EZYid Cart

No products in the cart.

SSL Encrypted Checkout

EZYid Cart

No products in the cart.

SSL Encrypted Checkout



This is an agreement between you (referred to as ‘You’ or ‘Your’) and EZYiD Pty Ltd ABN 18 647 101 951 (referred to as ‘EZYiD’, ‘We’, ‘Our’ or ‘Us’), and it governs Your use of the EZYiD Asset Management Platform, EZYiD Remote Worker and EZYVRFY and associated applications (EZYiD AMP).



Please read the terms and conditions of this agreement carefully. If You take steps to operate the EZYiD AMP on Your Company’s Device (Device), You agree to be bound by them.



These terms and conditions continue to apply unless We notify You of any replacement or amended terms and conditions (please see the General Terms set out below), in which case those terms and conditions will apply to Your use of the EZYID AMP.





Acceptable use of the EZYIDAMP



We grant You a personal, limited, non-transferable, non-exclusive and revocable licence to use the EZYID AMP on Your Company’s Device and Corporate Account for professional use. You must not use the EZYID AMP for any other purposes.



You must not do any of the following:



  • install or use the EZYID AMP on any Device except a Device that is authorised for use by Your Company;
  • to violate, or encourage the violation of, the legal rights of others (for example, this may include allowing End Users to infringe or misappropriate the intellectual property rights of others in violation of the Digital Millennium Copyright Act);
  • copy, modify, adapt, extract (including for example, by downloading), reproduce or distribute any part of, or any content accessible though, the EZYID AMP;
  • reverse engineer any part of the EZYID AMP;
  • use any material or content in the EZYID AMP or accessible through the EZYID AMP as a stand-alone file;
  • remove, obscure or alter any legal notices displayed in the EZYID AMP;
  • attempt to circumvent, disable or defeat any of the security features or components that protect the EZYID AMP and You must not assist, authorise or allow others to do so; 
  • use the EZYID AMP to infringe any law, regulation, order or legislative instrument or to commit fraud or other offences.
  • to intentionally distribute viruses, worms, Trojan horses, corrupted files, hoaxes, or other items of a destructive or deceptive nature; or
  • to interfere with the use of the EZYiD AMP, or the equipment used to provide the EZYiD AMP, by customers, authorised resellers, or other authorised users;





Collection and use of asset data and non-personal information



We may collect, use and disclose non-personal information, which will include data, and technical and related information, Your use of the EZYID AMP, and the EZYID AMP itself, to facilitate ongoing development, quality assurance and updating of the EZYID AMP.   



The EZYiD AMP allows You to manage accurate records of Your assets including the performance of critical tasks and actions to maintain the integrity of Your assets.



The EZYiD AMP has been created to include the storage of key data on our distributed blockchain ledger. We have procured a licence from Industrial Blockchain to store and secure asset records on the blockchain.



We may collect, use and disclose non-personal information about how You navigate around the EZYiD AMP, asset storage patterns and the performance of the systems to facilitate Our evaluation and development of the EZYiD AMP and the use of blockchain technology in the supply chain industry generally. We may also disclose information that we collect to supplier participants including manufacturers of assets and products and associated stakeholders of EZYID AMP.



You agree that this information can be collected, used and disclosed by Us so long as it is not personal information.





Protecting Your Data



We take the security of Your data extremely seriously. We take a number of steps to protect your data from inappropriate access or use by unauthorized persons (either external or internal). Your data is only stored in our production environment, and access to that data by EZYiD authorised personnel is limited only to the authorised personnel who require access to perform their standard duties.



Your data is only used for purposes that are compatible with providing the contracted services, such as troubleshooting technical support requests.  In the event, that We need to access the full body of Your data, then We will always require consent from You before accessing this data. We do not store or cache Your financial data used in conjunction with billing through the ezyid.io platform, and our development and support team do not have direct access to billing data.



We store your data in a multitenant database where all customer data is stored in a single database identified by the tenant identifier. When you terminate your subscription with Us, We will delete your subscription or tenant identifier and endeavour to delete any referential data to your tenancy. Given the storage of referential data on multiple devices, we are unable to guarantee the deletion of such referential data on all cloud or mobile devices.



If You wish to save your asset data periodically or at the termination of Your subscription with Us, You can download your asset data to a comma delimited CSV file format via our Export Excel function.






Physical Access to Your Data



All of your data is hosted on infrastructure provided by Google Cloud Platform, which maintains physical security of their sites using industry best practice controls as outlined the HTTP reference below:









Encryption of Data



We have mechanisms in place to ensure that Your data is protected both at rest and when in transit. All of your data at rest on the Google Cloud Platform (GCP) is encrypted by default and subject to the security policies and procedures of GCP outlined above.






Backups of Data



All of your data is backed up at regular intervals and stored on online storage solutions provided by Google Cloud Platform. Access to data backups is restricted to only specific authorised personnel of EZYiD, where that access is required as part of their job role.






Deletion and Disposal of Data



Your data is principally stored in, and subject to the deletion and disposal procedures of Google Cloud Platform.