Consent to Use Video, Audio, and Personal Data
By accessing and using WUMA Match’s services, you acknowledge that you have read, understood, and voluntarily agree to the following terms regarding the use of your video, audio, and personal data:
1. Video and Audio Access
You hereby grant WUMA Match permission to access and utilize your device’s camera and microphone solely for purposes related to identity verification, profile creation, and secure communication within the platform.
2. Data Collection and Secure Storage
You acknowledge and agree that your video, audio, and associated metadata may be securely collected, encrypted, and stored on WUMA Match’s protected servers for internal operational purposes, including identity validation, matching optimization, and personalized service delivery.
3. AI-Based Processing and Platform Enhancement
You authorize WUMA Match to process your submitted video and audio data, whether in anonymized or identifiable form, for the purposes of artificial intelligence training, behavioral and intent recognition, and continuous improvement of the platform’s matching algorithms and user experience.
4. Display to Verified Members Only
You grant permission for selected approved visual and audio components of your profile to be presented exclusively to verified members within the WUMA Match network as part of the introduction, matching, and communication process.
5. Strict Internal Use and No Third-Party Advertising
You acknowledge that your data will never be sold, rented, or shared with external advertisers. All collected materials remain strictly confined to WUMA Match’s internal operational and service-enhancement purposes.
6. Right to Withdraw Consent or Request Data Deletion
You retain the full right to withdraw this consent or request the permanent deletion of your data at any time by submitting a request to WUMA Match’s official support team, subject to applicable verification and regulatory requirements.
7. Data Security and Protection Commitment
WUMA Match operates under industry-leading data protection standards, utilizing advanced encryption technologies, strict access control, and globally recognized cybersecurity protocols to safeguard all user information with the highest level of confidentiality and integrity.
