Privacy Policy
Effective Date: 01 July 2022

Special Note

Welcome to use Ecloud service Logistics! Ecloud service logistics service provider (hereinafter referred to as "us")We are fully aware of the importance of personal information to you, and will do our best to protect the safety and reliability of your personal information. We are committed to maintaining your trust in us and handling your personal information in accordance with the principles of lawfulness, fairness, necessity and good faith. Therefore, this "Privacy Policy" (hereinafter referred to as "this policy")So that you can fully understand how we collect, use, save, share and transfer this information when you use Ecloud service Logistics, and how we provide you with access, update, deletion and protection of this information.

Before you use Ecloud service Logistics, please read this policy carefully and fully understand the terms and conditions. You can make the choices you deem appropriate in accordance with the guidelines of this privacy policy. For the relevant terms involved in this Privacy Policy, we try to be concise and concise for your better understanding. If you have any questions, please contact us.


1. Personal Information

Personal information refers to various information recorded electronically or in other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information.

2.Sensitive Personal Information

 Once leaked or illegally used, personal information that is likely to cause damage to the personal dignity of a natural person or endanger personal and property safety, including biometrics, religious beliefs, specific identities, medical and health, financial accounts, whereabouts and other information, as well as information on dissatisfaction 14 Personal information of minors one year old,

3.Authorized Consent

It means that you expressly authorize the specific processing of your personal information, including authorization through positive actions (that is, express consent), and authorization through negative omissions.


Refers to the process of technical processing of personal information so that the subject of personal information cannot be identified or associated, and the processed information cannot be recovered.


The process by which personal information is processed so that it cannot identify a specific natural person without the aid of additional information.

6.Log Information

The content you publish and browse when you use our platform, the operation time, type, original network address, destination address, port, date and time of access, and login IP  information when you publish the content.

7.Device Information

Including device identifiers (IMEI, IDFA, Android, ID, MAC, OAID, IMSI and other device-related information), application information (application crash information, notification switch status, application installation list and other application-related information), device parameters and system Information (device type, device model, operating system and hardware-related information), device network environment information (IP address, WiFi information, base station information and other network-related information). The actual collection of the product shall prevail.

8.Precise Positioning Information

means GPS or base station information, which is sensitive personal information. In order to collect the above information, we need to apply for the location permission that you authorize us to use the device.

9.Ecloud service International Logistics

Refers to the Ecloud service website and its client programs, mobile application products, and small programs.

10.Cloud God Horse Provider

Refers to  Shenzhen Zhiyun Medical Service Co., Ltd.


Refers to minors under the age of fourteen.

Privacy Policy

1.This policy will help you understand the following:

1.1.How we collect and use your personal information


1.3.How we share, transfer, and publicly disclose your personal information

1.4.How we protect your personal information

1.5.How you manage your personal information

1.6.How we process personal information of minors

1.7.How this Privacy Policy is Updated

1.8.How to contact us

2.How we collect and use your personal information

2.1.We will follow the principles of legitimacy, lawfulness, and necessity, and for the following purposes described in this policy, collect and use the personal information you provide in the process of using Ecloud service Logistics or generated due to the use of Ecloud service Logistics, as well as from Third parties obtain personal information about you.If we want to use your personal information for other purposes not specified in this policy, or use the information collected for a specific purpose for other purposes, we will inform you in a reasonable manner and ask again before use with your consent. When you cancel your account, we will stop using and delete the above information.

2.2.Circumstances in which you must authorize us to collect and use your personal information

2.2.1.Our Ecloud service logistics platform includes some core functions, and we may collect, save and use the following information about you to achieve the above functions. If you do not provide relevant information, you will not be able to enjoy the products and services we provide. These features include: registration, login and verification

When you sign up for a Ecloud service logistics platform account, you must at least provide us with the information you plan to useAccount name, password, your own mobile phone number, email address,We will verify whether your identity information is valid by sending SMS verification code or email. purchase and payment function

In order to facilitate the delivery of goods or services to you, you shall at least provide us withConsignee's personally identifiable information (including name, delivery address, postal code, contact number) and payment status information.If you refuse to provide such information, we will not be able to complete the delivery. Function

In order to improve the security of your use of our products and services, protect the personal and property safety of you or other users, better prevent phishing websites, fraud, network vulnerabilities, computer viruses and other security risks, and more accurately identify violations of laws and regulations and other circumstances, we may collect, use or integrate your account information, transaction information, and device information to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary records and audits in accordance with the law. , analysis and treatment measures.

2.3.Circumstances in which you may choose to provide personal information

In order for you to use the Ecloud service logistics service more conveniently or more interestingly, thereby enhancing your experience in use, our following extended functions may use your mobile phone and your personal information.If you do not provide this personal information, you can still use the core functions of the Ecloud service logistics platform, but you may not be able to use the extended functions we provide you or you need to fill in some information repeatedly

2.4.You are fully aware that in the following situations, we do not need your authorization and consent to collect and use personal information

2.4.1.related to national security and national defense security.

2.4.2.Those related to public safety, public health, and major public interests.

2.4.3.Related to criminal investigation, prosecution, trial and execution of judgments.

2.4.4.In order to protect the personal information subject or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain the consent of the person.

2.4.5.The collected personal information is disclosed to the public by the personal information subject or guardian.

2.4.6.Your personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

2.4.7.Necessary to enter into a contract according to your requirements.

2.4.8.Necessary for maintaining the safe and stable operation of the products and/or services provided, such as finding and dealing with faults in the products and/or services.

2.4.9.Required for legitimate news reporting.

2.4.10.When it is necessary for an academic research institution to carry out statistical or academic research based on public interests, and when it provides the results of academic research or description, it de-identifies the personal information contained in the results.

2.4.11.Other circumstances stipulated by laws and regulations.


3.1.We may obtain and use your information through the use of cookies or similar technologies, and store this information as log information.

3.2.By using cookies, we provide our users with a simple and personalized web experience. A COOKIES is a small amount of data that is sent to your browser from a web server and stored on your computer's hard drive. We use cookies for the benefit of their users.

3.3.COOKIES enables us to serve you better and faster, and make your experience on the Ecloud service logistics platform service more personalized. You may refuse or manage cookies or similar technologies through your browser or user choice mechanism. However, please note that if you disable cookies or similar technologies, we may not be able to provide you with the best service experience, and some services may not work properly.

3.4.We use our own cookies or similar technologies, which may be used for the following purposes:

3.4.1.Remember who you are.

3.4.2.To analyze your use of our services.

3.4.3.Ad optimization.

3.5.If you wish to disable COOKIES, you can configure your browser to select "Reject COOKIES" or "Notify you when a website sends COOKIES". Since our services are implemented by supporting cookies, after completing the operation of closing cookies, your access to Weibo may be affected or you may not be able to fully obtain our services. When you do not disable cookies, you may be prompted, such as whether to retain user information the next time you enter this website, to simplify login procedures (such as automatic login).

4.How we share, transfer or publicly disclose your personal information

4.1.Delegated processing

4.1.1.If we entrust a third party to process your personal information, we will agree with the entrusted person on the purpose, time limit, processing method, type of personal information, protection measures, rights and obligations of both parties, etc. Supervision of information processing activities.


4.2.1.We share your personal information under the premise of abiding by the "lawful and justifiable, least necessary and clear-purpose principles". At the same time, we will conduct a personal information protection impact assessment in advance for the sharing of personal information, and take effective technical protection measures for the output form, circulation, and use. At the level of cooperation agreements, the information protection obligations and responsibilities of partners are strictly required, and data security protection agreements are signed with business partners before cooperation.

4.2.2.We will not share your information with any third party outside of our company, except in the following cases:

(1) Obtain your express consent or authorization in advance.

(2) Share your information externally in accordance with applicable laws and regulations, the requirements of legal procedures, and mandatory administrative or judicial requirements.

(3) Only by sharing your personal information can we realize the core functions of our products and services or provide the services you need.

(4) In order to provide you with relevant products or services, show you content that may be of interest to you, protect your account and transaction security, etc.,We may share your personal information with our affiliates. We will share your personal information with our affiliates in accordance with this Privacy Policy, but we will only share necessary personal information and are bound by the purposes stated in this Privacy Policy. If our affiliates want to change the purpose of processing personal information, they will seek your authorization again.

(5)Shared with authorized partners. We may entrust authorized partners to provide certain services to you or perform functions on our behalf. We will only share your personal information for legal, legitimate, necessary, specific and explicit purposes, and only share personal information necessary to provide services. Our partners are not authorized to use the shared personal information for any other purpose.

(6) Provided according to the single service agreement signed with you or other legal documents.


4.3.1.Transfer is the process of transferring control of personal information to another company, organization or individual.

4.3.2.We will not transfer your personal information to any third party other than our company, except in the following cases:

(1) Obtain your express consent or authorization in advance.

(2) With the continuous development of our business,In the event of our merger, acquisition or bankruptcy, your information may be transferred as part of such transaction. If it involves the transfer of personal information, we will require the new company, organization, or individual that holds your personal information to continue to be bound by this policy, otherwise we will require the company, organization, or individual to seek your authorization and consent again.

4.4.public disclosure

4.4.1.We will not publicly disclose your personal information to any third party other than our company, except in the following cases:

(1) We may publicly disclose your personal information in accordance with the needs of laws and regulations, litigation and dispute resolution, or as required by administrative and judicial authorities.

(2) According to your needs, disclose the information you designate under the disclosure method that you expressly agree to.

5.How we protect your personal information

5.1.We have adopted industry-standard security technology and organizational and management protection measures to minimize the risk of your information being leaked, damaged, misused, unauthorized access, unauthorized disclosure and alteration.

5.1.1.Data security technical measures will adopt industry-standard security protection measures, including establishing reasonable system specifications and security technologies to prevent your personal information from being accessed, used and modified without authorization, and to avoid data damage or loss. network services adopt encryption technologies such as transport layer security protocol, and provide browsing services through https and other methods to ensure the security of user data during transmission. adopt encryption technology to encrypt and store users' personal information, and isolate them through isolation technology. use strict data access control and multi-factor authentication technology to protect personal information and prevent data from being used illegally. use code security automatic inspection and data access log analysis technology to conduct personal information security audits.

5.1.2.Other security measures we take to protect personal information manage and regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications. have comprehensive security controls over data through contact confidentiality agreements, monitoring and auditing mechanisms.

5.2.Please be aware that although we will try our best to ensure the security of any information you send to us, the Internet environment is not 100% secure and we are not responsible for any risks or losses arising from or related to it.

5.3.In the event of an unfortunate personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the measures you can take to prevent and reduce risks on your own. Recommendations, remedies for you, etc. We will promptly notify you of the event-related procedures by email, letter, telephone, push notification, etc. When it is difficult to inform the personal information subjects one by one, we will publish announcements in a reasonable and effective way. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

6.How you manage your personal information

6.1.Access and Correct Your Personal Information

6.1.1.Except as provided by laws and regulations, you have the right to access and correct your personal information at any time, including: account information, browsing information, and comment information.

6.1.2.For other personal information you need to access or correct during the use of our products and services, please feel free to contact us. We will respond to your request in the manner and period set out in this Privacy Policy.

6.2.delete your personal information

6.2.1.In the following circumstances, you may request us to delete personal information through the methods set out in this policy:

(1) If our handling of personal information violates laws and regulations.

(2) If you no longer use our products and services, or you cancel your account.

(3) If we stop providing products and services, or the shelf life has expired.

(4) If you withdraw your consent.

(5) If the purpose for which we process personal information has been achieved, cannot be achieved or is no longer necessary to achieve the purpose of processing.

6.3.change or withdraw your consent

6.3.1.You can change the scope of your authorization for us to continue to collect personal information or withdraw your authorization by deleting information, turning off device functions, setting privacy settings on the Ecloud service website or software, etc. You can also withdraw all authorization for us to continue to collect your personal information by canceling your account.

6.3.2.Please understand that Ecloud service logistics platform may need to collect necessary personal information to achieve this.When you withdraw your consent, we will not be able to continue to provide you with the services corresponding to the withdrawal of consent, but will not affect the personal information processing services previously carried out based on your authorization.

6.4.Cancel your account

You can cancel your previously registered account by canceling online or by contacting customer service.

6.4.1.After you cancel your account, the content, information, data, records, etc. under the account will be deleted or anonymized (unless otherwise provided by laws and regulations or otherwise required by regulatory authorities). At the same time, once the account is cancelled, it cannot be restored.

6.5.In response to your above request

6.5.1.If you are unable to exercise your rights as described above, you can contact us using the contact information set out in this policy. To protect the security of your account, when you make the above request to us, we may ask you to verify your identity before processing your request.

6.5.2.For your reasonable requests, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost as appropriate. We may reject requests that are unreasonably repeated, require excessive technical means, pose risks to the legitimate rights and interests of others, or are very impractical.

6.5.3.Exceptions to Response Situations

We will not be able to respond to your request in the following circumstances:

(1)In connection with our performance of our obligations under laws and regulations.

(2)Directly related to national security and national defense security.

(3)Directly related to public safety, public health, and major public interests.

(4)Directly related to criminal investigation, prosecution, trial and enforcement of sentences.

(5)We have sufficient evidence to show that the subject of personal information has subjective malice or abuse of rights.

(6)In order to protect the personal information subject or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain the consent of the person.

(7)Responding to the request of the personal information subject will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations.

(8)involving trade secrets.

7.How we process personal information of minors

7.1.We attach great importance to the protection of minors' personal information. If you are a minor under the age of 18, before using our products and services,Your guardian's consent should be obtained in advance.We will protect the personal information of minors in accordance with relevant national laws and regulations.

7.2.We do not actively collect personal information from minors directly. For the collection of personal information of minors with the consent of the guardian, we will only use, share, transfer or disclose this information when permitted by law, consent of the guardian or necessary for the protection of minors.

7.3.If it is proved that minors use our products and services without the consent of the guardian, we will negotiate with the relevant guardian and try to delete the relevant personal information as soon as possible.

7.4.For minors under the age of 14, in addition to complying with the provisions of this Privacy Policy on user's personal information, we will also adhere to the principles of just necessity, informed consent, clear purpose, security and legal use, and strictly follow the requirements of laws and regulations such as the regulations on the protection of children's personal information network to store, use and disclose, and will not exceed the time limit necessary for the purpose of collection and use, After expiration, we will delete or anonymize the personal information of children.

7.5.If you are a parent or other guardian of a minor under the age of 14, we may need to collect personal information of the child under guardianship from you for the purpose of performing relevant services to you. If we need to collect children's personal information from you in specific services, we will obtain your authorization and consent in advance and inform you of the purpose and purpose of collection. If you do not provide the above information, you will not be able to enjoy the relevant services provided by us.

8.How is this Privacy Policy updated

8.1.Our privacy policy may change from time to time. We will immediately release any changes to this Privacy Policy in Yunshen. For major changes, we will provide more significant notice. Without your explicit consent, we will not reduce your rights under this privacy policy.

8.2.Material changes referred to in this Privacy Policy include, but are not limited to:

8.2.1.There has been a major change in our service model.

8.2.2.The main object of personal information sharing, transfer or public disclosure has changed.

8.2.3.Material changes to your rights to participate in the processing of personal information and how to exercise them.

8.2.4.Our contact details and complaint channels have changed.

8.2.5.When the personal information security impact assessment report indicates that there is a high risk.

8.3.We will archive older versions of this Privacy Policy for your review.

9.How to contact us

9.1.If you have any questions, comments or suggestions regarding this Privacy Policy, please contact us at:

Tel: 0755-27202030

Address: 9th Floor, Jiufang Chuangfu Science and Technology Park, Xixiang, Baoan District, Shenzhen


9.2.Generally, we will reply within fifteen working days. If you are dissatisfied with our response, especially if our personal information processing has damaged your legitimate rights and interests, you can also file a complaint or report to the regulatory authorities such as Internet, telecommunications, public security, and industry and commerce, or file a complaint with the defendant's domicile. A court of competent jurisdiction files a lawsuit to find a solution.