1
Privacy Policy

Effective Date: 23rd January, 2025

Last Updated:
23rd January, 2025
Table of Content

1. Information We Collect
--------------------------------------------------------------------------------------- 5
2
1.1. Personal Information
------------------------------------------------------------------------------------- 5
1.1.1. Identification Data
--------------------------------------------------------------------------------- 5
1.1.2. Account Information
------------------------------------------------------------------------------ 6
1.1.3. Profile Data
----------------------------------------------------------------------------------------- 6
1.1.4. User Content
--------------------------------------------------------------------------------------- 6
1.1.5. Communications Data
---------------------------------------------------------------------------- 6
1.1.6. Payment Information
------------------------------------------------------------------------------ 7
1.1.7. Metadata
-------------------------------------------------------------------------------------------- 7
1.1.8. Device Information
-------------------------------------------------------------------------------- 7
1.1.9. Interaction Data
------------------------------------------------------------------------------------ 7
1.1.10. Financial Data
------------------------------------------------------------------------------------ 8
1.1.11. Location Data
------------------------------------------------------------------------------------- 8
1.2. Automatically Collected Information
------------------------------------------------------------------ 8
1.2.1. Device Information
-------------------------------------------------------------------------------- 8
1.2.2. Usage Data
----------------------------------------------------------------------------------------- 9
1.2.3. Log Data
--------------------------------------------------------------------------------------------- 9
1.2.4. Location Data
-------------------------------------------------------------------------------------- 9
1.3. Information from Third Parties
------------------------------------------------------------------------- 9
1.3.1. Social Media Accounts
--------------------------------------------------------------------------- 9
1.3.2. Non-Listed Payment Processors
------------------------------------------------------------- 10
1.3.3. Advertising Partners
---------------------------------------------------------------------------- 10
1.3.4. Analytics Providers
------------------------------------------------------------------------------ 10
1.3.5. Publicly Available Sources
-------------------------------------------------------------------- 10
2. How We Use Your Information
--------------------------------------------------------------------------- 10
2.1. Provision of Services
---------------------------------------------------------------------------------- 11
2.1.1. Media Sharing and Social Functionality
---------------------------------------------------- 11
2.2. Tailoring and Modifying
------------------------------------------------------------------------------- 11
2.3. Analytics and Improvement
-------------------------------------------------------------------------- 12
2.4. Marketing and Communication
---------------------------------------------------------------------- 12
2.5. Compliance with Applicable Law
-------------------------------------------------------------------- 12
3. Sharing Your Information
---------------------------------------------------------------------------------- 12
3.1. Service Contractors
------------------------------------------------------------------------------------ 13
3.2. Legal and Regulatory Disclosures
------------------------------------------------------------------ 13
3.3. Business Transfers
------------------------------------------------------------------------------------- 13
4. Data Retention and Deletion
------------------------------------------------------------------------------ 13
4.1. Retention Periods
--------------------------------------------------------------------------------------- 14
4.2. Anonymization and Deletion
------------------------------------------------------------------------- 14
4.3. Legal and Regulatory Compliance
------------------------------------------------------------------ 15
5. Your Data Rights
--------------------------------------------------------------------------------------------- 15
5.1. Right of Access
----------------------------------------------------------------------------------------- 15
5.2. Right of Correction
------------------------------------------------------------------------------------- 16
5.3. Right to Withdraw Consent
--------------------------------------------------------------------------- 16
3
5.4. Right to Request Deletion
---------------------------------------------------------------------------- 16
5.5. Right to Data Portability
------------------------------------------------------------------------------- 17
5.6. Right to Object to Processing
------------------------------------------------------------------------ 17
5.7. Exercising Your Rights
-------------------------------------------------------------------------------- 17
6. Cookies and Other Tracking Technologies
---------------------------------------------------------- 17
6.1. Types of Cookies
--------------------------------------------------------------------------------------- 18
6.2. Managing Cookies
-------------------------------------------------------------------------------------- 18
7. International Data Transfers
------------------------------------------------------------------------------ 18
7.1. Legal Mechanisms for Data Transfers
------------------------------------------------------------- 19
7.2. Data Protection Safeguards
-------------------------------------------------------------------------- 20
7.3. User Rights and Compliance
------------------------------------------------------------------------ 20
7.4. Third-Party Service Providers
------------------------------------------------------------------------ 21
8. Data Security
-------------------------------------------------------------------------------------------------- 21
8.1. Technical Safeguards
--------------------------------------------------------------------------------- 21
8.1.1. Encryption
----------------------------------------------------------------------------------------- 21
8.1.2. Access Controls
--------------------------------------------------------------------------------- 22
8.1.3. Network Security
-------------------------------------------------------------------------------- 22
8.2. Administrative Safeguards
---------------------------------------------------------------------------- 23
8.2.1. Security Policies and Procedures
------------------------------------------------------------ 23
8.2.2. Training and Awareness
----------------------------------------------------------------------- 23
8.2.3. Risk Management
------------------------------------------------------------------------------- 24
8.3. Physical Safeguards
----------------------------------------------------------------------------------- 24
8.3.1. Data Center Security
--------------------------------------------------------------------------- 24
8.3.2. Device Security
---------------------------------------------------------------------------------- 25
8.4. Security Audits
------------------------------------------------------------------------------------------ 25
8.4.1. Regular Assessments
-------------------------------------------------------------------------- 25
8.4.2. Continuous Monitoring
------------------------------------------------------------------------- 25
8.4.3. Compliance Audits
------------------------------------------------------------------------------ 26
8.5. User Responsibilities
---------------------------------------------------------------------------------- 26
8.5.1. Account Security
--------------------------------------------------------------------------------- 26
8.5.2. Security Best Practices
------------------------------------------------------------------------ 26
9. Children’s Privacy
------------------------------------------------------------------------------------------- 27
9.1. Age Restrictions
---------------------------------------------------------------------------------------- 27
9.1.1. Intended Audience
------------------------------------------------------------------------------ 27
9.2. Collection of Personal Information
------------------------------------------------------------------ 27
9.2.1. Inadvertent Collection
-------------------------------------------------------------------------- 27
9.3. Data Deletion Procedures
---------------------------------------------------------------------------- 28
9.3.1. Identification of Data
---------------------------------------------------------------------------- 28
9.3.2. Secure Deletion
---------------------------------------------------------------------------------- 28
9.4. Compliance with Applicable Laws
------------------------------------------------------------------ 28
9.4.1. Children’s Online Privacy Protection Act (COPPA)
-------------------------------------- 28
9.4.2. General Data Protection Regulation (GDPR)
--------------------------------------------- 29
4
9.5. Reporting and Addressing Concerns
--------------------------------------------------------------- 29
9.5.1. Reporting Mechanism
-------------------------------------------------------------------------- 29
9.5.2. Parental Rights and Controls
----------------------------------------------------------------- 30
9.6. Technical and Organizational Measures
---------------------------------------------------------- 30
9.6.1. Data Minimization
------------------------------------------------------------------------------- 30
9.6.2. Data Security Measures
----------------------------------------------------------------------- 30
10. Changes to This Privacy Policy
------------------------------------------------------------------------ 31
11. Contact Us
---------------------------------------------------------------------------------------------------- 31
5
StikBook Inc. ("we", "us," or "our") is dedicated to maintaining the privacy of our users
and treating their personal information in a secure manner when they access or interact
with our social media platform (the "App"). Our Privacy Policy sets out our approach to
the collection, use, disclosure, and retention of your personal information in accordance
with applicable Canadian privacy legislation, including the Personal Information
Protection and Electronic Documents Act (PIPEDA). By using or otherwise accessing the
App, you approve of the collection, use, disclosure, and processing of your personal
information in accordance with this Privacy Policy. This Privacy Policy is meant to help you
understand what information we collect, why we collect it, and how you can update,
manage, or delete that information.

1. Information We Collect

As you use our services, there are different ways we process it:

1.1. Personal Information

For the purpose of running and improving the App's functionality, StikBook Inc. gathers
and uses a variety of personal information from its users. The following lists the types of
personal data that are gathered and how they are used:

1.1.1. Identification Data

In order to register users and maintain their accounts, including identity verification and
customer support, personal identifiers like name, email address, phone number, date of
birth, and postal address are needed. Additionally, this data is used to respond to user
inquiries, updates, and problems pertaining to their accounts; customize user interfaces;
offer features and content that are specific to the interests of each user; and fulfill legal
requirements, including those pertaining to age verification and other regulations.
6
1.1.2. Account Information

To provide safe access to users' accounts and to authenticate users during the login
process, login credentials, including passwords, usernames, and security questions, are
gathered. Additionally, by using multi-factor authentication and other security measures,
this information helps users restore their accounts in the event that they lose or forget
their login credentials.

1.1.3. Profile Data

In order to promote user interaction and engagement on the platform by showing profile
information to other users, users may choose to add bios, photographs, and other general
information to their profiles. This information is collected. Additionally, this data is utilized
to facilitate user connections and the sharing of interests and social media links, as well
as to offer personalized content recommendations based on user interests and profile
information.

1.1.4. User Content

In order for users to share content with others and take part in social interactions on the
platform, any media (pictures, videos, audio), comments, likes, messages, or other
content that users create and post via the App are gathered. This information is also
utilized to analyze and control user-generated content in order to make sure that it
complies with community standards, stop harmful or unlawful content from spreading,
and increase user engagement by letting users interact with content that has been shared
by others.

1.1.5. Communications Data

To offer messaging services and promote user communication, the content of messages
sent through the app is gathered, along with time and date meta tags. Additionally, this
information is utilized to comply with legal obligations, such as keeping communication
logs for regulatory purposes, and to respond to user questions and offer customer
assistance via the App's contact channels.
7
1.1.6. Payment Information

To execute financial transactions, such subscription payments and in-app purchases,
information like credit card numbers, billing addresses, and transaction histories are
gathered. Along with these other uses, this data is also utilized to detect and stop financial
transaction fraud, create and deliver billing statements and invoices to users, and adhere
to record-keeping protocols and financial rules.

1.1.7. Metadata

Timestamped images, location information, and interaction statistics are just a few
examples of the information that is gathered about user content in order to index user-
generated content for search and retrieval, examine user interactions with content to
enhance user engagement tactics, and use interaction data to personalize content
recommendations that will improve user experiences.

1.1.8. Device Information

In order to improve platform security, technical information is gathered, including IP
addresses, browser types, operating systems, and device identifiers. This information is
used to monitor and identify potential security threats, provide technical support,
troubleshoot device compatibility issues, and optimize platform performance and
functionality across various devices and browsers.

1.1.9. Interaction Data

Information about how users interact with the platform—such as the pages they visit, the
features they use, and how long they stay on it—is gathered in order to assess how well
the platform is performing and pinpoint areas for development, improve user experience
overall by learning about user behavior and preferences, and create new features and
services based on patterns of user interaction.
8
1.1.10. Financial Data

To monitor and handle financial transactions, including purchases and subscriptions, data
is gathered pertaining to financial transactions, including payment methods, billing
details, transaction history, and subscription data. In addition, this information is needed
to maintain accurate records, adhere to financial requirements, administer user
subscriptions, and offer associated services.

1.1.11. Location Data

GPS data, or location data obtained from an IP address, is gathered to offer location-based
services and features, such as suggestions and localized content, whether the data is
particular (like coordinates) or general (like city). In addition, this data is utilized to meet
regulatory requirements for the collecting and use of location data, as well as to evaluate
user location data for market research and platform optimization.

1.2. Automatically Collected Information

When you engage with the App, StikBook Inc. may automatically gather certain
information about your device and usage habits. The purpose of collecting this data is to
enhance the platform's general security and functionality while also improving user
experience.

1.2.1. Device Information

The purpose of collecting device-specific information from users is to monitor and detect
potential security threats and unauthorized access, ensure compatibility, optimize the
performance of the application on various devices and operating systems, provide
technical support, and troubleshoot device-specific issues. Device-specific information
includes the model of the device, operating system version, unique device identifiers (like
IP address), and browser type.
9
1.2.2. Usage Data

The purpose of gathering data on user interactions with the app is to track its
effectiveness, find areas for development, comprehend user behavior and preferences,
and improve the overall user experience. This data includes the functionality used, pages
visited, and frequency of interactions.

1.2.3. Log Data

Log files that record system actions, which may contain error reports, crash information,
and other diagnostic data, are collected to diagnose and resolve technical issues and
system errors, perform regular maintenance and updates, and conduct security audits
and monitor for any suspicious activity.

1.2.4. Location Data

GPS data or location data derived from an IP address, whether specific (e.g., coordinates)
or general (e.g., city), is gathered in order to offer location-based services and content
tailored to the user's location, analyze location data for platform optimization and market
research, and improve security by monitoring on location data for any odd or suspicious
activity.

1.3. Information from Third Parties

From time to time, StikBook Inc. may obtain information about you from third-party
sources to enhance and provide our services. This information is collected to supplement
the data we already have and to provide a more comprehensive user experience.

1.3.1. Social Media Accounts

Information from your social media accounts (including Facebook and Instagram) when
you link third-party platform accounts with StikBook is collected to enrich your StikBook
profile with additional information from your social media accounts. This data is also used
to enable seamless integration with social media platforms, allowing users to share
content and interact with their social networks, as well as to provide personalized content
recommendations based on your social media activity and interests.
10
1.3.2. Non-Listed Payment Processors

Information from third-party payment providers used for processing and validating your
payment transactions is collected to verify and validate payment transactions to ensure
accuracy and prevent fraud, generate and send accurate billing statements and invoices,
and comply with financial regulations and record-keeping requirements.

1.3.3. Advertising Partners

Information from advertising partners about your interactions with advertisements and
promotional content is collected to deliver personalized advertisements based on your
interests and interactions with ads, analyze the effectiveness of advertising campaigns,
and optimize ad strategies. This data is also used to gain insights into audience behavior
and preferences for targeted marketing efforts.

1.3.4. Analytics Providers

Information from third-party analytics providers about your usage and interaction with
the App is collected to analyze user behavior and interaction patterns to improve the
App's functionality and user experience, develop new features, optimize existing ones,
and monitor the performance of the App.

1.3.5. Publicly Available Sources

Information from publicly available sources, such as public profiles, websites, and online
directories, is collected to supplement user profiles with additional publicly available
information, conduct market research and analysis for business development purposes,
and verify the accuracy of user-provided information to ensure data integrity.

2. How We Use Your Information

StikBook Inc. uses the personal information collected from users for various purposes to
provide, maintain, and enhance the functionality of the App, as well as to comply with
legal obligations. The detailed uses are outlined below:
11
2.1. Provision of Services

Personal information is used by StikBook Inc. to provide services including transaction
processing, customer assistance, account maintenance, and guaranteeing the App's
availability and operation. Personal data is used to give customer support services,
answer questions, troubleshoot problems, and handle complaints. It also aids in the
management of user accounts, including verification and authentication. Additionally, it
makes financial transactions possible, such as in-app purchases and subscription
payments. Personal information also facilitates system updates and maintenance, which
helps guarantee the App's availability.

2.1.1. Media Sharing and Social Functionality

StikBook Inc. collects personal information to enable media sharing and enhance social
interactions on the platform. This includes sharing content such as photos, videos, and
audio, and providing messaging services that facilitate user communication. Personal
information also supports social networking features, allowing users to connect with
others, follow profiles, and engage in interactions.

2.2. Tailoring and Modifying

Personal information allows StikBook Inc. to personalize user experiences, tailoring
content recommendations based on user interests, interactions, and profiles. It helps
customize user experiences by adjusting features and updates to individual preferences.
Personal data also allows for ad personalization, delivering tailored advertisements and
promotional content. Additionally, StikBook Inc. uses personal data to gather and analyze
user feedback for developing new features and improving existing ones. Usage data helps
identify opportunities for platform optimization.
12
2.3. Analytics and Improvement

StikBook Inc. uses personal information for performance monitoring, including
monitoring the App’s system performance to identify areas for improvement, diagnosing
errors, resolving technical issues, and conducting security audits. Personal data also helps
analyze user behavior to understand interaction patterns and preferences. It supports
engagement strategies and market research efforts to enhance user retention and inform
business development.

2.4. Marketing and Communication

StikBook Inc. uses personal information for marketing purposes, sending promotional
content, marketing communications, and updates about new features, in line with user
preferences and legal requirements. It also manages subscription preferences for
marketing communications. Furthermore, personal information is used for user
communications, including important service announcements, updates, and surveys to
collect user feedback.

2.5. Compliance with Applicable Law

In accordance with Canadian privacy laws such as PIPEDA and CASL, personal information
is processed to fulfill legal requirements. In addition, it facilitates the processing of legal
requests from courts, regulatory organizations, and law enforcement. By putting security
measures in place to safeguard user data and stop unwanted access, StikBook Inc. uses
personal data to identify and stop fraudulent activity.

3. Sharing Your Information

StikBook Inc. may share personal information with third parties to provide and enhance
the App’s functionality, comply with legal obligations, and protect the rights and safety of
users.
13
3.1. Service Contractors

StikBook Inc. Third-party service providers to help with analytics, hosting, data storage,
and payment processing. While analytics providers assist in analyzing user behavior,
hosting providers supply the infrastructure required to host the application. Financial
transactions are managed by payment processors. Service providers are required by
StikBook Inc. to sign confidentiality agreements, guaranteeing that personal data is
utilized solely for its intended purpose and safeguarded by suitable security measures.

3.2. Legal and Regulatory Disclosures

Legal requirements, such as subpoenas, court orders, or other government demands, may
mandate the disclosure of personal information. In any investigation pertaining to fraud,
criminal activity, or other legal problems, StikBook Inc. may collaborate with law
enforcement and regulatory organizations. In addition to defending the company's legal
rights, personal information may also be provided to safeguard user safety and public
security.

3.3. Business Transfers

Personal data may be transferred along with corporate assets in the case of a merger,
acquisition, or business change. The requirements of this privacy policy and the
implementation of privacy measures will need to be adhered to by the new company.
Subject to legal and privacy safeguards, personal data may be transferred as part of asset
liquidation in bankruptcy or insolvency cases.

4. Data Retention and Deletion

StikBook Inc. is committed to retaining personal information only for as long as necessary
to fulfill the purposes for which it was collected, comply with legal obligations, resolve
disputes, and enforce agreements. The detailed data retention and deletion practices are
outlined below:
14
4.1. Retention Periods

Personal data is retained only for the duration necessary to fulfill the purposes for which
it was collected, as outlined in this Privacy Policy. Retention periods may vary based on
legal requirements, industry standards, and regulatory obligations. Specifically, account
information is retained for as long as the user maintains an active account on the App,
and upon account deletion, personal information will be securely deleted or anonymized,
except where retention is required by law. Payment information is retained for the
duration necessary to complete transactions and maintain accurate financial records, as
required by financial regulations. User content is retained as long as necessary to provide
services and facilitate user interactions, and it will be deleted or anonymized upon user
request or account deletion, subject to legal retention obligations. Communications data
is retained for a period necessary to address user inquiries, provide customer support,
and comply with legal requirements. Log data is retained for security audits, error
diagnosis, and system maintenance.

4.2. Anonymization and Deletion

Anonymized personal data is used to enable statistical analysis and research without
identifying specific users when it is no longer required for its intended use. Anonymized
data can be utilized for analytics, research, and enhancing the usability and functioning
of the app. Users may request that StikBook Inc. remove their personal data, and the
company will consider and handle this request in compliance with relevant legal
requirements and data retention guidelines. To guarantee that it cannot be retrieved or
accessed, personal data will be safely erased from StikBook Inc.'s systems using industry-
standard techniques.
15
4.3. Legal and Regulatory Compliance

StikBook Inc. keeps personal information for as long as is required to fulfill legal
requirements, including those pertaining to data protection, finance, and tax laws. In
order to comply with regulatory obligations, retention periods for records of transactions,
communications, and user interactions may be extended. In the event of legal actions or
investigations, personal data may be kept until the problem is resolved. It may also be
kept for the length of time required to settle disputes and uphold agreements.

5. Your Data Rights

Under applicable data protection laws, including the Personal Information Protection and
Electronic Documents Act (PIPEDA), users have certain rights regarding their personal
information. StikBook Inc. is committed to respecting and facilitating these rights.

5.1. Right of Access

Users have the right to request access to their personal information held by StikBook Inc.,
including information about the data collected, the purposes of processing, and any third
parties with whom the data has been shared. StikBook Inc. will respond to access requests
within the time frame specified by applicable laws and provide the requested information
in a structured, commonly used, and machine-readable format. Users may request a copy
of their personal information in a format that allows for easy review and transfer, and
StikBook Inc. is committed to transparency in data processing, providing users with clear
and understandable information about their data.

5.2. Right of Correction

Users have the right to request the correction or amendment of their personal data if it
is inaccurate or incomplete. StikBook Inc. will promptly update or correct any inaccuracies
in user data upon receiving a valid request. The company takes reasonable steps to ensure
that personal data is accurate, complete, and up-to-date, and users are encouraged to
keep their personal information up-to-date and accurate by notifying StikBook Inc. of any
changes.
16
5.3. Right to Withdraw Consent

Where StikBook Inc. relies on user consent to process personal data, users have the right
to withdraw that consent at any time. Withdrawal of consent may affect the functionality
of certain services offered by the App, and StikBook Inc. will inform users of any such
impact. Users can also opt out of receiving marketing communications by following the
unsubscribe instructions provided in each message, and they can manage their cookie
preferences through browser settings or the App's cookie management tools.

5.4. Right to Request Deletion

Users have the right to request the deletion of their personal data, and StikBook Inc. will
evaluate and process such requests in accordance with applicable laws and data retention
policies. Deletion requests may be subject to legal and regulatory restrictions, including
data retention obligations. Personal data will be securely deleted from StikBook Inc.'s
systems using industry-standard methods to ensure that it cannot be recovered or
accessed, and users will receive confirmation once their data has been deleted.

5.5. Right to Data Portability

Users have the right to request the transfer of their personal data to another service
provider in a structured, commonly used, and machine-readable format, and StikBook
Inc. will facilitate data transfer requests where technically feasible. Data portability allows
users to have greater control over their personal information and facilitates the transfer
of data between service providers. StikBook Inc. aims to ensure interoperability by
providing data in formats that are widely accepted and used.

5.6. Right to Object to Processing

Users have the right to object to the processing of their personal information on grounds
relating to their particular situation. Users can object to the processing of their data for
direct marketing purposes at any time. StikBook Inc. will evaluate and respond to
objections to processing in accordance with applicable laws. If a valid objection is raised,
StikBook Inc. will cease processing the personal data in question, unless there are