Privacy Policy

Last Updated: September 25, 2025

Introduction

Welcome to Earnify ("we," "us," "our," or "Company"). We are committed to protecting your privacy and ensuring transparency about how we collect, use, share, and protect your personal information. This Privacy Policy ("Policy") describes our privacy practices in relation to our income tracking and financial management application and associated services ("Service," "App," or "Platform").

This Policy applies to all users of Earnify, regardless of location or method of access. By using our Service, you acknowledge that you have read, understood, and agree to the collection, use, and disclosure of your information as described in this Privacy Policy.

Key Points:

  • We collect only the data necessary to provide our Service

  • We do not sell your personal information to third parties

  • You have control over your data and can delete it at any time

  • We implement industry-standard security measures to protect your information

  • We comply with GDPR, CCPA, and other applicable privacy regulations

1. Data Collection

1.1 Information You Provide to Us

Account and Profile Information: We collect information you provide when creating and maintaining your account:

  • Full name and email address

  • Account credentials (encrypted passwords or third-party authentication tokens)

  • Profile picture or avatar (if uploaded)

  • Account preferences and settings

  • Time zone and regional settings

  • Communication preferences

Financial and Income Data: We collect financial information you manually enter into the Service:

  • Income amounts, dates, and sources

  • Tax rates and contribution rates you configure

  • Transaction categories, tags, and descriptions

  • Payment methods and frequencies

  • Notes, comments, and custom fields you add

  • Historical income records and trends

  • Tax withholding and estimated payment information

Support and Communication Data: We collect information when you interact with our support team:

  • Customer service inquiries and correspondence

  • Feedback, suggestions, and feature requests

  • Survey responses and user research participation

  • Bug reports and technical issues

  • Review and rating submissions

Premium Subscription Data: For Premium users, we collect additional information:

  • Subscription plan and billing preferences

  • Payment history and transaction records (processed by third-party payment providers)

  • Feature usage and advanced analytics preferences

  • Export and data sharing preferences

1.2 Information We Collect Automatically

Device and Technical Information: We automatically collect technical data about your device and usage:

  • Device type, model, and operating system version

  • Browser type, version, and language settings

  • Screen resolution and device capabilities

  • Internet Protocol (IP) address and general geographic location (country/city level)

  • Network connection type and internet service provider

  • Unique device identifiers and mobile advertising IDs (where applicable)

Usage and Analytics Data: We collect information about how you use our Service:

  • Pages or screens viewed and time spent on each

  • Features used and frequency of usage

  • Navigation paths and user flow patterns

  • Session duration and frequency of app launches

  • Search queries and filter usage within the app

  • Button clicks, form interactions, and user interface engagement

  • Performance metrics including load times and response rates

  • Error logs, crash reports, and diagnostic information

Location Information: We collect limited location data:

  • Country and region information from IP address

  • Time zone information for accurate financial reporting

  • General location data for compliance with regional regulations

  • We do not collect precise GPS location unless explicitly requested and consented to

1.3 Information from Third-Party Sources

Authentication Services: When you sign up using third-party authentication:

  • Google Sign-In: Email address, name, profile picture, and basic profile information

  • Apple Sign-In: Email address (which may be masked), name, and basic authentication data

  • We only request the minimum information necessary for account creation

Payment and Billing Information: From our payment processors (Stripe, PayPal, Apple App Store, Google Play Store):

  • Payment confirmation and transaction status

  • Subscription status and billing cycle information

  • Refund and chargeback notifications

  • We do not store complete payment card details on our servers

Integration Partners: If you choose to connect third-party financial services:

  • Account balance and transaction data (only with your explicit consent)

  • Financial institution names and account types

  • Synchronized transaction information

  • Authentication tokens for ongoing data access

Public and Commercial Databases: In limited cases, we may supplement your information with:

  • Email validation and verification data

  • Fraud prevention and security screening information

  • Business information for commercial accounts

  • Regulatory compliance and sanctions screening data

2. How We Use Your Personal Information

2.1 Primary Service Functions

Core Service Delivery:

  • Providing income tracking and financial management capabilities

  • Performing tax calculations based on your input and configured rates

  • Generating financial reports, analytics, and insights

  • Maintaining your account and user profile

  • Synchronizing data across your devices

  • Enabling data export and backup functionality

Personalization and Optimization:

  • Customizing the user interface and experience based on your preferences

  • Providing relevant financial insights and recommendations

  • Optimizing app performance for your device and usage patterns

  • Tailoring feature suggestions and educational content

Data Processing and Analysis:

  • Processing and organizing your financial data for reporting

  • Calculating tax estimates and financial projections

  • Generating trend analysis and historical comparisons

  • Creating data visualizations and dashboard displays

2.2 Communication and Support

Customer Service and Support:

  • Responding to your inquiries and support requests

  • Providing technical assistance and troubleshooting

  • Resolving billing issues and subscription management

  • Delivering onboarding guidance and feature education

Service-Related Communications:

  • Sending account notifications and security alerts

  • Providing service updates and maintenance notices

  • Communicating policy changes and terms updates

  • Delivering subscription and billing notifications

Marketing and Promotional Communications (with consent):

  • Sharing product updates and new feature announcements

  • Providing educational content and financial tips

  • Sending promotional offers and subscription upgrades

  • Conducting user surveys and feedback collection

2.3 Security and Fraud Prevention

Account Security:

  • Monitoring for suspicious login attempts and unauthorized access

  • Implementing multi-factor authentication and security protocols

  • Detecting and preventing fraudulent activities

  • Maintaining audit logs for security purposes

System Security:

  • Protecting against malware, viruses, and cyber attacks

  • Monitoring system performance and identifying vulnerabilities

  • Implementing access controls and data protection measures

  • Conducting security assessments and penetration testing

2.4 Legal Compliance and Business Operations

Regulatory Compliance:

  • Complying with financial services regulations and reporting requirements

  • Meeting data protection and privacy law obligations (GDPR, CCPA, etc.)

  • Responding to legal requests and court orders

  • Conducting know-your-customer (KYC) and anti-money laundering (AML) procedures where required

Business Intelligence and Analytics:

  • Analyzing usage patterns to improve our Service

  • Conducting market research and competitive analysis

  • Measuring feature adoption and user engagement

  • Planning product development and business strategy

Internal Operations:

  • Managing customer relationships and account administration

  • Processing subscription payments and billing operations

  • Conducting financial reporting and accounting procedures

  • Maintaining business records and documentation

2.5 Research and Development

Product Improvement:

  • Analyzing user behavior to enhance existing features

  • Identifying pain points and areas for improvement

  • Testing new functionality and user interface changes

  • Optimizing performance and user experience

Innovation and New Features:

  • Researching market trends and user needs

  • Developing new financial tools and capabilities

  • Creating educational resources and content

  • Expanding integration opportunities with third-party services

Quality Assurance:

  • Testing software updates and new releases

  • Monitoring system stability and performance

  • Identifying and fixing bugs and technical issues

  • Ensuring cross-platform compatibility and functionality

3. Legal Basis for Data Processing (GDPR Compliance)

For users in the European Economic Area (EEA), United Kingdom, and Switzerland, we process your personal data based on the following lawful bases under the General Data Protection Regulation (GDPR):

3.1 Contractual Necessity (Article 6(1)(b) GDPR)

We process your data to:

  • Provide the Earnify Service as described in our Terms of Service

  • Create and manage your user account

  • Process Premium subscription payments and billing

  • Deliver customer support and technical assistance

  • Enable core functionality including income tracking and tax calculations

3.2 Legitimate Interests (Article 6(1)(f) GDPR)

We process your data based on our legitimate business interests to:

  • Improve and optimize our Service through usage analytics

  • Ensure the security and integrity of our systems and data

  • Prevent fraud, abuse, and security threats

  • Conduct business development and strategic planning

  • Communicate with you about service-related matters

  • Comply with legal obligations and protect our legal rights

We have conducted legitimate interest assessments and implement appropriate safeguards to ensure our interests do not override your fundamental rights and freedoms.

3.3 Consent (Article 6(1)(a) GDPR)

We process your data based on your explicit consent for:

  • Marketing communications and promotional messages

  • Optional features and enhanced functionality

  • Third-party integrations and data sharing

  • Non-essential cookies and tracking technologies

  • Participation in surveys, research, and beta testing programs

You may withdraw your consent at any time through your account settings or by contacting us directly.

3.4 Legal Obligation (Article 6(1)(c) GDPR)

We process your data to comply with legal requirements:

  • Responding to lawful requests from government authorities

  • Meeting financial services regulations and reporting obligations

  • Retaining records as required by applicable laws

  • Implementing sanctions screening and compliance procedures

3.5 Vital Interests (Article 6(1)(d) GDPR)

In exceptional circumstances, we may process data to protect vital interests:

  • Preventing harm to individuals or public safety

  • Responding to emergency situations and security threats

  • Protecting against illegal activities that could cause harm

4. Data Sharing and Disclosure

4.1 Our Commitment to Data Privacy

We do not sell, rent, lease, or trade your personal information to third parties for their marketing purposes. We only share your information in the specific, limited circumstances described in this section, and we require all recipients to maintain appropriate privacy and security protections.

4.2 Service Providers and Business Partners

We engage trusted third-party service providers to help us operate and improve our Service. These providers have access to your information only to perform specific functions on our behalf and are contractually obligated to protect your data.

Infrastructure and Technology Providers:

  • Cloud Computing Services: Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform or similar services for secure data hosting and storage

  • Content Delivery Networks: CloudFlare or similar services for performance optimization

  • Database Services: Managed database providers for secure data storage and backup

  • Monitoring and Analytics: Application performance monitoring and error tracking services

Payment and Financial Services:

  • Payment Processors: Stripe, PayPal, Apple App Store, Google Play Store for subscription billing and payment processing

  • Banking Partners: Financial institutions for payment settlement and transaction processing

  • Fraud Prevention: Anti-fraud services for transaction monitoring and risk assessment

Communication and Support:

  • Email Services: Transactional email providers for account notifications and communications

  • Customer Support: Help desk platforms and customer relationship management systems

  • Push Notifications: Mobile notification services for app alerts and updates

Business Intelligence and Analytics:

  • Usage Analytics: Privacy-focused analytics services that provide insights without compromising user privacy

  • Performance Monitoring: Application monitoring tools for system health and performance optimization

  • Security Services: Cybersecurity providers for threat detection and incident response

4.3 Legal Requirements and Protection of Rights

We may disclose your information when required by law or when we believe in good faith that disclosure is necessary to:

Legal Process and Government Requests:

  • Comply with valid legal process, including subpoenas, court orders, and search warrants

  • Respond to lawful requests from government agencies and regulatory authorities

  • Meet legal obligations under applicable financial services regulations

  • Cooperate with law enforcement investigations and proceedings

Protection of Rights and Safety:

  • Protect our rights, property, and legitimate business interests

  • Safeguard the rights, property, and safety of our users and the general public

  • Investigate and prevent fraud, abuse, and violations of our Terms of Service

  • Respond to claims of illegal activity or infringement of third-party rights

  • Defend against legal claims and potential litigation

Emergency Situations:

  • Protect against imminent threats to physical safety or security

  • Prevent harm to minors or vulnerable individuals

  • Respond to medical emergencies or safety threats

4.4 Business Transactions

In the event of a corporate transaction, your information may be disclosed or transferred:

Mergers and Acquisitions:

  • During due diligence processes for potential business combinations

  • Upon completion of mergers, acquisitions, or similar transactions

  • To successor entities that assume our obligations under this Privacy Policy

Asset Sales and Transfers:

  • Sale or transfer of business assets, including user databases

  • Bankruptcy proceedings or business reorganization

  • Spin-offs or divestiture of business units

Safeguards in Business Transactions:

  • Buyers must agree to honor the commitments made in this Privacy Policy

  • Users will be notified of material changes to data handling practices

  • Reasonable efforts will be made to ensure continued protection of personal information

4.5 Aggregated and De-Identified Information

We may share aggregated, de-identified, or anonymized information that cannot reasonably be used to identify you:

Research and Analytics:

  • Industry trends and market research reports

  • Academic research and economic analysis

  • Product development and feature planning

  • Performance benchmarking and competitive analysis

Business Intelligence:

  • Aggregate usage statistics and feature adoption rates

  • General demographic and geographic trends

  • System performance and reliability metrics

  • Security threat intelligence and fraud patterns

4.6 With Your Explicit Consent

We may share your information for additional purposes with your explicit, informed consent:

Third-Party Integrations:

  • Financial services and banking applications you choose to connect

  • Tax preparation software and accounting platforms

  • Budgeting tools and personal finance management applications

  • Business expense and invoicing platforms

Partner Programs:

  • Referral programs and affiliate partnerships (with opt-in participation)

  • Co-marketing initiatives and joint promotional campaigns

  • Educational content and financial wellness programs

  • Industry associations and professional networks

Data Portability:

  • Sharing data with new service providers when you request data portability

  • Exporting data to third-party platforms for analysis or backup

  • Transferring data as part of switching to alternative financial management tools

5. Data Security and Protection Measures

5.1 Comprehensive Security Framework

We implement a multi-layered security approach to protect your personal information against unauthorized access, use, disclosure, alteration, and destruction.

Security Governance:

  • Chief Information Security Officer (CISO) oversight of security programs

  • Regular security policy reviews and updates

  • Employee security training and awareness programs

  • Third-party security assessments and penetration testing

  • Incident response and business continuity planning

Risk Management:

  • Comprehensive risk assessments and threat modeling

  • Vulnerability management and patch deployment procedures

  • Security metrics monitoring and reporting

  • Regular security audits and compliance assessments

  • Continuous improvement of security controls and processes

5.2 Technical Security Measures

Encryption and Cryptography:

  • Data in Transit: All data transmissions use TLS 1.3 or higher encryption protocols

  • Data at Rest: Sensitive data is encrypted using AES-256 encryption standards

  • Database Encryption: Full database encryption with key management systems

  • Backup Encryption: All backup data is encrypted using industry-standard algorithms

  • Key Management: Secure key generation, storage, and rotation procedures

Network and Infrastructure Security:

  • Firewalls and Intrusion Detection: Multi-layer firewall protection with real-time threat monitoring

  • DDoS Protection: Distributed denial-of-service attack mitigation and response

  • Network Segmentation: Isolated network environments for different system components

  • VPN Access: Secure remote access for authorized personnel only

  • Security Monitoring: 24/7 network monitoring and automated threat response

Application Security:

  • Secure Development: Security-by-design principles and secure coding practices

  • Code Reviews: Regular security code reviews and static analysis testing

  • Dependency Management: Automated vulnerability scanning of third-party libraries

  • Web Application Firewall: Protection against common web application attacks

  • API Security: Secure API design with authentication and rate limiting

Data Center Security:

  • Physical Security: Biometric access controls and 24/7 security monitoring

  • Environmental Controls: Climate control and power backup systems

  • Asset Management: Secure hardware disposal and data destruction procedures

  • Redundancy: Geographically distributed data centers for business continuity

5.3 Access Control and Authentication

Identity and Access Management:

  • Multi-Factor Authentication: Required for all administrative access and available for user accounts

  • Role-Based Access Control: Granular permissions based on job responsibilities and need-to-know basis

  • Privileged Access Management: Enhanced controls for accounts with administrative privileges

  • Single Sign-On: Centralized authentication systems for internal applications

  • Access Reviews: Regular reviews and recertification of user access rights

User Authentication:

  • Strong Password Requirements: Minimum complexity standards and password strength validation

  • Session Management: Secure session handling with automatic timeout and invalidation

  • Device Recognition: Trusted device registration and anomaly detection

  • Login Monitoring: Real-time monitoring for suspicious login activities

  • Account Lockout: Automated account lockout for failed authentication attempts

5.4 Data Protection and Privacy Controls

Data Minimization and Purpose Limitation:

  • Collection of only necessary data for specified purposes

  • Regular data audits to identify and remove unnecessary information

  • Automated data retention and deletion procedures

  • Privacy-by-design principles in system development and data processing

Data Loss Prevention:

  • Content Inspection: Automated scanning for sensitive data in files and communications

  • Endpoint Protection: Data loss prevention software on all devices with data access

  • Email Security: Encrypted email systems and content filtering for sensitive information

  • Removable Media Controls: Restrictions on use of USB drives and external storage devices

  • Print and Copy Controls: Monitoring and restrictions on printing and copying sensitive data

5.5 Incident Response and Business Continuity

Security Incident Response:

  • Incident Response Team: Dedicated team with defined roles and responsibilities

  • Response Procedures: Documented procedures for incident identification, containment, and recovery

  • Communication Plans: Internal and external communication protocols for security incidents

  • Forensic Capabilities: Digital forensics tools and expertise for incident investigation

  • Lessons Learned: Post-incident analysis and security improvement implementation

Business Continuity and Disaster Recovery:

  • Backup Systems: Regular, automated backups with offsite storage and encryption

  • Recovery Procedures: Documented procedures for system restoration and data recovery

  • Failover Systems: Redundant systems and infrastructure for business continuity

  • Testing and Validation: Regular testing of backup and recovery procedures

  • Recovery Time Objectives: Defined targets for system restoration and service availability

5.6 Third-Party Security Management

Vendor Risk Management:

  • Security Assessments: Comprehensive security evaluations of all third-party providers

  • Contractual Requirements: Security and privacy obligations in all vendor contracts

  • Ongoing Monitoring: Regular security reviews and performance monitoring of vendors

  • Incident Coordination: Coordinated incident response procedures with third-party providers

  • Data Processing Agreements: Formal agreements governing data processing by third parties

Supply Chain Security:

  • Vendor Due Diligence: Security assessments and background checks for critical suppliers

  • Software Supply Chain: Security validation of third-party software and components

  • Hardware Security: Secure procurement and configuration of hardware systems

  • Service Provider Audits: Regular audits and assessments of key service providers

  • Risk Assessment: Ongoing evaluation of third-party security risks and mitigation measures

6. Data Retention and Deletion

6.1 Data Retention Principles

We retain your personal information only for as long as necessary to fulfill the purposes for which it was collected, comply with legal obligations, resolve disputes, and enforce our agreements. Our retention practices are based on the following principles:

Purpose Limitation:

  • Data is retained only for the specific purposes for which it was originally collected

  • When the original purpose no longer applies, data is reviewed for deletion or anonymization

  • Retention periods are regularly reviewed and updated based on business needs and legal requirements

Data Minimization:

  • We regularly review stored data to identify and delete information that is no longer necessary

  • Automated processes help identify data that has exceeded its retention period

  • We maintain only the minimum amount of data necessary for each specific purpose

Legal and Regulatory Compliance:

  • Retention periods comply with applicable laws and regulations in relevant jurisdictions

  • Financial records may be retained longer to meet tax and regulatory requirements

  • Legal hold procedures preserve data when required for litigation or investigations

6.2 Specific Retention Periods

Account and Profile Information:

  • Active Accounts: Retained while your account remains active and for up to 12 months after account closure

  • Inactive Accounts: Accounts inactive for more than 2 years may be automatically deleted after notice

  • Profile Data: Basic profile information retained for customer service purposes for up to 3 years after account deletion

  • Authentication Data: Login credentials and security information deleted within 30 days of account closure

Financial and Transaction Data:

  • Income Records: Retained for up to 7 years to comply with tax record-keeping requirements

  • Tax Calculations: Historical tax estimates and calculations retained for 7 years

  • Premium Subscription Data: Billing and payment history retained for up to 7 years for accounting and tax purposes

  • Export Data: Downloaded data exports are not retained on our servers beyond the download session

Communication and Support Data:

  • Customer Support: Support tickets and communications retained for 3 years for quality assurance and training

  • Email Communications: Service-related emails retained for 2 years; marketing emails for 1 year after opt-out

  • Feedback and Surveys: User feedback and survey responses retained for 2 years for product improvement

  • Bug Reports: Technical issue reports retained for 1 year or until resolution, whichever is longer

Usage and Analytics Data:

  • Application Logs: Detailed usage logs retained for 12 months for security and performance analysis

  • Analytics Data: Aggregated usage statistics retained for 24 months for trend analysis and product development

  • Error Logs: Technical error logs and crash reports retained for 18 months for debugging and improvement

  • Security Logs: Security-related logs retained for 24 months for compliance and incident response

Device and Technical Information:

  • Device Data: Device identifiers and technical specifications retained for 18 months

  • IP Address Logs: IP addresses retained for 12 months for security and fraud prevention

  • Session Data: User session information retained for 90 days for security monitoring

  • Location Data: General location information retained for 6 months for regulatory compliance

6.3 Data Deletion Procedures

User-Initiated Deletion: Users can request deletion of their data through multiple channels:

Account Settings:

  • Self-service data deletion options in account management interface

  • Selective deletion of specific data categories or time periods

  • Bulk export options before deletion for personal backup purposes

  • Confirmation procedures to prevent accidental deletion

Customer Support:

  • Data deletion requests through customer support channels

  • Identity verification procedures for deletion requests

  • Guidance on data export options before deletion

  • Confirmation of deletion completion within specified timeframes

Automated Deletion Processes:

  • Scheduled Deletion: Automated deletion of data that has exceeded retention periods

  • Account Closure: Systematic deletion of account data following closure procedures

  • Data Aging: Progressive deletion of older data based on defined schedules

  • Legal Hold Management: Automated systems to prevent deletion of data under legal hold

6.4 Data Deletion Standards and Verification

Secure Deletion Methods:

  • Database Records: Secure deletion with overwriting to prevent data recovery

  • Backup Systems: Removal from all backup systems and archives

  • Log Files: Secure deletion from system logs and audit trails

  • Third-Party Systems: Coordination with service providers to ensure complete deletion

  • Physical Media: Secure destruction of physical storage devices when necessary

Deletion Verification:

  • Completion Confirmation: Written confirmation provided to users upon request

  • Audit Trails: Detailed logs of deletion activities for compliance and verification

  • Quality Assurance: Regular audits to ensure deletion procedures are followed correctly

  • Exception Handling: Documentation and management of any data that cannot be deleted due to legal requirements

6.5 Legal and Regulatory Retention Requirements

Financial Services Regulations:

  • Tax Records: Income and tax-related data retained for periods required by tax authorities (typically 5-7 years)

  • Anti-Money Laundering: Customer identification and transaction records retained as required by AML regulations

  • Financial Reporting: Data supporting financial statements retained for regulatory audit purposes

  • Consumer Protection: Records supporting consumer transactions and complaints retained as required by consumer protection laws

Data Protection Laws:

  • GDPR Compliance: Retention periods aligned with European data protection requirements

  • CCPA Compliance: California privacy law requirements for data retention and deletion

  • Other Regional Laws: Compliance with data protection laws in jurisdictions where we operate

  • Cross-Border Considerations: Management of conflicting retention requirements across jurisdictions

Legal Proceedings and Investigations:

  • Litigation Hold: Preservation of relevant data when legal proceedings are anticipated or ongoing

  • Regulatory Investigations: Retention of data requested by regulatory authorities during investigations

  • Criminal Investigations: Cooperation with law enforcement while respecting user privacy rights

  • Dispute Resolution: Preservation of data relevant to customer disputes and complaints

Business and Contractual Requirements:

  • Vendor Contracts: Data retention requirements specified in third-party service agreements

  • Insurance Requirements: Data retention periods required by business insurance policies

  • Audit Requirements: Retention of data necessary for financial and operational audits

  • Business Continuity: Retention of critical business data for operational continuity and disaster recovery

7. Your Privacy Rights and Choices

7.1 Universal Privacy Rights

Regardless of your location, you have certain fundamental rights regarding your personal information:

Right to Information:

  • Receive clear, understandable information about how we process your personal data

  • Access our Privacy Policy and any updates or changes

  • Understand the legal basis for processing your information

  • Know how long we retain different types of personal data

Right to Access:

  • Request access to the personal information we hold about you

  • Receive information about how your data is being processed

  • Obtain details about third parties who may have received your information

  • Access your data in a structured, commonly used, and machine-readable format

Right to Correction:

  • Update and correct inaccurate or incomplete personal information

  • Add supplementary information where necessary for accuracy

  • Request correction of outdated information

  • Ensure your profile and account information remains current

Right to Deletion:

  • Request deletion of your personal information in certain circumstances

  • Have your data erased when it's no longer necessary for the original purpose

  • Delete your account and associated data at any time

  • Request removal of information that was unlawfully processed

7.2 Rights for European Union Users (GDPR)

Under the General Data Protection Regulation (GDPR), EU residents have enhanced privacy rights:

Enhanced Access Rights (Article 15):

  • Detailed information about processing purposes and legal basis

  • Categories of personal data being processed

  • Recipients or categories of recipients of your data

  • Retention periods or criteria for determining retention periods

  • Information about automated decision-making, including profiling

Rectification Rights (Article 16):

  • Right to have inaccurate personal data corrected without undue delay

  • Right to have incomplete personal data completed through supplementary statement

  • Notification of corrections to third parties where feasible

Erasure Rights - "Right to be Forgotten" (Article 17):

  • Data no longer necessary for the original purposes

  • Withdrawal of consent where processing was based on consent

  • Objection to processing and no overriding legitimate grounds

  • Data has been unlawfully processed

  • Erasure required for compliance with legal obligations

Right to Restrict Processing (Article 18):

  • Contest the accuracy of personal data during verification

  • Processing is unlawful but you prefer restriction over erasure

  • We no longer need the data but you need it for legal claims

  • You've objected to processing pending verification of grounds

Data Portability Rights (Article 20):

  • Receive personal data in structured, commonly used, machine-readable format

  • Transmit data directly to another controller where technically feasible

  • Applies to data processed based on consent or contract

  • Available for automated processing only

Right to Object (Article 21):

  • Object to processing based on legitimate interests or public interest

  • Object to direct marketing, including profiling for marketing purposes

  • Object to processing for scientific, historical research, or statistical purposes

  • Absolute right to stop direct marketing communications

Rights Related to Automated Decision-Making (Article 22):

  • Not subject to decisions based solely on automated processing with legal effects

  • Right to human intervention in automated decision-making processes

  • Right to express views and contest automated decisions

  • Right to explanation of automated decision-making logic

Supervisory Authority Rights:

  • Lodge complaints with your local Data Protection Authority

  • Seek judicial remedies for privacy violations

  • Receive compensation for material or non-material damages

7.3 Rights for United States Users

California Residents (CCPA/CPRA Rights):

Right to Know (Transparency):

  • Categories of personal information collected, used, and disclosed

  • Specific pieces of personal information collected about you

  • Business or commercial purposes for collecting or selling personal information

  • Categories of third parties with whom we share personal information

  • Categories of sources from which personal information is collected

Right to Delete:

  • Request deletion of personal information collected from you

  • Direct service providers to delete your personal information

  • Exceptions for certain legal, contractual, or operational requirements

  • Confirmation of deletion within specified timeframes

Right to Opt-Out:

  • Opt out of the sale of personal information (we don't sell personal information)

  • Opt out of sharing for cross-context behavioral advertising

  • Limit use and disclosure of sensitive personal information

  • Global privacy controls and browser signals recognition

Right to Correct:

  • Request correction of inaccurate personal information

  • Provide accurate information to replace incorrect data

  • Verification of identity before implementing corrections

Right to Non-Discrimination:

  • Equal service and pricing regardless of privacy rights exercised

  • No denial of goods or services for exercising privacy rights

  • No different prices or quality of services based on privacy choices

  • Incentive programs must be reasonably related to data value

Additional CPRA Rights:

  • Right to limit use of sensitive personal information

  • Enhanced notice requirements for data processing

  • Right to know about retention periods for personal information

  • Expanded definition of personal information and sensitive data

Other U.S. State Rights:

Virginia (VCDPA), Colorado (CPA), Connecticut (CTDPA), Utah (UCPA):

  • Similar rights to CCPA including access, deletion, correction, and opt-out

  • Right to appeal decisions regarding rights requests

  • Additional protections for sensitive data processing

  • Enhanced consent requirements for certain data processing activities

7.4 Rights for Users in Other Jurisdictions

We respect privacy rights under local laws worldwide:

Canada (PIPEDA):

  • Right to access personal information and request corrections

  • Right to withdraw consent for optional processing

  • Right to file complaints with Privacy Commissioner

  • Enhanced protection for sensitive personal information

Australia (Privacy Act):

  • Right to access and correct personal information

  • Right to complain to Office of the Australian Information Commissioner

  • Notifiable data breach protections

  • Credit reporting protections for financial information

Brazil (LGPD):

  • Confirmation of data processing and access to data

  • Correction of incomplete, inaccurate, or outdated data

  • Anonymization, blocking, or elimination of unnecessary data

  • Data portability and information about public and private entities

Other International Rights:

  • We strive to honor similar privacy rights under other applicable laws

  • Local data protection requirements are incorporated into our practices

  • Cultural and legal considerations for different regions

  • Cooperation with local privacy authorities and regulators

7.5 How to Exercise Your Rights

Online Account Management: Access many privacy controls directly through your account:

Account Settings:

  • Update profile information and contact preferences

  • Modify privacy settings and data sharing preferences

  • Download your personal data in portable formats

  • Delete specific data categories or entire account

  • Manage marketing communication preferences

Privacy Dashboard:

  • View summary of personal information we hold

  • Track data sharing and third-party access

  • Review and update consent preferences

  • Monitor privacy rights request status

  • Access privacy policy updates and notifications

Request Processing:

  • Identity Verification: We may request additional information to verify your identity

  • Response Timeframes: Most requests processed within 30 days (45 days for complex requests)

  • No Fees: Rights requests are processed free of charge (excessive requests may incur reasonable fees)

  • Status Updates: Regular updates provided for complex or delayed requests

  • Appeals Process: Options to appeal decisions regarding rights requests

7.6 Limitations on Rights

Certain limitations may apply to privacy rights:

Legal Limitations:

  • Compliance with legal obligations and court orders

  • Protection of others' rights and freedoms

  • National security and public safety considerations

  • Law enforcement and regulatory requirements

Technical Limitations:

  • Aggregated or anonymized data that cannot be linked to individuals

  • Backup systems with extended deletion timeframes

  • Third-party system limitations and processing delays

  • Legacy system constraints and data format issues

Business Limitations:

  • Protection of trade secrets and confidential business information

  • Contractual obligations to third parties

  • Operational requirements for service provision

  • Financial and tax record retention requirements

8. International Data Transfers

8.1 Global Nature of Our Service

Earnify is a global service that may involve the transfer of your personal information across international borders. We recognize that different countries have varying levels of data protection, and we are committed to ensuring that your personal information receives adequate protection regardless.