Privacy Policy - Data Collection and Usage
Information We Collect
User Information
We collect and store basic user identification information necessary to provide our services:
- User ID for authentication purposes
- Authentication tokens for secure access
Usage Information
We automatically collect information about how you use our service:
- Types of image processing operations you perform (animation, boomerang, GIF creation, etc.)
- Timestamps of your activities
- Number of requests and usage patterns for rate limiting purposes
Image Data
When you use our service, we process and temporarily store:
- Images you upload for processing
- Converted and processed versions of your images
- Technical metadata associated with your images
Technical Information
To maintain and improve our service, we collect:
- HTTP request data
- API usage information
- Response status information
- Request identifiers and queue positions
- System performance metrics
Log Data
Our systems automatically collect:
- Application logs for service maintenance
- Error logs for troubleshooting
- Debug information when necessary
- Processing status information
How We Use This Information
We use the collected information to:
- Provide and maintain our image processing services
- Authenticate and authorize your access
- Manage request queues and rate limiting
- Monitor and improve service performance
- Troubleshoot technical issues
- Prevent abuse of our services
Data Retention
We retain data in accordance with the following policies:
- User account information is retained while your account is active
- Image data is temporarily stored during processing and deleted after completion
- Usage logs and technical data are retained for a limited period for service maintenance
- Compute action records are maintained for rate limiting and service improvement purposes
Data Security
We implement appropriate technical and organizational measures to protect your data, including:
- Secure authentication mechanisms
- Temporary file storage with automatic cleanup
- Rate limiting to prevent abuse
- Secure database storage for user records