Privacy Policy
Effective Date: 2026/3/10
When you use the features, interfaces, or related support services provided by "Magic Perler - Bead Pattern Generator" (hereinafter referred to as "the Service" or "we"), your privacy and data security are of utmost importance to us. This Privacy Policy details the scope, retention periods, and security standards regarding our collection and use of data, and explains the rights you have over your data.
1. Information We Collect and Process
To ensure the safe and stable operation of the Service, we may process the following types of information during your interaction. Account Credentials: When you register an access credential, your basic contact address or encrypted password fragment will be collected for identity verification and multi-device state synchronization support. System Usage Logs: We may collect anonymized operational statistics and network logs (such as diagnostic crash reports) to enhance application reliability and troubleshoot technical faults. Such data is aggregated anonymously and does not involve tracking or anchoring of any specific natural person's identity.
2. Device Permissions and Local Processing Principles
To deliver the core creative and rendering experience of the product, certain operations of the Service may invoke specific functional interfaces of your device (e.g., local browser caching or temporary system access). Please be aware that we strictly value the privacy isolation of endpoint data: all core image resolution matrix operations that convert your private images into "perler bead models" are processed in real-time, completely and exclusively isolated within your device's memory level. Unless you issue an explicit and affirmative command (for example, pushing the finished product to the public gallery server), your source assets and creative prototypes will be strictly isolated and will never automatically circulate or be archived in our central server infrastructure.
3. Information Security Standards and Responsibilities
We utilize industry-standard secure transmission protocols and firewall technological architectures (such as Secure Sockets Layer SSL/TLS encryption and irreversible password hashing) to multi-layer defend and isolate your account profile from unauthorized access or disclosure. Given the broad audience of this Service, if you are under the legal age of majority as dictated by applicable law, you may only access or use our service network under the premise of verifiable authorization by a legal guardian, and only when such guardian is fully aware of and consents to the specifics of this policy.
4. Your Controls and Data Erasure
You retain full autonomy over your personal information at all times. You may initiate a request to terminate the service at any time through your account control panel; the cancellation process is entirely self-service and requires no manual verification. Once your account deletion resolution is issued and accepted by the server, the service network will automatically purge and block all your profiles and retained configuration files. Regarding any content pool data you previously authorized for distribution in public environments (such as the artwork gallery), we will concurrently remove or execute complete de-identification (severing any links pointing to your account) to ensure the data is properly detached.
5. Boundaries and Disclaimers Regarding External Environments
To expand functionality, the Service may incorporate and nest linked components and partnership pages supported by independent operating entities. These external third-party sites are not governed by this policy, and we hold no responsibility for the consequences of their enforcement of their own independent privacy frameworks. When you leave the controlled ecosystem of the Service to access external digital assets, we strongly advise you to independently evaluate the associated risks and review the specific privacy statements of those providers.
6. Policy Updates and Exercising Rights
We may appropriately modify this statement in response to technical iterations or policy adjustments. When significant structural changes occur, we will post a public notice on this console page. Once a change is published, it acquires immediate contractual effect. If you need to exercise related data rights such as access, or have questions regarding the execution details of this policy to lodge a privacy compliance inquiry, please contact our privacy compliance team. The designated email is:alicecbting@gmail.com