Company Ez Solutions Based in Paris offering SaaS Services
1. General information
2. About the data collected and its use
Data can be collected in three ways. The first is the data that you, the lessor, voluntarily provide when you register and start using the service. The second method is the analytical data collected on this website. Finally, third parties are created by receiving information in other ways. B. From other websites, cookie technology, and use of our software. All of these are explained and illustrated in this topic. For clarity, a cookie is an internet file that temporarily stores what a user has accessed on your network. You can register your e-mail address, search settings, location, etc. To use the services we provide, you need to create an account on our website. Access is then granted via the EzPing software that can be downloaded from this website. The credentials may include a name, email address, and password to access the user panel and software. Purchase data is not stored on the server because we know that third-party charges are being charged by large companies in the online payment business. The emails collected during registration may be used to contact you, including sending communications with contacts, support, or marketing content. When you visit our website, you will receive personal information in some countries, such as IP address, location, plugin type, web browser version and type, operating system, time to access a particular page, and actions that occurred during the visit. Information that may be considered as may be collected from the hardware. .. Our software may collect information about your usage, such as the games you play and how you interact with them. As part of our service, we aim to rent servers hosted around the world to improve availability, redundancy, and system route mitigation.
3. Who will share the data
The information we collect automatically is used to manage our services and websites. These improvements may include issues to ensure that our website content indicates more efficient. Your data can be shared within a partner that provides third-party service providers or services, business, technical services, delivery, payments, networks, and advertising, credit agencies, and host services. For divergence between rental, judicial disputes, or administrative disputes, data can be used as a shape or evidence that includes a subcontractor. B. Queries for Loan Tranget Services. We can share with talented law enforcement agencies, regulatory regulators, government agencies, courts or third parties. There are both important interests. Your personal information may be associated with purchasing, merger, or actual purchases, and purchaser agreed, purchase, merger, or actual purchase, and proposals from part of our business. This information for the purpose of use provided by this policy. For visitors from the European Economic Area, the above personal information may be collected and used on our legal grounds, depending on the current personal information and the circumstances in which it was collected.
4. Data transfer, security, and retention
The information collected may be shared not only within the country in which it was collected, but also in other countries where data security laws may differ. The services provided by EzPing and its partners are distributed around the world. That is, data processing does not have a specific static place to do it. EzPing is technical to protect the information shared using Secure Socket Layer (SSL) encryption, apart from the fact that Internet traffic data may not be considered 100% true. Use administrative and organizational means For clarity, Secure Socket Layer (SSL) is an encryption protocol developed for the Internet that enables secure communication between customers and servers from web applications. Data you sent may be stored and saved in our unlimited time database, if necessary for the effect of the effect. In order to point out this, our data is committed to you, monitoring our data around the clock to ensure the integrity and security of the data saved.
5. Final considerations