Privacy Policy
Effective Date: 25-11-2025
1. INTRODUCTION AND SCOPE
This Comprehensive Privacy Policy ("Policy") meticulously outlines the protocols, procedures, and principles governing the collection, storage, processing, utilization, and disclosure of personal information and data pertaining to users of the Young Streamers Lite mobile application ("App"). The App is owned and operated by YS LIVE("we," "us," "our," or "Company"), a sole proprietorship registered under the Udyam registration scheme of the Government of India.
This Policy applies comprehensively to all services, features, functionalities, and capabilities offered through the Young Streamers platform, including but not limited to live broadcasting services, video and audio communication features, text-based chat functionalities, virtual gifting systems, digital payment processing, and all associated interactive elements (collectively referred to as "Services").
By downloading, installing, accessing, registering with, or utilizing our Services in any manner, you explicitly acknowledge that you have read, understood, and voluntarily agreed to be bound by all terms, conditions, and practices described in this extensive Privacy Policy. If you do not agree with any aspect of this Policy, you must immediately cease all use of our Services and uninstall the App from your device.
2. DEFINITIONS AND INTERPRETATION
For the purpose of clarity and precise understanding throughout this document:
- "Personal Information" refers to any data that identifies, relates to, describes, references, or is capable of being associated with a particular individual, either directly or indirectly.
- "Sensitive Personal Information" includes specific categories of data such as financial information, precise geolocation data, biometric data, and other specially protected information.
- "User-Generated Content" encompasses all content created, uploaded, streamed, transmitted, shared, or otherwise made available by users through our Services.
- "Processing" means any operation or set of operations performed on personal data, whether manually or automated, including collection, recording, organization, structuring, storage, adaptation, retrieval, consultation, use, disclosure, dissemination, alignment, combination, restriction, erasure, or destruction.
- "Data Controller" refers to YS LIVE, which determines the purposes and means of processing personal information.
- "Data Processor" means any natural or legal person who processes personal data on behalf of the Data Controller.
3. COMPREHENSIVE INFORMATION COLLECTION PRACTICES
3.1 Information Voluntarily Provided by Users
During your engagement with our Services, we collect several categories of information that you knowingly and voluntarily provide:
- Account Registration Data: When you initiate the account creation process, we collect essential information including your mobile telephone number, email address, date of birth (for rigorous age verification to enforce our 18+ policy), password (encrypted and hashed), preferred language selection, and unique user identifier generated by our system.
- Detailed Profile Information: As you customize your profile, we collect your chosen display name (alias), profile photographs (sourced either from your device's gallery or captured directly through your device's camera), self-declared gender identification, geographical location data, biographical description text, and links to external social media profiles if you choose to connect them.
- User-Generated Content Portfolio: This extensive category includes all content you create, produce, upload, stream, transmit, or share through our platform, specifically encompassing live video broadcast streams, real-time video and audio communication sessions, text-based chat messages and conversations, still images and photographs, pre-recorded video content, textual comments on other users' content, virtual gift transactions including both sending and receiving activities, and all other forms of media or communication exchanged through our Services.
- Financial and Transactional Data: When you engage in financial transactions within our platform, we collect comprehensive payment information including complete transaction history, detailed purchase records with timestamps, current virtual token balance, selected payment method details, billing address information, and all relevant data required by our integrated payment processors Google Pay Billing and Other methods. We explicitly do not store sensitive payment card details, security codes, or complete payment account numbers on our servers.
- Customer Support Interactions: All communications between you and our customer support team are meticulously recorded, including support tickets, email correspondence, in-app chat support conversations, feature requests, bug reports, technical issue descriptions, and all feedback submissions.
- Social Connectivity Information: When you utilize our 'Discover Friends' or social connection features and explicitly grant permission, we may access your device's address book contacts to facilitate social connections within our platform.
3.2 Information Automatically Collected Through Technology
Our systems automatically collect specific categories of technical and usage information through various technological means:
- Detailed Device Specifications: We collect comprehensive device information including hardware manufacturer and model, operating system version and build number, unique device identifiers (including IMEI, IMSI, MAC address, Android ID, and device serial number where permitted), IP address and network configuration, mobile carrier information, screen resolution and display characteristics, device language settings, installed application list, and battery status information.
- Comprehensive Usage Analytics: Our systems continuously monitor and record detailed usage patterns including specific features accessed, time spent on each feature, live streams viewed with duration metrics, user profiles followed and interaction frequency, blocking and reporting activities, virtual gift transactions with values and recipients, search query patterns and results, navigation paths through the application, session duration and frequency, and detailed interaction heatmaps.
- Precise Location Information: With your explicit consent, we collect precise GPS-based location data including latitude and longitude coordinates, location accuracy indicators, altitude measurements, and movement patterns. Without precise location permission, we derive approximate location information from IP address geolocation, WiFi network signals, and cellular tower triangulation data.
- Technical Performance Metrics: We systematically collect technical data including application crash reports with stack traces, performance metrics with loading times and responsiveness measurements, bandwidth consumption statistics, error logs with detailed debugging information, memory usage patterns, and CPU utilization statistics.
- Cookies and Tracking Technologies: We employ an extensive array of tracking technologies including persistent cookies, session cookies, flash cookies, pixel tags, web beacons, clear GIFs, device fingerprinting techniques, and similar tracking technologies to analyze service usage patterns, personalize content delivery, and enhance user experience.
3.3 Device Permissions and Access Information
To deliver full functionality of our Services, the App requests specific device permissions. We collect and process information related to these permissions as follows:
- Camera and Microphone Access: Required for live streaming, video/audio calls, and profile picture capture. We process video and audio streams only during active sessions and do not record or store content without your explicit consent.
- Storage/Media Access: Necessary for uploading profile pictures, sharing media in chats, and saving content. We access your device storage only when you initiate media selection and respect your chosen files only.
- Phone State Permission: Used exclusively for secure phone number authentication via OTP verification. We access basic device identifiers to prevent fraud and ensure one account per device compliance.
- Bluetooth Connectivity: Required for connecting audio devices during video/audio calls for enhanced audio quality experience.
- Notification Permissions: To deliver real-time alerts for messages, calls, gifts, and live stream notifications. You can customize notification preferences in app settings.
- Network State Access: Monitors connectivity to optimize streaming quality, switch between networks seamlessly, and provide offline capabilities where possible.
- Background Services: Essential for maintaining live streaming sessions, ongoing calls, and real-time notifications while using other apps.
- Vibrate Permission: For haptic feedback during notifications and interactions to enhance user experience.
All permissions are requested only when needed for specific features. You can manage these permissions anytime through your device settings. Denying certain permissions may limit functionality but core app features will remain accessible.
4. ELABORATE PURPOSES OF INFORMATION PROCESSING
We process your personal information for multiple specific, explicit, and legitimate purposes:
- Core Service Delivery: To provide, maintain, operate, and continuously improve our comprehensive suite of Services including high-quality live streaming capabilities, seamless video and audio communication features, real-time text-based chat functionalities, virtual gifting ecosystems, and all interactive social features that constitute our platform.
- Secure Payment Processing: To facilitate, authenticate, authorize, and process virtual token purchases, manage financial transactions, handle billing operations, prevent payment fraud, and ensure compliance with financial regulations through our integrated payment gateways Google Pay Billing and Other Methods.
- Rigorous Age Verification: To strictly enforce our 18+ age policy through multiple verification mechanisms, ensure compliance with legal age requirements, prevent underage access, and maintain a safe environment for adult users.
- Comprehensive Content Moderation: To systematically review, monitor, filter, and moderate all user-generated content for compliance with our detailed Community Guidelines, applicable laws and regulations, platform safety standards, and to prevent harmful or illegal content dissemination.
- Responsive Customer Support: To promptly respond to user inquiries, efficiently troubleshoot technical issues, provide comprehensive feature assistance, manage user complaints and reports, and deliver general customer service excellence.
- Continuous Service Improvement: To analyze detailed usage patterns, identify popular features and pain points, develop innovative new functionalities, optimize user interface design, enhance overall user experience, and drive platform evolution based on data-driven insights.
- Robust Safety and Security: To detect, prevent, investigate, and mitigate fraudulent activities, platform abuse, harassment incidents, illegal conduct, security breaches, and other malicious activities that could harm our users or platform integrity.
- Personalized User Experience: To algorithmically recommend relevant content streams, suggest compatible users to follow, customize individual news feeds, personalize notification settings, and tailor the overall platform experience to individual user preferences and behavior patterns.
- Strategic Communications: To send essential service announcements, critical security alerts, promotional offers (with straightforward opt-out mechanisms), administrative notifications, product updates, and other service-related communications.
5. DETAILED INFORMATION SHARING AND DISCLOSURE PRACTICES
5.1 Information Sharing with Other Users
As an inherently social platform, certain information is necessarily shared with other users:
- Public Profile Visibility: Your basic profile information including display name, profile picture, biographical description, and follower counts are visible to all platform users by default.
- Content Broadcasting: Your live streams, uploaded videos, and public posts are visible to other users according to your specific privacy settings and content distribution preferences.
- Interactive Communications: Your chat messages, comments, reactions, and public interactions are visible to other participants in the relevant conversations or content threads.
- Social Activities: Your virtual gift transactions, following activities, and certain social interactions may be visible to other users as part of the platform's social features.
5.2 Information Sharing with Service Providers
We engage specialized third-party service providers who process information on our behalf:
- Payment Processing Partners: Google Pay Billing and Other Methods for secure transaction processing, fraud prevention, and financial compliance.
- Cloud Infrastructure Providers: InterServer Web Hosting and Google Cloud Platform for robust data storage, content delivery, live streaming infrastructure, and computational resources.
- Analytics and Insights Partners: Specialized analytics services including Google Analytics, Firebase Analytics, and custom analytics platforms to understand user behavior, measure feature performance, and drive product decisions.
- Customer Support Platforms: Zendesk, Freshdesk, or similar customer support systems to manage user inquiries, support tickets, and communication workflows.
- Content Delivery Networks: Global CDN providers to ensure low-latency, high-quality streaming experiences across geographical regions.
- Marketing and Communication Tools: Email service providers, push notification services, and marketing automation platforms for user communication and engagement.
5.3 Legal Compliance Disclosures
We may disclose your information to third parties when compelled by legal requirements:
- In response to valid legal processes including subpoenas, court orders, search warrants, or other mandatory legal requests
- To comply with applicable laws, regulations, statutory requirements, or governmental demands
- To protect and defend our legal rights, intellectual property, and contractual interests
- To prevent, investigate, or take action regarding potential illegal activities, security issues, or policy violations
- To protect the safety, rights, and security of our users, employees, or the general public
5.4 Business Transaction Scenarios
In the event of strategic business developments including mergers, acquisitions, asset sales, business transfers, or corporate restructuring, your information may be transferred to the succeeding entity as part of the business assets, subject to appropriate confidentiality and data protection commitments.
6. COMPREHENSIVE DATA SECURITY FRAMEWORK
We have implemented an extensive, multi-layered security framework to protect your personal information:
- Encryption Protocols: We employ industry-standard SSL/TLS encryption for all data transmissions between your device and our servers. Sensitive data at rest is encrypted using AES-256 encryption standards.
- Infrastructure Security: Our servers are protected by enterprise-grade firewalls, intrusion detection systems, distributed denial-of-service (DDoS) mitigation services, and regular security vulnerability assessments.
- Access Control Mechanisms: We implement strict role-based access controls, multi-factor authentication for administrative access, principle of least privilege enforcement, and comprehensive access logging and monitoring.
- Security Governance: We maintain formal information security policies, conduct regular employee security awareness training, perform background checks on personnel with data access, and enforce strict confidentiality agreements.
- Continuous Monitoring: We employ 24/7 security monitoring, real-time threat detection systems, automated anomaly detection, and regular security incident response drills.
- Physical Security: Our data centers maintain rigorous physical security measures including biometric access controls, 24/7 surveillance, security personnel, and environmental controls.
- Data Backup and Recovery: We maintain comprehensive data backup strategies with geographically distributed backups, regular recovery testing, and business continuity plans.
Despite these extensive security measures, we must acknowledge that no method of electronic transmission or storage is 100% secure, and we cannot guarantee absolute protection against determined sophisticated attacks.
7. DEVICE PERMISSIONS MANAGEMENT AND CONTROLS
We believe in transparent permission management. Here&aposs how you can control app permissions:
7.1 Permission Request Timing
We follow the principle of "ask when needed" - permissions are requested only when you attempt to use a feature that requires them:
- Camera/Microphone: When starting live stream or video call
- Storage Access: When uploading profile picture or media
- Contacts: When using "Find Friends" feature
- Location: When enabling location-based recommendations (optional)
- Notifications: During first app launch for alerts
7.2 Permission Control Methods
You have multiple ways to control permissions:
- Device Settings: Go to Settings → Apps → Young Streamers Lite → Permissions to enable/disable any permission
- In-App Prompts: Manage permissions through app's permission dialogs
- Feature-Specific Toggles: Some features have individual toggles in app settings
7.3 Impact of Permission Denial
Denying permissions affects specific features only:
- No Camera: Can't start live stream or video call (audio-only still works)
- No Microphone: Can't speak in live or calls (can still listen)
- No Storage: Can't upload media (can still view/download)
- No Notifications: Won't receive alerts (app still functions)
- No Location: Location-based features disabled (app works normally)
7.4 Permission Usage Transparency
We provide clear indicators when permissions are active:
- Camera/Microphone icons visible during active use
- Notification when background services are running
- Clear explanations before permission requests
- Option to "Try Again" if permission initially denied
Note: Some permissions (INTERNET, ACCESS_NETWORK_STATE, VIBRATE) are required for basic app functionality and cannot be disabled as they don't access personal data. These are standard Android system permissions for app operation.
8. USER RIGHTS AND PREFERENCES MANAGEMENT
We provide comprehensive mechanisms for you to exercise control over your personal information:
8.1 Access and Management Controls
- Profile Management: You can view, edit, update, or modify your profile information including display name, profile picture, biographical information, and privacy settings through the app's settings menu.
- Privacy Configuration: You can adjust granular privacy settings for your content visibility, communication preferences, social connectivity options, and data sharing preferences.
- Data Export Capability: You can request a complete export of your personal data in a structured, machine-readable format through our data export tools.
- Selective Content Deletion: You can delete specific content items, conversations, or media uploads individually, or request bulk deletion of content categories.
- Account Termination: You can permanently delete your entire account and associated data through Settings → Account Management → Delete Account, subject to reasonable processing time.
8.2 Communication Preferences
- Marketing Communications: You can opt-out of promotional emails, marketing messages, and commercial communications through unsubscribe links or preference centers while maintaining essential service communications.
- Notification Management: You can customize push notification preferences, including categories, frequency, and timing, through both app settings and device-level controls.
- Contact Frequency: You can manage how often you receive various types of communications from our platform.
8.3 Device Permission Controls
You maintain ultimate control over app permissions through your device's operating system settings:
- Location Services: Control when and how the app accesses your precise or approximate location data
- Camera Access: Manage the app's ability to access your device's camera for streaming and photos
- Microphone Access: Control the app's access to your microphone for audio streaming and calls
- Contact Book: Manage the app's ability to access your device's contact information
- Storage Access: Control the app's access to your device storage for media uploads and downloads
- Other Permissions: Manage various other device capabilities and sensors
8.4 Comprehensive Rights Exercise
Depending on your jurisdiction and applicable data protection laws, you may exercise additional rights including:
- Right to access specific personal information we hold about you
- Right to rectification of inaccurate or incomplete information
- Right to erasure of personal information under specific circumstances
- Right to restriction of processing in certain situations
- Right to data portability for transfer to another service
- Right to object to certain processing activities
- Rights related to automated decision-making and profiling
To exercise these rights, please contact us at info@youngstreamers.live with detailed requirements. We will respond within regulatory timeframes, typically 30 days, and may request identity verification for security purposes.
9. INTERNATIONAL DATA TRANSFER MECHANISMS
As a global platform, your personal information may be transferred to, stored in, and processed in countries outside your residence, including India where our primary operations are based, and other countries where our service providers operate. These countries may have data protection laws that differ from your home country.
We ensure appropriate safeguards for international data transfers through:
- Standard Contractual Clauses: We implement European Commission approved standard contractual clauses for transfers from the EEA and Switzerland
- Adequacy Decisions: We rely on adequacy decisions where applicable for transfers to countries with approved data protection standards
- Binding Corporate Rules: We adhere to binding corporate rules for intra-organizational transfers where applicable
- Data Processing Agreements: We maintain comprehensive data processing agreements with all international service providers
- Security Assessments: We conduct rigorous security assessments of international service providers
- Legal Compliance: We ensure all transfers comply with applicable data protection regulations including India's Digital Personal Data Protection Act, GDPR, CCPA, and other relevant frameworks
10. DATA RETENTION AND DESTRUCTION POLICIES
We retain your personal information only for as long as necessary to fulfill the purposes outlined in this Policy, unless a longer retention period is required or permitted by law. Our specific retention practices include:
- Active Account Period: We retain your information while your account remains active and you continue using our Services
- Post-Termination Retention: After account deletion, we may retain certain information for specific legitimate purposes
- Legal Compliance Retention: We retain information as required by applicable laws, regulations, legal processes, or governmental requests, including tax records, financial transaction data, and compliance documentation
- Dispute Resolution: We retain information reasonably necessary for dispute resolution, contract enforcement, and legal claim establishment
- Security and Safety: We retain information necessary for ongoing security maintenance, fraud prevention, and platform safety enforcement
- Business Operations: We retain anonymized or aggregated data for business intelligence, analytics, and service improvement purposes
Upon expiration of the retention period, we securely destroy or anonymize personal information using industry-standard data destruction methods that prevent reconstruction or recovery.
11. CHILDREN'S PRIVACY PROTECTION FRAMEWORK
Our Services are strictly limited to users who are 18 years of age or older. We do not knowingly collect, solicit, or process personal information from individuals under 18 years of age. Our comprehensive child protection measures include:
- Strict Age Verification: We implement multiple age verification mechanisms during registration and ongoing monitoring
- Proactive Monitoring: We continuously monitor for indications of underage usage through behavioral patterns and content analysis
- Immediate Action: We immediately disable accounts and delete information when we identify underage users
- Reporting Systems: We maintain accessible reporting mechanisms for users to report suspected underage usage
- Educational Resources: We provide resources and guidance about online safety for young users
- Legal Compliance: We comply with all applicable child protection laws and regulations including COPPA and similar frameworks
If you believe we have inadvertently collected information from a minor, please contact us immediately at info@youngstreamers.live for prompt investigation and resolution.
// ADD THIS NEW SECTION AFTER SECTION 11 (Children's Privacy Protection Framework)
12. CHILD SAFETY STANDARDS AND CSAE/CSAM PREVENTION
12.1 Zero Tolerance Policy:
Young Streamers Lite (YS LIVE)maintains an absolute ZERO TOLERANCE policy towards Child Sexual Abuse and Exploitation (CSAE) and Child Sexual Abuse Material (CSAM). We strictly prohibit any content, behavior, or activity that exploits, endangers, or harms minors.
12.2 CSAM/CSAE Detection and Prevention:
We implement comprehensive technical and operational measures to prevent, detect, and remove CSAM/CSAE content:
- Automated Content Scanning: Hash-matching technology to identify known CSAM
- AI-Powered Moderation: Machine learning models to detect suspicious content
- Human Review: Dedicated moderation team for content review
- User Reporting: In-app reporting system for user-submitted reports
- Age Verification: Multi-layered age verification systems
12.3 Mandatory Reporting Protocol:
Upon detection or receipt of reports regarding CSAM/CSAE, we:
- Immediately remove the content (within 60 minutes)
- Preserve all evidence for law enforcement
- Report to Indian authorities within 24 hours
- Cooperate fully with police investigations
- Permanently ban involved accounts and devices
12.4 Legal Compliance Framework:
Our Child Safety Standards comply with:
- Protection of Children from Sexual Offences (POCSO) Act, 2012
- Information Technology Act, 2000 (Section 67B)
- Google Play Child Safety Standards
- UN Convention on the Rights of the Child
12.5 How to Report Violations:
Users can report suspected CSAM/CSAE content through:
- In-App Reporting: Use the "Report" button on any content
- Email: safety@youngstreamers.live
- Emergency: Contact local police (Dial 112 in India)
- Cyber Crime: National Cyber Crime Portal (cybercrime.gov.in)
12.6 Complete Child Safety Policy:
For our complete Child Safety Standards, please visit:https://web.youngstreamers.live/child-safety-standards
13. POLICY UPDATES AND MODIFICATION PROCEDURES
We may periodically update this Privacy Policy to reflect:
- Evolving Services: Changes in our service offerings, features, or technological capabilities
- Legal Requirements: New legal obligations, regulatory requirements, or compliance standards
- User Feedback: Valuable input from our user community and stakeholder feedback
- Security Enhancements: Improvements in our security practices and protective measures
- Industry Standards: Adoption of industry best practices and technological advancements
We will notify users of significant changes through:
- In-App Notifications: Prominent notices within the application interface
- Email Communications: Direct email messages to registered users
- Platform Announcements: Public announcements through our official channels
- Policy Date Updates: Clear indication of the "Last Updated" date at the top of this Policy
Continued use of our Services after changes become effective constitutes acceptance of the revised Policy. If you materially disagree with significant changes, you may terminate your account as described in Section 7.
14. CONTACT INFORMATION AND GRIEVANCE REDRESSAL
For questions, concerns, requests, or complaints regarding this Privacy Policy or our data practices, please contact us through the following channels:
- Primary Email: info@youngstreamers.live
- Response Commitment: We strive to respond to all inquiries within 7 business days
- Registered Entity: YS LIVE (Sole Proprietorship registered under Udyam)
- Designated Officer: We will appoint a designated Grievance Officer as required by applicable laws
- Escalation Procedure: We maintain a structured escalation process for unresolved complaints
- Legal Compliance: We ensure all transfers comply with applicable data protection regulations including India's Digital Personal Data Protection Act, GDPR, CCPA, and other relevant frameworks
We take all privacy concerns seriously and are committed to investigating and resolving issues in a fair, transparent, and timely manner. For complaints that cannot be resolved directly, users may have the right to lodge complaints with relevant data protection authorities in their jurisdiction.