Privacy and Data Governance Policy

Effective Date: February 11, 2026

Welcome to Followers Bucket. We prioritize the integrity of your personal information and are committed to transparent data practices. This policy outlines how we manage, protect, and utilize your data in alignment with global privacy standards, including GDPR and CCPA.

1. Scope of Data Collection

We collect data to provide and improve our social media growth services. This includes:

  • Voluntarily Provided Data: Information you share during account creation or purchase, such as your name, email address, and social media handles.
  • Automated Information: Technical data collected via cookies and logs, including IP addresses, browser types, and usage patterns to optimize platform performance.

2. Service Integration and Third-Party Sharing

To deliver a high-quality experience, we integrate with industry-standard third-party providers. Your data is shared exclusively for service performance with:

  • Secure hosting infrastructure.
  • Professional Email Service Providers (ESPs).
  • Encrypted payment processors.

Our Commitment: We do NOT sell, rent, or trade your personal data to third parties for marketing or any other purposes.

3. Cross-Border Data Transfers

As a global service, your information may be transferred across international borders. We ensure all such transfers are governed by Standard Contractual Clauses (SCCs) and adhere to recognized Data Privacy Frameworks to maintain a consistent level of protection regardless of location.

4. User Agency and Rights

You maintain full control over your personal data. Under the "Right to be Forgotten" and other global regulations, you may request:

Access
A report of the data we hold about you.
Correction
Updates to any inaccurate or incomplete information.
Deletion
Permanent removal of your personal data from our systems.

To exercise these rights, please contact our privacy team. We commit to honoring all valid opt-out or deletion requests within 14 days.

5. Data Security Standards

We employ robust technical and organizational measures to defend your data against unauthorized access, alteration, or disclosure. Our infrastructure is regularly audited to meet modern security benchmarks.