# Privacy Policy


  • Updated on: February 15, 2026
  • Effective Date: February 15, 2026

# Introduction

iCost Expense Tracker ("we", "us", or "our") attaches great importance to your privacy and fully understands the importance of personal information to you. We will, in accordance with legal and regulatory provisions, adopt secure protection measures to protect your personal information and privacy security, while establishing strict policies to manage all data.

This policy applies to how we handle and protect your personal information during your use of iCost Expense Tracker products and services (including but not limited to downloading, installing, registering, logging in, using, etc.). Before using/continuing to use our products or services, please carefully read and fully understand the entire content of this policy, especially the terms highlighted in bold or other forms, and make appropriate choices according to the guidance of this policy when necessary. If you do not agree with the content of this policy, it may cause our products or services to not function properly, or fail to achieve the service effects we intend to achieve, and you should immediately stop accessing/using our products or services. Your use or continued use of the products or services provided by us indicates that you fully understand and agree to the entire content of this Privacy Policy.

# About Us

The operator of the iCost Expense Tracker APP and website is Guangzhou Quji Technology Co., Ltd. and its affiliates.

The registered address is Room A589, 8th Floor, Building 8, 848 Maogang Road, Huangpu District, Guangzhou City.

# About This Privacy Policy

This policy aims to help you understand the following:

Part I: Definitions

Part II: Main Body

  1. What Information We Collect;
  2. How We Use Artificial Intelligence (AI) to Process Your Personal Information;
  3. How We Use Your Personal Information;
  4. How We Share, Transfer, and Publicly Disclose Your Personal Information;
  5. How We Protect Your Information;
  6. How You Manage Your Information;
  7. Scope and Updates of This Policy;
  8. How to Contact Us.

We understand the importance of personal information to you and will do our utmost to protect the security and reliability of your personal information. We are committed to maintaining your trust in us and adhere to the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of purpose specification, the principle of consent, the principle of minimal necessity, the principle of ensuring security, the principle of subject participation, and the principle of openness and transparency. At the same time, we promise to adopt corresponding security protection measures to protect your personal information in accordance with industry-recognized security standards.

Please carefully read and understand this policy and any supplementary policies before using our products or services. Your use or continued use of our products or services means that you agree to us collecting, using, storing, and sharing your relevant information in accordance with this Privacy Policy. If you have any questions about this Privacy Policy or related matters, you can contact us via email at feedback@quji.tech.

# Part I: Definitions

  1. De-identification: Refers to the process of technically processing personal information so that it cannot identify a specific natural person without the use of additional information.
  2. Anonymization: Refers to the process of technically processing personal information so that the personal information subject cannot be identified, and the processed information cannot be restored.
  3. IP Address: Refers to the Internet Protocol address, a unique identifier assigned to each computer or mobile device connected to the Internet (including mobile Internet) when accessing the network. Since these identifiers are usually assigned based on country/region, IP addresses can often be used to identify the approximate geographic location of the device's connection.

# Part II: Main Body

# 1. What Information We Collect

1. Information Necessary for the Basic Operation of the Product

When you use our products or services, to ensure the normal operation of the software and services, we will automatically collect some information. This information will not be associated with your account. Please understand that this information is the basic information we must collect to provide services and ensure the normal operation of the product.

1.1 We will collect information such as your device model, operating system version, IP address, software version, and operation logs. This information will be stored locally in text form. When you encounter problems, you can actively provide it to us to help us troubleshoot and resolve issues.

1.2 To help us better understand the operation of the product and related services, and to ensure the security of operation and service provision, we use Firebase to collect de-identified information such as crash information and performance data generated during the use of the software.

Please note that if the information cannot identify your personal identity alone or in combination with other information, it does not constitute your personal information within the legal meaning; when your information can identify your personal identity alone or in combination with other information, or when we combine data that cannot be associated with any specific personal information with your other personal information for use, such information will be treated and protected as your personal information under this Privacy Policy during the period of combined use.

2. Information Required to Implement Additional Functions

2.1 When providing you with other additional services, in order to provide you with more convenient and higher-quality products or services and strive to enhance your experience, we will collect information such as geographic location information, camera, photo album (image library/video library), global system settings information, device information, and push information, which you have explicitly authorized, after obtaining your explicit consent.

2.2 When you use the backup and restore function, if some unexpected situations such as backup anomalies occur with iCloud, we may store the data in cloud storage as auxiliary means under good network conditions to ensure data security as much as possible. You can manage this function independently in the application settings.

Please be aware that if you do not agree to provide the information corresponding to the above additional functions, it will not affect your use of the basic services of iCost Expense Tracker, but you may not be able to enjoy the service experience brought by the additional functions.

# 2. How We Use Artificial Intelligence (AI) to Process Your Personal Information

To provide you with intelligent assisted accounting functions, we may use third-party artificial intelligence models to process your relevant information after you actively use or enable specific functions.

1. Intelligent Functions Triggered by System Shortcuts

When you use services by adding system shortcuts (such as "Smart Screenshot Recognition", "Smart Voice Accounting", "Smart Text Accounting"):

1.1 Description of Function Modes: For the Smart Screenshot recognition function, if you have enabled the relevant "Auto Recognition" configuration, the system will submit the screenshot content to the AI model for processing. If the relevant configuration is not enabled, it will only be processed locally or manually without invoking the AI model.

For Smart Voice and Smart Text functions, invoking means you authorize us to use the relevant voice or text content for AI processing to generate bills.

1.2 Information Processing Flow: In AI processing mode, the screenshots, voice, or text content you provide will first undergo necessary preprocessing (such as voice-to-text conversion), and then the text information will be transmitted to a third-party AI model for intelligent analysis.

2. Intelligent Functions Used Within the App

When you use the "Voice Memo" function within the App, you can create bills by inputting voice, text, or sending screenshots.

2.1 Authorization and Processing: When you click and use the voice input function for the first time within the application, the device system will request microphone permission. Your authorization and use of this function in this context means you understand and accept: To complete the accounting, the voice information you subsequently input will, after being converted to text, be subject to auxiliary processing by the third-party artificial intelligence (AI) models described in this policy. Text or screenshot content you provide through this function will also be processed through similar procedures.

3. General Instructions Regarding Third-Party AI Processing

3.1 Third-Party Service Providers and Models: When in the above AI processing mode, relevant text information will be transmitted to the technical support environment provided by cloud service providers that comply with national laws and regulations, and invoke artificial intelligence models such as DeepSeek for processing.

3.2 Model and Technology Changes: To continuously optimize services and performance, we may, without prior notice, use other equivalent technical solutions or models that comply with legal and regulatory requirements as substitutes. We undertake that, apart from the necessary purposes for realizing this function, we will not use your information for other purposes and will require service providers through agreements to strictly protect your information.

3.3 Your Control: You can control the collection and processing of information by disabling shortcut permissions, turning off relevant AI processing options (such as relevant "Auto Recognition" configurations) in the App's function settings, or managing microphone and photo album permissions in the device system settings. After disabling, we will no longer continue processing, but this does not affect processing previously conducted based on your authorization.

3.4 Statement on Result Accuracy: Based on the existing characteristics of artificial intelligence technology, the generated content may be inaccurate or erroneous. The analysis results are for reference only, and we do not provide any guarantee regarding their absolute accuracy and reliability. Please exercise caution and verify when using.

# 3. How We Use Your Personal Information

We strictly adhere to legal and regulatory provisions and agreements with users, using the collected information for the following purposes:

  • To provide, process, maintain, improve, and develop our products or the services provided to you, such as delivery, verification, after-sales service, customer support, and advertising;
  • When providing our services, for identity verification, customer service, security protection, fraud monitoring, archiving, and backup purposes, to ensure the security of the products and services we provide to you;
  • Internal purposes, such as data analysis, research, and development of statistical information related to the use of our products or services, to better improve our products or services;
  • To help us design new services and improve our existing services;
  • To perform software verification and upgrade services;
  • Other purposes that do not violate any mandatory laws or regulations;
  • To store and maintain information related to you for our business operations (e.g., data synchronization) or to fulfill legal obligations;
  • Other purposes with your consent.

# 4. How We Share, Transfer, and Publicly Disclose Your Personal Information

1. Sharing, Transfer, and Public Disclosure

1.1 Sharing Under Statutory Circumstances: We may share your personal information in accordance with legal and regulatory requirements, the need for litigation dispute resolution, or as required by administrative or judicial authorities according to law.

1.2 Third-Party SDK Service Providers: To ensure the implementation and stable and secure operation of related products/services, and to enable you to use and enjoy more services and functions, we may integrate software development kits (SDKs) or other similar application programming interfaces (APIs) provided by third parties. We will prudently evaluate and monitor the security capabilities of our partners and require them to comply with the terms of cooperation agreements to protect the security of your personal information. Please also be fully aware that if you use such third-party services within iCost Expense Tracker, you will agree to have them directly collect and process your personal information (e.g., through embedded code, plugins, etc.). To maximize the protection of your information security, we recommend that you review their personal information protection policies before using any third-party SDK services. To protect your legitimate rights and interests, if you find any risks in such SDKs or other similar applications, we recommend that you immediately terminate the relevant operation and promptly contact us. Please note that such third-party services are independently operated by the corresponding third parties, and their information processing behaviors are not under our control.

For information on the types of personal information collected by third-party SDKs and their purposes, please refer to the Third-Party Information Sharing List (opens new window) for further details.

2. Exemption from Consent for Sharing, Transfer, and Disclosure According to Law

Please understand that, under the following circumstances, based on laws, regulations, and national standards, we may share, transfer, or publicly disclose your personal information without obtaining your authorization:

  • Related to national security and national defense;
  • Related to public security, public health, or significant public interest;
  • Related to judicial or administrative law enforcement actions such as criminal investigation, prosecution, trial, and enforcement of judgments;
  • For protecting the vital legal rights and interests such as life and property of you or other individuals, where it is difficult to obtain your consent;
  • Personal information that you have made public on your own;
  • Personal information collected from legally publicly disclosed information, such as legitimate news reports, government information disclosure, etc.

Please be aware that, according to applicable law, if we process personal information using technical measures and other necessary measures so that the data recipient cannot re-identify a specific individual and cannot restore the information, then sharing such processed data does not require further notification to you or obtaining your consent.

# 5. How We Protect Your Information

We have taken the following measures to prevent your personal information from unauthorized access, public disclosure, use, modification, damage, or loss:

  • Using encryption technology, anonymization, and other reasonably feasible means to ensure the privacy of your information during transmission;
  • Ensuring the security of the entire system from multiple dimensions such as organizational structure, system design, personnel management, and product technology, ensuring that only authorized personnel can access your personal information, and conducting security audits on data and technology as appropriate;
  • Taking reasonably feasible measures to avoid collecting irrelevant personal information. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy (unless there are mandatory retention requirements under the law);

Please understand that due to technical limitations and various possible malicious means, the internet environment is not absolutely secure. We strongly recommend that you use secure systems and communication networks when accessing services and do not disclose your account password to others. Please note that information you voluntarily share or even publicly disclose while using our services may involve your or others' personal information. Even if you delete the shared information, it may still have been independently copied or stored by other users or unrelated third parties not under our control before your deletion.

# 6. How You Manage Your Information

You have the right to manage your personal information through the following methods:

1. Inquire and Correct Your Personal Information

1.1 Click on the avatar within the app to enter the settings page. You can click on the username to modify nickname information, and click on the user avatar to modify avatar information.

1.2 Click on the avatar within the app to enter the settings page, go to Help & Feedback, and click on Consultation or Feedback to contact customer service personnel for assistance.

2. Delete Information

Click on the avatar within the app to enter the settings page, go to Help & Feedback, and select "Delete All Data". This action will delete all records and is irreversible.

3. Change the Scope of Authorization Consent (Modify Your Consented Authorizations)

You can modify the relevant permissions (such as location, pictures, etc.) in the device system settings - iCost Expense Tracker - permissions configuration items.

4. Change the Scope of Authorization Consent (Withdraw Your Consented Authorizations)

You can revoke relevant permissions in the device system settings - iCost Expense Tracker - permissions configuration items. After revocation, we will no longer continue to collect the corresponding information, but this does not affect the processing of personal information conducted previously based on the authorization.

# 7. Scope and Updates of This Policy

1. Scope

This policy applies to all products and services of iCost Expense Tracker. If a specific service has its own specific privacy policy, that specific privacy policy shall prevail.

2. Policy Updates

We may revise this policy from time to time based on business adjustments, changes in laws and regulations, or other reasons. If the updated content causes a substantial reduction in your rights, we will notify you through pop-up prompts, in-app messages, emails, or other means. If you continue to use our services, it means you agree to accept the updated policy.

# 8. How to Contact Us

If you have any questions, comments, or suggestions regarding this Privacy Policy or matters related to your personal information, please contact us by email at feedback@quji.tech.