• Dhaka 1230, Bangladesh.
  • +88 01938901214
  • connect@spicybinary.com

Legal

Documentation



Privacy Policy

  • Legal Hire
  • Revision - May 13 2018

This privacy policy has been compiled to better serve those who are concerned with how their 'Personally identifiable information' (PII) is being used online. PII, as used in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.

What personal information do we collect from the people that visit our blog, website or app? When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address, or other details to help you with your experience.

  • When do we collect information?

We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
• To administer a contest, promotion, survey or other site feature.
• To send periodic emails regarding your order or other products and services.

  • How do we use your information?

Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our solution as safe as possible. We do not use Malware Scanning.

  • What information do we collect?

We collect information in the following ways: when you subscribe to a newsletter or discussion group, when you register to one of our services, when you sign up for or use our products, you voluntarily give us certain information. This can include your name, email, interest and company name. We also record your IP address at the time of the subscription and at a regular basis.

  • What information do we use?

We may use the information you provided us when you subscribed to our services like your name and email address to send you emails related to your subscriptions to our services, the mailing lists or newsletter you subscribed to or big announcements. You can request at any time that all information related to you are removed from our databases.

  • How do we protect visitor information?

We collect information from you when you register on our site, place an order, subscribe to a newsletter or enter information on our site.

Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology (available on request).

We implement a variety of security measures when a user places an order enters, submits, or accesses their information to maintain the safety of your personal information. For your convenience we may store your credit card information kept for more than 60 days in order to expedite future orders, and to automate the billing process.

  • Do we use 'cookies'?

Yes. Cookies are small files that a site or its service provider transfers to your computer's hard drive through your Web browser (if you allow) that enables the site's or service provider's systems to recognize your browser and capture and remember certain information. For instance, we use cookies to help us remember and process the items in your shopping cart. They are also used to help us understand your preferences based on previous or current site activity, which enables us to provide you with improved services. We also use cookies to help us compile aggregate data about site traffic and site interaction so that we can offer better site experiences and tools in the future.

We use cookies to:
• Help remember and process the items in the shopping cart.
• Understand and save user's preferences for future visits.

You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser (like Internet Explorer) settings. Each browser is a little different, so look at your browser's Help menu to learn the correct way to modify your cookies.

If you disable cookies off, some features will be disabled It won't affect the users experience that make your site experience more efficient and some of our services will not function properly. However, you can still use the core functionalities.

  • Third Party Disclosure

We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information.

  • Third party links

We do include or offer third party products or services on our solutions.

  • Google

Google's advertising requirements can be summed up by Google's Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adwordspolicy/answer/1316548?hl=en Google, as a third party vendor, uses cookies to serve ads on our site. Google's use of the DART cookie enables it to serve ads to our users based on their visit to our site and other sites on the Internet. Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy.

We have implemented the following:
• Remarketing with Google AdSense
• Demographics and Interests Reporting

We along with third-party vendors, such as Google use first-party cookies (such as the Google Analytics cookies) and third-party cookies (such as the DoubleClick cookie) or other third-party identifiers together analyze the user interaction within the website and offer a better user experience.

  • California Online Privacy Protection Act

CalOPPA is the first state law in the nation to require commercial websites and online services to post a privacy policy. The law's reach stretches well beyond California to require a person or company in the United States (and conceivably the world) that operates websites collecting personally identifiable information from California consumers to post a conspicuous privacy policy on its website stating exactly the information being collected and those individuals with whom it is being shared, and to comply with this policy. - See more at: http://consumercal.org/california-online-privacy-protection-act-caloppa/#sthash.0FdRbT51.dpuf

According to CalOPPA we agree to the following:
Users can visit our site anonymously.
Once this privacy policy is created, we will add a link to it on our home page, or as a minimum on the first significant page after entering our website. Our Privacy Policy link includes the word 'Privacy', and can be easily be found on the page specified above.

Users will be notified of any privacy policy changes:
• On our Privacy Policy Page

Users are able to change their personal information:
• By emailing us
• By logging in to their account
• By chatting with us or sending us a help ticket

  • How does our site handle do not track signals?

We honor do not track signals and do not track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.

  • Does our site allow third party behavioral tracking?

It's also important to note that we allow third party behavioral tracking.

  • COPPA (Children Online Privacy Protection Act)

When it comes to the collection of personal information from children under 13, the Children's Online Privacy Protection Act (COPPA) puts parents in control and sets a standard for the rest of the world. The Federal Trade Commission, USA's consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children's privacy and safety online.

We do not specifically market to children under 13.

  • Fair Information Practices

The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.

In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur: We will notify the users via email
• Within 1 business day
• Within 1 business day

We also agree to the individual redress principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or a government agency to investigate and/or prosecute non-compliance by data processors.

  • CAN SPAM Act

The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.

We collect your email address in order to:
• Send information, respond to inquiries, and/or other requests or questions.
• Process orders and to send information and updates pertaining to orders
• We may also send you additional information related to your product and/or service.
• Market to our mailing list or continue to send emails to our clients after the original transaction has occurred

To be accordance with CANSPAM we agree to the following:
• NOT use false, or misleading subjects or email addresses
• Identify the message as an advertisement in some reasonable way
• Include the physical address of our business or site headquarters
• Monitor third party email marketing services for compliance, if one is used.
• Honor opt-out/unsubscribe requests quickly
• Allow users to unsubscribe by using the link at the bottom of each email

If at any time you would like to unsubscribe from receiving future emails, you can
• Follow the instructions at the bottom of each email.

Acceptable Use Policy

  • Legal Hire
  • Revision - May 13 2018

Usage of Spicy Binary Services or Software Solutions is subject to this Acceptable Use policy. Users who are found to be violating these rules, at the sole discretion of Spicy Binary (Pvt) LTD. may see their subscriptions suspended without prior notice. The subscription fees will usually not be refunded.

What personal information do we collect from the people that visit our blog, website or app? When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address, or other details to help you with your experience.

  • Illegal or Harmful Use

You may not use CostERP™ Cloud Services for storing, displaying, distributing or otherwise processing illegal or harmful content. This includes:

• Illegal Activities: promoting gambling-related sites or services, or child pornography.

• Harmful or Fraudulent Activities: Activities harmful to others, promoting fraudulent goods, services, schemes, or promotions (e.g., make-money-fast schemes, ponzi and pyramid schemes, phishing, or pharming), or engaging in other deceptive practices. • Infringing Content: Content that infringes the intellectual property of others.

• Offensive Content: Content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable, including content that constitutes child pornography, relates to bestiality, or depicts non-consensual sex acts. • Harmful Content: Malicious and malware content, such as viruses, trojan horses, worms, etc.

  • Email Abuse

You may not use CostERP™ Cloud Services for spamming. This includes:

• Unsolicited messages: sending or facilitating the distribution of unsolicited bulk emails and messages, either directly via CostERP™ Cloud Services or indirectly via third-party email services. This includes the use of bulk emails lists. Any mass-mailing activity is subject to the applicable legal restrictions, and you must be able to prove the legal origin of your email distribution lists.
• Spoofing: sending emails or messages with forged or obfuscated headers, or assuming an identity without the sender's permission

  • Security Violations

• You may not attempt to compromise CostERP™ Cloud Services, to access or modify content that does not belong to you, or to otherwise engage in malicious actions:
• Unauthorized access: accessing or using any CostERP™ Cloud Services or service without permission
• Security research: conducting any security research or audit on CostERP™ Cloud Services without written permission to do so, including via scanners and automated tools.
• Eavesdropping: listening to or recording data that does not belong to you without permission
• Other attacks: non-technical attacks such as social engineering, phishing, or physical attacks against anyone or any system.

  • Network and Services Abuse

You may not abuse the resources and systems of CostERP™ Cloud Services. In particular, the following activities are prohibited:

• Network abuse: causing Denial of Service (DoS) by flooding systems with network traffic that slows down the system makes it unreachable, or significantly impacts the quality of service
• Overloading: voluntarily impacting the performance or availability of systems with abnormal content such as very large data quantities, or very large numbers of elements to process, such as email bombs.
• Crawling: automatically crawling resources in a way that impacts the availability and performance of the systems
• Attacking: using the CostERP™ Cloud Services to attack, crawl or otherwise impact the availability or security of third-party systems • Abusive registrations: using automated tools to repeatedly register or subscribe to CostERP™ Cloud Services, or registering or subscribing with fake credentials, or under the name of someone else without their permission.

  • Third Party Service Providers

All Third Party Service Providers may update their terms and conditions of use at their discretion which will prompt us to abide by them.

Service Level Policy

  • Legal Hire
  • Revision - May 13 2018

Service-level Policy is our commitment to our client. Particular aspects of services – quality, availability, responsibilities.

  • Uptime

 Customer databases are hosted in the best connected data center (see 5 Cloud Services for more information).
 We guarantee a minimum of 99.9% uptime (3 nines, excluding planned maintenance).
 This corresponds to a maximum unplanned downtime of 1.44min/24h or 8h/year.
 We usually deliver much better uptime than this (100% most months), as our providers always deliver a much better uptime than their SLA too.

  • High Availability

Our data centers are Tier-III certified or equivalent, with N+1 redundancy for power, network and cooling.

  • Backups (subject to Backup Plan)

 Up to 12 full backups up to 12 months: 1/day for 12 days, 1/week for 12 weeks, 1/month for 12 months on request. *
 Mission Critical Backups replicated on up to 3 different machines in different data centers. *
 For a permanent disaster impacting one server only, our Disaster Recovery Plan has the following metrics:
• RPO (Recovery Point Objective) = 5 minutes, i.e. can lose maximum 5 minutes of work. *
• RTO (Recovery Time Objective) = 30 minutes, i.e. the service will be back online after maximum 30 minutes (Standby promotion time + DNS propagation time included). *
 For data center disasters (one entire data center is completely and permanently down), Disaster Recovery Plan has these metrics:
• RPO (Recovery Point Objective) = 24h, i.e. you can lose maximum 24h of work if the data cannot be recovered and we need to restore the last daily backup. *
• RTO (Recovery Time Objective) = 24h, i.e. the service will be restored from the backup within 24 hours in a different data center. *

  • Security (subject to Security Plan)

The safety of your data is very important to us, and we design our systems and procedures to guarantee it.

You can learn more about it on our Security page. Here are some highlights:
 SSL - All web connections to client instances are protected with 256-bit SSL encryption (HTTPS with a 2048-bit modulus SSL certificate), and running behind Grade A SSL stacks. All our certificates chains are using SHA-2 already.
 Reliable Platform - Servers with full hardware guarantee, redundant data storage, network and electrical supplies
 Passwords - Customer passwords are protected with industry-standard md5.
 Safe System - Our servers are running recent Windows Server distribution with up-to-date security patches, with firewall and intrusion counter-measures (not disclosed for obvious reasons). Microsoft Red Teams are always on standby to counter act malicious activity.
 Isolation - Client data stored in dedicated databases - no sharing of data between clients, no access possible from one database to another.