Terms of Use

Last Updated: 09/18/23

Acceptance of Terms

By accessing or using this website ("Site"), you agree to be bound by these Terms of Use ("Terms"). If you do not agree to these Terms, please do not use this Site.

Changes to Terms

We reserve the right to modify, amend, or change these Terms at any time without notice. Your continued use of the Site after any such changes indicates your acceptance of the updated Terms. User Eligibility

You must be at least 18 years old to use this Site. By using this Site, you represent and warrant that you are of legal age.

User Account

Some features of the Site may require you to create a user account. You are responsible for maintaining the confidentiality of your account information and are solely responsible for all activities that occur under your account.

Content and Intellectual Property

(a) Content Ownership: All content on this Site, including but not limited to text, graphics, logos, images, videos, and software, is the property of EZ Works or its licensors and is protected by copyright, trademark, and other intellectual property laws.

(b) User-Generated Content: If you submit or upload content to the Site, you grant EZ Works a non- exclusive, worldwide, royalty-free, irrevocable, sub-licensable license to use, reproduce, modify, adapt, publish, translate, create derivative works from, distribute, and display such content.

Prohibited Activities

(a) You agree not to:

  • Use the Site for any illegal or unauthorized purpose.
  • Interfere with the proper functioning of the Site.
  • Upload or transmit viruses, malware, or any other malicious code.
  • Violate any applicable laws or regulations.

(b) We reserve the right to terminate or suspend your access to the Site for violating these Terms or for any other reason.

Disclaimer of Warranties

The Site is provided "as is" and "as available" without any warranties of any kind, either express or implied, including, but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement.

Limitation of Liability

EZ Works and its affiliates, officers, directors, employees, agents, and licensors shall not be liable for any indirect, incidental, special, consequential, or punitive damages, or any loss of profits or revenues, whether incurred directly or indirectly.

Governing Law

These Terms shall be governed by and construed in accordance with the laws of California. Any legal action or proceeding arising out of or related to these Terms shall be brought exclusively in the state or federal courts located in California, and you consent to the jurisdiction of such courts. Contact Information

If you have any questions or concerns regarding these Terms, please contact us at info@ezworks.app.

EZ Works - Security Policy

Last Updated April 21, 2023

At EZ Works, we take the security and privacy of customer data very seriously. Keeping customer information safe is embedded into our approach to product development and execution. Our policy covers the following aspects of security: data, application, product, people, and information.

Data security

Data encryption

  • Data in transit: all data transferred between the user’s browser and our servers is encrypted in transit. We use TLS v1.2
  • Data at rest: data is encrypted at rest in AWS using AES-256 key encryption.

Data center security

  • We use Amazon Web Services (AWS) to host its production servers, databases, and supporting services.

Data availability

  • Our production systems and data are backed up on a regular basis. We run through a checklist to verify data is recorded and usable. Backups are tested on a periodic basis.

Application security

  • Access to our systems is limited based on employee roles and responsibilities. The principle of least privilege is enforced.
  • All changes to our application are subject to peer review and testing before being merged.
  • We maintain segregated testing, development, and production environments.

Vulnerability management

  • Our security team uses third parties to conduct penetration tests to identify deficiencies in the system that may affect critical assets.
  • We use third-party security tools to continuously scan our applications, systems, and infrastructure for security risks and vulnerabilities.
  • Our code repositories are regularly scanned for security issues using static code analysis.

Product security

  • We allow you to add an extra layer of security to your account by enabling two-step verification, also called two-factor authentication. This reduces the risk of having your account accessed by anyone else.

People security

  • Security awareness

    We have a security team to enforce secure practices and respond to security incidents quickly and efficiently.
  • Policies

    We maintain a robust set of security policies that are updated periodically to meet the demand of an evolving security environment. Policies are communicated to employees and available for review at any time.
  • Training

    Our employees and contractors are required to complete security training. Our security team provides continuous education on emerging security threats, and communicates updates with employees regularly.
  • Employee checks

    We perform background checks for potential candidates before hiring.
  • New-hire reviews

    All new hires are required to sign and acknowledge EZ Works’s information security policy and confidentiality agreements upon joining the team.

Information security

We have implemented industry-standard security features in the EZ Works platform. We have utilized experts that have built several secure financial applications and fintech platforms.

Category Description
Access Control
  • Social logins
  • Login attempts monitoring
  • Multi-factor authentication (MFA)
  • Authorized APIs
  • Key management services (KMS) and restricted database access
Data Transport Security
  • TLS access
  • Virtual Network
Data Security
  • Encryption of personally identifiable information (PII)
  • Data leakage prevention - tokenization
  • Encrypted data backup
Perimeter Security
  • Firewall
  • Intrusion detection system
  • Isolated environments
  • Restricted protocol access
Continuous Security
  • Vulnerability scanning
  • 24x7 Log monitoring system
  • Penetration tests

Upon request, we provide enterprise customers will have access to our security policies, audit logs, and results of penetration testing through the course of our engagement at the beta stage.

In parallel, we have embarked on a SOC 2 (System and Organization Controls 2) compliance program with a Trust Service Criteria (TSC) of security, availability, processing integrity, confidentiality, and privacy. The SOC 2 audit will be conducted after a 6-month period of operating controls in the beta environment.