Privacy Policy

Update Date: January 01, 2025

Effective Date: September 20, 2020



EAC International Logistics Inc. ("we") highly values the protection of users' personal information and will diligently and prudently safeguard the security of users' personal information. In the course of our business operations and those of our affiliated companies (collectively referred to as "USEAC"), we may process your personal information that you actively provide or that is provided by other relevant parties. We will collect, use, store, and protect your personal information in accordance with this Privacy Policy. We hope this Privacy Policy informs you about how we handle your personal information, so we recommend that you carefully read and understand all the contents of this Privacy Policy.



Please note that clauses limiting or exempting liability are highlighted in bold for your attention. If you do not agree to this Privacy Policy, we may not be able to provide you with complete services, and you may be unable to complete relevant transactions or obtain the services we provide.



We reserve the right to remind you to read this Privacy Policy and any amendments we make from time to time through appropriate means (such as website announcements). Once updated terms of the Privacy Policy are published, they will replace the existing terms.



This Privacy Policy will help you understand:


1. How We Collect and Use User Information

2. Use of Cookies and Similar Technologies

3. How We Store User Information

4. How We Entrust Processing, Jointly Process, Transfer, and Disclose Personal Information

5. How We Protect User Information Security

6. Exercise of Personal Information Rights

7. Terms of Use for Minors

8. Revision and Notification of Privacy Policy

9. Exceptions to Obtaining Authorization and Consent

10. Scope of Application

11. How to Contact Us



1. How We Collect and Process User Information


(A) User Information We Directly Collect and Use


We collect user information that you actively provide when using our services in the following scenarios and business activities, including but not limited to personal information you provide to us.



Please note that if information cannot identify your personal identity individually or in combination with other information and is unrelated to you, it does not constitute your personal information in the legal sense; when your information can identify your personal identity individually or in combination with other information, or when we combine data that cannot be linked to any specific personal information with your other personal information, such information will be treated and protected as your personal information according to this Privacy Policy during the combined use period. It should be clarified that personal information does not include anonymized information.



When you visit our website (https://eac-usa.com), register, or log in to our online client for relevant business operations, we may require you to provide your mobile phone number, username, and password to create an account. We may send SMS verification codes to verify your identity. We collect this information to help you establish a service account.



During your registration for our service accounts (including but not limited to USEAC accounts, OMS client accounts), depending on our services, we will also ask you to fill in the following personal information: your name, your position, your work contact number, your work email, the institution you work for, institution address (non-personal information), and the QQ number you use. We collect this personal information to confirm the institution you represent (i.e., our corporate customer) and to contact you during our service provision.



In addition, we will also ask you to upload the business license of the institution you represent (non-personal information) and the ID photo of the legal representative of the institution you represent. We collect the above information to further confirm the identity of our corporate customers and to ensure that the operations you perform on our website and client reflect the intentions of the institution you represent. Specifically, the ID photo of the legal representative constitutes sensitive personal information. Please ensure you have obtained separate consent from the legal representative before uploading this photo.



(B) User Information We May Obtain from Third Parties


In the course of our business activities with our corporate customers, suppliers, and partners (i.e., the institution you work for), they may share your personal information with us in accordance with applicable laws, agreements, or with your consent. This mainly includes your name, position, the name of the institution you work for, and your work contact information. We and our employees primarily use this information to maintain communication and contact with you regarding business activities with the institution you represent. We will use industry-standard methods and make every commercial effort to protect the security of your personal information within the scope necessary to achieve the above purposes, in accordance with applicable laws and regulations.



(C) Handling Changes in the Purpose of Collecting and Using User Information


Please understand that as our business develops, our services may be adjusted and changed. When adjusted services or functions require the collection or use of your personal information that we have already collected, we will again explain the scope and purpose of collecting and using such information to you and obtain your consent before doing so.



2. Use of Cookies and Similar Technologies


Cookies and similar technologies are commonly used in the internet. When you use our online services, we may use related technologies to send one or more Cookies or anonymous identifiers to your device to collect and store your account information, search history information, and login status information. Cookies and similar technologies can help you avoid repeatedly filling in account information and search content, and can also help us improve service efficiency and enhance login and response speeds.


You can refuse or manage Cookies through browser settings. However, please note that if you disable Cookies, you may not enjoy the best service experience, and the availability of certain functions may be affected. We promise that we will not use your personal information collected through Cookies or similar technologies for any purpose other than those described in this Privacy Policy.



3. How We Store User Information


(A) Location of Information Storage


In accordance with laws and regulations, we will store personal information received and generated within China during the provision of services to you and the institution you work for, and during business activities with corporate customers, suppliers, and partners within the territory of Mainland China. We will not transmit the above information overseas.



(B) Storage Period


1. We will only retain your personal information for the period necessary for the purposes of providing services and conducting business activities. However, you understand and acknowledge that the necessary storage period may vary based on different services and business needs. Our criteria for determining the storage period include: the time required to retain personal information to achieve the business purpose, including providing services, maintaining corresponding transaction and business records as required by law, ensuring system and service security, responding to possible inquiries or complaints, problem localization, etc.; whether laws, contracts, etc., have special requirements for retaining relevant information.



2. Before you withdraw authorization and consent, delete, or deactivate your service account, we will retain personal information related to your service account. After the necessary period expires, we will delete or anonymize your information, except as otherwise provided by laws and regulations.



4. How We Entrust Processing, Transfer, Disclose, and Publicly Disclose Personal Information


(A) Entrusting Processing of Personal Information


Certain specific modules or functions of our services rely on external suppliers. For institutions that we entrust with processing personal information, we will sign data protection agreements requiring them to process personal information according to our requirements, this Privacy Policy, and other relevant confidentiality and security measures.



(B) Providing Personal Information to Other Personal Information Processors


Unless we obtain your separate authorization and consent, we will not provide your personal information to other personal information processors.




(C) Transfer of Personal Information


We will not transfer your personal information to any other third party, except in the following circumstances:


1. Based on your written request and meeting the conditions stipulated by the national cyberspace administration, we will provide you with transfer channels.


2. After obtaining your explicit consent, we will transfer your user information to other third parties.


3. In the event of changes in our service operating entity, mergers, acquisitions, or bankruptcy liquidation, if user information transfer is involved, we will inform you of the situation in accordance with the law and require the new holder of your information to continue to be bound by this Privacy Policy or continue to protect your information in accordance with security standards no lower than those required by this Privacy Policy. Otherwise, we will require the institution to re-seek your authorization and consent. If bankruptcy occurs and there is no data successor, we will delete your information.



(D) Public Disclosure of Personal Information


In principle, we will not publicly disclose your personal information unless we obtain your explicit consent or as required by national laws and regulations.



5. How We Protect Personal Information Security


(A) We attach great importance to the security of personal information and will strive to take reasonable security measures (including technical and managerial aspects) to protect your personal information, preventing it from being improperly used or accessed, publicly disclosed, used, modified, damaged, lost, or leaked without authorization.


(B) We will use reasonable and feasible measures such as industry-standard encryption technologies and anonymization to protect your information, and use security protection mechanisms to minimize the possibility of your information being maliciously attacked.


(C) We have established specialized security departments, security management systems, and data security processes to ensure your information security. We implement strict data usage and access systems to ensure that only authorized personnel can access your information, and we conduct timely security audits of data and technology in accordance with the company's relevant internal management systems.


(D) Despite having taken the above reasonable and effective measures and complied with standards required by relevant laws and regulations, please understand that due to technical limitations and various possible malicious means, in the internet industry, even after making every effort to strengthen security measures, it is impossible to always guarantee 100% security of information. We will strive to ensure the security of the information you provide to us. You acknowledge and understand that the systems and communication networks you use to access our services may experience problems due to factors beyond our control. Therefore, we strongly recommend that you take proactive measures to protect the security of your user information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account passwords and other information to others.


(E) We will develop emergency response plans and immediately activate them in the event of personal information security incidents, striving to prevent the impact and consequences of such security incidents from expanding. Once a personal information security incident (leakage, loss, etc.) occurs, we will inform you in accordance with legal requirements: the basic situation of the security incident and its possible impact, the measures we have taken or will take, suggestions for you to prevent and reduce risks, and remedies for you. We will promptly inform you of the incident-related situation through push notifications, emails, letters, or SMS. When it is difficult to inform each individual, we will use reasonable and effective means to publish announcements. At the same time, we will report the handling of user information security incidents to relevant regulatory authorities as required.


(E) We hereby specifically remind you that the personal information protection measures provided in this Privacy Policy only apply to our services. Once you leave our website or client, browse or use other websites, products, services, and content resources, we have no ability or obligation to protect any information you submit in software or websites outside our website or client, regardless of whether your login, browsing, or use of such third-party software or websites is based on links or guidance from our website.



6. Exercise of Personal Information Rights


We attach great importance to the management of personal information and protect your rights to access, copy, correct, supplement, delete, withdraw authorization and consent, deactivate accounts, and complain or report in accordance with the law, enabling you to protect your privacy and information security.



(A) Your Rights in Personal Information Processing Activities


1. If you are the owner of our service account, after logging into the service account and completing reasonable and necessary identity verification, you can contact us via email (it@szeac.com) to access, copy, correct, supplement, and delete the personal information you submitted to us and that you used on our website or client.


2. If we received your personal information from the institution you work for, we cannot directly verify your identity. You need to exercise your relevant rights with the institution that directly collected your personal information.


3. Generally, you can access, copy, correct, supplement, and delete personal information you actively provided.


4. In the following circumstances, you can request us to delete personal information:


(1) If the processing purpose has been achieved, cannot be achieved, or is no longer necessary to achieve the processing purpose;

(2) If our processing of personal information violates laws and regulations;

(3) If we collected and used your personal information without your consent;

(4) If our processing of personal information violates our agreement with you;

(5) If we cease providing services, or the storage period of personal information has expired;

(6) If you withdraw consent;

(7) If we no longer provide services to you;

(8) Other circumstances stipulated by laws and administrative regulations.


If we decide to respond to your deletion request, we will also notify entities that obtained your personal information from us to delete it promptly, unless otherwise provided by laws and regulations, or unless these entities obtain your separate authorization. When you delete information from our website or client, we may not immediately delete the corresponding information in the backup system but will delete it when the backup is updated.



(B) Deactivating Your Account



You can apply to deactivate your account on our website or client. You acknowledge and understand that deactivating your account is an irreversible action. After deactivation, we will cease providing any services to you and the institution you work for, delete all information about your account, or anonymize relevant information. If laws and regulations require the retention of personal information, we will store it separately and promise not to use such information in daily business activities.



(C) Withdrawing or Changing the Scope of Your Authorization and Consent



1. When we directly collect your personal information based on your consent, you can withdraw all authorization for us to continue collecting your personal information by deactivating your service account.


2. You understand and agree that after you withdraw consent or authorization, you will no longer be able to use the online services corresponding to the withdrawn consent or authorization, and we will no longer process your corresponding personal information. However, your decision to withdraw consent or authorization will not affect the previous processing of personal information based on your authorization.



(D) How to Obtain a Copy of Your User Information



We will provide you with copies of the following types of personal information based on your written request: your basic account information. However, please note that the information copies we provide you are limited to the information we directly collected.



(E) Complaints and Reports



You can complain or report according to our publicized system. If you believe that your information rights may have been violated, or if you discover clues of violations of your information rights, you can contact us by email (it@szeac.com) to submit relevant information and proof of rights. We will verify and respond to your complaint or report promptly.



(F) Responding to Your Requests



To ensure security, you may need to provide a written request and prove your identity in other ways. We may first require verification of your identity before processing your request. If you are dissatisfied with the response, you can also complain and report through the above channels.



You understand and acknowledge that in the following circumstances, we will be unable to respond to your request:


1. Related to our fulfillment of obligations stipulated by laws and regulations;

2. Directly related to national security and defense security;

3. Directly related to public security, public health, and major public interests;

4. Directly related to criminal investigation, prosecution, trial, and execution of judgments;

5. We have sufficient evidence to show that the personal information subject has subjective malice or abuses rights;

6. It is necessary to protect the life, property, and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain the consent of the person;

7. Responding to the request of the personal information subject will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations;

8. Involving trade secrets.



(G) Notification When Ceasing Operations



If we cease operations of our website or client, we will stop collecting your personal information, notify you of the cessation of operations by means of individual delivery or announcement, and delete or anonymize your personal information that we hold.



7. We Do Not Collect Minors' Personal Information



Our services are mainly aimed at corporate customers. Our service accounts do not allow minors to register and use. If we discover that we have collected minors' personal information without obtaining verifiable parental consent in advance, we will try to delete the relevant information as soon as possible.



8. Revision and Notification of Privacy Policy



(A) Our website, client, and business activities with relevant parties will be updated and changed from time to time. We will revise this Privacy Policy accordingly, and such revisions constitute part of this Privacy Policy and have the same effect as this Privacy Policy. However, without your explicit consent, we will not reduce your rights under the currently effective Privacy Policy.


(B) After this Privacy Policy is updated, we will publish the updated version on our official website and at the client registration/login interface, and remind you of the updated content in an appropriate manner before the updated terms take effect, so that you can keep abreast of the latest version of this Privacy Policy. Your continued use of our website or client services constitutes your acceptance of all contents of the revised Privacy Policy.


(C) For major changes, we will also provide more prominent notifications (including but not limited to SMS, email notifications, system messages, or special prompts on browsing pages) to explain the specific changes to this Privacy Policy.


Major changes referred to in this Privacy Policy include but are not limited to:


1. Major changes in our service model. Such as the purpose of processing personal information, the types of personal information processed, and how personal information is used;

2. Major changes in our ownership structure and organizational structure. Such as business adjustments, bankruptcy, mergers, etc.;

3. Changes in the main recipients of personal information transmission, transfer, or public disclosure;

4. Major changes in your rights and how they are exercised regarding personal information processing;

5. Changes in our contact information and complaint channels.



9. Exceptions to Obtaining Authorization and Consent



Please understand that in the following circumstances, according to laws, regulations, and relevant applicable national standards, we may collect, store, use, process, transfer, provide, disclose, and delete your personal information without your authorization and consent:


1. Related to our fulfillment of obligations stipulated by laws and regulations;

2. Directly related to national security and defense security;

3. Directly related to public security, public health, and major public interests;

4. Directly related to criminal investigation, prosecution, trial, and execution of judgments;

5. Necessary to protect the life, health, property, and other major legitimate rights and interests of the personal information subject or other individuals but difficult to obtain the person's consent;

6. The personal information involved is disclosed to the public by yourself or has been lawfully disclosed;

7. Necessary for signing or performing a contract at your request;

8. Collected from lawfully publicly disclosed information, such as legitimate news reports, government information disclosure, and other channels;

9. Necessary to maintain the safe and stable operation of our online services, such as discovering and handling failures in our network systems and related services;

10. Other circumstances stipulated by laws and regulations.



10. Scope of Application



This Privacy Policy applies to the official website of USEAC, the client provided to various corporate customers, and personal information processing activities involved in business activities between USEAC and corporate customers, suppliers, and partners.



This Privacy Policy does not apply to the processing of personal information of end users (i.e., recipients) of our corporate customers. We only process such end-user personal information on behalf of our corporate customers for the purpose of providing our services.



11. How to Contact Us



If you have any questions, comments, or suggestions regarding this Privacy Policy, you can contact us by sending an email to [it@szeac.com]. Generally, we will reply within 15 working days ("response period"). However, you understand and agree that depending on the complexity of your request, the aforementioned response period may be extended to 30 days, but we will inform you in writing of the reason for the delay before the response period expires.



Contact Info
877 668 7837
cindy@eac-usa.com
3080 12th street, Riverside California 92507
Top