We are well aware of users' concerns about the security of personal information and the importance of user information. As a party providing products and/or services, we have the obligation and responsibility to ensure that user information and privacy are properly protected. We will strictly comply with the requirements of laws and regulations to take corresponding security protection measures, regulate our behavior, and strive to ensure the security of user information and privacy. Your trust is very important to us. Based on this, we have specially formulated the "Privacy Policy Agreement" (hereinafter referred to as "this Agreement"), through which we will elaborate in detail how we will collect, use, store and protect your user information and how you can manage your user information, so that you can make better choices.
Before you start using our products and/or services, please be sure to read and understand this Agreement carefully and make sure that you fully understand and agree to this Agreement before starting to use it. In addition to this Agreement, in specific scenarios, we will also explain to you the corresponding information collection purpose, scope and usage through instant notifications (including pop-ups, page prompts, etc.), function update instructions, etc. These instant notifications and function update instructions constitute part of this Agreement and have the same effect as this Agreement. We try to explain the professional terms involved in this Agreement to you in a concise and popular way so that you can understand it.
Your agreement to this Agreement indicates that you have understood the products and/or services we provide, as well as the necessary user information required for the operation of the corresponding product and/or service functions (please note that the user information described in this Agreement may include personal information and/or sensitive personal information), and have given the corresponding collection and use authorization.
I. Scope of application of this policy
1.1 This policy applies to the various products and services provided to you by this website and new forms of applications that emerge with the development of technology. If there is a separate privacy policy or similar legal document in the products or services provided to you by us and our affiliates, such separate documents shall prevail.
1.2 This policy does not apply to services provided to you by other third parties. Your information processing and protection matters shall be subject to the privacy policies or similar documents of such third parties. We do not bear any legal responsibility for any third party's improper use or disclosure of the information provided by you.
1.3 It should be noted that if you provide services to your users again, you should agree on a privacy policy or similar legal document with your users in accordance with relevant legal requirements.
II. How we collect and use your personal information
2.1 We will follow the principles of legitimacy, legality, necessity, integrity, openness, transparency and quality assurance to collect your personal information for the purposes, methods and scope described in this statement, including personal information you proactively provide to us, personal information generated or retained during your use of our products and/or services, and personal information obtained from third parties with your authorization or as permitted by laws and regulations. If the information we collect contains any of your sensitive personal information, we will obtain your separate consent or meet other legal bases required by laws and regulations in accordance with the requirements of laws and regulations. If you refuse to provide personal information collected to achieve the necessary purpose, you may not be able to use the corresponding functions. We will collect the following personal information for the following purposes:
2.1.1 Information collected when you register and log in to your account
(1) When you create an account, you must provide us with your email address, password, and confirm your login password. The email address you submit is used to receive verification codes when you register, log in, bind your account, and retrieve your password, and is used as one of the contact methods designated by you and Easy Link to receive relevant business notifications (such as new product launches, service changes, etc.). If you refuse to provide the above information, you will not be able to register an Easy Link account and can only use browsing and search services.
2.1.2 Information collected when you perform real-name authentication
According to laws and regulations, you need to complete real-name authentication when using the Easy Link service. If you are unable to complete or refuse to perform real-name authentication, you will not be able to use the Easy Link service.
(1) When you perform personal real-name authentication: If you choose to perform face recognition authentication, we need to collect your name, ID number and face information.
(2) When you perform corporate real-name authentication, we need to collect the name and ID number of your corporate contact. At the same time, you need to submit your corporate name, social credit code, and business license image to Easy Link. Easy Link will use the information you submit only as Easy Link to complete your real-name authentication.
Please be aware that we will only use the aforementioned information to verify your identity and record and store the verification results, and will not store such sensitive personal information for other purposes that you have not explicitly authorized.
You are aware and understand that identity document information and biometric information of facial features are necessary to authenticate your real identity in accordance with legal requirements. The above information contains your sensitive personal information. Once leaked or used illegally, it may cause your personal dignity to be violated or your personal and property safety to be endangered. Please carefully consider what method to use for identity verification. However, if you refuse to provide us with any of the above identity verification information, we will not be able to complete your true identity verification and provide you with corresponding technical services.
2.1.3 Information collected when you perform security settings
To protect the security of your Easy Link account, when you use the Easy Link account security setting service, we need to collect your mobile phone number and email address as a security verification method. However, if you refuse to provide us with any of the above information, we will not be able to provide you with corresponding technical services.
2.1.4 Information collected when you purchase and use Easy Link services online
(1) When you purchase and use Easy Link services by remittance, we need to collect your order information, remitter name, remittance bank name, remittance bank card number, remittance amount, and remittance date information from the receiving bank to complete the recharge to your designated Easy Link account.
(2) To help you complete the order payment, you need to provide Easy Link with some information related to the completion of the transaction, including the product and/or service information of the transaction, the transaction amount, the order time, the order number, the order status, the payment method, the payment serial number, the payment status and other necessary information required by the anti-money laundering law. We collect this information to help you complete the transaction smoothly, ensure your transaction security, query the order information, provide customer service, etc. If you refuse to provide us with the above information, we will not be able to provide you with the corresponding technical services.
2.1.5 In order to provide continuous cloud services and ensure the quality of cloud services, during your use of Easy Link services, we will collect and save the relevant information about your login and use of the service (but will not include the operations after entering the service). The relevant information specifically includes:
(1) Operation records, we will receive and record your operation records and related log information when using the Easy Link service.
2.1.6 Information collected when you use after-sales service
When you request our support or service through the work order system, service hotline, intelligent customer service, etc., we need to collect your name or account information, email address, mobile phone number, business information (such as company name, industry, position) and your consultation records, call recordings and the content you actively submit to us (such as text, pictures, videos). If you refuse to provide the above information, we will not be able to contact you in time for after-sales service.
2.2 When you use specific cloud services, your other personal information may be collected in addition. For specific personal information protection rules, please refer to the privacy protection statement disclosed by the specific cloud service.
2.3 In order to follow up your needs in a timely manner, we may enter the contact information or account data (including name, email address, phone number, position), your company basic information and project service information you provide into our customer relationship management system. The service consultant connected with you will have the right to view the above information and contact you when necessary.
2.4 We will take necessary compliance measures to ensure the security of your information. If you have any questions, you can log in to the Easy Link official website, submit a work order or call the customer service hotline directly to contact us. We will respond to your request within 15 days.
2.5 According to relevant laws, regulations and national standards, we may process your relevant personal information in accordance with the law without seeking your authorization and consent in the following circumstances:
2.5.1 It is necessary for the personal information processor to perform legal obligations or statutory duties;
2.5.2 It is necessary to conclude and perform a contract to which you are a party;
2.5.3 It is necessary to respond to public health emergencies or to protect the life, health and property safety of natural persons in an emergency;
2.5.4 Carry out news reporting, public opinion supervision and other activities for the public interest, and process your personal information that you have disclosed yourself or other personal information that has been legally disclosed within a reasonable scope in accordance with the law;
2.5.5 Other circumstances stipulated by laws and administrative regulations.
2.6 If we collect your personal information beyond the purpose stated in this statement or beyond the scope of the purpose claimed at the time of collection and the scope that is directly or reasonably related, we will inform you again in accordance with the law before collection and obtain your explicit consent (except for cases where your consent is not required according to laws and regulations).
2.7 Please understand that the functions and services we provide to you are constantly updated and developed. If a function or service is not included in the above description but does need to process your information, we will explain the content, scope and purpose of information processing to you separately through updating this statement, page prompts, interactive processes, offline notifications, etc., and obtain your consent (except for cases where your consent is not required according to laws and regulations).
2.8 Circumstances in which other entities collect your information
You know and understand that when you use the Easy Link platform or jump to a third-party platform to use the services provided by a third-party entity, the third-party entity's processing of your information is not subject to this statement, but is subject to the privacy policy or similar documents of the third-party entity. We recommend that you read carefully and decide whether to be subject to the privacy policy of the third-party entity before using the services provided by the third-party entity through this platform or jumping to a third-party platform.
2.9 We will not disclose your personal information publicly. If it must be disclosed publicly, we will inform you of the purpose of the public disclosure, the type of information disclosed and the sensitive information that may be involved, and obtain your separate consent, unless otherwise provided by laws and regulations or otherwise agreed between us and you. You know and understand that when the state administrative or judicial authorities require us to provide your personal information in accordance with laws, regulations and regulatory provisions, we will cooperate and provide it in accordance with the requirements of the state administrative or judicial authorities.
III. How we use cookies and related technologies
3.1 To ensure normal operation and provide you with an easier access experience, we will store a small data file called Cookie (a very small text file) on your login device. For example: When you visit an information or service that requires you to log in to provide it, when you log in, we will encrypt and store your login identity in the cookie file of your computer. You do not need to do any additional work, all collection, storage and encryption work are automatically completed by the system. Cookies usually contain identifiers, site names, and some numbers and characters. Easy Link can only read Cookies provided by Easy Link.
3.2 Cookie files will be saved on your computer's hard drive or the flash memory of the device terminal, and they can only be read by the server that sets them. You can delete them at any time using the browser or operating system software with built-in cookie clearing function. You can manage cookies according to your preferences, and you can also clear all cookies saved on your computer. Most web browsers have the function of blocking cookies. But if you do this, you need to change the user settings every time you visit our website. For more information on how to change browser settings, please visit the relevant settings page of the browser you use.
3.3 In order to provide you with more convenient, fast and smooth services, we use Cookies for the following specific purposes:
3.3.1 Remember your identity. For example: Cookies are used to record information such as the currently logged in Easy Link account and identify your identity.
3.3.2 Recording behavior. For example: Cookies are used to track your access behavior and provide some personalized product purchase recommendations based on your access behavior.
3.4 You can reject or manage cookies through browser settings. However, please note that if you disable cookies, your account login function may be affected, and we will not be able to provide you with personalized product purchase recommendation services.
IV. How we protect and save your user information
4.1 Easy Link attaches great importance to the security of your information. We strive to take various reasonable physical, electronic and management security measures to protect your user information. Prevent user information from unauthorized access, public disclosure, use, modification, damage or loss. For example, we will use encryption technology to improve the security of user information; we will use trusted protection mechanisms to prevent user information from malicious attacks; we will deploy access control mechanisms to ensure that only authorized personnel can access user information; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting user information.
4.2 We will take reasonable and feasible measures to try our best to avoid collecting irrelevant user information. We will only retain your user information for the period required to achieve the purposes stated in this policy, unless permitted by law. After the above user information retention period, we will delete or anonymize your personal information.
4.3 Although we have taken reasonable and effective security measures in accordance with the requirements of relevant laws and regulations, due to technical limitations and possible malicious means, we cannot guarantee 100% information security. Please understand and understand that the systems and communication networks we provide may be affected by factors beyond our control and may cause problems. Therefore, we strongly recommend that you take active measures to protect the security of personal information, such as using complex passwords, changing passwords regularly, and not disclosing account passwords and related personal information to others.
4.4 After an unfortunate user information security incident (leakage, loss, etc.), we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, your own suggestions for preventing and reducing risks, and your remedial measures. We will promptly inform you of the relevant circumstances of the incident by email, letter, telephone, push notification, etc. When it is difficult to inform the user information subject one by one, we will