Privacy Policy

Reminder terms:

Your trust is very important to us. We are well aware of the importance of personal information to you. We will take corresponding security protection measures in accordance with the requirements of laws and regulations, and try our best to keep your personal information safe and controllable. In view of this, East2Global platform operator, namely East2Global or "we" or "E2G" for short) has formulated this "Privacy Policy" (hereinafter referred to as "this Policy/this Privacy Policy") and reminds you: This policy applies to all products and services offered by East2Global. It should be noted that this policy does not apply to services provided to you by other third parties, nor does it apply to products or services on the East2Global platform for which legal notices and privacy policies have been independently set. Before using the products or services of the East2Global platform, please be sure to read and thoroughly understand this policy, and use the relevant products or services after confirming your full understanding and agreement. Once you start to use the products or services of the East2Global platform, it means that you have fully understood and agreed to this policy. If you have any questions, comments or suggestions about the content of this policy, you can contact us through the contact information provided by the East2Global platform.

1 Definition

1.1 Enterprise users Refers to individuals or organizations that register, log in, use enterprise East2Global products and services and obtain management authority, including but not limited to legal persons, government agencies, other organizations, partnerships or individual industrial and commercial households, etc. (hereinafter referred to as "enterprise users"); enterprise users can Create its work platform through the enterprise East2Global (referring to the virtual workspace created and managed by enterprise users, and multiple people can join and use the enterprise East2Global service), and invite and authorize individual users to join their work platform and become their end users. 1.2 Enterprise User Administrator Refers to the individual designated by the enterprise user who has the operating authority of the enterprise user management background system; the enterprise user administrator can be one or more people. 1.3 Individual Users/End Users Refers to individual users who are invited by enterprise users to join the enterprise work platform and register to use the enterprise East2Global, hereinafter referred to as "you" or "end users". When an enterprise user invites you to access their work platform as an end user, you will receive the invitation and can choose whether to join the enterprise user. 1.4 Personal Information Refers to various information recorded by electronic or other means that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information. 1.5 Personal Sensitive Information Refers to personal information that, once leaked, illegally provided or abused, may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. 1.6 Deletion of personal information Refers to the act of removing personal information from the system involved in the realization of daily business functions to keep it in a state that cannot be retrieved or accessed. 1.7 Enterprise-controlled data Refers to the information and data submitted or generated by the enterprise user and the end user of the enterprise user in the process of using the enterprise East2Global, including the information submitted or requested by the enterprise user to be provided by the end user, the information assigned by the enterprise user to the end user, and the requirements for completing the work, Information submitted by end users to enterprise users to meet the daily management needs of enterprises.

2 Privacy Policy

This Privacy Policy section will help you understand the following: (1) How we collect and use your personal information (2) How we use cookies and similar technologies (3) How we share, transfer and publicly disclose your information (IV) How we protect and manage your information (5) Your rights (6) How do we handle the information of minors (7) How your information is transferred globally (8) How to update this privacy policy (9) How to contact us

3 How we collect and use what information about you

We will only collect and use your personal information for the following purposes described in this policy. If you do not provide relevant information, you will not be able to enjoy East2Global's related services. These functions include: 3.1 Circumstances in which your personal information is collected and used by core business functions 3.1.1 Register an account We serve you through your East2Global platform account. In order to use our services, you need to create an East2Global platform account, provide your mobile phone number, your intended membership name and password. If you register as an individual user or a corporate user, in addition to the above information, we will collect your identity information or basic corporate information and other information collected by law. For services that need to be used through an East2Global platform account, we may verify your membership based on the above information you provide to ensure that we are providing services for you. If you already have an East2Global platform account, we may display your above personal information in the East2Global platform services and actions you perform on the East2Global platform or in products and services associated with your East2Global platform account, such as through an East2Global platform account Centralize your profile or trade orders. We will respect your choices regarding East2Global platform services and East2Global platform account settings. 3.1.2 To provide you with logistics services East2Global or an East2Global authorized business partner collects the following information from you when you place an order for shipment or when your information is provided as a recipient: sender's and recipient's name, address, contact details and shipment Information (collectively, "Waybill Information"), which is used for order submission, generation of logistics waybill, collection, sorting, warehousing, transportation, export customs clearance, import customs clearance, and delivery of shipments; according to relevant legal requirements, we also collect your Documents such as ID information or business license are used to verify your identity and import and export customs clearance. If you provide an inaccurate or wrong address, we may use your previous waybill information to complete and correct the inaccurate and wrong address information, provided that it does not violate the mandatory requirements of relevant laws and regulations for the storage of personal information. , in order to save the time of repeatedly confirming the address with the recipient/sender, ensure the timeliness, avoid your losses due to the wrong delivery or delayed delivery of the express, and allow you to have a better service experience. In addition, in the process of providing you with the delivery service, if it involves telephone communication, we may record the content of the call to avoid potential disputes. 3.1.3 Payment and settlement After you place an order, you can choose the payment service provided by the payment institutions supported by East2Global (for example: bank transfer, Alipay, WeChat, etc.), we need to provide your East2Global or logistics carrier order number and transaction amount information to these payment institution to confirm your payment instruction and complete the payment. If you apply for an invoice, you also need to provide the following information: invoice title, taxpayer identification number, payee's email address, and more information you provide according to your invoicing needs, such as buyer information. 3.1.4 Message Push We collect your device information to send you shipment routing information, payment status information, coupons and promotions. You can set Do Not Disturb in the "Settings" of the system, mobile phone or other devices, or in the APP, WeChat public account, etc. 3.1.5 Customer service and after-sales East2Global's customer service and after-sales functions will use your account information and waybill information. In order to ensure the security of your account, East2Global's customer service will use your account information and waybill information to verify your identity. When you need East2Global to provide customer service and after-sales service related to your shipment, East2Global will query your waybill information and shipment routing information. You may provide information other than the above information when you communicate with East2Global's customer service staff, such as when you request East2Global to change the delivery address, contact person or contact number. In addition, East2Global will also collect the questionnaire response information you submit to us when you participate in the questionnaire survey, the relevant contact name, company name, contact number, email address and your consultation information submitted on the East2Global website. 3.1.6 To improve our products or services We may collect your account information and waybill information for data analysis to form user portraits and provide you with better services. For the information collected from your various devices, we may associate them so that East2Global can provide you with consistent services on these devices. We may combine information from one service with information from other services, legally obtained indirectly and legally obtained through public channels, or combine legally obtained identifiable personal information about you with non-personally identifiable information, To provide you with quality services and to improve our products and services. 3.1.7 Ensuring transaction security In order to improve the security of the system when you use East2Global's services, prevent phishing website fraud more accurately and protect account security, we may judge by means of understanding your browsing information, waybill information, your commonly used software information, equipment information, etc. Your account is at risk, and may record some links ("URLs") that we consider to be risky; we will also collect your device information to analyze East2Global system problems, count traffic and troubleshoot possible risks. Troubleshoot when we send abnormal information. 3.2 Indirect acquisition and use of personal information 3.2.1 We may obtain the account information (avatar, nickname) that you authorize to share from a third party, and bind your third-party account to your East2Global account after you agree to this policy, so that you can directly access the account information through the third-party account. Log in and use East2Global's services. 3.2.2 If you place an order for shipment through third-party channels that are not on the East2Global page, we will obtain your waybill information from these third-party channels, including the sender's name, phone number, address and shipment information, in order to provide you with Shipping related services. 3.2.3 When you send your parcel to others, please ensure that you have obtained the relevant authorization from the recipient, and ensure that East2Global and East2Global's carriers have the right to process the recipient's personal information in accordance with this policy. 3.2.4 If we obtain your personal information from East2Global's partners, we will use your this personal information. 3.3 Other uses 3.3.1 We may send you advertisements and other commercial information that we think may be of interest to you by email, SMS, etc. 3.3.2 After we de-identify your personal information collected by technical means, the de-identified information will not be able to identify the subject. You know and agree that we have the right to use the de-identified information. On the premise of not disclosing your personal information, we have the right to analyze the user database and make commercial use. 3.3.3 We will collect statistics on service usage and may share these statistics with the public or third parties to show the overall usage trends of our services. However, these statistics do not contain any identifying information about you. 3.3.4 If we really need to display your personal information, we will desensitize your information by means of content replacement and anonymization to protect your information security. 3.3.5 When we want to use your personal information for other purposes not specified in this policy, or use the information collected for a specific purpose for other purposes, we will use online click authorization or email, text message, etc. in advance. Ask for your consent. 3.4 Consent exceptions 3.4.1 You are fully aware that in the following situations, we do not need your authorization and consent to collect and use personal information: (1) Related to national security and national defense security; (2) Those related to public safety, public health, and major public interests; (3) related to criminal investigation, prosecution, trial and execution of judgments; (4) It is difficult to obtain the consent of the person for the purpose of safeguarding the life and property of the personal information subject or other individuals and other major legitimate rights and interests; (5) The collected personal information is disclosed to the public by the subject of the personal information; (6) Your personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels; (7) Necessary to sign and perform the contract according to your request; (8) Necessary for maintaining the safe and stable operation of the provided services, such as discovering and disposing of service failures; (9) Necessary for legitimate news reporting; (10) Other circumstances stipulated by laws and regulations. 3.4.2 According to the law, sharing and transferring de-identified personal information and ensuring that the data recipient cannot recover and re-identify the personal information subject is not an external sharing, transfer or public disclosure of personal information. The storage and processing of such data will not require further notice to you and your consent.

4 How we use cookies and similar technologies

4.1 Cookies 4.1.1 In order to ensure the normal operation of the website, provide you with an easier access experience, and recommend to you content that may be of interest to you, we will store cookies, Flash cookies, or browser (or associated applications), other local storage (collectively, "Cookies") that typically includes identifiers, site names, and some numbers and characters. With the help of cookies, websites can store data such as your preferences. 4.1.2 If your browser or browser add-onThe HTTP protocol headers sent behind the scenes can be used in place of cookies. ETag can help us avoid unnecessary server load, improve service efficiency, save resources and energy, and at the same time, we may use ETag to record your identity so that we can better understand and improve our products or services. Most browsers provide users with the function of clearing browser cache data, and you can perform corresponding data clearing operations in the browser settings. However, please note that if you disable ETag, you may not enjoy a relatively better product or service experience.

5 How we share, transfer and publicly disclose your information

5.1 Sharing We will not share your personal information with companies, organizations and individuals other than E2G service providers. If public disclosure is necessary, we will inform you of the purpose of this public disclosure, the type of information disclosed and the sensitive information that may be involved , and comply with the requirements of relevant laws and regulations to disclose. It should be noted that how to disclose or share the relevant information of end users in the enterprise user work platform they join is determined and managed by enterprise users. If you have any questions or comments about this, you understand and agree to contact your company. Enterprise users or enterprise user administrators. Except in the following cases: 5.1.1 Sharing under statutory circumstances: We may share your personal information externally in accordance with laws and regulations, the need for litigation and dispute resolution, or as required by administrative and judicial authorities in accordance with the law. 5.1.2 Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties. 5.1.3 Sharing under your active choice: If you purchase goods or services through the E2G platform, we will share the necessary transaction-related information in your order information with the relevant goods or service providers according to your choice, To achieve your transaction and after-sales service needs. 5.1.4 Sharing with our affiliates: Your personal information may be shared with our affiliates. We will only share personal information that is necessary and subject to the purposes stated in this policy. If the affiliated company wants to change the purpose of processing personal information, it will ask for your authorization again. Affiliate refers to: any economic organization that controls, or is controlled by, or is jointly controlled with E2G from time to time, where the word "control" means directly or indirectly possessing or controlling more than 50% of the voting rights . 5.1.5 Sharing with authorized partners: We may entrust authorized partners to provide you with certain services or perform functions on our behalf, and we will only share for the legal, legitimate, necessary, specific and explicit purposes stated in this Privacy Policy Your information, authorized partners can only access the information they need to perform their duties, and shall not use this information for any other purpose. Currently, our authorized partners include the following types: logistics providers, service providers and other partners. We send information to suppliers, service providers and other partners who support Flybox's business globally, including providing technical infrastructure services, analyzing how our services are used or potential risks, advertising services, shipping, warehousing , customs clearance, terminal collection and delivery, payment facilitation, providing customer service, providing data storage or data analysis services, providing third-party additional business function services (such as voice input, map function) or conducting academic research and surveys. We will agree to strict data protection measures with them, and make them process personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures. 5.2 Assignment We will not transfer your personal information to any companies, organizations and individuals, except in the following cases: 5.2.1 Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties; 5.2.2 In the event of merger, acquisition or bankruptcy liquidation of E2G service providers, or other situations involving merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will require new companies holding your personal information, Organizations continue to be bound by this policy, or we will require the company, organization, and individual to seek your authorization again. 5.3 Public disclosure We will only publicly disclose your personal information in the following circumstances: 5.3.1 With your explicit consent or based on your active choice, we may publicly disclose your personal information; 5.3.2 If we determine that you have violated laws and regulations or seriously violated relevant agreements and rules of E2G platform, or to protect the personal and property safety of E2G platform users or the public from infringement, we may, in accordance with laws and regulations or ask you Disclose personal information about you with your consent, including related violations and the measures that E2G platform has taken against you. 5.3.3 Disclosure according to the mandatory requirements of government authorities and judicial authorities.

6 How we protect and manage your information

6.1 How we keep your personal information safe 6.1.1 We have taken reasonable and feasible security protection measures in line with industry standards to protect your information and prevent personal information from unauthorized access, public disclosure, use, modification, damage or loss. For example, the data exchange between your browser and the server is protected by SSL protocol encryption; we also provide HTTPS protocol secure browsing method for E2G website; we will use encryption technology to improve the security of personal information; we will use trusted We will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information . 6.1.2 We will take reasonable and practicable measures to try our best to avoid collecting irrelevant personal information. We will only retain your personal information for as long as is necessary to achieve the purposes described in this policy (unless there is a mandatory retention requirement by law). 6.1.3 The Internet is not an absolutely safe environment. When using E2G platform services, we strongly recommend that you do not use the communication methods not recommended by E2G platform to send your information. You can connect and share with each other through our services. When you create a communication, transaction or sharing through our services, you can choose the object of communication, transaction or sharing independently, as a third party who can see your transaction content, contact information, exchange information or shared content and other related information. Please properly protect your personal information and only provide it to others when necessary. If you find that your personal information, especially your account or password, has been leaked, please contact E2G customer service immediately so that we can take corresponding measures according to your application. 6.1.4 We will update and disclose relevant content such as security risks and personal information security impact assessment reports from time to time, which you can obtain through announcements on E2G's official website. 6.1.5 In the event of an unfortunate personal information security incident, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the measures we have taken or will take, and you can prevent and reduce risks on your own advice, remedies for you, etc. We will inform you of the relevant circumstances of the event by email, letter, phone call, push notification, etc. When it is difficult to inform the personal information subjects one by one, we will publish announcements in a reasonable and effective way. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of regulatory authorities. 6.2 Retention period of personal information 6.2.1 Your account information, related rights and interests in the account, and virtual asset information will be deleted immediately after you cancel your account, but the account of individual ordering channels has a certain period of retrogression (such as 30 days), and the information will be stored in the account. Deleted after the deadline. Once deleted, such information cannot be recovered. 6.2.2 In order to meet your inquiry needs, your waybill information will be kept in the front-end system of Flybox for a period ranging from six months to one year (depending on the specific order channel). Person, recipient's mobile phone number or waybill number can check the shipment routing information on E2G's official website. After the deadline is met, we will remove your waybill information from the front desk system to keep it in an unretrievable and accessible state, or Anonymize it. 6.2.3 Your personal information will be stored in the E2G background system for a longer period of time, and the specific period will be determined according to the type of personal information, legal and regulatory requirements, and meeting the purposes described in this policy. 6.2.4 If we terminate the service or operation, we will notify you at least 30 days in advance, and delete or anonymize your personal information after the termination of the service or operation. 6.3 How you manage your information You can access and manage your information in the following ways: 6.3.1 Inquiring about your information You have the right to inquire about your information. You can inquire about your information by yourself in the following ways: (1) Account information: If you wish to access or edit your basic profile information and payment information in your account, change your password, add security information or close your account, etc., you can do so through "Account Management" by logging in to your account. (2) Order information: You can check your order records, transaction records, etc. in the Flybox system. If you are unable to inquire about such information through the above path, you can contact us at any time through E2G customer service. We will respond to your request for access. For other personal information generated during your use of our services, we will provide you with the relevant arrangements in this article "6.3.6 Responding to your above request". 6.3.2 Correcting or supplementing your information You have the right to ask us to make corrections or supplements when you find that the information we process about you is inaccurate. You can apply for correction or supplementation through the methods listed in "6.3.6 Inquiry of Your Information". 6.3.3 Deletion of your information You may request us to delete personal information in the following circumstances: (1) If our processing of personal information violates laws and regulations; (2) If we collect and use your personal information without your explicit consent; (3) If our handling of personal information seriously violates our agreement with you; (4) If you no longer use our products or services, or you voluntarily cancel your account; (5) If we permanently cease to provide you with products or services. If we decide to respond to your deletion request, we will also try our best to notify the subjects who have obtained your personal information from us and require them to delete it in a timely manner (unless otherwise provided by laws and regulations, or these subjects have independently obtained your authorization) . When you or we assist you to delete the relevant information, we may not be able to delete the corresponding information from the backup system immediately because of applicable laws and security technology, we will store your personal information securely and isolate it from any further processing, Until the backup can be cleared or anonymous. 6.3.4 Change the scope of your authorization and consent Each business function requires some basic personal information to be completed. In addition, you can give or withdraw your access to the address book, implement geographic location, camera function, recording function, etc. by setting in "Account Management" or contacting E2G customer service or changing the settings of your smart mobile device. authorized consent. When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization. 6.3.5 Constrained Information System Automatic Decision-Making In some business functions, we may only make decisions based on non-human automatic decision-making mechanisms, including information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us to make an explanation, and we will also provide a method of appeal on the premise of not infringing on E2G's trade secrets or other user rights and public interests. 6.3.6 In response to your above request For security, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. For your reasonable requests, we do not charge fees in principle, but for repeated requests that exceed a reasonable limit, we will charge a fee at our discretion. Requests for information not directly related to your identity, unwarranted duplication of information, or requests that require excessive technical means (for example, the need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are impractical , we may reject it. In the following cases, we will not be able to respond to your request in accordance with the requirements of laws and regulations: (1) Related to national security and national defense security; (2) Those related to public safety, public health, and major public interests; (3) related to criminal investigation, prosecution, trial and execution of judgments, etc.; (4) There is sufficient evidence to show that the subject of personal information has subjective malice or abuse of rights; (5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations; (6) Involving commercial secrets.

7 How we handle information about minors

In e-commerce activities, we presume that you have the corresponding capacity for civil conduct. If you are a minor, we require you to ask your parents or guardians to read this Privacy Policy carefully, and to use our services or provide us with information with the consent of your parents or guardians. If you are the guardian of a minor, when you have questions about the personal information of the minor under your guardianship, please contact us through the contact information in Article 10. For the collection of minors' personal information using our products or services with the consent of parents or guardians, we will only use, share, and transfer minors' personal information permitted by laws and regulations, express consent of parents or guardians, or necessary to protect minors or disclose this information.

8 How your information is transferred around the world

8.1.1 In principle, the personal information we collect and generate within a country/region will be stored within that country/region. 8.1.2 However, since you will carry out the parcel East2Global transportation business through the partners of the E2G platform, E2G will transmit the information of the international parcel waybill to the original collection country/Affiliates, partners in countries outside the region. In addition, your personal information may also be transferred to countries/regions other than the country/region of original collection for the other purposes stated in this policy. 8.1.3 Such countries may have different data protection laws or even no relevant laws. In such cases, we will ensure that your personal information is protected adequately and equitably in the country of original collection. For example, the waybill information is encrypted and transmitted, the security capability level of the recipient is regularly assessed and audited, and the data processing agreement/clause is signed.

9 How this Privacy Policy is updated

9.1.1 Our Privacy Policy is subject to change. 9.1.2 We will not limit your rights under this Privacy Policy without your express consent. We will post any changes to the Privacy Policy on a dedicated page. 9.1.3 For major changes, we will also provide more prominent notices (including that we will notify you through the fly box publicity or even provide you with pop-up prompts). 9.1.4 The material changes referred to in this policy include but are not limited to: 1) Significant changes to our service model. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.; 2) Significant changes in our control, etc. Such as changes of information controllers caused by mergers and acquisitions, etc.; 3) The main object of personal information sharing, transfer or public disclosure has changed; 4) Your right to participate in the processing of personal information and the way you exercise it have undergone significant changes; 5) The responsible department, contact information and complaint channels that we are responsible for handling personal information security have changed; 6) The personal information security impact assessment report indicates that there is a high risk.

10 How to contact us

10.1.1 You can contact us in the following ways and we will respond to your request within a certain period of time. 10.1.2 If you have any questions, comments or suggestions about the content of this policy, you can contact us through the E2G customer service hotline "400-150-1188" and the E2G service center online customer service.