HiDrama Privacy Policy

Last Updated: January 13, 2026

This Privacy Policy applies to the products and services related to HiDrama (hereinafter referred to as "this Product"). As the operator of this Product, we fully recognize the importance of personal information to you. We will protect the security of your personal information and sensitive personal information in accordance with the provisions of applicable laws and regulations. We formulate this Privacy Policy and specially remind you: please read and understand this Privacy Policy carefully before using this Product to make appropriate choices.

This Privacy Policy will help you understand:


  1. We will collect and use your information in accordance with this Privacy Policy, but will not collect personal information in a bundled, lump-sum manner by force solely based on your consent to this Privacy Policy.
  2. When you use or enable relevant functions or services, we will collect and use relevant information as is necessary to realize such functions and services. Except for the necessary information required to realize basic business functions or as mandated by laws and regulations, you may refuse to provide such information without affecting your use of the basic functions of this Product. We will specify which information is necessary in this Privacy Policy item by item.
  3. Important or sensitive device permissions will not be enabled by default. To realize specific functions or services, we will pop up a window to obtain your separate, express consent before enabling them, and you may also withdraw your authorization at any time. It should be particularly pointed out that even if we obtain these important or sensitive device permissions with your authorization, we will not collect your information when such functions or services are not needed.
  4. The following content will help you understand in detail how we collect, use, store, transmit, share, transfer (if applicable) and protect personal information; and how you can inquire, access, delete, correct and withdraw authorization of personal information. Among them, the important content of the clauses concerning your rights and interests in personal information has been highlighted in bold—please pay special attention to it.

Table of Contents


  1. How We Collect and Use Personal Information
  2. Permissions We Obtain and Corresponding Business Functions
  3. How We Use Cookies and Similar Technologies
  4. How We Share, Transfer and Publicly Disclose Personal Information
  5. How We Store Personal Information
  6. How We Protect the Security of Personal Information
  7. Managing Your Personal Information
  8. Terms for Minors
  9. Revision and Notification of the Privacy Policy
  10. Contact Us

1. How We Collect and Use Personal Information

1.1 To provide product services and functions, we will collect information actively provided by you when using functions or receiving services, and information generated by you during the use of functions or receipt of services through automated means in the following ways:

Business Function: Anti-fraud and Anti-cheating

To prevent fraud and cheating and ensure the normal operation of our business, so as to provide you with better services and an ecological environment, we need to obtain certain necessary data when the application is started and running in the background, including application information such as application package name, application version, application installation time, application signature, and list of running applications; Android ID, country code, startup time, system time, system version, and MAC address; screen resolution, mobile phone brand, mobile phone model, and sensor information including acceleration sensor, magnetic field sensor, orientation sensor, gyroscope sensor, light sensor, pressure sensor, gravity sensor, linear acceleration sensor, and rotation vector sensor; application installation and usage information, screen unlock information, WiFi list information, and network information. The obtained information will only be used for this purpose and stored in pseudonymized form on the server. This function is a basic function of this Product, and the above information is necessary information. If you refuse to provide the above information, this Product cannot provide services for you.

Business Function 5: Background Reminder Service

We need to run background services to detect updates to your album status and remind you to use the image editing function. To provide you with better editing materials, we need to update the material library irregularly and remind you to experience it when the material library is updated. This function is an additional function of this Product, and the above information is non-necessary information. If you refuse to provide the above information, it will not affect your use of other basic functions of this Product.

Business Function: Advertising Service

To optimize the quality and effect of advertising content, the App will read the following data in real time when running in the foreground or background: basic information such as device brand, model, software system version, resolution, IP address, device language, and sensor information including acceleration sensor, magnetic field sensor, gyroscope sensor, gravity sensor, linear acceleration sensor, and rotation vector sensor; device identifiers including Android ID, IMEI, OAID, IMSI, ICCID, MEID, device serial number, build_serial, device MAC address, etc., the specific fields vary according to the software and hardware version; application installation list, application package name, version number, and application foreground/background status; interactive data such as display, click and conversion of advertisements; location information; crash data and performance data. The collected data will be stored anonymously and will not be used for other purposes. This function is an additional function of this Product, and the above information is non-necessary information. If you refuse to provide the above information, the quality and effect of the advertising content you see will be reduced.

Business Function: VIP Membership Service

We will provide you with the VIP membership service function. For details of this service function, please refer to the Membership Service Agreement. This function requires your authorization, and you can choose to log in through Google Account, Facebook, Apple ID or any other method. After you authorize the login, we will collect your avatar and nickname, IMEI information, Android ID, MAC address, OAID, device serial number, device manufacturer, device model, and device system version information. This information is only used to confirm and identify your membership identity and will not be used for other purposes. This function is an additional function of this Product, and the above information is non-necessary information. If you refuse to provide the above information, you will not be able to enjoy the VIP membership service function, but it will not affect your use of other basic functions of this Product.

Usage Scenarios and Scope: The data collected in connection with the above business functions shall only be used in the above business scenarios and shall not be used for other purposes.

Technical Description: Data collection methods involved above:


2. Permissions We Obtain and Corresponding Business Functions

2.1 The following permission applications will be prompted to you in the form of pop-up windows and authorized by you.

Permission Applied for: Camera (CAMERA); Permission Function: Use the camera to take photos for matting and editing functions.

Permission Applied for: Read External Storage (READ_EXTERNAL_STORAGE); Permission Function: Read local photos for matting and editing functions.

Permission Applied for: Write External Storage (WRITE_EXTERNAL_STORAGE); Permission Function: Save edited images to the local device.

Permission Applied for: Read Phone Status and Identity (READ_PHONE_STATE); Permission Function: Identify fake devices by reading device information for anti-cheating purposes.

Permission Applied for: Access WiFi State (ACCESS_WIFI_STATE); Permission Function: Update material templates under appropriate network environment.

Permission Applied for: Write System Settings (WRITE_SETTINGS); Permission Function: Perform wallpaper settings.

Permission Applied for: Request Install Packages (REQUEST_INSTALL_PACKAGES); Permission Function: Required for application upgrades.

2.2 The following permission applications are notified to you through this Privacy Policy, and your consent to this Privacy Policy shall be deemed as your consent to such permission authorizations.

Permission Applied for: Internet (INTERNET); Permission Function: Update material templates under appropriate network environment.

Permission Applied for: Access Network State (ACCESS_NETWORK_STATE); Permission Function: Update material templates under appropriate network environment.

Permission Applied for: Wake Lock (WAKE_LOCK); Permission Function: Help users realize material library updates.

Permission Applied for: Foreground Service (FOREGROUND_SERVICE); Permission Function: Identify album status updates and remind of image editing functions.

Permission Applied for: Expand Status Bar (EXPAND_STATUS_BAR); Permission Function: Required for notification bar reminder function.

Permission Applied for: Reorder Tasks (REORDER_TASKS); Permission Function: Remind users to install updates in a timely manner when the application is upgraded.

Permission Applied for: Receive Boot Completed (RECEIVE_BOOT_COMPLETED); Permission Function: Ensure the normal startup of this application after the user restarts the mobile phone.

Permission Applied for: System Alert Window (SYSTEM_ALERT_WINDOW); Permission Function: Identify album status updates and remind of image editing functions.

Permission Applied for: Vibrate (VIBRATE); Permission Function: Vibrate reminder when receiving notifications.

Permission Applied for: Change WiFi State (CHANGE_WIFI_STATE); Permission Function: Judge the network environment to ensure the normal use of some functions.

Permission Applied for: Query All Packages (QUERY_ALL_PACKAGES); Permission Function: Prevent repeated application installation.


3. How We Use Cookies and Similar Technologies

Cookies, device information identifiers and other similar technologies are commonly used technologies on the Internet. When you use this Product and related services, we may use relevant technologies to send one or more Cookies or anonymous identifiers to your device to collect and identify information about your access to and use of this Product. We promise not to use Cookies for any purposes other than those stated in this Privacy Policy. We use Cookies and similar technologies mainly to achieve the following functions or services:

3.1 Ensure the Safe and Efficient Operation of Products and Services

We may set Cookies or anonymous identifiers for authentication and security purposes to confirm whether you have logged into the service safely, or whether you have encountered theft, fraud and other illegal activities. These technologies will also help us improve service efficiency and increase login and response speed.

3.2 Help You Obtain a More Convenient Access Experience

The use of such technologies can help you save the steps and processes of repeatedly filling in personal information and entering search content.

3.3 Clearing Cookies

Most browsers provide users with the function of clearing browser cache data. You can perform corresponding data clearing operations in the browser settings function. If you perform the clearing, you may not be able to use the services or corresponding functions provided by us that rely on Cookies, but it will not affect your normal use of other functions and services.


4. How We Share, Transfer and Publicly Disclose Personal Information

4.1 Sharing

Except for the following circumstances, we will not share your personal information with any other third party unless we obtain your express consent, unless the shared personal information is de-identified information and the third party cannot re-identify the natural person subject of such information. If the purpose of the third party's use of information exceeds the scope of the original authorization and consent, they need to obtain your consent again.

(1) Sharing with Our Affiliated Companies

To facilitate us and our affiliated companies to jointly provide some services to you, your information may be shared within our affiliated companies. Our sharing is subject to the purposes stated in this Privacy Policy. If we share your sensitive personal information or the affiliated companies change the purpose of using and processing personal information, we will seek your authorized consent again.

(2) Sharing with Third-Party Service Providers

To realize and ensure the stable operation of the relevant functions of our products, we need to cooperate with third-party service providers in specific fields to provide you with services. Third-party service providers may collect personal information when providing services. We will ensure that they process your personal information in accordance with our instructions, following the purposes and requirements set out in this Privacy Policy, and take appropriate confidentiality and security measures to protect information security. It mainly includes:

a. Adaptive Message Push: To adapt the message push function to the terminal model you use, we may share the mobile phone model, version and related device information with terminal device manufacturers through SDK and other technologies;

b. Ensure Usage Security: We attach great importance to account, service and content security. To protect the account and property security of you and other users, and to protect the legitimate rights and interests of you and us from illegal infringement, we and our affiliated parties or service providers may share necessary device, account and log information;

c. Analyze Product Usage: To analyze the usage of our services and improve the user experience, we may share statistical data on product usage including crashes and flashbacks with affiliated parties or third parties, which is difficult to identify your personal identity in combination with other information;

d. Implement Face Recognition: To realize the fun camera function, we will use the facial recognition technology of third-party service providers to identify the pictures you manually take or select in this function, and we will share the processed pictures with third-party service providers. The shared pictures are only used to realize the above functions, and we will not use them for any other purposes. We will conduct strict security testing on the application programming interface (API) and software development kit (SDK) of third-party service providers, and agree on strict data protection measures to make them ensure confidentiality and security in accordance with this Privacy Policy.

(3) Sharing Information for Advertising Purposes

For the purposes of displaying advertisements, evaluating and optimizing advertising delivery effects, etc., we need to share part of your information with third-party partners such as advertisers and their agents. The above information has been anonymized or de-identified.

Usage Scenarios and Scope: WeChat sharing.

4.2 Transfer

(1) We will not transfer your personal information to any other third party unless we obtain your explicit consent.

(2) With the continuous development of our business, we may conduct mergers, acquisitions and asset transfers, and your personal information may be transferred as a result. In the event of the aforementioned changes, we will inform you of the recipient's name and contact information, require the recipient to protect your personal information in accordance with laws and regulations and security standards no lower than those stated in this Privacy Policy; otherwise, we will require the recipient to obtain your authorized consent again.

4.3 Public Disclosure

(1) We will not publicly disclose your information unless it is in accordance with the provisions of national laws and regulations or with your express consent. We will adopt security protection measures that meet industry standards when publicly disclosing your personal information.

(2) When announcing penalties for violating accounts and fraudulent behaviors, we will disclose the information of relevant accounts.

4.4 Personal Information Shared, Transferred and Publicly Disclosed Without Needing to Obtain Consent in Accordance with Law

Please understand that in the following circumstances, in accordance with laws, regulations and national standards, we may share, transfer and publicly disclose your personal information without obtaining your authorization and consent:

(1) Directly related to national security and national defense security;

(2) Directly related to public security, public health and major public interests;

(3) Directly related to criminal investigation, prosecution, trial and execution of judgments;

(4) Necessary for protecting your life, property and other major legitimate rights and interests or those of others but it is difficult to obtain the consent of the individual;

(5) Personal information that you voluntarily disclose to the public;

(6) Collecting personal information from legally publicly disclosed information, such as legitimate news reports, government information disclosure and other channels.


5. How We Store Personal Information

5.1 Storage Location

In accordance with the provisions of laws and regulations, we will store the personal information collected and generated during our domestic operations on Google.

5.2 Storage Period

We will only retain your personal information for the shortest period necessary to achieve the purpose of providing this Product and services. After the expiration of the necessary period, we will delete or anonymize your personal information unless otherwise stipulated by laws and regulations.


6. How We Protect the Security of Personal Information

(1) We attach great importance to the security of your personal information and will strive to take reasonable security measures including technical and management aspects to protect your personal information from improper use or unauthorized access, public disclosure, use, modification, damage, loss or leakage.

(2) We will use encryption technologies, anonymization processing and other relevant reasonable and feasible means no less than those of industry peers to protect your personal information, and use security protection mechanisms to prevent malicious attacks on your personal information.

(3) We will establish a special security department, security management system and data security process to ensure the security of your personal information. We adopt strict data use and access systems to ensure that only authorized personnel can access your personal information, and regularly conduct safety education and training for employees, and conduct data security audits of data and technologies from time to time.

(4) We will formulate emergency response plans and immediately activate the emergency plan when a user information security incident occurs to try to prevent the expansion of the impact and consequences of such security incidents. In the event of a user information security incident including leakage and loss, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will promptly inform you of the relevant situation of the incident in the form of push notifications, emails, letters, text messages and other relevant forms. If it is difficult to inform you one by one, we will take reasonable and effective measures to issue an announcement. At the same time, we will also report the disposal of the user information security incident to the relevant regulatory authorities in accordance with requirements.


7. Managing Your Personal Information

We attach great importance to your management of personal information and make every effort to protect your relevant rights such as inquiring, accessing, modifying, deleting, withdrawing consent and authorization, and canceling accounts, so that you have the ability to protect your privacy and information security.

7.1 Change or Withdraw the Scope of Authorization

You can change the scope of consent or withdraw your authorization by selecting Application Details - Permission Management in the device's own operating system. After withdrawing the authorization, we will no longer collect information related to these permissions.

Specific business functions and services require your information to be completed. When you withdraw your consent or authorization, we cannot continue to provide you with the functions and services corresponding to the withdrawal of consent or authorization, and will no longer process your corresponding personal information. However, your decision to withdraw consent or authorization will not affect the personal information processing conducted by us based on your authorization before.

7.2 Access to Information

(1) Access to Information

This Product currently has no login function, so you cannot directly access the personal information under your account on the Product page. If you need to obtain a copy of the information we collect about you, please contact us by email, and we will need you to provide further relevant information to technically locate and identify your personal information in the unlogged state.

(2) Modify Information

When you need to update your personal information or find that the personal information we collect and store is incorrect, you have the right to make modifications. You can submit your modification request to us by email.

(3) Delete Information

If you wish to delete personal information, please contact us by email to submit a deletion request. Subject to meeting the requirements of the minimum retention period stipulated by laws and regulations, we will delete or anonymize your personal information. Within the minimum retention period required by the above laws and regulations, we will no longer use your personal information for commercial purposes.

7.3 Cancel Account

You can log out of your account through Me - Settings - Logout in the Product, or submit an account cancellation request by contacting us through Me - Settings - Cancel Account - I have read and understood, confirm cancellation in the Product or by email. Before you cancel your account, we will verify your personal identity, security status, device information, etc. The review time is usually within 1 minute, and will not exceed 15 working days at most. The account cancellation is irreversible. After you cancel your account, we will delete your relevant information or anonymize it unless otherwise stipulated by laws and regulations.

7.4 Respond to Your Requests

You can contact us by sending an email to customer@tech-mints.cn for the above requests for accessing, modifying, deleting personal information, changing or withdrawing the scope of authorization, and canceling accounts. We will reply within 15 working days after verifying your identity.

7.5 Access the Privacy Policy

You can view the full content of the Privacy Policy at the bottom of the Settings page (Settings icon in the upper right corner of the Home page - About - Privacy Policy) and the bottom of the About page (Me - Settings - About - Privacy Policy).

7.6 Notification of Termination of Operation

If we terminate the operation, we will promptly stop collecting your personal information, notify you of the termination of operation by means of individual delivery or announcement, and delete or anonymize the personal information we hold about you.


8. Terms for Minors

(1) If you are a minor under the age of 18, please read and agree to this Privacy Policy jointly under the supervision and guidance of your parents or other guardians before using this Product and related services.

(2) We protect the personal information of minors in accordance with the provisions of relevant national laws and regulations, and will only collect, use, share or disclose the personal information of minors when permitted by law, explicitly agreed by parents or other guardians, or necessary to protect minors; if we find that we have collected the personal information of minors without first obtaining verifiable parental consent, we will try to delete the relevant information as soon as possible.

(3) If you are the guardian of a minor, please contact us through the contact information published in this Privacy Policy if you have any questions about the personal information of the minor under your guardianship.

(4) For minors under the age of 14 (hereinafter referred to as "children"), you and your parents or other guardians should carefully read the following content:

You should understand that only when we judge you to be a child user through the information you submit or your statements, the personal information we collect through your account will be regarded as children's personal information.

We will process children's personal information in accordance with the provisions of this Privacy Policy. When there are substantial changes in the processing purposes, methods, scope, storage matters, security protection measures, etc. agreed in this Privacy Policy, we will obtain the guardian's consent again.

Collection and Use of Children's Personal Information: The purposes, methods and scope of our collection and use of children's personal information will not exceed the content specified in this Privacy Policy. If we find that we have collected children's personal information without first obtaining verifiable parental consent, we will try to delete the relevant information as soon as possible.

Sharing, Transfer and Public Disclosure of Children's Personal Information: In general, we will not share, transfer or publicly disclose children's personal information to third parties. We may share, transfer or disclose children's personal information to third parties only with the consent of guardians. If it is necessary to share or transfer children's personal information to third parties, we will conduct a data security assessment by ourselves or entrust a third-party institution to do so.

Entrusted Processing of Children's Personal Information: In general, we will not entrust third parties to process children's personal information. If it is really necessary to entrust third parties to process, we will take compliance measures in accordance with the provisions of laws and administrative regulations, including but not limited to conducting security assessment on third parties.

Storage of Children's Personal Information: We will store children's personal information in accordance with the provisions of this Privacy Policy.

Correction and Deletion of Children's Personal Information: a. Guardians or children themselves may correct and delete personal information in the manner provided in this Policy. b. If a child or their guardian finds that we have processed the child's personal information in violation of the provisions of laws, administrative regulations or this Policy, or the child's guardian withdraws consent, or the child or their guardian terminates the use of services through cancellation, etc., they may contact us to delete the relevant child's personal information.

Internal Management of Children's Personal Information: We follow the principle of least privilege for our staff, strictly set information access permissions, and control the scope of knowledge of children's personal information. Staff access to children's personal information requires approval, and we have taken technical measures to record access to avoid illegal copying and downloading of children's personal information.

Emergency Disposal and Reporting of Children's Personal Information Security Incidents: If we find that children's personal information has been or may be leaked, damaged or lost, we will immediately activate the emergency plan and take remedial measures. In the event of a security incident, we will promptly inform the child's guardian of the content and impact of the security incident, the disposal measures we have taken or will take, suggestions for the child or their guardian to independently prevent and reduce risks, and the remedial measures we provide for the child's personal information subject. If we judge that the children's information security incident has caused or may cause serious consequences, we will immediately report to the relevant competent authorities.


9. Revision and Notification of the Privacy Policy

(1) To provide you with better services, the functions and services of this Product will be updated and changed from time to time. We will revise this Privacy Policy as appropriate. These revisions form part of this Privacy Policy and have the same effect as this Privacy Policy. Without your explicit consent, we will not reduce your rights under the currently effective Privacy Policy.

(2) After this Privacy Policy is updated, we will release the updated version in this Product, and before the updated terms take effect, we will remind you of the updated content through appropriate means such as pop-up reminder dialog boxes when starting the application, so that you can timely understand the latest version of this Privacy Policy.


10. Contact Us

(1) If you have any complaints, suggestions or questions about personal information protection, you can send the relevant issues to us

(2) We will review the relevant issues as soon as possible and reply within fifteen working days after verifying your user identity.