The information we collect from users enables us to personalize and improve our services, and to allow our users to set up a user account and allows for repeat orders to be completed more quickly. This document describes the types of information we collect from our users and what we do with it among other privacy concerns.
For additional information, please
e-mail us at firstname.lastname@example.org
... Read More ...
Children Protection Policies
This platform is open to the public but it is ONLY limited to 13 years and over. No underage child should access the platform on his/her own under any circumstance without parental guidance. Any customer who violates this policy will be deleted from the system and blocked from usage forever.
Personal information you provide to us
We receive and store any information you enter on our website or provide to us in any other way. The types of Personal Information collected may include your name, billing address, postal address, e-mail address and telephone numbers that are entered on this website, sent to us by email, or entered in the process of paying for an order.
Personal information collected automatically
We receive and store certain types of information whenever you interact with this website. We automatically receive and record information from your browser including your hardware model, operating system version, unique device identifiers, and mobile network information including phone number, browser type, IP address and the page you requested. This information is collected and stored using Google Analytics. Google Analytics is a web analysis service provided by Google. Google utilizes the data collected to track and examine the use of this website, to prepare reports on its activities and share them with other Google services.
We may receive a confirmation when you open an email from this website, if your computer supports this type of program. We uses this confirmation to help us make emails more interesting and helpful.
Cookies are alphanumeric identifiers that we transfer to your computer's hard drive through your browser to enable our systems to recognize your browser and tell us how and when pages in our site are visited and by how many people. We do not combine the site usage information collected through cookies with other Personal Information. Most Web browsers automatically accept cookies, but you can usually change your browser to prevent that.
How we use information we collect
We use the information we collect to provide, maintain, protect and improve our service, to develop new ones. When you contact us, we may keep a record of your communication to help solve any issues you might be facing. We may use your email address to inform you about our services, such as letting you know about upcoming changes or improvements. We also use this information to offer you tailored content - like giving you more relevant search results and adverts.
We use information collected from cookies and other technologies to improve your user experience and the overall quality of our services.
We will use information as required by law.
Bestilaya processes personal information on our servers in many countries around the world. We may process your personal information on a server located outside the country where you live.
Bestilaya.net is a highly secured platform and has undergone penetration testing from a reputed agency. Our information security management framework provides robust controls for data encryption, data backups, server hardening, intrusion detection, patch management, protection against cross scripting, SQL injection attacks, etc.
We will not use data for unlawful activities (such as child pornography, gambling, fraud, terrorist activities), sending unsolicited emails, for posting any material or transmitting any content that harasses, threatens the health and safety of our users or for posting any obscene, racist, indecent, malicious, harmful or violent content.
We store passwords in encrypted form.
Only authorized persons can access data and all access are based on the principle of least privilege i.e. access is based on the user role and no access is given beyond what the role demands.
Information Security Organization
We have an information security and risk management committee headed by our CEO and with an independent board oversight.
Data is backed up on a daily basis. All backups are protected by either 256 bit AES encryption (Symmetric) or 2048 bit RSA (Asymmetric) encryption.
Confidentiality and Non-disclosure
We sign confidentiality and non-disclosure agreements with all our customers. Also, all our employees sign confidentiality and non-disclosure agreements in the interest of all.
Employee Background Verification and Screening
We do not perform background verification as a policy. We often verify references, KYC proofs and make sure that potential team members fit our organization values.
We deploy robust encryption techniques in order to secure legally/contractually restricted data (i.e. sensitive data). The encryption plan covers emails, desktop/laptop file systems, external storage media, data backups, transport level encryption and others.
Our information technology assets (software, servers, desktops, and laptop computers owned and operated by bestilaya.net) are properly patched with the latest appropriate updates in order to reduce system vulnerability and to enhance and repair application functionality.
We harden our operating system, application, database, web servers towards any unauthorized attacks.
Cross Scripting and SQL Injections
Our technology stack, platform and code base are designed and deployed to prevent cross-scripting and SQL injection attacks.
We do not use user data in our testing or development environment including § Uptime. We guarantee a 99.9% uptime of our systems except in the event of a natural disaster beyond our control.
Network and Application Level Redundancy
Network level redundancy is managed by our hosting provider, Software Technologies, an SSAE16 certified provider. Application level redundancy is managed in-house including § IP Restrictions. We only allow authorized IPs to connect to our systems to enhance the security system.
Ethics and Code of Conduct
Bestilaya.net is a professionally run organization and follows ethical business practices.
All our key applications have undergone penetration testing from a reputed agency.
We retain data for a period specified in the contracts with our customers and comply with customer specific requirements. Our systems are capable of selective and automatic purging of sensitive data.
When you place orders or access your account information, we offer the use of a secure server. The Secure Server Software (SSL) encrypts all information you input before it is sent to us. Furthermore, all of the customer data we collect is protected against unauthorized access.
Change to the policy