Privacy Policy
We respect your privacy and make our best efforts to protect it.
To facilitate your login, use of related services, and to provide you with a more personalized user experience and service, we may collect and use your relevant information when you use our services. We will take security protection measures in accordance with legal requirements to ensure your user information remains secure and controlled. Through this privacy statement, we would like to explain how we collect, use, store and disclose your information when using QuickEasy (collectively referred to as “the Service”), as well as how we provide you with access, updates, control and protection of this information.
If you are a user from mainland China, we will collect and use your personal information in accordance with the “Cybersecurity Law of the People’s Republic of China”, “Information Security Technology - Personal Information Security Specification” (GB/T 35273-2017) and other relevant laws and regulations to provide you with QuickEasy products and/or services. We typically only collect your personal information with your consent. In some cases, we may also collect personal information based on legal obligations or contractual necessity, or we may need personal information to protect your vital interests or those of others.
Your use of our services means that you agree to our collection, use, storage and disclosure of your relevant information in accordance with this privacy statement, as well as the control and protection measures provided to you. We hope to clearly introduce how we handle your information through this privacy policy, so we recommend that you read this privacy policy in full to help you understand how to maintain your privacy rights.
I. Scope of Statement
The “information” in this privacy policy specifically refers to the information collected in Section II.
II. Scope of Information Collection
- 2.1 To complete necessary activities such as QuickEasy account registration, management, and real-name verification, you need to submit true, legal, and valid information, including but not limited to name, contact person, email, contact phone number, contact address information, etc.
- 2.2 To provide continuous service and ensure service quality, during your use of this service, we will record and save your login and service usage information, including but not limited to IP address, browser type, language used, access date and time, hardware and software characteristics, user identifiers and webpage browsing records, etc.
III. How Information is Collected
-
3.1 We collect your information through your active submission and records generated during your use of our services
-
3.2 We may collect and use your information through Cookies and other related technologies. Our specific uses of Cookies include:
- Remembering your identity. For example: Cookies help us identify you as our registered user;
- Analyzing your use of our services to provide you with more personalized services, recommendations, etc.
-
3.3 You can refuse or manage Cookies through browser settings. However, please note that if you disable Cookies, you may not enjoy the best service experience, and the availability of certain functions may be affected.
-
3.4 Information recorded through QuickEasy Cookies will be subject to this privacy statement.
IV. Information Use
To provide you with better, more convenient, and secure services, subject to relevant laws and regulations, we may use the collected information for the following purposes:
- Providing services to you;
- Meeting your personalization needs. For example, language settings, location settings, personalized help services and instructions, or responding to you and other users in other aspects;
- Service optimization and development. For example, we will optimize our services based on information generated when the QuickEasy system responds to your needs;
- Protecting QuickEasy, QuickEasy users and QuickEasy partners. For example, we will use your information for identity verification, security prevention, complaint handling, dispute coordination, fraud monitoring, etc. For example, when you use security features or other similar services, we will detect malicious programs or viruses, or identify fraudulent information for you;
- Providing you with more relevant services. For example, providing you with similar features or services that you might be interested in;
- Inviting you to participate in surveys about our products and services;
- Other scenarios that may require the use of collected information. If the usage scenario has no reasonable correlation with the initial scenario, we will obtain your consent again before using the information.
V. Information Disclosure
Without your consent, we will not share your information with any unrelated third parties, except in the following circumstances:
-
5.1 With the continuous development of our business, we and our affiliates may undergo mergers, acquisitions, asset transfers, or similar transactions, and your information may be transferred as part of such transactions. We will comply with relevant laws and regulations, notify you before the transfer, ensure information confidentiality during the transfer, and continue to fulfill corresponding responsibilities and obligations after the change.
-
5.2 We may also disclose your information for the following reasons:
To comply with applicable laws, regulations, and other relevant provisions; To comply with court judgments, rulings, or other legal proceedings; To comply with requirements of relevant government authorities or other authorized bodies; When we have reason to believe compliance with laws and regulations is required; For purposes reasonably necessary to execute relevant service agreements or this privacy statement, maintain public interest, handle complaints/disputes, protect our customers, us or our affiliates, other users or employees’ personal and property safety or legitimate rights and interests. Circumstances where you have legally authorized disclosure. If we disclose your information for the above reasons, we will promptly inform you while complying with relevant laws, regulations, and this statement.
VI. Information Storage
- 6.1 Information collected by QuickEasy about you is stored on QuickEasy servers located in mainland China.
- 6.2 Usually, we only retain your information during the period we provide services to you, and the retention period will not exceed the time necessary to fulfill the relevant purposes of use.
- 6.3 However, in the following circumstances, and only for purposes related to these circumstances, we may need to retain your information or part of it for a longer period: - To comply with applicable laws, regulations, and other relevant provisions; - To comply with court judgments, rulings, or other legal proceedings; - To comply with requirements of relevant government authorities or other authorized bodies; - When we have reason to believe compliance with laws and regulations is required; - For purposes reasonably necessary to execute relevant service agreements or this privacy statement, maintain public interest, handle complaints/disputes, protect our customers, us or our affiliates, other users or employees’ personal and property safety or legitimate rights and interests.
VII. Information Security
-
7.1 We strive to ensure information security to prevent information loss, improper use, unauthorized viewing or disclosure.
We use various security technologies to ensure information security. For example, we will prevent information leakage, damage, and loss through server backup, password encryption, and other security measures; we establish strict management systems and processes to ensure information security. For example, we strictly limit the range of personnel who can access information, conduct audits, and require them to comply with confidentiality obligations; we attach importance to information security compliance work and have established good coordination and communication mechanisms with regulatory authorities and third-party evaluation institutions to timely resist and handle various information security threats, providing comprehensive protection for your information security; however, please understand that due to technical limitations and possible malicious means, even with our best efforts to strengthen security measures, it’s impossible to ensure 100% information security in the internet environment. You need to understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control.
-
7.2 In the event of personal information leakage or other security incidents, we will activate emergency plans, prevent the security incident from expanding, report in a timely manner according to relevant provisions such as the “National Network Security Incident Emergency Response Plan”, and inform you of relevant circumstances through email, push notifications, announcements, etc., and provide you with security recommendations.
-
7.3 To more effectively protect your information security, we also hope you can strengthen your self-protection awareness. We only assume responsibility within the scope where QuickEasy directly causes your personal information leakage, therefore, please properly maintain your account and password information to avoid personal information leakage. Unless you judge it necessary, do not provide your account password and other personal information to any third party.
VIII. Access and Control
- 8.1 You can access, modify, and delete your relevant information while using our services. How you access, modify, and delete information will depend on the specific services you use.
- 8.2 If you find that we collect or use your information in violation of laws, regulations, or our agreement, you can request us to delete it. If you find that the information we collect and store about you is incorrect and you cannot correct it yourself, you can also request us to correct it.
- 8.3 When accessing, modifying, and deleting relevant information, we may require you to verify your identity to ensure account security. Please understand that due to technical limitations and legal requirements, some of your requests may not be responded to.
- 8.4 Based on legal requirements, information security, and other legitimate reasons, some of your information may not be accessible, modifiable, or deletable.
- 8.5 You can choose to withdraw your consent for certain non-basic functions or services to process your information, and choose to cancel your QuickEasy account by contacting QuickEasy administrators and filing appeals.
- 8.6 If you have questions about the implementation of the above rights, you can contact us through the relevant contact methods in “X. Contact Us”
IX. Changes
We may revise the terms of this privacy statement from time to time, and such revisions constitute part of this Privacy Policy. When changes may substantially reduce your rights under this privacy statement or expand the scope of information collection and use, we will notify you before the revision takes effect through prominent notices on the homepage, sending you emails, or other means. In such cases, if you continue to use our services, it means you agree to be bound by the revised privacy statement.
X. Contact Us
If you have any questions or suggestions about these terms, please contact us as instructed on this page: Submit Feedback. We will promptly review the issues involved and respond within thirty days after verifying your user identity.
XI. Glossary
Terms used in this privacy protection guide have the following definitions in general:
Personal Information: Personal information refers to various information recorded electronically or in other ways that can identify a natural person’s identity alone or in combination with other information, including but not limited to a natural person’s name, date of birth, ID number, personal biometric information, address, phone number, etc.
Personal Sensitive Information: Personal sensitive information refers to personal information that, if leaked, illegally provided, or misused, may endanger personal and property safety, or easily lead to personal reputation damage, physical and mental health harm, or discriminatory treatment. For example, personal sensitive information includes ID numbers, personal biometric information, bank account numbers, communication content, health and physiological information, etc.
Device: Device refers to equipment that can be used to access QuickEasy products and/or services, such as desktop computers, laptops, tablets, or smartphones.
Unique Device Identifier: A unique device identifier (Exclusive ID or UUID) refers to a string of characters embedded in the device by the device manufacturer that can uniquely identify the corresponding device (such as a phone’s IMEI number). Unique device identifiers have multiple uses, including providing advertising when cookies cannot be used (such as in mobile applications).
IP Address: Each internet-connected device is assigned a number called an Internet Protocol (IP) address. These numbers are usually assigned based on geographic regions. IP addresses can usually be used to identify the location where a device connects to the internet.
SSL: SSL (Secure Socket Layer) is a security protocol implemented on the transmission communication protocol (TCP/IP). SSL supports various types of networks while providing three basic security services, all achieved through the use of public key and symmetric key technology to achieve information confidentiality.
Information Collection Technology: The “automatic collection” mentioned in the QuickEasy Privacy Protection Guide includes the following methods: A. Cookie Cookie is a small text file that the website server places in the client (your computer, mobile phone, or other smart terminal) when you browse web pages. When you visit the corresponding website again, the website can recognize your browser through cookies. Cookies may store user preferences and other information. You can configure your browser to reject all cookies or display prompts when websites send cookies. However, without cookies, some website functions or services may not work properly. Please refer to the QuickEasy Cookie Guide for details. B. Web beacon Web beacon is an electronic image file or other technology embedded in websites or emails that can be used to count visitors, record whether and when you read emails or websites, or used to use certain cookies. C. Log files Log files store certain automatically collected data. Such data includes Internet Protocol (IP) address, browser type, Internet Service Provider (ISP), referring/exit pages, operating system, date/time stamp, and clickstream data, etc. D. ET Tag ET Tag is an HTTP protocol header transmitted between internet browsers and internet servers that can replace cookies to track individual users, allowing us to better understand and improve our services. E. JavaScript JavaScript is a programming language used to create more interactive and dynamic web pages. JavaScript can set cookies, read cookies, and delete cookies.
Affiliated Companies: Refers to any company or institution that currently or in the future controls, is controlled by, or is under common control with one party. “Control” means having the ability to directly or indirectly influence the management of the mentioned company, whether through ownership, voting shares, contract, or other legally recognized means.
Algorithm: The process or series of rules that computers follow when performing problem-solving calculations.
Application Data Cache: Application data cache refers to a data storage mechanism on devices. It has many benefits, such as allowing network applications to run without internet connection and improving related application performance by increasing content loading speed.
Browser Web Storage: The “browser web storage” mechanism allows websites to store data in the device’s browser. When using this mechanism in “local storage” mode, data can be stored across sessions. This way, users can still access the corresponding data even after closing and reopening the browser. One of the technologies that helps implement web storage is HTML 5.
Account: As long as you register an account and provide us with some personal information (as explained in Section 3.1 of this guide), you can use our services. When you access QuickEasy, the system uses this account information to authenticate your identity to prevent unauthorized access to your account.
Non-Personal Identity Information: Information recorded related to users but cannot directly or indirectly identify your identity, including personal information provided through de-identification, anonymization, or pseudonymization.
De-identification: Refers to the process of technical processing of personal information so that personal information subjects cannot be identified without additional information.
Anonymization: Refers to the process of technical processing of personal information so that personal information subjects cannot be identified and the processed information cannot be restored.
Server Logs: Like most websites, our servers automatically record webpage requests you make when visiting the website. These “server logs” typically include your web request, Internet Protocol address, browser type, browser language, request date and time, and one or more cookies that can uniquely identify your browser.