Privacy Policy

Effective Date: November 2, 2025

1. Definitions and Interpretation

This Privacy Policy ("Policy") governs the collection, processing, and use of Personal Data by DLRednote ("Company," "we," "us," or "our"), a service provider operating the website accessible at downloadrednote.com ("Service," "Platform," or "Website").

Definitions:

  • "Personal Data" means any information relating to an identified or identifiable natural person
  • "Processing" means any operation performed on Personal Data, including collection, storage, use, and deletion
  • "Data Subject" means the natural person to whom Personal Data relates
  • "Third Party" means any natural or legal person other than the Data Subject, Company, or authorized processors
  • "Content" means videos, images, text, and other materials available on RedNote (小红书) platform

2. Categories of Personal Data Collected

We collect and process the following categories of Personal Data in accordance with applicable data protection laws:

2.1 Data Provided Voluntarily

  • Service Data: RedNote URLs submitted for content downloading purposes
  • Communication Data: Information contained in correspondence, feedback, or support requests
  • User-Generated Content: Any content, comments, or materials voluntarily submitted

2.2 Automatically Collected Technical Data

  • Network Identifiers: IP addresses, device identifiers, and network connection information
  • Technical Specifications: Browser type, version, operating system, and device characteristics
  • Usage Analytics: Access logs, session duration, page views, and interaction patterns
  • Geolocation Data: Approximate geographic location derived from IP address
  • Tracking Technologies: Cookies, web beacons, and similar technologies as detailed in Section 8

2.3 Legal Basis for Processing

We process Personal Data based on the following legal grounds:

  • Legitimate Interest: To provide, maintain, and improve our Service
  • Contractual Necessity: To fulfill service requests and maintain platform functionality
  • Legal Compliance: To comply with applicable laws, regulations, and legal processes
  • Consent: Where explicitly provided for specific processing activities

3. Purposes and Lawful Processing

We process Personal Data for the following specific, explicit, and legitimate purposes:

3.1 Service Provision and Operation

  • Facilitating content downloading requests from RedNote platform
  • Maintaining platform functionality, availability, and performance
  • Processing and responding to user requests and technical support
  • Ensuring service reliability and troubleshooting technical issues

3.2 Analytics and Service Improvement

  • Analyzing usage patterns to optimize platform performance and user experience
  • Conducting statistical analysis for service enhancement and development
  • Monitoring service health, security, and operational metrics
  • Identifying and preventing fraudulent, abusive, or unauthorized usage

3.3 Legal and Regulatory Compliance

  • Complying with applicable laws, regulations, and governmental requests
  • Responding to legal process, court orders, and law enforcement requests
  • Protecting our legal rights, interests, and those of our users
  • Investigating and preventing violations of our terms of service

3.4 Data Processing Principles

All processing activities adhere to the following principles:

  • Data Minimization: We collect only data necessary for specified purposes
  • Purpose Limitation: Data is used solely for declared purposes
  • Accuracy: We maintain accurate and up-to-date information
  • Storage Limitation: Data is retained only as long as necessary
  • Security: Appropriate technical and organizational measures protect data

4. Intellectual Property Rights and Copyright Compliance

CRITICAL LEGAL NOTICE - INTELLECTUAL PROPERTY RIGHTS

Ownership Declaration: All Content accessed, downloaded, or processed through our Service remains the exclusive intellectual property of: (i) the original content creators, (ii) RedNote Inc. (小红书), and/or (iii) other rightful copyright holders. The Company makes no claim of ownership, license, or proprietary interest in any downloaded Content.

User Liability: Users assume full legal responsibility for ensuring compliance with all applicable intellectual property laws, including but not limited to copyright, trademark, and publicity rights. Unauthorized use may result in civil and criminal penalties.

4.1 Service Limitations and Disclaimers

  • Technical Facilitation Only: Our Service functions solely as a technical intermediary tool
  • No Content Verification: We do not verify, validate, or guarantee the legal status of any Content
  • No License Grant: Use of our Service does not constitute a license to use, distribute, or modify Content
  • Platform Independence: We are not affiliated with, endorsed by, or acting on behalf of RedNote Inc.

4.2 User Obligations and Compliance Requirements

By using our Service, you covenant and warrant that you will:

  • Obtain all necessary permissions, licenses, or authorizations before downloading Content
  • Comply with all applicable copyright laws, fair use provisions, and intellectual property regulations
  • Respect the terms of service, community guidelines, and usage policies of RedNote platform
  • Not use downloaded Content for commercial purposes without explicit authorization from rights holders
  • Provide appropriate attribution and credit to original creators when legally required or ethically appropriate
  • Immediately cease use of any Content upon notice of infringement or violation

4.3 DMCA and Copyright Infringement Policy

We respect intellectual property rights and respond to valid notices under the Digital Millennium Copyright Act (DMCA). If you believe your copyrighted work has been infringed through our Service, please provide written notice containing:

  • Identification of the copyrighted work claimed to be infringed
  • Identification of the allegedly infringing material and its location
  • Your contact information and electronic signature
  • A statement of good faith belief that use is not authorized
  • A statement of accuracy and authority to act on behalf of the copyright owner

5. Data Sharing, Disclosure, and Third-Party Processing

5.1 General Prohibition on Data Sales

We do not sell, rent, lease, trade, or otherwise monetize Personal Data to Third Parties for commercial purposes. Any data sharing is conducted in accordance with this Policy and applicable data protection regulations.

5.2 Permitted Disclosures

We may disclose Personal Data in the following limited circumstances:

  • Legal Compulsion: When required by applicable law, regulation, legal process, or governmental request
  • Law Enforcement: To comply with court orders, subpoenas, or lawful requests from public authorities
  • Rights Protection: To protect and defend our legal rights, property, or safety, and that of our users
  • Service Providers: With authorized processors and vendors under strict contractual confidentiality obligations
  • Business Transactions: In connection with mergers, acquisitions, or asset transfers, subject to equivalent privacy protections
  • Consent: With your explicit, informed consent for specific disclosure purposes

5.3 Third-Party Service Providers

We engage carefully vetted Third-Party processors to assist with Service operations. These relationships are governed by:

  • Comprehensive data processing agreements with privacy and security requirements
  • Contractual limitations on data use, retention, and sub-processing
  • Regular audits and compliance monitoring of processor activities
  • Immediate notification requirements for any data breaches or incidents

5.4 International Data Transfers

Personal Data may be transferred to, processed, or stored in jurisdictions outside your country of residence. Such transfers are conducted with appropriate safeguards, including:

  • Adequacy decisions by relevant data protection authorities
  • Standard contractual clauses approved by supervisory authorities
  • Binding corporate rules or certification mechanisms
  • Explicit consent where legally required

6. Data Security and Protection Measures

6.1 Security Framework

We implement comprehensive technical, administrative, and physical safeguards designed to protect Personal Data against unauthorized access, alteration, disclosure, destruction, or loss. Our security program includes:

6.2 Technical Safeguards

  • Encryption: Data in transit and at rest is protected using industry-standard encryption protocols
  • Access Controls: Multi-factor authentication and role-based access restrictions
  • Network Security: Firewalls, intrusion detection systems, and secure network architectures
  • Vulnerability Management: Regular security assessments, penetration testing, and patch management
  • Monitoring: Continuous monitoring for suspicious activities and security incidents

6.3 Administrative Safeguards

  • Personnel Security: Background checks and security training for authorized personnel
  • Data Governance: Documented policies and procedures for data handling and protection
  • Incident Response: Established procedures for detecting, responding to, and reporting security incidents
  • Vendor Management: Security requirements and assessments for Third-Party service providers

6.4 Data Breach Notification

In the event of a data breach that poses a risk to your rights and freedoms, we will:

  • Notify relevant supervisory authorities within 72 hours where legally required
  • Inform affected Data Subjects without undue delay when high risk is determined
  • Provide clear information about the nature, scope, and potential consequences of the breach
  • Detail the measures taken to address the breach and prevent future occurrences

6.5 Security Limitations and User Responsibilities

Important Disclaimer: While we employ robust security measures, no system is completely secure. Internet transmission and electronic storage inherently carry security risks. Users are responsible for:

  • Maintaining the confidentiality of any account credentials
  • Using secure networks and updated software when accessing our Service
  • Promptly reporting any suspected security incidents or unauthorized access
  • Understanding that complete security cannot be guaranteed

7. Cookies and Tracking Technologies

7.1 Types of Tracking Technologies

We employ various tracking technologies to enhance functionality, analyze usage patterns, and improve user experience:

  • Essential Cookies: Necessary for basic site functionality and security
  • Analytics Cookies: Collect aggregated usage statistics and performance metrics
  • Functional Cookies: Remember user preferences and settings
  • Web Beacons: Track email interactions and page view analytics
  • Local Storage: Store data locally for improved performance and functionality

7.2 Cookie Management and User Control

You maintain control over cookie settings through various mechanisms:

  • Browser Settings: Configure cookie acceptance, blocking, and deletion preferences
  • Opt-Out Tools: Use industry-standard opt-out mechanisms for analytics tracking
  • Do Not Track: We honor Do Not Track signals where technically feasible
  • Granular Control: Manage specific cookie categories through our cookie preference center

7.3 Third-Party Analytics and Advertising

We may utilize Third-Party analytics services that employ their own tracking technologies. These services are subject to their respective privacy policies and may include:

  • Google Analytics for website usage analysis
  • Umami Analytics for privacy-focused analytics
  • Other analytics providers as disclosed in our cookie policy

Important Note: Disabling certain cookies may impact Service functionality and user experience.

8. Third-Party Services

Our website may contain links to third-party websites or integrate with third-party services. We are not responsible for the privacy practices of these external services.

9. Data Retention

We retain your information only as long as necessary to provide our services and comply with legal obligations. Download requests and associated data are typically processed and deleted within a short timeframe.

10. Your Rights

Depending on your location, you may have the right to:

  • Access your personal information
  • Correct inaccurate information
  • Request deletion of your information
  • Object to processing of your information
  • Data portability

11. Children's Privacy

Our service is not intended for children under 13 years of age. We do not knowingly collect personal information from children under 13.

12. Changes to This Policy

We may update this Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page and updating the "Last updated" date.

13. Limitation of Liability and Disclaimers

IMPORTANT LEGAL DISCLAIMERS

The following limitations and disclaimers are fundamental to our Service provision and constitute essential terms of your use of our platform.

13.1 Service Disclaimers

AS-IS BASIS: Our Service is provided on an "as-is" and "as-available" basis without warranties of any kind, either express or implied, including but not limited to warranties of merchantability, fitness for a particular purpose, non-infringement, or course of performance.

  • We do not warrant that the Service will be uninterrupted, secure, or error-free
  • We make no representations about the accuracy, reliability, or completeness of any Content
  • We disclaim all liability for any damages arising from use of Third-Party content or platforms
  • Technical functionality and availability are subject to various factors beyond our control

13.2 Limitation of Liability

MAXIMUM LIABILITY CAP: To the fullest extent permitted by applicable law, our total liability for any claims arising from or related to this Policy or the Service shall not exceed the amount paid by you (if any) for using the Service in the twelve (12) months preceding the claim.

EXCLUDED DAMAGES: We shall not be liable for any indirect, incidental, special, consequential, or punitive damages, including but not limited to:

  • Loss of profits, revenue, or business opportunities
  • Loss of data, information, or content
  • Cost of substitute services or products
  • Personal injury or property damage
  • Reputational harm or emotional distress

13.3 Indemnification

You agree to indemnify, defend, and hold harmless the Company, its officers, directors, employees, and agents from and against any claims, liabilities, damages, losses, costs, or expenses arising from:

  • Your use of the Service or violation of this Policy
  • Your infringement of any intellectual property or other rights of Third Parties
  • Your violation of any applicable laws or regulations
  • Any Content you download, use, or distribute through our Service

14. Governing Law and Dispute Resolution

14.1 Governing Law

This Privacy Policy and any disputes arising hereunder shall be governed by and construed in accordance with the laws of [Jurisdiction], without regard to its conflict of law principles.

14.2 Dispute Resolution

Any disputes, claims, or controversies arising from or relating to this Policy shall be resolved through:

  • Informal Resolution: Good faith negotiations between the parties for thirty (30) days
  • Binding Arbitration: Individual arbitration under applicable arbitration rules
  • Class Action Waiver: No class actions, class arbitrations, or representative proceedings
  • Jurisdiction: Exclusive jurisdiction in courts of [Jurisdiction] for non-arbitrable matters

14.3 Severability

If any provision of this Policy is deemed invalid, illegal, or unenforceable, the remaining provisions shall remain in full force and effect, and the invalid provision shall be modified to the minimum extent necessary to make it enforceable.

This Privacy Policy is effective as of the date listed above and governs our collection, use, and disclosure of your information when you use our RedNote video downloading service.