Data Flow Diagram

Overview of our data flow.

Update Date: 2025 Eylül

Data Processing Flow

Below is a diagram showing the data flow and processing within the Vybeo platform. This diagram illustrates our data management processes designed for KVKK, GDPR, and CCPA compliance.

1

Data Collection

  • Data provided by the user during registration (email, password, name, gender)
  • Technical data automatically collected (IP address, device information, estimated location)
  • Chat interaction data generated during sessions (messages, start/end times)
2

Data Processing

  • Processing user preferences for matching algorithm
  • Behavioral analysis for security and moderation
  • Anonymized usage statistics for service improvement
3

Data Storage

  • Passwords: Secure storage with bcrypt hashing
  • Sensitive data: Storage with AES-256 encryption
  • Retention periods: Defined storage policies according to data type
4

Data Sharing

  • No third-party sharing except when legally required
  • Use of anonymized and aggregated data for analysis
  • Contracts with GDPR-compliant data processors
5

Data Deletion

  • Data deletion upon user request
  • Automated data cleanup (when retention period expires)
  • Deletion of all personal data when account is removed

Detailed Data Flow

Detailed explanation of each step

1

Data Collection

Collected Data:

  • Data provided by the user during registration (email, password, name, gender)
  • Technical data automatically collected (IP address, device information, estimated location)
  • Chat interaction data generated during sessions (messages, start/end times)

Data Collection Process:

3

Data Storage

Storage Features:

  • Passwords: Secure storage with bcrypt hashing
  • Sensitive data: Storage with AES-256 encryption
  • Retention periods: Defined storage policies according to data type

Secure Data Storage

4

Data Sharing

Controlled Data Sharing

Sharing Policies:

  • No third-party sharing except when legally required
  • Use of anonymized and aggregated data for analysis
  • Contracts with GDPR-compliant data processors
5

Data Deletion

Deletion Procedures:

  • Data deletion upon user request
  • Automated data cleanup (when retention period expires)
  • Deletion of all personal data when account is removed

Secure Data Deletion

Security Measures

Measures taken to ensure data security:

Encryption

Industry‑standard encryption methods are used during transmission and storage.

AES-256 Encryption

Access Control

Strict access controls and permission management with RBAC are enforced.

Role-Based Access Control (RBAC)

Regular Audits

Annual security audits and penetration tests are conducted.

Regular Audit

Interactive Data Flow Chart

An interactive chart visualizing data flow

1 2 3 4 5 Collection Processing Storage Sharing Deletion

Questions About Data Flow?

If you want to learn more about how your data is processed, please contact us.