1. Controller and Scope
For personal information processed through the website, scanner, account area, help center, and
product analytics, QUANT ALGORITHM TREE SYSTEM LTD is the controller or business responsible for
deciding why and how the information is used, unless a third-party provider is acting as an
independent controller under its own terms.
This Policy covers current and future product surfaces, including accounts, subscriptions, scanner
usage, pair-history pages, watchlists, alerts, APIs, exports, support, Telegram or email delivery,
and administrative tools when those features are enabled.
2. Information We Collect
Account and authentication information
When you create an account, we collect information such as your email address, login credentials,
password hashes, access tokens, session identifiers, verification state, reset-link state, and account
identifiers required to authenticate and maintain access.
Subscription and billing information
We collect the plan you choose, billing status, subscription state, and transaction references
from payment or checkout providers. This may include product, plan, checkout session, customer,
subscription, invoice, receipt, cancellation, renewal, failed-payment, refund, dispute, or portal metadata.
Card numbers, bank account details, and payment credentials are processed by the payment provider,
currently intended to be Polar in production. We store only references and status information needed
to operate access, billing history, support, audit, and reconciliation.
Product usage and analytics information
We collect events that help us understand whether the product works and where users get stuck,
including page views, button clicks, signup, login, password reset, checkout, scanner refreshes,
filter changes, bucket selection, language/theme changes, row inspection, pair-history views,
watchlist actions, help-center views, and outbound exchange-link clicks.
Product analytics may include visitor ID, session ID, campaign attribution, page path, locale,
theme, browser information, timestamps, and event metadata. We may hash IP addresses for abuse
prevention and analytics.
Technical, device, and security information
We may collect IP address or IP hash, user-agent, device and browser type, request headers, logs,
error traces, timestamps, API calls, rate-limit data, authentication attempts, and security events.
Preferences and product settings
We may store language, theme, filters, selected venues, sorting, watchlists, saved setups, alert rules,
and other preferences that make the scanner usable across sessions.
Support and communications
If you contact us or connect an optional delivery channel, we may process your messages, email address,
Telegram or delivery-channel identifiers, support history, attachments, and account context needed to help you.
Information we do not need
The core scanner does not require exchange API keys, seed phrases, wallet private keys, custody credentials,
or full payment card details. Do not send these to us.
3. Sources of Information
- You provide information when creating an account, subscribing, contacting support, or configuring product settings.
- Your browser and device provide technical information when you use the site.
- The product generates usage and analytics events as you interact with pages and scanner features.
- Payment providers, including Polar when enabled, provide subscription and billing status.
- Public market-data sources and venues provide non-personal market data used by the scanner.
4. How We Use Information
- To create and maintain your account and authenticate access.
- To provide the scanner, board views, subscription gating, and delivery workflows.
- To process checkout, activate subscriptions, and manage billing state.
- To show billing history, receipts, invoice references, cancellation state, and renewal status.
- To send service, security, and account-related communications.
- To prevent abuse, fraud, scraping, unauthorized access, and other misuse.
- To improve product quality, reliability, UX, and legal/compliance operations.
- To comply with legal obligations and enforce our agreements.
- To measure acquisition, conversion, retention, feature usage, and billing-flow health.
- To maintain audit trails for access, billing, security, and support.
- To develop or test future product features such as alerts, APIs, exports, or team access.
5. Legal Bases
Where applicable, we process information because it is necessary to perform our contract with you,
because it is in our legitimate interests to operate and secure the product, because we must comply
with legal obligations, or because you have given consent for specific activities such as optional marketing or certain cookies.
- Contract: account creation, authentication, scanner access, subscription gating, billing support, and requested product features.
- Legitimate interests: fraud prevention, security, debugging, service reliability, product analytics, UX improvement, abuse prevention, and internal reporting.
- Legal obligation: tax, accounting, sanctions, consumer, corporate, and dispute-related recordkeeping where applicable.
- Consent: optional marketing, non-essential cookies where required, and optional delivery channels where consent is legally required.
6. How We Share Information
We may share information with providers and parties that help us operate or protect the product, such as:
- payment and subscription providers, including Polar where enabled;
- hosting, delivery, cloud, and database providers;
- security, logging, and anti-abuse providers;
- analytics and performance providers, including Google Analytics or Google Tag Manager if enabled;
- email, support, Telegram, or notification providers;
- professional advisers, accountants, auditors, legal counsel, banks, and acquirers;
- government, court, regulator, law-enforcement, tax, or sanctions authorities where required or legally justified.
We may also disclose information when required by law, to enforce our rights, protect users,
investigate abuse, or in connection with a merger, restructuring, or sale of the service.
We do not sell personal information in the ordinary meaning of selling a customer list for money.
If we ever use data in a way that qualifies as a "sale" or "sharing" under a specific privacy law,
we will provide the disclosures and choices required by that law.
7. Polar and Payment Providers
When checkout or billing is handled by Polar or another payment provider, that provider may collect
payment, tax, fraud, invoice, receipt, and customer-portal information under its own privacy terms.
We receive the subscription and billing metadata needed to grant access, show billing history,
handle support, and reconcile payments.
Do not send us card numbers, bank credentials, or full payment authentication data. Use the payment
provider's checkout or customer portal for payment methods, invoices, cancellation, and subscription management.
8. International Transfers
We are based in Israel and may use providers located in Israel, the United States, the European Economic Area,
the United Kingdom, and other jurisdictions. Your information may be processed in countries that have
privacy rules different from your country.
Where required, we rely on appropriate safeguards such as contractual commitments, provider security
controls, data-processing agreements, adequacy decisions, standard contractual clauses, or other legally
recognized transfer mechanisms.
9. Data Retention
We retain information for as long as needed to provide the service, maintain subscription records,
comply with tax, accounting, security, and legal obligations, resolve disputes, and enforce agreements.
We may retain aggregated, de-identified, or pseudonymous product analytics for conversion analysis,
reliability monitoring, and product improvement.
Billing records may be retained longer than account activity records where required for tax, accounting,
chargeback, audit, or legal compliance.
- Account records are generally retained while the account is active and for a reasonable period after closure.
- Billing and tax records may be retained for the period required by accounting, tax, audit, payment-dispute, and legal obligations.
- Security logs and abuse-prevention records may be retained while needed to protect the service or investigate incidents.
- Support records may be retained while needed for service history, disputes, and quality control.
- Aggregated or de-identified analytics may be retained for longer because it no longer identifies an individual user.
10. Security
We use reasonable technical and organizational measures to protect your information, including
access controls, authentication safeguards, and infrastructure protections. No system can be guaranteed
perfectly secure, so you should also protect your credentials and devices.
If you believe your account has been compromised, contact us promptly and change your password.
11. Your Rights
Depending on your jurisdiction, you may have rights to access, correct, delete, restrict, object to,
or port certain personal information. You may also withdraw consent where processing is based on consent.
To exercise these rights, contact quantityinfo@gmail.com
or use the contact channel published in the product, checkout, or account communications.
We may need to verify your identity before responding. Some information may be retained where necessary
for legal obligations, billing records, security, fraud prevention, disputes, or legitimate business records.
12. Region-Specific Notices
European Economic Area, United Kingdom, and similar GDPR-style rights
You may have rights to access, correction, deletion, restriction, portability, objection, and withdrawal
of consent. You may also complain to your local supervisory authority.
Israel
Where Israeli privacy law applies, you may have rights to inspect information about you and request
correction of inaccurate or incomplete information, subject to applicable law.
California and other U.S. state privacy laws
If a U.S. state privacy law applies to you, you may have rights to know, access, correct, delete,
receive a copy of, or opt out of certain uses of personal information. We do not intentionally collect
sensitive personal information for the purpose of inferring characteristics, and the product is not
configured to sell personal information or share it for cross-context behavioral advertising.
13. Cookies and Browser Storage
We use cookies, local storage, and similar technologies to maintain login state, secure sessions,
remember product settings, and improve service performance. See our Cookies Policy
for more detail.
14. Automated Processing
The scanner uses automated ranking, filtering, and calculations to present public market information.
These calculations do not make legal or similarly significant decisions about you. Subscription gating
and fraud checks may use automated rules to protect access and billing.
15. Marketing
We may send service messages, security notices, billing notices, and product communications related
to your account. Optional marketing emails or non-essential tracking will be handled according to
applicable consent and unsubscribe rules.
16. Children’s Privacy
The service is not directed to children or minors under 18. Do not use the product if you are not
legally permitted to enter into a binding agreement in your jurisdiction.
17. Changes to This Policy
We may update this Privacy Policy from time to time. If we make material changes, we will post the
updated version on the site and update the effective date above. We may also notify you through
the product, email, account area, or billing provider where appropriate.