1 Update Notification
This privacy policy may be updated from time to time. Major changes will be notified to you through in-app notifications or other means.
### 11.2 Effective Time
The updated privacy policy takes effect from the date of publication.
## 12. Contact Us
If you have any questions about this privacy policy or need to exercise your rights, please contact us through the following methods:
- **App Store Feedback**: Submit feedback through the App Store application page
We will respond within 30 days of receiving your request.
---
**Last Updated: September 14, 2025**
**Effective Date: September 14, 2025**