Easy AI Privacy Policy


Welcome to Easy AI (hereinafter referred to as “This Software”). This Privacy Agreement (hereinafter referred to as “This Agreement”) is designed to clarify how, the scope, and the rights and obligations of the operators of this Software (hereinafter referred to as “We”) to collect, use, store, transmit, and disclose your personal data (hereinafter referred to as “Users”), and to protect your personal privacy and data security. This Agreement adheres to international data protection principles, including but not limited to the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and the General Standards requirements reached by the International Conference of Data Protection and Privacy Commissioners, without involving any specific legal constraints of any particular country or region. By clicking “Agree,” registering an account, or actually using this Software and related services, you represent that you have fully read, understood, and agreed to all the terms of this Agreement. If you do not agree to this Agreement, please do not use this Software and related services.


1. Definition and Scope


1.1 Core Definitions


1.1.1 Personal Data: Means any information related to an identified or identifiable natural person, including but not limited to registration information, usage records, device information, generated content, etc., that conforms to the standards defined for personal data in the International General Data Protection Regulations.


1.1.2 Data Processing: Means any operation performed on personal data, including collection, storage, use, transmission, encryption, anonymization, deletion, etc., whether performed by automated means or not.


1.1.3 Data controller: Means a natural person or organization that independently or jointly with others decides the purposes and ways of processing personal data, as referred to in this Agreement as the operator of this software; Data processor: Means a third-party entity or individual that is commissioned by the data controller to process personal data on behalf of the controller.


1.1.4 Deidentified Data: Means information that cannot be reasonably used to deduce the identity of a particular user or establish an association with a particular user. Deidentified information is no longer considered personal data, and its processing is not subject to the personal data-related terms of this Agreement.


1.2 Applicability Scope


1.2.1 This Agreement applies to all users who use this Software and related services, including individual users, business users, and other organizational users, regardless of the country or region of the user.


1.2.2 This Agreement covers the personal data processing behavior under all service scenarios of this Software, including but not limited to personal data processing activities that arise during account registration, feature use, content generation, service optimization, etc.


1.2.3 This Agreement does not apply to third-party services, and if the Software contains links to or inputs to third-party services, the collection and use of your personal data by third parties pursuant to their own privacy policies is unrelated to us and we assume no responsibility.


2. Data Collection


2.1 Collecting Principles


2.1.1 Minimum Required Principle: We collect only the personal data necessary to provide this Software Service, and do not collect information unrelated to the Service, in accordance with the core requirements of international data protection.


2.1.2 Voluntary Consent Principle: With the exception provided by law, before we collect your personal data, we will clearly inform you of the purpose, scope, and use of the collection, and we will proceed with the collection only after obtaining your voluntary consent, which you can withdraw at any time.


2.1.3 Transparent disclosure principle: We will clearly inform you of the types of personal data we collect, how it is collected and the purpose of its use, ensuring that the data collection behavior is publicly transparent, making it easy for you to understand and monitor.


2.2 Scope of Collection


2.2.1 Registration Information: Information submitted when you register for this Software account, including but not limited to email address, password (encrypted storage), username, etc., is used for account creation, authentication, and service login.


2.2.2 Usage Data: Information generated during your use of this Software, including but not limited to feature usage records, input content, content generation, operation logs, usage duration, etc., is used to optimize the service experience and improve functional performance.


2.2.3 Device Information: You use this Software‘s device-related information, including but not limited to the device model, operating system version, IP address, browser type, etc., to ensure service compatibility, prevent security risks, and do not collect personally identifiable device details.


2.2.4 Sensitive Personal Information: If you choose to provide sensitive personal information (including, but not limited to, biometric information, health information, financial information, etc.), we will obtain your written consent separately and will take additional security measures to strictly restrict its use and comply with the CCPA requirements for protecting sensitive personal information.


2.3 How we collect it


2.3.1 Proactive Submission: Personal Data that you voluntarily submit through the registration page and functionality interface of this Software, including but not limited to registration information, input content, etc.


2.3.2 Automatic Collection: This Software automatically collects your usage data and device information through technical means, only for service delivery and optimization, not for other purposes, and will adopt de-identification processing to reduce privacy risks.


2.3.3 Third-party acquisition: With your explicit consent, we may obtain your relevant personal data (such as third-party account login information) from third parties. The personal data provided by third parties must comply with their own privacy policies and international data protection regulations. We will conduct strict audits and secure processing of such data.


3. Data Usage


3.1 Purpose of Use


3.1.1 Basic Services Provision: Used to realize the core functions of this Software, including account login, content generation, intelligent interaction, service push, etc., ensuring that you can normally use the various services of this Software.


3.1.2 Optimizing the Service Experience: Based on your usage data, analyzing your usage habits, optimizing the functional design, interface layout, and response speed of this Software, providing you with a personalized service experience that complies with the reasonable requirements for data use in international data protection regulations.


3.1.3 Ensuring Service Security: Used to identify and prevent risks such as account theft, malicious attacks, and unauthorized use, maintain the normal operation order of this Software, and protect your legitimate interests and those of other users.


3.1.4 Compliance and Audits: Use your personal data for compliance reviews, audits, and to ensure that data processing behavior complies with relevant rules in accordance with international law requirements, judicial requirements, or regulatory directives.


3.1.5 Service Upgrades and R&D: After de-identifying processing, your non-personal data is used for technical R&D, feature upgrades and new product testing of this Software to improve the quality of the service, without involving any use of personally identifiable information.


3.2 Use Restrictions


3.2.1 We will only use your Personal Data within the scope of the purposes of use stipulated in this Agreement, without your explicit consent, not beyond the scope stipulated, and not for other purposes unrelated to this Software Services.


3.2.2 We will not use your personal data for automated decisions, unless we obtain your explicit consent, and will provide you with the right to refuse automated decisions, in accordance with the relevant requirements of the GDPR and CCPA.


3.2.3 If we need to use your personal data for purposes not stipulated in this agreement, we will notify you in advance, obtain your written consent before using it, and ensure the legitimacy and transparency of the use of the data.


4. Data storage


4.1 Location of Storage


4.1.1 Your Personal Data will be stored on servers that comply with international security standards, located in countries or regions that comply with international data protection regulations, ensuring that the data storage complies with global privacy protection requirements.


4.1.2 If we need to transfer your personal data to another country or region for storage, we will ensure that that country or region has a level of data protection comparable to international travel standards, and we will adopt measures such as encryption for transmission, signing a Data Protection Agreement (DPA) to ensure the security of the data, and comply with the requirements of the GDPR for cross-border data transfer.


4.2 Storage Period


4.2.1 We will store your Personal Data for the “minimum necessary period,” i.e., only for the minimum period necessary to achieve the purposes of the service. Personal Data that exceeds the retention period will be deleted or anonymized.


4.2.2 If your account is logged out, the service is terminated, or the data retention period expires, we will delete all your personal data within a reasonable period, or anonymize it to ensure that the data is no longer identifiable and meets the requirements of international data protection regulations for data retention.


4.2.3 If we need to extend the data retention period due to legal requirements, judicial requirements or compliance requirements, we will adopt stricter security measures during the extended period, and the extended period will not exceed the upper limit stipulated by the relevant law.


4.3 Storage Security


4.3.1 We will adopt security measures conforming to international standards, including but not limited to data encryption, access controls, firewalls, intrusion detection, etc., to prevent your personal data from being leaked, tampered with, lost or misused, and to ensure the security of your data storage.


4.3.2 We will regularly conduct security testing and maintenance of servers, update security protection technologies, and improve the security of data storage; at the same time, we will conduct strict permissions management and privacy training for employees who access your personal data, clarify confidentiality obligations, prevent internal leakage risks, and comply with international data protection regulations for data security requirements.


4.3.3 In the event of a data breach incident, we will promptly take remedial measures in accordance with international emergency handling standards, notify the affected users, and report to the relevant regulatory authorities to minimize user losses.


5. Data Transfer and Disclosure


5.1 Data Transfer


5.1.1 We will only transfer your Personal Data in order to provide this Software Service, optimize the service experience or comply with compliance requirements. Encryption technology will be used during the transfer to ensure the security of the data transfer and to comply with the requirements of international data protection regulations for data transfer.


5.1.2 Cross-border data transfers will strictly comply with internationally applicable rules, ensure that recipients have the appropriate level of data protection, and sign data protection agreements that clarify the rights and obligations of both parties, ensure the security and compliance of cross-border data transfers, and comply with the relevant requirements of the GDPR and CCPA.


5.2 Data Disclosure


5.2.1 We will not sell, rent, or share your personal data with any third party unless we obtain your explicit written consent, in accordance with the core principles of international data protection.


5.2.2 Disclosure with Your Consent: If you expressly agree, we may disclose your personal data to third parties for the purposes of services stipulated in this Agreement, third parties must comply with the privacy protection requirements of this Agreement, cannot be used without permission for other purposes, and we will monitor the behavior of third parties‘ use.


5.2.3 Compliance Disclosure: In accordance with international applicable laws, judicial rulings, regulatory directives or governmental requirements, we may legally disclose your personal data without obtaining your consent in advance, but will notify you promptly upon disclosure (unless prohibited by law), in accordance with the relevant requirements of the GDPR and CCPA.


5.2.4 Third-Party Service Disclosure: If this Software collaborates with a third party to provide services and needs to transfer your necessary personal data to a third party, we will sign a data protection agreement with the third party, clarify the third party‘s confidentiality obligations and data usage restrictions, ensure the security of your personal data, and will notify you in advance to obtain your consent.


5.2.5 De-identified disclosure: We may disclose de-identified non-personal data to third parties for academic research, market analysis, service optimization, etc. This type of data cannot identify your personal identity, does not involve privacy disclosure risks, and complies with the requirements of international data protection regulations.


6. User Data Rights


6.1 Core Rights


6.1.1 Right to be informed: You have the right to inquire about the specific circumstances under which we collect, use, store, and transfer your personal data, including the types of data, purposes of use, periods of storage, and disclosures, etc. We will provide you with the results of your inquiries within reasonable periods, in accordance with the core rights requirements of users in the International Data Protection Regulations.


6.1.2 Access rights: You have the right to access your personal data, including viewing, downloading your submitted registration information, using records, generating content, and so on. We will provide you with convenient access channels to ensure that you can smoothly exercise this right.


6.1.3 Correction right: If you find that your personal data is incorrect, incomplete or inaccurate, you have the right to request us to correct that data, and we will correct it for you promptly after verification and confirmation, and inform you of the corrected results.


6.1.4 Right to delete: Under the conditions of compliance with international data protection rules and relevant legal requirements, you have the right to request us to delete your personal data, including but not limited to deleting all data after account logout, deleting specific usage records, etc. We will complete the deletion within a reasonable period after receiving the request or inform you of reasons why you cannot delete (such as cases where law requires retention).


6.1.5 Right to withdraw consent: You have the right to withdraw your consent to the collection, use, and disclosure of your personal data at any time. After withdrawing your consent, we will no longer continue to collect, use, and disclose your relevant personal data, but this does not affect the legality of the data processing activities that were completed based on your consent prior to the withdrawal, nor does it affect the processing of personal data necessary to provide the underlying services.


6.1.6 Data Portability: You have the right to request that we provide your personal data to you in a structured, common and machine-readable format, or directly transfer it to another data controller you designate, in accordance with the requirements of the GDPR for user data portability, and we will meet your needs within reasonable time limits.


6.1.7 Objection Right: You have the right to object to our use of your personal data for non-essential service purposes such as service optimization, personalized push, etc., and upon your objection, we will stop the use of the relevant data without affecting the core services you use this Software for.


6.2 How Your Rights Are Executed


6.2.1 You can submit a data rights exercise request through this Software Settings page, or by sending a written request by contacting the email address (kaliev@tckzop.com), clearly stating your needs (such as queries, corrections, deletion of data, etc.).


6.2.2 Upon receipt of your application, we will conduct identity verification, confirm your identity, process your application within the period stipulated by the International Data Protection Regulations (usually no more than 30 business days), and notify you of the processing results via your reserved contact details.


6.2.3 If you have any objections to our processing results, you can submit a complaint again through the above method, we will re-examine and respond to the complaint results within a reasonable period.


6.3 Restrictions of Rights


6.3.1 If your exercise of your rights violates international applicable laws, legal requirements, or may harm the legitimate interests of other users, or jeopardize the security of this Software Service, we have the right to refuse your request and inform you of the reasons for your refusal.


6.3.2 To ensure service continuity and fulfill compliance obligations, your rights such as deletion and withdrawal of consent will be reasonably restricted, and we will inform you in advance of the reasons and grounds for the restrictions.


7. Third-party data processing


7.1 Prerequisites for Third-Party Cooperation


7.1.1 To improve the service quality of this Software and achieve certain functions, we may commission third-party entities (such as server providers, data security providers, payment providers, etc.) to process your personal data. All third parties must comply with the requirements of international data protection regulations and possess appropriate data protection capabilities.


7.1.2 We enter into a formal data processing agreement (DPA) with third parties, which clarifies the scope, purpose, confidentiality obligations, and security responsibilities of third parties‘ data processing, strictly limits third parties‘ rights to use your data, and ensures that third parties only process your personal data within the scope entrusted to them.


7.2 Third-Party Supervision and Responsibility


7.2.1 We will conduct regular monitoring and auditing of third-party data processing behavior to ensure that third parties strictly comply with data processing protocols and international data protection rules. If we discover that third parties have violated any processing behavior, we will immediately terminate cooperation and require the third parties to take corrective measures and assume appropriate responsibility.


7.2.2 If a third party violates a data processing agreement or international data protection rules, resulting in the leakage or abuse of your personal data, we will assume the corresponding collateral responsibility, while also having the right to indemnify the third party to maximize your legitimate rights and interests.


7.2.3 You can contact us to inquire about the list of third parties that collaborate with this Software and the scope of data processing. We will inform you truthfully to ensure transparency in data processing behavior.


8. Data Security and Emergency Handling


8.1 Security Assurance Measures


8.1.1 Technology Assurance: We adopt internationally-leading encryption technologies (including encryption in transit and encryption at rest) to provide comprehensive encryption protection for your personal data, preventing data from being leaked or tampered with during transmission and storage. At the same time, we deploy firewalls, intrusion detection systems, data backup mechanisms, etc., to enhance your data security protection capabilities.


8.1.2 Management Guarantees: Establish a strict internal data management system, administer hierarchical permissions to employees who access personal data, clarify confidentiality obligations, regularly conduct privacy protection training, and enhance employees‘ privacy protection awareness; establish data processing audit mechanisms, record all data processing behaviors, and facilitate tracing.


8.1.3 Compliance Guarantee: Strictly comply with international data protection regulations and related legal requirements, regularly conduct data protection compliance assessments, promptly correct any issues that arise, and ensure that data processing behavior is legal and compliant.


8.2 Emergency Response to Security Incidents


8.2.1 Incident Monitoring and Warning: We establish a data security incident monitoring mechanism to detect and warn against security incidents such as data breaches, tampering, and loss in time, ensuring that we can respond immediately.


8.2.2 Incident Handling: If a data security incident occurs, we will immediately initiate an emergency response plan to take corrective measures such as blocking vulnerabilities, suspending related data processing behaviors, and restoring data to minimize the impact caused by the incident.


8.2.3 Notification and Reporting: In accordance with the requirements of the International Data Protection Regulations, if a data security incident may affect your legitimate interests, we will notify you within 72 hours of the incident, informing you of the incident details, the remedial measures taken, and the preventive measures you can take; at the same time, we will report the situation of the incident to the relevant international regulatory authorities (as required by law).


9. Agreement Changes and Notification


9.1 Agreement Changes


9.1.1 We have the right to modify the content of this Agreement at any time in accordance with updates to international data protection rules, adjustments to this software service, and changes to relevant legal requirements to ensure that this Agreement always meets international compliance requirements.


9.1.2 Upon amendments to this Agreement, we will notify you through this software pop-up window, on-site message, email, etc., and the amended Agreement will take effect from the date of notification delivery. If you continue to use this software service, it is considered that you agree to the amended Agreement; if you do not agree, you can stop using this software service and sign out your account.


9.2 Other Notifications


9.2.1 Regarding significant changes in data processing behavior, data security events, results of user rights exercise, etc., we will promptly notify you through the contact method you have reserved (e.g., email, site messages) to ensure your right to be informed.


9.2.2 If there are changes to your contact methods, you need to update your account information promptly, otherwise you will be liable for the consequences such as not being able to deliver notifications and not being able to exercise your rights properly.


10. Disclaimer


10.1 Irresistible Force Disclaimer


10.1.1 We accept no responsibility for any breach, loss, or alteration of your personal data due to irresistible forces (including but not limited to natural disasters, wars, network disruptions, hacking attacks, third-party service failures, etc.), and we have taken reasonable measures to prevent and remedy them. We comply with the internationally applicable principles of disclaimer.


10.2 Owner’s Disclaimer


10.2.1 You are solely responsible for the leakage or loss of your personal data due to your own misconduct (such as the leakage of your account password, the proactive provision of your personal data to third parties), device failure, network problems, etc. We assume no responsibility.


10.2.2 All consequences and responsibilities arising from any false, forged data you submit through this Software, or personal data used for illegal or unlawful purposes, are to be borne by you alone and are not related to us.


10.3 Third Party Disclaimer


10.3.1 If third-party service providers or data processors violate relevant agreements or legal requirements, resulting in damage to your personal data, we have the right to compensate the third party after taking on collateral responsibility, without exempting the third party from direct liability.


10.3.2 When you use third-party services, the third party is solely responsible for the collection and use of your personal data, and we do not assume any consequent responsibility, unless there is intentional or serious negligence on our part.


10.4 Compliance Disclaimer


10.4.1 We accept no liability for data processing conducted in accordance with international law regulations, judicial rulings, and regulatory directives, even if it has some impact on you, in accordance with international principles of compliance and disclaimer.


11. Dispute Resolution and Applicability of Law


11.1 Dispute Resolution


11.1.1 Any disputes arising between you and us due to the execution of this Agreement, personal data processing behaviour, should be resolved first through friendly negotiation; if negotiation fails, any party has the right to apply for arbitration to a neutral international arbitrator, arbitrating for the country or region determined by negotiation between the two parties, the arbitration result is a final ruling, binding on both parties.


11.1.2 During the dispute resolution process, the parties shall continue to adhere to the other terms of this Agreement and shall not arbitrarily terminate or suspend the relevant data processing activities, unless otherwise required by law or arbitration.


11.2 Applicability of Law


11.2.1. The establishment, execution, interpretation, and dispute resolution of this Agreement are governed by the rules of international commercial and civil law and data protection rules, and are not governed by the exclusive laws of any particular country or region (unless otherwise agreed between the parties), to ensure the international universality of the Agreement.


11.2.2. If any provision of this Agreement is deemed invalid or unenforceable, without affecting the validity of the other provisions, the other provisions shall still be enforced in accordance with the International Rules of Conduct.


12. Other Terms


12.1 Contact Methods


12.1.1 If you have any questions, complaints, suggestions or data rights exercise requests, you can contact us by: Contact the email address: kaliev@tckzop.com, and we will respond to your claim within 3 working days to ensure that your issue is dealt with promptly.


12.2 Effective Date


12.2.1 This Agreement is effective from the date you register your account or first use of these Software Services, effective until you stop using these Software Services and the account is logged out, all personal data is deleted or anonymized.


12.3 Complete Agreement


12.3.1 This Agreement is the complete agreement between you and us regarding the processing of personal data, replacing all previous verbal or written agreements, agreements, and agreements reached between the two parties. If this Agreement conflicts with any other service agreements you have signed with us, this Agreement will take precedence.


12.3.2 What is not stipulated in this Agreement applies to international data protection rules and relevant legal requirements.