ULooks Privacy Policy
Last Updated: April 11, 2026
Privacy Commitment: We understand the importance of personal information to you and will do our utmost to protect the security and reliability of your personal information. We are committed to maintaining your trust in us and adhering to the following principles to protect your personal information: consistency of rights and responsibilities, clear purpose, choice and consent, minimum necessity, security assurance, subject participation, openness and transparency.
1. Information We Collect
1.1 Information You Actively Provide
| Information Type |
Collection Purpose |
Required |
| Facial Photos |
AI facial analysis and feature recognition |
Yes |
| Gender Information |
Provide more accurate analysis results |
No |
| Nickname |
Personalized user experience |
No |
| Feedback Content |
Improve product and service quality |
No |
1.2 Automatically Collected Information
- Device Information: Device model, operating system version, device identifiers
- Application Information: App version, crash logs, performance data
- Usage Data: Feature usage frequency, analysis count, session duration
- Network Information: IP address, network type (for service optimization only)
1.3 Third-Party Service Information
- Apple Sign-In: User identifier obtained when signing in with Apple ID
- Firebase Analytics: App usage statistics and crash reports
- Payment Information: Purchase records through App Store/Google Play
2. Information Usage Purposes
2.1 Core Services
- Facial Analysis: Use uploaded photos for AI analysis to generate feature reports
- Result Display: Show analysis results and improvement suggestions
- History Records: Save analysis history with comparison viewing support
- Account Management: Create and manage user accounts
2.2 Service Optimization
- Algorithm Improvement: Optimize AI analysis algorithm accuracy
- User Experience: Improve app interface and interaction experience
- Performance Monitoring: Monitor app performance and fix issues promptly
- Security Protection: Detect and prevent security threats
2.3 Compliance Requirements
- Comply with legal and regulatory requirements
- Cooperate with regulatory investigations
- Maintain user and public safety
3. Information Storage and Security
3.1 Storage Location
- Server Location: Data is stored on secure cloud servers
- Cloud Backup: Use encryption technology for cloud backup
- Local Cache: Some data is temporarily cached on your device
3.2 Security Measures
- Data Encryption: Use industry-standard encryption technology to protect data transmission and storage
- Access Control: Strictly limit data access permissions to authorized personnel only
- Security Audits: Regularly conduct security audits and vulnerability scans
- Backup and Recovery: Establish comprehensive data backup and recovery mechanisms
- Staff Training: Provide privacy protection and security awareness training to employees
3.3 Storage Duration
| Data Type |
Storage Duration |
Description |
| Facial Photos |
30 days after user deletion or account cancellation |
For providing analysis services and history records |
| Analysis Results |
30 days after user deletion or account cancellation |
For history records and comparative analysis |
| Account Information |
Immediately deleted after account cancellation |
For account management and identity verification |
| Usage Logs |
12 months |
For service optimization and troubleshooting |
4. Information Sharing and Disclosure
Important Statement: We will not sell, rent, or otherwise provide your personal information to third parties unless we obtain your explicit consent or are required by laws and regulations.
4.1 Information We Will Not Share
- Your facial photos and analysis results
- Personal identity information
- Private communication content
4.2 Situations Where We May Share
- Explicit Consent: When we obtain your explicit consent
- Legal Requirements: According to laws, legal procedures, government requirements
- Security Needs: To maintain user and public safety
- Service Providers: Share necessary information with trusted third-party service providers
4.3 Third-Party Services
- Firebase: For app analytics and crash reporting
- Apple/Google: For app distribution and payment processing
- Cloud Service Providers: For data storage and computing services
5. Your Rights
5.1 Access Rights
- View personal information we have collected about you
- Understand the purpose and methods of information use
- Obtain detailed explanations of information processing
5.2 Control Rights
- Modify Information: Update or correct your personal information
- Delete Information: Delete specific personal information
- Restrict Processing: Limit our processing of your information
- Data Export: Obtain your data in structured format
5.3 Account Management
- Account Cancellation: Apply to cancel your account at any time
- Data Clearance: Clear related data after account cancellation
- Withdraw Consent: Withdraw previously given consent
6. Children's Privacy Protection
- Our services are primarily intended for users aged 18 and above
- We do not knowingly collect personal information from children under 18
- If we discover we have collected children's information, we will delete it immediately
- If you are a child's guardian, please supervise the child's app usage
7. International Data Transfer
- Your data is processed and stored on secure cloud servers
- Some technical services may involve cross-border data transfer
- Cross-border transfers will comply with relevant laws and regulations
- We will ensure recipients provide adequate data protection
8. Cookies and Similar Technologies
- Local Storage: Store preference settings on your device
- Analytics Tools: Use analytics tools to understand app usage
- Performance Monitoring: Monitor app performance and stability
- User Control: You can manage these features through device settings
9. Privacy Policy Updates
- We may update this privacy policy from time to time
- Major changes will be notified through in-app notifications or other means
- Continued use of the service indicates agreement to the updated policy
- We recommend regularly reviewing the latest version of the privacy policy
10. Data Security Incidents
- If a data security incident occurs, we will immediately initiate emergency response
- Promptly assess incident impact and take remedial measures
- Notify relevant authorities and affected users as required by law
- Continuously improve security measures to prevent similar incidents