Data Flow Diagram
Overview of our data flow.
Data Processing Flow
Below is a diagram showing the data flow and processing within the Vybeo platform. This diagram illustrates our data management processes designed for KVKK, GDPR, and CCPA compliance.
Data Collection
- Data provided by the user during registration (email, password, name, gender)
- Technical data automatically collected (IP address, device information, estimated location)
- Chat interaction data generated during sessions (messages, start/end times)
Data Processing
- Processing user preferences for matching algorithm
- Behavioral analysis for security and moderation
- Anonymized usage statistics for service improvement
Data Storage
- Passwords: Secure storage with bcrypt hashing
- Sensitive data: Storage with AES-256 encryption
- Retention periods: Defined storage policies according to data type
Data Sharing
- No third-party sharing except when legally required
- Use of anonymized and aggregated data for analysis
- Contracts with GDPR-compliant data processors
Data Deletion
- Data deletion upon user request
- Automated data cleanup (when retention period expires)
- Deletion of all personal data when account is removed
Detailed Data Flow
Detailed explanation of each step
Data Collection
Collected Data:
- Data provided by the user during registration (email, password, name, gender)
- Technical data automatically collected (IP address, device information, estimated location)
- Chat interaction data generated during sessions (messages, start/end times)
Data Collection Process:
Data Storage
Storage Features:
- Passwords: Secure storage with bcrypt hashing
- Sensitive data: Storage with AES-256 encryption
- Retention periods: Defined storage policies according to data type
Secure Data Storage
Data Sharing
Controlled Data Sharing
Sharing Policies:
- No third-party sharing except when legally required
- Use of anonymized and aggregated data for analysis
- Contracts with GDPR-compliant data processors
Data Deletion
Deletion Procedures:
- Data deletion upon user request
- Automated data cleanup (when retention period expires)
- Deletion of all personal data when account is removed
Secure Data Deletion
Security Measures
Measures taken to ensure data security:
Encryption
Industry‑standard encryption methods are used during transmission and storage.
Access Control
Strict access controls and permission management with RBAC are enforced.
Regular Audits
Annual security audits and penetration tests are conducted.
Interactive Data Flow Chart
An interactive chart visualizing data flow
Questions About Data Flow?
If you want to learn more about how your data is processed, please contact us.