Privacy & Security

Privacy Policy (Australia)

Last updated: 2026-02-19

We follow practical privacy and security standards aligned with responsible Amazon operations. We protect sensitive information, and we expect clients to do the same.

Our privacy and security commitment

What we may collect

  • Contact details (name, email, company, website)
  • Business and product information shared during onboarding
  • Operational details required to execute agreed services
  • Communication records needed for service continuity

How we use information

  • Respond to enquiries and deliver scoped services
  • Execute listing, operations, and workflow tasks you request
  • Improve service reliability and process quality
  • Maintain auditability of important decisions and actions

Amazon-related compliance principles

Where Amazon systems and policies are involved, we operate with compliance-first discipline: account integrity, proper use of permissions, and accurate handling of business data. We do not support shortcuts that violate platform policies or compromise trust.

What clients must do (your responsibilities)

  • Protect account credentials, MFA devices, and API keys
  • Share access only through approved channels and agreed scope
  • Provide accurate business/product information
  • Notify us promptly if you suspect account or data compromise
  • Review and approve critical actions when requested

What clients must not do

  • Do not share passwords in insecure/public channels
  • Do not request policy-violating or deceptive actions
  • Do not grant excessive permissions unrelated to current scope
  • Do not use shared credentials without internal control records
  • Do not ignore security incidents or suspicious access signals

What we will not do

  • We will not sell or misuse your business or personal information
  • We will not perform unauthorized actions outside agreed scope
  • We will not request unsafe credential practices
  • We will not conceal critical incidents that affect your account security
  • We will not promise outcomes that depend on factors outside our control

Data retention and deletion

  • We retain information only as long as reasonably needed for service delivery and records.
  • You may request access, correction, or deletion where applicable.
  • Retention may be extended when legally required or needed for legitimate dispute/audit protection.

Service boundary alignment

Our service-side Data & Access Boundary is defined in Services and enforced through scope control, approval checkpoints, and minimum required permissions.

Privacy and service execution are designed to work together, not as separate promises.

Why clients can trust YIZHUO AU

Trust is earned by behavior, not slogans. We operate with clear boundaries, explicit ownership, and transparent communication. Our objective is long-term partnership quality: secure execution, compliant operations, and reliable delivery cadence.

For privacy/security requests: hello@yizhuo.au