Privacy Policy
Last Updated: January 2025
Effective Date: January 2025
Important Authorization Notice: Apexbase LLC is duly authorized to sell, develop, and distribute GSB (Global Software Base) infrastructure solutions under the express authorization of Ali YILDIRIM, the original developer and intellectual property owner of the GSB infrastructure. This authorization encompasses all aspects of development, marketing, sales, support, and ongoing enhancement of GSB-based products and services.
1. Introduction and Scope
1.1 About This Privacy Policy
Apexbase LLC ("we," "us," "our," or "Company") is committed to protecting your privacy and ensuring the security of your personal information. This comprehensive Privacy Policy explains how we collect, use, disclose, and safeguard your information when you visit our website, use our services, or interact with our GSB infrastructure solutions.
This Privacy Policy applies to all information collected by Apexbase LLC through our website, mobile applications, software products, GSB infrastructure services, customer support channels, and any other digital or physical touchpoints where you interact with our company.
1.2 GSB Infrastructure Authorization
Apexbase LLC operates under the explicit authorization of Ali YILDIRIM, the original developer and intellectual property owner of the GSB (Global Software Base) infrastructure. This authorization grants us comprehensive rights to:
- Develop and enhance GSB infrastructure components
- Market and sell GSB-based solutions
- Provide technical support and maintenance services
- Create derivative works and improvements
- License GSB technology to third parties
- Collect and process data necessary for GSB operations
1.3 Consent and Agreement
By accessing our website, using our services, or providing us with your personal information, you acknowledge that you have read, understood, and agree to be bound by this Privacy Policy. If you do not agree with the terms of this Privacy Policy, please do not access our website or use our services.
2. Information We Collect
2.1 Personal Information
We collect various types of personal information that you voluntarily provide to us or that we automatically collect when you interact with our services:
2.1.1 Identity Information
- Full name, including first, middle, and last names
- Date of birth and age verification data
- Government-issued identification numbers (when required for compliance)
- Professional titles and designations
- Photographs and profile images
- Digital signatures and authentication credentials
2.1.2 Contact Information
- Email addresses (primary and secondary)
- Telephone numbers (mobile, home, work)
- Physical addresses (home, business, billing, shipping)
- Postal codes and geographic location data
- Emergency contact information
- Preferred communication methods and languages
2.1.3 Professional Information
- Company name and business address
- Job title and department
- Professional qualifications and certifications
- Industry and business sector
- Work experience and employment history
- Professional references and recommendations
2.1.4 Financial Information
- Credit card and payment method details
- Bank account information for ACH transfers
- Billing addresses and tax identification numbers
- Transaction history and payment records
- Credit worthiness and financial standing information
- Invoicing preferences and purchase order details
2.2 Technical Information
2.2.1 Device and Browser Information
- IP addresses and geographic location data
- Device identifiers (UDID, IMEI, MAC addresses)
- Operating system type and version
- Browser type, version, and settings
- Screen resolution and display capabilities
- Hardware specifications and performance metrics
- Network connection type and quality
2.2.2 Usage and Activity Data
- Pages visited and time spent on each page
- Click-through rates and navigation patterns
- Search queries and results interactions
- Feature usage and preference settings
- Session duration and frequency of visits
- Download and upload activities
- Error logs and crash reports
2.2.3 GSB Infrastructure Data
- System performance metrics and analytics
- Configuration settings and customizations
- Integration data with third-party systems
- API usage statistics and performance data
- Security event logs and access patterns
- Backup and recovery information
- Version control and update history
2.3 Communication Data
- Customer support inquiries and responses
- Live chat conversations and transcripts
- Email correspondence and attachments
- Phone call recordings (where legally permitted)
- Survey responses and feedback submissions
- Social media interactions and mentions
- Marketing communication preferences
2.4 Third-Party Information
We may receive information about you from third-party sources, including:
- Business partners and resellers
- Data brokers and marketing agencies
- Social media platforms and professional networks
- Government agencies and regulatory bodies
- Credit reporting agencies and financial institutions
- Background check and verification services
3. How We Use Your Information
3.1 Service Provision and Enhancement
- Providing access to our GSB infrastructure solutions
- Processing transactions and managing billing
- Delivering customer support and technical assistance
- Customizing user experiences and interfaces
- Maintaining and improving service performance
- Developing new features and functionalities
- Ensuring system security and preventing fraud
3.2 Communication and Marketing
- Sending service updates and important notifications
- Providing marketing communications and promotional offers
- Conducting market research and customer surveys
- Personalizing marketing content and advertisements
- Managing email subscriptions and preferences
- Facilitating community forums and user groups
3.3 Legal and Compliance
- Complying with applicable laws and regulations
- Responding to legal requests and court orders
- Protecting our rights and intellectual property
- Investigating and preventing fraud and abuse
- Ensuring compliance with industry standards
- Maintaining records for audit and reporting purposes
3.4 Business Operations
- Analyzing usage patterns and trends
- Conducting financial reporting and analysis
- Managing partnerships and business relationships
- Planning capacity and resource allocation
- Evaluating and improving business processes
- Supporting mergers, acquisitions, and investments
4. Information Sharing and Disclosure
4.1 Service Providers and Partners
We may share your information with carefully selected third-party service providers who assist us in operating our business and providing services to you:
- Cloud hosting and infrastructure providers
- Payment processors and financial institutions
- Customer support and help desk services
- Marketing and advertising platforms
- Analytics and data processing services
- Security and fraud prevention services
- Professional services (legal, accounting, consulting)
4.2 Business Transfers
In the event of a merger, acquisition, reorganization, sale of assets, or bankruptcy, your information may be transferred to the acquiring entity or successors, subject to applicable law and this Privacy Policy.
4.3 Legal Requirements
We may disclose your information when required by law or when we believe in good faith that disclosure is necessary to:
- Comply with legal obligations and court orders
- Protect and defend our rights and property
- Investigate potential violations of our terms
- Protect the safety of our users and the public
- Respond to government requests and investigations
4.4 Consent-Based Sharing
We may share your information with third parties when you have provided explicit consent for such sharing, including:
- Integration with third-party applications
- Participation in joint marketing campaigns
- Sharing testimonials and case studies
- Facilitating business partnerships
5. Data Security and Protection
5.1 Security Measures
We implement comprehensive security measures to protect your personal information:
5.1.1 Technical Safeguards
- End-to-end encryption for data transmission
- Advanced encryption standards (AES-256) for data at rest
- Multi-factor authentication for system access
- Regular security assessments and penetration testing
- Intrusion detection and prevention systems
- Secure coding practices and code reviews
- Regular security updates and patch management
5.1.2 Administrative Safeguards
- Access controls and role-based permissions
- Employee background checks and security training
- Incident response and breach notification procedures
- Regular security audits and compliance assessments
- Data retention and disposal policies
- Vendor security assessments and agreements
5.1.3 Physical Safeguards
- Secure data centers with 24/7 monitoring
- Biometric access controls and surveillance systems
- Environmental controls and disaster recovery
- Secure disposal of physical media
- Restricted access to server rooms and facilities
5.2 Data Breach Response
In the event of a data breach that may affect your personal information, we will:
- Immediately investigate and contain the breach
- Assess the scope and impact of the incident
- Notify affected individuals within 72 hours when required
- Report to relevant regulatory authorities as mandated
- Implement additional security measures to prevent recurrence
- Provide ongoing updates and support to affected parties
6. Data Retention and Disposal
6.1 Retention Periods
We retain your personal information for different periods depending on the type of information and purpose:
6.1.1 Account Information
- Active accounts: Retained while account remains active
- Inactive accounts: Retained for 7 years after last activity
- Deleted accounts: Personal data deleted within 30 days
6.1.2 Transaction Records
- Financial transactions: Retained for 7 years
- Tax-related records: Retained for 7 years
- Audit trails: Retained for 10 years
6.1.3 Communication Records
- Customer support: Retained for 3 years
- Marketing communications: Until unsubscribed
- Legal communications: Retained for 10 years
6.1.4 Technical Data
- Usage analytics: Retained for 2 years
- Security logs: Retained for 5 years
- Performance data: Retained for 1 year
6.2 Secure Disposal
When personal information is no longer needed, we securely dispose of it using:
- Cryptographic erasure for encrypted data
- Secure deletion algorithms for digital media
- Physical destruction for hardware storage devices
- Certificate of destruction for sensitive materials
7. Your Privacy Rights
7.1 Access Rights
You have the right to request access to your personal information, including:
- Confirmation of what personal data we hold
- Copies of your personal information in a readable format
- Details about how we use and share your data
- Information about data retention periods
- Details about automated decision-making processes
7.2 Correction and Update Rights
You can request corrections to inaccurate or incomplete personal information:
- Update contact information and preferences
- Correct errors in your profile data
- Supplement incomplete information
- Update professional and business information
7.3 Deletion Rights
You may request deletion of your personal information when:
- The information is no longer necessary for its original purpose
- You withdraw consent for processing
- The information has been unlawfully processed
- Deletion is required for legal compliance
7.4 Portability Rights
You have the right to receive your personal information in a structured, commonly used format and to transmit it to another service provider.
7.5 Objection Rights
You can object to processing of your personal information for:
- Direct marketing purposes
- Legitimate interest processing
- Automated decision-making
- Research and statistical purposes
7.6 Restriction Rights
You may request restriction of processing when:
- You contest the accuracy of personal data
- Processing is unlawful but you prefer restriction
- We no longer need the data but you require it for legal claims
- You have objected to processing pending verification
8. International Data Transfers
8.1 Cross-Border Transfers
As a global company, we may transfer your personal information across international borders to:
- Our offices and facilities worldwide
- Third-party service providers in various countries
- Cloud infrastructure providers
- Business partners and resellers
8.2 Transfer Safeguards
When transferring personal information internationally, we ensure adequate protection through:
- Adequacy decisions by relevant authorities
- Standard contractual clauses approved by regulators
- Binding corporate rules for intra-group transfers
- Certification schemes and codes of conduct
- Explicit consent for specific transfers
9. Children's Privacy
9.1 Age Restrictions
Our services are not intended for children under the age of 16. We do not knowingly collect personal information from children under 16 without appropriate parental consent.
9.2 Parental Rights
If we become aware that we have collected personal information from a child under 16 without parental consent, we will:
- Delete the information immediately
- Notify the parents or guardians
- Implement additional age verification measures
- Review and strengthen our collection practices
10. Cookies and Tracking Technologies
10.1 Types of Cookies
We use various types of cookies and similar technologies:
10.1.1 Essential Cookies
- Authentication and session management
- Security and fraud prevention
- Load balancing and performance optimization
- Error handling and debugging
10.1.2 Functional Cookies
- User preferences and settings
- Language and region selection
- Accessibility features
- Shopping cart and form data
10.1.3 Analytics Cookies
- Usage statistics and behavior analysis
- Performance monitoring and optimization
- A/B testing and feature evaluation
- Conversion tracking and attribution
10.1.4 Marketing Cookies
- Targeted advertising and personalization
- Cross-device tracking and linking
- Retargeting and lookalike audiences
- Campaign effectiveness measurement
10.2 Cookie Management
You can control cookie settings through:
- Browser settings and preferences
- Our cookie consent management platform
- Third-party opt-out tools and mechanisms
- Industry self-regulatory programs
11. Third-Party Services and Links
11.1 Third-Party Integrations
Our services may integrate with third-party platforms and applications, including:
- Customer relationship management (CRM) systems
- Enterprise resource planning (ERP) platforms
- Social media and professional networks
- Payment processors and financial services
- Analytics and marketing automation tools
- Cloud storage and productivity applications
11.2 Third-Party Privacy Practices
When you use third-party services through our platform:
- Third-party privacy policies apply to their collection and use of your data
- We are not responsible for third-party privacy practices
- We recommend reviewing third-party privacy policies
- You may need to manage privacy settings directly with third parties
12. Regional Privacy Laws
12.1 General Data Protection Regulation (GDPR)
For individuals in the European Economic Area, we comply with GDPR requirements including:
- Lawful basis for processing personal data
- Enhanced individual rights and protections
- Data protection impact assessments
- Appointment of Data Protection Officers
- Breach notification requirements
- Privacy by design and default principles
12.2 California Consumer Privacy Act (CCPA)
For California residents, we provide additional rights under CCPA:
- Right to know about personal information collection and use
- Right to delete personal information
- Right to opt-out of personal information sales
- Right to non-discrimination for exercising privacy rights
- Right to designate an authorized agent
12.3 Other Regional Laws
We also comply with applicable privacy laws in other jurisdictions, including:
- Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada
- Privacy Act 1988 in Australia
- Personal Data Protection Act (PDPA) in Singapore
- Lei Geral de Proteção de Dados (LGPD) in Brazil
- Data Protection Act 2018 in the United Kingdom
13. Updates to This Privacy Policy
13.1 Policy Changes
We may update this Privacy Policy from time to time to reflect:
- Changes in our business practices and services
- New legal or regulatory requirements
- Technological developments and security enhancements
- Industry best practices and standards
- User feedback and privacy concerns
13.2 Notification of Changes
When we make material changes to this Privacy Policy, we will:
- Post the updated policy on our website
- Send email notifications to registered users
- Provide in-app notifications for significant changes
- Maintain previous versions for reference
- Highlight key changes in our communications
13.3 Continued Use
Your continued use of our services after policy updates constitutes acceptance of the revised Privacy Policy. If you disagree with changes, you may discontinue use of our services and request deletion of your personal information.
14. Contact Information and Data Protection Officer
15. Definitions and Glossary
15.1 Key Terms
- Personal Information: Any information that identifies, relates to, describes, or is reasonably capable of being associated with a particular individual.
- Processing: Any operation performed on personal data, including collection, use, storage, disclosure, and deletion.
- Controller: The entity that determines the purposes and means of processing personal data.
- Processor: An entity that processes personal data on behalf of a controller.
- Data Subject: An individual to whom personal data relates.
- GSB Infrastructure: The Global Software Base infrastructure developed by Ali YILDIRIM and licensed to Apexbase LLC.