Privacy Policy

Updated on: 01Day 05Month 2025Year

Effective date: 01Day 05Month 2025Year

This privacy policy section will help you understand the following:

1、Definition and Scope of Application

2、How do we collect and use your information

3、How do we use cookies and similar technologies

4、How do we share, transfer, and publicly disclose users' personal information

5、How do we protect user information security

6、How do you manage personal information

7、How to update this privacy policy

8、How to contact us

EZY-CONJUNCT PTY LTD(hereinafter referred to as "us") is well aware of the importance of personal information to you. We will provide sufficient protection for your personal information security in accordance with legal and regulatory requirements and in accordance with industry best practices. We are committed to maintaining your trust in us and adhering to the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of consent, the principle of minimum adequacy, and the principle of ensuring security, The principle of subject participation, the principle of openness and transparency, and so on. In view of this, we have formulated this Privacy Policy (hereinafter referred to as "this Policy/Privacy Policy") to help you fully understand how we collect, use, share, store, and protect your personal information during your use of our products/services, as well as how you manage your personal information.

Before using various products or services of this application, please carefully read and thoroughly understand this policy. After confirming full understanding and agreement, use the relevant products or services. Once you start using various products or services of this application, it means that you have fully understood and agreed to this policy. If you have any questions, opinions or suggestions regarding the content of this policy, you can contact us through the various contact information provided by this application.

Our product is developed based on DCloud uni app (5+App/Web2App), and during application operation, we need to collect your device unique identification code (device ID, IMEI/android ID/DeviceID/IDFA, device MAC address, OAID, software list, SIM card IMSI information) to provide statistical analysis services. We also improve performance and user experience through application startup data and abnormal error log analysis, providing better services for users. For more information, please visit the "DCloud User Service Terms". (DCloud User Service Terms hyperlink to https://ask.dcloud.net.cn/protocol.html ).

1、Definition and Scope of Application

Personal information: Various types of information recorded electronically or in combination with other information that can identify the identity of a specific natural person or reflect the activities of a specific natural person, Personal information includes (name, date of birth, ID number, personal biometric information, address, communication contact information, communication records and content, account password, property information, credit information, travel trajectory, accommodation information, health and physiological information, transaction information), etc.

Personal sensitive information: Personal information that, once leaked, illegally provided, or abused, may endanger personal and property safety, and can easily cause damage to personal reputation, physical and mental health, or discriminatory treatment, Personal sensitive information includes (ID number, personal biometric information, bank account, communication records and content, property information, credit information, travel trajectory, accommodation information, health physiological information, transaction information, personal information of children under 14 years old (including), etc.).

Personal information processing: including the collection, storage, use, processing, transmission, provision, disclosure, deletion, etc. of personal information.

Personal information deletion: refers to the act of removing personal information from systems involved in implementing daily business functions, leaving it in a state that cannot be retrieved or accessed.

Data anonymization of personal information: a process in which the subject of personal information cannot be identified or associated through the technical processing of personal information, and the processed information cannot be recovered.

Deidentification of personal information: The process of processing personal information through technology, making it impossible to identify or associate with the subject of personal information without the use of additional information.

Personal information subject: The natural person identified or associated with personal information.

Personal information controller: An organization or individual with the ability to determine the purpose, method, etc. of personal information processing.

Device information: including device identifiers (IMEI, IDFA, Android ID, MAC, OAID, IMSI, and other device related information), application information (application crash information, notification switch status, application installation list, and other application related information), device parameters and system information (device type, device model, operating system, and hardware related information), The device network environment information (IP address, WiFi information, base station information, and other network related information) shall be based on the actual collection of the product.

Children: Refers to minors who have not reached their fourteenth anniversary.

2、 How do we collect and use your information

The kinds of things you do on our app and website might mean we need to collect your personal information. If you want us to send you emails, for example, we’ll need to collect your email address. So, a lot of the time, you’ll know what info we’re collecting, and when. After all, you’ll be giving us the information yourself.

We might also collect non-personal information, like a list of the pages you look at on our app and website. We do this so that we can give you the most helpful, personal experience of our services. For example, we use it to suggest properties like the ones you look at most often. We often use cookies or other technology to collect this kind of info. So, you might not realise every time it’s happening.

Here are some of the common cases where we collect your personal information:1.You register to use our app and website through an account. 2.You log in to use our app and website through a social networking site account. 3.You subscribe to receive alerts or emails; fill in forms; create applications; complete surveys or research; and take part in promotions and competitions on our app and website or those of our service providers. 4.You contact us or our service providers for any reason. For instance, you might report a problem with our app and website, seek further services or ask for help. 5.You post on or add material to our app and websit. 6.You use our services and any credit provided by us in connection with those services.

What actual information are we talking about? It can include your:

full name

phone number

email address

real estate license

company name , address and ABN/ACN

profile photo/avatar

any other information you share with us.

What if you use our services through a social network, or log in here using your social network credentials? We’ll collect information from that social site, such as your:

user name

site ID

profile photo

email address.

If you subscribe to alert services on the app and website, of course we’ll need to collect your name and email address.

We might also use tracking technologies to collect non-personal information about you. Those technologies include cookies, web beacons, pixels and measurement software. And they might collect data about your activities on our app and website, including IP addresses. Our service providers might use cookies to collect information about your visits to our app and website. These tracking technologies can collect information about you even if you are not logged into our app and website, and we use this information to provide you with a more personalised experience and to further improve our products and services.

We may also collect your personal information through our other businesses, service providers and third parties. This helps us provide better, more relevant services and products to you.

In a nutshell, we use the personal information we collect about you to:

1. provide the products and services you ask for.

2. respond to your enquiries.

3. create and maintain your account.

4. make sure you follow our app and website terms of use.

5. offer you products and services that you might like.

More specifically, we use personal info we’ve collected to:

1. improve your security when you visit our websites.

2. present website content in the most effective way for you and your devices.

3. provide you with a better or more relevant service or product. For instance, we might help you save time by pre-filling a form with information you’ve already shared with us.

4. customise the services, experience, advertising and content you see on our app and website.

5. combine with info we’ve collected from service providers, third parties, cookies or web beacons. We do this to give you a more relevant, personalised experience. It raises the quality of our services, and third-party services, too.

6. reply to you, or give you the services, products, information and help that you ask for.

7. contact you to conduct research, and ask for feedback on our products, services or websites.

8. verify your identity and remind you of your credentials.

9. improve the quality and functionality of our products and services.

10. let you know about changes to our products and services.

Without your personal info, we may not be able to provide these services.

We use the information we collect through cookies and web beacons in line with this Privacy Policy, to do things like:

report statistics

analyse trends

deliver our services

diagnose problems

target and improve the quality of our products and services

provide more relevant services and advertising to you on our app and website, and on third-party websites. Our service providers and other third parties may do that, too.

3、How do we use cookies and similar technologies

1. Cookies

Cookies and similar device information identification technology are commonly used technologies in the Internet. When you use our services, we may use related technologies to send one or more cookies or anonymous identifiers (hereinafter referred to as "cookies") to your device to collect, identify, and store information about your access to and use of this product. We promise not to use cookies for any other purpose other than those stated in this privacy policy, We mainly use cookies to ensure the safe and efficient operation of our products and services. They can help us confirm the security status of your account and transactions, troubleshoot related anomalies such as crashes and delays, and help you avoid repeating the steps and processes of filling out forms and entering search content.

2. Website Beacons and Pixel Labels

In addition to cookies, we also use similar technologies such as website beacons and pixel labels on our website. A website beacon is usually a transparent image embedded in a website or email. With the help of pixel labels in emails, we can know if emails have been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

4、How do we share, transfer, and publicly disclose users' personal information

1. Sharing

We will not share your personal information with companies, organizations, or individuals outside of our application service provider, except for the following situations:

1.1 Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

1.2 Sharing under legal circumstances: We may share your personal information with others in accordance with laws and regulations, litigation dispute resolution needs, or as required by administrative or judicial authorities in accordance with the law.

1.3 Sharing with affiliated companies: In order for us to jointly provide services to you based on our affiliated account, your personal information may be shared with our affiliated companies. We will only share necessary personal information (if it is convenient for you to use our affiliated company's products or services using this application account, we will share your necessary account information with the affiliated company). If we share your personal sensitive information or if the affiliated company changes the purpose of using and processing personal information, we will seek your authorization and consent again.

1.4 Sharing with authorized partners: For the purposes stated in this privacy policy only, certain of our services will be provided jointly by us and authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, arranging partners to provide services. We will only share your personal information for legitimate, legitimate, necessary, specific, and clear purposes, and only share personal information necessary for providing services. Our partners have no right to use the shared personal information for other purposes unrelated to the product or service.

Please note that the information you voluntarily share or even publicly share when using our services may involve personal information or even sensitive personal information of you or others. Please consider and make a decision with greater caution.

Currently, our authorized partners include the following types:

1.4.1 Authorized partners for advertising and analysis services. Unless we obtain your permission, we will not share your personally identifiable information (referring to information that can identify you, such as name or email address, mobile phone number, through which you can be contacted or identified) with partners providing advertising and analysis services. We will provide these partners with information about their advertising coverage and effectiveness, without providing your personal identification information, or we will summarize this information so that it does not identify you personally. For example, only after advertisers agree to comply with our advertising guidelines can we possibly tell them how effective their advertisements are, or how many people have seen their advertisements or installed applications after seeing them, or provide these partners with personally identifiable statistical information to help them understand their audience or customers.

1.4.2 Suppliers, service providers, and other partners. We send information to suppliers, service providers, and other partners who support our business, including providing technical infrastructure services, analyzing the usage of our services, measuring the effectiveness of advertising and services, providing customer service, facilitating payment, or conducting academic research and research.

2. Transfer

We will not transfer your personal information to any company, organization, or individual, except for the following situations:

2.1 Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

2.2 When it comes to mergers, acquisitions, or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this personal information protection policy. Otherwise, we will require the company or organization to seek authorization from you again.

3. Public disclosure

We will publicly disclose your personal information under the following circumstances:

3.1 After obtaining your explicit consent;

3.2 Disclosure based on law: In cases where required by law, legal proceedings, litigation, or mandatory requirements of government authorities, we may publicly disclose your personal information.

4. Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing personal information

In the following situations, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent:

4.1 Related to personal information controllers fulfilling their obligations under laws and regulations;

4.2 Directly related to national security and national defense security;

4.3 Directly related to public safety, public health, and major public interests;

4.4 Directly related to Criminal investigation, prosecution, trial and judgment execution;

4.5 For the purpose of safeguarding the significant legitimate rights and interests of personal information subjects or other individuals, such as life and property, but it is difficult to obtain my authorized consent;

4.6 Personal information disclosed by the individual information subject to the public on their own;

4.7 Collecting personal information from legally disclosed information centers, such as legitimate news reports, government information disclosure, and other channels.

According to legal regulations, sharing or transferring personal information that has undergone deidentification processing, and ensuring that the data recipient cannot recover and re identify the personal information subject, does not constitute external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not require separate notice to you and your consent.

5、How do we protect user information security

We store personal information(including credit-realted information)we collect from you on our service and in data centres in the Australia, the United States of America, Europe and Asia (including in China, Singapore, Philippines and specifically). We may also store information securely in physical form at our offices.

These data centres provide secure storage, back-up and data retrieval services. We transfer your data to them so we can deliver the products and services you’ve asked for. When you give us your personal info, you give us your consent to store that info outside of Australia for these purposes.

1. We have used security measures that comply with De facto standard to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser and server, it is protected by SSL (Secure Socket Layer) protocol encryption (i.e. HTTPS protocol); We will use encryption technology to improve the security of personal information; We will use trusted protection mechanisms to prevent malicious attacks on personal information; We will deploy access control mechanisms to ensure that only authorized personnel can access personal information; And we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.

2. We have an industry-leading data security management system centered around the data lifecycle, which enhances the security of the entire system from multiple dimensions such as organizational construction, institutional design, personnel management, and product technology.

3. We will take reasonable and feasible measures to ensure that unrelated personal information is not collected. We will only retain your personal information for the period required to achieve the purposes stated in this policy, unless an extension of the retention period is required or permitted by law.

4. The Internet is not an absolutely secure environment, and we strongly recommend that you do not use communication methods other than those recommended by this application to send personal information. You can establish connections and share with each other through our services. When you create communication, trading, or sharing through our services, you can freely choose who to communicate, trade, or share with as a third party who can see your transaction content, contact information, exchange information, or share content and other related information.

If you find that your personal information, especially your account or password, has been leaked, please contact our customer service immediately so that we can take corresponding measures based on your application.

Please note that the information you voluntarily share or even publicly share when using our services may involve personal information or even sensitive information of yourself or others, such as when you choose to upload pictures containing personal information when posting updates or in public places such as group chats or circles. Please be more cautious when considering whether to share or even publicly share relevant information when using our services.

Please use complex passwords to assist us in ensuring the security of your account. We will do our best to ensure the security of any information you send us. At the same time, we will also report the handling of personal information security incidents in accordance with regulatory requirements.

6、How do you manage personal information

You can access and manage your information through the following methods, and we will respond to your request in compliance with legal and regulatory requirements:

1. Access your personal information

You have the right to access your personal information, except for exceptions specified by laws and regulations. You can access your personal information through the following methods:

Personal Information - If you wish to access or edit other information such name, phone number, email, license,company name, ABN/ACN, address in your personal information, you can do so by logging in to your account through "Me" - "My Profile".

2. Correct or supplement your personal information

When you discover that there are errors in the personal information we process about you, you have the right to request us to make corrections or supplements. You can apply for correction or supplementation through the methods listed in "(1) Access to your personal information" in this article.

3. Delete your personal information

You can delete some of your personal information through the methods listed in "(1) Accessing Your Personal Information" in this article.

In the following situations, you can request us to delete personal information through customer service:

3.1 If our handling of personal information violates laws and regulations;

3.2 If we collect and use your personal information without your explicit consent;

3.3 If our handling of personal information seriously violates our agreement with you;

3.4 If you no longer use our products or services, or if you cancel your account;

3.5 If we are no longer providing you with products or services.

If we decide to respond to your deletion request, we will also notify the parties who obtained your personal information from us as much as possible and require them to delete it in a timely manner (unless otherwise provided by laws and regulations, or if these parties have independently obtained your authorization).

After you or we assist you to delete relevant information, we may not be able to immediately back up the information in response to the deletion from the backup system due to the legal and security technology restrictions. We will securely store your personal information and limit any further processing until the backup can be clear or achieve Data anonymization.

4. Change the scope of your authorization and consent

Each business can require some basic personal information to be completed. In addition, for the collection and use of additional personal information, you can contact the customer service of this application to apply for or revoke your authorization consent.

Please note that for some types of personal information, we may not be able to respond to your request to change the scope of authorization if it is necessary for us to truthfully realize the basic functions of this application or fulfill our obligations under laws and regulations. After you revoke your authorization, we will no longer process the corresponding personal information, but your decision to revoke your authorization will not affect the personal information processing we conducted based on your authorization.

5. Constrained Information System Automatic Decision Making

In certain business functions, we may only make decisions based on non manual automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you can contact us through customer service.

6. Respond to your above request

To ensure security, you may need to provide a written request or otherwise prove your identity. We may require you to verify your identity before processing your request.

We will provide a response within 30 days. If you are not satisfied, you can also initiate a complaint through customer service on this application.

We do not charge any fees for your reasonable requests in principle, but for requests that are repeated multiple times and exceed reasonable limits, we will charge a certain cost according to the situation. We may refuse requests that are unfounded, require excessive technical means (such as developing new systems or fundamentally changing existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical (such as involving information stored on backup tapes).

In the following situations, according to legal and regulatory requirements, we will not be able to respond to your request:

6.1 Related to the fulfillment of obligations stipulated by laws and regulations by personal information controllers;

6.2 Directly related to national security and national defense security;

6.3 Directly related to public safety, public health, and major public interests;

6.4 Directly related to Criminal investigation, prosecution, trial and execution of judgment;

6.5 The personal information controller has sufficient evidence to indicate that the personal information subject has malicious intent or abuse of power by the supervisor;

6.6 For the purpose of safeguarding the significant legitimate rights and interests of personal information subjects or other individuals, such as life and property, but it is difficult to obtain my authorized consent.

6.7 The request of the corresponding personal information subject will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations;

6.8 Involving trade secrets.

7. Account cancellation

We will keep the data on your account for 180 days. If you do not wish to continue using our product, you can submit a cancellation application to us through My Settings Account Cancellation.

After you voluntarily cancel your account, we will stop providing you with products or services, and delete or Data anonymization your personal information according to the requirements of applicable laws, except for those required to be retained by laws and regulations.

If you are unable to access this personal information through the above path, you can contact us at any time through our application customer service. We will reply to your visit request within 30 days.

For any other personal information generated by you during the use of our products or services, we will provide it to you in accordance with the relevant arrangements in "(6) Responding to your above request" of this clause.

7、How to update this privacy policy

To provide you with a better product and service experience, we continuously strive to improve our products, services, and technologies. When new services and business processes change, we may update our privacy policy to inform you of your rights under this policy.

For significant changes, we will also provide more prominent notifications (including notification through small red dots or pop-up notifications to you),

Without your explicit consent, we will not reduce your rights under this personal information protection policy. We will post any changes made to this policy on this page.

For significant changes, we will also provide more significant notifications (including for certain services, we will send notifications via email explaining specific changes to personal information protection policies).

The significant changes referred to in this policy include but are not limited to:

1) Our service model has undergone significant changes. For example, the purpose of processing personal information, the type of personal information processed, and the way personal information is used;

2) We have undergone significant changes in ownership structure, organizational structure, and other aspects. Changes in ownership caused by business adjustments, bankruptcy mergers and acquisitions, etc;

3) Changes in the main objects of personal information sharing, transfer, or public disclosure;

4) Your right to participate in personal information processing and the way you exercise it have undergone significant changes;

5) When there are changes in the responsible department, contact information, and complaint channels for handling personal information security;

6) When the personal information security impact assessment report indicates the existence of high risks;

We will also archive the old version of this policy on the dedicated page of this application for your reference.

8、How to contact us

You can contact us through the following methods, and we will respond to your request within 30 days:

1. If you have any questions, opinions or suggestions regarding the content of this policy, you can contact us through the APP's "Me" - "Contact Us";

2. If you find that personal information may be leaked, you can report it through the APP's "Me" - " Contact Us";

Company Name: EZY-CONJUNCT PTY LTD

Office address: LEVEL1 / 268 CANTERBURY ROAD, SURREY HILLS, VIC 3127

Contact Emall: info@ezyconjunct.com.au