Confidentiality
 We place strict controls over our employees access to the data you and your users make available via the Effective Business Software Solutions Inc.
 services,
 as more specifically defined in your agreement with Effective Business Software Solutions Inc. covering the use of the Effective Business Software Solutions Inc. services
 (“Data protection“),
 and are committed to ensuring that Customer Data is not seen by anyone who should not have access to it. The
 operation
 of the Effective Business Software Solutions Inc. services requires that some employees have access to the systems which store and process Customer
 Data. For
 example, in order to diagnose a problem you are having with the Effective Business Software Solutions Inc. services, we may need to access your
 Customer
 Data. These employees are prohibited from using these permissions to view Customer Data unless it is necessary
 to do so
 and only by your permission. We have technical controls and policies in place to ensure that any access to
 Customer Data
 is always logged. All of our employees and contract personnel are bound to our policies regarding Customer Data
 and we
 treat these issues as matters of the highest importance within our company.
 
 Personnel Practices
 Effective Business Software Solutions Inc. employees receive privacy and security training during onboarding as well as on an ongoing basis. All
 employees
 are required to read and sign our comprehensive security policy covering the security, availability, and
 confidentiality
 of the Effective Business Software Solutions Inc. services.
 
 Compliance
 Customer data for all accounts are accessed via secure protocols such as HTTPS and SSH. Additionally, all
 passwords are
 encrypted on our servers and databases. We run a dedicated environment behind firewalls with constant
 monitoring. All
 software is updated regularly to ensure the latest security patches.
 
For more information check out our infrastructure sub-processors.
 For more information check out our infrastructure sub-processors.
Security Features for Team Members & Administrators
 In addition to the work we do at the infrastructure level, we provide retailers of the Effective Business Software Solutions Inc. services with
 additional
 tools already available in the standard plan to enable their own users to protect and restrict user access to
 their
 Customer Data. If that is not enough for you, Effective Business Software Solutions Inc. can provide additional and customized software components
 upon
 Customer´s request to suit their retail needs.
 
 Logging
 Detailed access logs are available both to users and administrators of Effective Business Software Solutions Inc. retailer and is provided in
 standard
 solution. We log every user access time, the IP address of the connection and domain to provide the best
 overview of
 accessing done by the retailer users while using Effective Business Software Solutions Inc. services.
 
The administrators of the Effective Business Software Solutions Inc. retailer stores can review access logs for the whole retail chain. All access attempts are also logged as successful or unsuccessful to provide better insight on the logging situations. In addition, operations undertaken by the users in Effective Business Software Solutions Inc. services are also being logged.
 The administrators of the Effective Business Software Solutions Inc. retailer stores can review access logs for the whole retail chain. All access attempts are also logged as successful or unsuccessful to provide better insight on the logging situations. In addition, operations undertaken by the users in Effective Business Software Solutions Inc. services are also being logged.
Sign In
 All login operations to Effective Business Software Solutions Inc. services are only possible via our implemented and tested for security methods.
 The user
 access to Effective Business Software Solutions Inc. services can be managed and configured only by the administrators of the Effective Business Software Solutions Inc. retail chain.
 This means
 that even if the retailer has leaked any login credentials, they can not be used out of the provided privileges
 of the
 compromised user or even to log into other services without having rights to do so. Upon successful login the
 user is
 provided with authorization token which allows to access the specific Effective Business Software Solutions Inc. service. The token will be valid
 only
 temporarily and after certain time of inactivity the user must re-login to acquire new and valid authorization
 token.
 
 Data Retention
 Effective Business Software Solutions Inc. has made tools available for the Effective Business Software Solutions Inc. retailer which will allow the privileged user to manage other users
 and the
 data of the retailer´s customer. Effective Business Software Solutions Inc. believes that every piece of data you insert into Effective Business Software Solutions Inc. services belongs
 to you
 and hence no restrictions are set to data management whether it is customers data, employees or users.
 
 Deletion and return of Customer Data
 Effective Business Software Solutions Inc. provides the retailer with option to get their all data destroyed after they have ended their subscription
 at
 Effective Business Software Solutions Inc.. This includes data in Effective Business Software Solutions Inc. services and all the backups created by us. The Customer is provided with
 several
 tools to export their data out from Effective Business Software Solutions Inc. during the active subscription and access to data is also provided
 over the
 Effective Business Software Solutions Inc. Inventory API. Effective Business Software Solutions Inc. also manages backups on the behalf of the customer and in case of data incident by
 either
 party, the data can always be restored.
 
 Data Encryption In Transit and At Rest
 The Effective Business Software Solutions Inc. services support the latest recommended secure cipher suites and protocols to encrypt all traffic in
 transit.
 All the Customer Data is encrypted at rest – we encrypt the data between all our services with latest SSL
 encryption
 making it impossible to steal any information while the data is in transit between the Customer and Effective Business Software Solutions Inc.. We
 monitor
 the changing cryptographic landscape closely and work promptly to upgrade the services to respond to new
 security
 weaknesses as they are discovered and implement best practices as they evolve.
 
All the connections are being monitored by the Effective Business Software Solutions Inc. personnel in the background. Effective Business Software Solutions Inc. also has extra security measures in place to detect the possible malicious activities over the network and specific guidelines have been worked out to tackle such obstacles before they emerge.
 All the connections are being monitored by the Effective Business Software Solutions Inc. personnel in the background. Effective Business Software Solutions Inc. also has extra security measures in place to detect the possible malicious activities over the network and specific guidelines have been worked out to tackle such obstacles before they emerge.
Availability
 We understand that being a retailer is 24/7 job and you as a retailer rely on the Effective Business Software Solutions Inc. services to work. We’re
 committed to making Effective Business Software Solutions Inc. a highly-available service that you can count on. Our infrastructure runs on systems
 that are
 fault tolerant, for failures of individual servers or even entire data centers. Our operations team tests
 disaster-recovery measures regularly and staffs an around-the-clock on-call team to quickly resolve unexpected
 incidents.
 
 Disaster Recovery
 Customer Data is stored redundantly at multiple locations in our hosting provider’s data centers to ensure
 availability.
 We have well-tested backup and restoration procedures, which allow recovery from a major disaster. To avoid a
 major
 disaster from happening and to provide best response time of the Effective Business Software Solutions Inc. services, all the traffic is directed
 through the
 load balancing and is accordingly optimized, avoiding possible response delays and server crashes. The
 Operations team
 is alerted in case of a failure with our services. Backups are fully tested to confirm that our processes and
 tools work
 as expected.
 
 Network Protection
 In addition to monitoring and logging, we have implemented secure server access across our products. Firewalls
 are
 configured according to industry best practices and unnecessary ports are blocked by configuration with AWS
 Security
 Groups.
 
 Host Management
 We perform vulnerability scans on our hosts and remediate any findings that present a risk to the security of
 our
 services. We enforce production-specific security measures like screens lockouts, training our personnel on
 security and
 its measures, usage of the secure hardware for production, making high-risk tasks and systems only available
 from VPN
 connection or only on our premise, engaging with secure workplace access methods and many more.
 
 Incident Management & Response
 In the event of a security breach, Effective Business Software Solutions Inc. will promptly notify you of any unauthorized access to your Customer
 Data.
 Effective Business Software Solutions Inc. has incident management policies, guidelines and procedures in place to handle such events.
 
 Product Security Practices
 New features, functionality, and design changes go through a security review process by our development team. In
 addition, our code is audited with automated static analysis software, tested, and manually peer-reviewed prior
 to being
 deployed to production. The products we provide are designed to be secure, hence no data is provided by our
 services
 before authorization has been successfully concluded. Depending on the selected solution, the data fetched from
 our
 services will never remain on the user´s device in form which it could be used without the required
 authorization
 beforehand. Effective Business Software Solutions Inc. carries out additional security checks from time to time to detect any additional missed
 security
 leaks in our products.
 
All our 3rd party processors are selected via thorough decision making process where we evaluate the suitability of the external service provider in multiple criterions such as security features and measures, SLA conditions, service performance and availability and many more to assess the suitability and if the 3rd party is capable of of being up to the recommended industry standards. In addition, we only host servers with Customer data in the same region as the Customer.
 All our 3rd party processors are selected via thorough decision making process where we evaluate the suitability of the external service provider in multiple criterions such as security features and measures, SLA conditions, service performance and availability and many more to assess the suitability and if the 3rd party is capable of of being up to the recommended industry standards. In addition, we only host servers with Customer data in the same region as the Customer.
Updates
 As our business grows and evolves, the functionality and security measures we provide may also change. Please
 check back
 frequently for updates.
 
    