Thank you for using the EzPiano service! This Privacy Policy explains the personal data thatEzPiano Ltd. (“EzPiano”, “us”, “us” or “our”) collects about you, how we use your personal data, and what you may do with your personal data. choose.

Your trust is important to us and we understand the importance of personal information to you. We will collect personal information from you within a reasonable and necessary scope in accordance with the requirements of laws and regulations. We make every effort to take appropriate security protection measures through reasonable and effective information security technology and management process to prevent your information from being leaked, damaged or lost. In view of this, our company formulates this “Privacy Agreement” and reminds you to pay attention to:

This Agreement applies to EzPiano products and services. It should be noted that this agreement does not apply to services provided by third parties to you, such as jumping to third-party websites, clients or programs through this website, and the personal information you provide to the third-party service provider does not apply to this agreement. .

This agreement mainly explains to you:

1. What information we collect about you.

2. How we use your information.

3. Under what circumstances do we share your information.

4. How we store your information.

5. How we protect your information.

6. Your Rights.

7. Our Policy Regarding Children.

8. Amendments and Notices of Privacy Policy.


1. What information we collect about you.

We collect your information based on the principles of lawfulness, reasonableness and necessity. When providing you with a specific service, we will clearly inform you of the information we will collect and its purpose to respond to your specific service request. Depending on the service you choose, we may collect one or more of the following information in the following scenarios:

1.1 In order to help us understand the operation of this product, we will use mobile analysis software such as Umeng Data Statistics SDK. We may log relevant information such as your frequency of use, crash data, overall usage, performance data, etc. We do not associate the information stored in the analytics software with any of your personal information.

1.2 When you download or use this product, we may read information related to your mobile device, such as hardware model, IMEI number or other unique device identifier, MAC address, IP address, operating system version and the information used to access the service. device settings.

1.3 When you use this product service, we will automatically receive and record the information on your browser and computer, such as your IP address, browser type, language used, access date and time, software and hardware feature information and data such as web page records that you need.

1.4 When you use the services of this product, we may read information related to your location, such as the GPS signal of the device or the nearby WLAN access point, information about cell phone signal transmission towers, country code, city code, mobile network Code, cell ID, latitude and longitude information and language settings.

1.5 It is important to note that individual device information and service log information are information that cannot identify the identity of a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or use it in combination with personal information, such non-personal information will be considered personal information during the combined use, unless authorized by you Or unless otherwise provided by laws and regulations, we will anonymize and de-identify such information.

1.6 In addition, we may also collect other information, such as the questionnaire responses you send us when you participate in a questionnaire; and the information you provide to us when you interact with us.

1.7 In order to improve the security of your use of this product and services, protect your or the public’s personal and property safety from infringement, and better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions and other security risks, more accurate We may use or integrate your device interaction information, web log information, and information that we have obtained your authorization or shared in accordance with the law to prevent security incidents and take necessary records in accordance with the law. , audit, analysis, disposition measures.

1.8 If the information you provide contains personal information of other users, you need to ensure that you have obtained legal authorization before providing such personal information to us. If we use the information for other purposes not specified in this agreement, or use the information collected for a specific purpose for other purposes, or if we actively obtain your personal information from a third party, we will obtain your prior consent. 

1.9 Exceptions to authorization and consent: You fully understand and agree that we do not need your authorization and consent to collect and use your personal information under the following circumstances, and we may not respond to your corrections/modifications, deletions, cancellations, withdrawals Consent, request for information:

  • 1.9.1 Related to national security and national defense security;
  • 1.9.2 Related to public safety, public health, and major public interests;
  • 1.9.3 Those related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and execution of judgments;
  • 1.9.4 In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent;
  • 1.9.5 Your personal information disclosed to the public by yourself;
  • 1.9.6 Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
  • 1.9.7 Necessary in accordance with the signing and performance of relevant agreements or other written documents with you;
  • 1.9.8 Necessary for maintaining the safe and stable operation of the products and/or services provided, such as finding and disposing of malfunctions of the products and/or services;
  • 1.9.9 Necessary for legitimate news reporting;
  • 1.9.10 When it is necessary for academic research institutions to carry out statistical or academic research based on public interests, and when providing academic research or description results, the personal information contained in the results is de-identified;
  • 1.9.11 Other situations stipulated by laws and regulations. 


 2. How we use your information

2.1 We will keep your personal data up to date; store or destroy it securely; minimise the collection and retention of data we need to provide you with services; protect personal information from disclosure, misuse, unauthorized access and disclosure ; Take appropriate technical measures to protect the security of your personal information.

2.2 We use your information for the following purposes:

  • 2.2.1 To provide other services requested by you as described when we collect the information.
  • 2.2.2 For internal management and back-office support, share your contact information with the company’s branches around the world.
  • 2.2.3 To maintain the integrity and security of the data technology systems in which we store and process your personal information.
  • 2.2.4 To enforce or protect our agreement or contract with you.
  • 2.2.5 Detect and investigate information breaches, illegal activity and fraud.
  • 2.2.6 Contact you to resolve the issue.
  • 2.2.7 Other uses with your permission.
  • 2.3 It should be noted that the above use methods cover the main ways we use your information. From time to time, we may provide users with more diverse services by updating the pages of our website. When we want to use the information for other purposes not specified in this agreement, or use the information collected for a specific purpose for other purposes, we will seek your consent again in the form of updating this agreement.

3. How we share your information

We will not share your personal information with companies, organizations and individuals outside of EzPiano, with the following exceptions:

3.1 Sharing under statutory circumstances: We may share your personal information externally in accordance with laws and regulations, litigation and dispute resolution needs, or as required by administrative and judicial authorities in accordance with the law.

3.2 Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

3.3 Sharing with affiliated companies: In order to facilitate us to provide services to you and protect the personal and property safety of the public from infringement, your personal information may be shared with our affiliated companies and/or their designated service providers. We will only share necessary personal information and are bound by the purpose stated in this agreement. If we share your personal sensitive information or our affiliates change the purpose of use and processing of personal information, we will seek your authorization and consent again.

3.4 Sharing with authorized partners: We may entrust authorized partners to provide you with certain services or perform functions on our behalf, and we will only share your information for the legal, legitimate, necessary, specific and explicit purposes stated in this agreement, Authorized Partners have access only to the information they need to perform their duties and may not use this information for any other purpose.

  • 3.4.1 Authorized partners of advertising and analysis services. We will not share your personally identifiable information with partners that provide advertising and analytics services unless we have your permission. We entrust these partners with information related to ad reach and effectiveness, but do not provide your personally identifiable information, or we de-identify this information so that it does not personally identify you. Such partners may combine the above information with other data that they have lawfully obtained in order to carry out our commissioned advertising services or decision-making recommendations.
  • 3.4.2 Suppliers, Service Providers and Other Partners. We send information to suppliers, service providers and other partners who support our business, including technical infrastructure services entrusted by us, analysing how our services are used, measuring the effectiveness of our services, providing customer service, Payment to facilitate or conduct academic research and surveys.

3.5 We will not transfer your personal information to any company, organization and individual, except in the following cases:

  • 3.5.1 Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
  • 3.5.2 In the event of a merger, acquisition or bankruptcy liquidation of a DynamicTile service provider, or other situations involving merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will request a new company or organization that holds your personal information. Continue to be bound by this agreement, otherwise we will require the company, organization and individual to seek authorization from you again.

4. How we store your information

Unless otherwise required by law, this website will keep your information for the following period:

4.1 During your use of the EzPiano service, we will continue to save your information for you.

4.2 When you stop using the EzPiano service, we will stop using your personal information and delete your personal information within a certain period.

4.3 After your personal information is anonymized and desensitized, it will form usable circulating data, and we do not need your consent for the storage and use of this data.


5 Protection of personal information

On the premise of paying attention to information security, we make every effort to take reasonable technical and management measures to protect your personal information, in order to maximize the protection of your personal information.
For the purpose of protecting information security, your personal information will be encrypted or anonymized, or processed by technical means commonly used in the industry, reasonable and in compliance with laws and regulations.
The company provides a complete information security supervision mechanism, including the use, access, and sharing of data that require strict authorization.
Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if we do our best to strengthen security measures, it is not always possible to ensure that information is 100% secure.
You accept and understand that there may be unexpected and uncontrollable information security issues during the use of the company’s applications. We also recommend that you take active measures to protect the security of personal information, such as using complex passwords, changing passwords regularly, and not disclosing personal information to third parties.
On the basis of the above reasonable and effective measures, we further establish an information security handling plan to ensure that emergency plans are activated when information security problems occur, and strive to prevent the impact and consequences of these security incidents from expanding.
Information security problems caused by your personal reasons, especially problems caused by the use of this application environment, are not within the scope of the company’s personal information security protection.


6. How we protect your information

5.1 We have taken reasonable and feasible security protection measures in line with industry standards to protect your information and prevent personal information from unauthorized access, public disclosure, use, modification, damage or loss. For example, the exchange of data between your browser and the server is protected by SSL protocol encryption; we will also use encryption technology to improve the security of personal information; we will use trusted protection mechanisms to prevent malicious attacks on personal information; we We will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will conduct security and privacy protection training courses to enhance employees’ awareness of the importance of protecting personal information.

5.2 The Internet is not an absolutely safe environment. When using the products or services of this website, we strongly recommend that you do not send your information by means of communication other than those recommended by this website. You can connect and share with each other through our services.

5.3 In the event of an unfortunate personal information security incident, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and your suggestions for self-prevention and risk reduction , remedies for you, etc. We will inform you of the relevant circumstances of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the personal information subjects one by one, we will publish announcements in a reasonable and effective way. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.



7. Your rights

6.1 Your personal information is completely owned by you. The company fully protects your personal management authority over the personal information submitted to the company. You can modify your personal information in this application at any time. When you modify your personal information, you should follow the requirements of national laws and regulations.

6.2 In the process of using the company’s application, we will clearly publicize the necessary permissions that need to be applied for, and will also clearly inform the entire content of this privacy agreement. Unless authorized by you, these permissions will not be opened. At the same time, you can also turn off these permissions in the device operating system. For permissions, such as GPS geographic location, address book, camera, microphone, photo album, etc., if the permissions are not necessary in the application, closing or denying the authorization will not affect the use of the application.

Please know that the necessary permissions will affect the main use of the application. If you refuse to authorize the necessary permissions or disable the necessary authorization in the device operating system, it will affect your use of the application.

When using this app, we will explicitly apply to you for authorization of necessary permissions, and will only enable these permissions after you agree and authorize.

6.3 We provide a complete account deletion function. In order to avoid the possibility of account theft, we need to verify the ownership of your account, and you need to provide some proof materials, such as personal information, account status, historical records, etc.
Please know that account deletion is an irreversible process. After you cancel your account, we will delete relevant information about you or perform anonymization, unless otherwise provided by laws and regulations.


8. Our policy on children

Our Platforms are not intended for use by children (under the age of 13 or higher as required by applicable law). We do not knowingly collect or solicit any personal data or serve interest-based advertising to children, nor do we knowingly allow children to register or use the platform. Children should not use our platform and should not send us any personal data about themselves at any time. If we learn that we have inadvertently collected personal data from a child, we will take reasonable steps to delete this information from our records immediately. If you think we may have information about a child, please contact us. The email address is:


9. Amendments and Notices of Privacy Policy

For the development of business and technology and the purpose of providing better services, we will revise this privacy agreement in due course. After the release of the newly revised privacy agreement, it will completely replace the previous version of the privacy agreement. Please check the relevant content in a timely manner. without notice