How Vianium handles account, plugin, and operational data.
This policy describes data handling when a person or team uses Vianium for authentication, account linking, plugin execution, and operations from the dashboard, clients, or connected integrations.
1. Scope
Vianium is an execution layer for identity, OAuth, billing, media, observability, and connected modules. This policy covers the landing site, dashboard, Connect gateway, and linked-account flows exposed by the product.
Some Vianium deployments may be operated by customers or partners. In those cases, the operator of that environment may also act as the data controller toward their end users.
2. Data we collect
We collect identity and access data required to operate the account: email, name, derived credentials, session tokens, and authentication state.
When a person links a plugin, Vianium may store OAuth tokens, account identifiers, public profile data, and the minimum information required to operate that module.
- Threads: user identifier, username, name, avatar, approved scopes, and post, mention, or insight data when the user authorizes those permissions.
- Reddit, YouTube, and Drive: tokens, basic profile data, and resources needed to execute reads, publishing flows, or browsing within the module.
- WhatsApp: session state, contacts, chats, messages, media, and technical events when the user links a session in that environment.
- Billing and operations: plan state, billing events, technical logs, health signals, and service metrics.
3. How we use data
We use data to authenticate users, link external accounts, perform user-requested operations, protect sessions, debug incidents, and maintain service availability.
We do not use plugin data for purposes unrelated to the contracted product functionality. Actual scope depends on the enabled modules and the permissions granted by each user.
4. Security and protection
The system applies technical controls to reduce exposure and unauthorized access. In the current codebase, passwords use Argon2id, secrets and tokens are encrypted before persistence, and gateway sessions are managed with revocable JWTs.
The channel between the gateway and plugins can run with optional mTLS, and the platform keeps logs and metrics for system health, technical auditing, and operational response.
5. Retention and deletion
We keep data while the account, session, or linked integration remains active and for as long as needed for security, support, fraud prevention, contractual performance, or legal obligations.
When a user disconnects a plugin or requests account closure, Vianium removes or invalidates elements that are no longer needed, subject to the minimum retention period for security and audit records in that deployment.
6. Transfers and external integrations
When a user connects third-party services, some information is exchanged with those providers to complete OAuth, read resources, or publish content. That includes Meta Threads when the user links their Threads account.
Each external provider maintains its own policies and terms. Vianium only requests and processes the scope required for the function enabled in the relevant module.
7. Rights and requests
Users may request access, correction, connection revocation, or data deletion through the operator of the environment where they use Vianium.
If the request is related to a linked plugin, we also recommend revoking access from the corresponding external account to cut off any remaining provider-side permission.
For Threads or Meta review flows, this page acts as the public reference for the product’s data-handling posture.
Contact
Privacy and compliance requests should be directed to the operator of the Vianium deployment or to the support channel associated with the instance where the product is used.