Privacy Policy

Last Updated: March 15, 2025

1. INTRODUCTION

This Privacy Policy describes how Growth Engine Systems ("GES"), a service of 16825290 CANADA INC ("we," "us," or "our"), located at 412-920 156 St NW Edmonton, AB T6R0N6 Canada, collects, uses, stores, and protects information obtained from our clients ("you" or "your") in connection with our services globally. By making any payment for GES services, you automatically acknowledge that you have read, understood, and agree to be bound by this Privacy Policy.

2. SCOPE AND APPLICATION

This policy applies to all information collected through:

2.1 Digital Properties

- Our website (growthenginesystems.com)

- GES automation platform

- Client portals

- Mobile applications

- API integrations

2.2 Business Operations

- Client communications

- Service delivery

- Payment processing

- Support interactions

- Marketing activities

- Analytics systems

2.3 Service Delivery

- System configurations

- Automation workflows

- Integration settings

- Performance metrics

- Usage statistics

3. INFORMATION COLLECTION AND PROCESSING

3.1 Required Business Information

a) Account Information

- Business contact details

- Account credentials

- Billing information

- Service preferences

- User permissions

- Access logs

b) Service Configuration

- System settings

- Integration parameters

- Workflow configurations

- Automation rules

- Custom preferences

c) Communication Records

- Support interactions

- Service requests

- Training sessions

- Implementation calls

- Progress updates

3.2 Service-Specific Data

a) Business Automation

- Workflow configurations

- Process mappings

- Integration settings

- Automation rules

- Performance metrics

b) Marketing Systems

- Campaign configurations

- Audience data

- Performance metrics

- Content assets

- Analytics data

c) Customer Management

- Interaction records

- Service histories

- Communication logs

- Support tickets

- Feedback data

3.3 Industry-Specific Data

a) Vertical Markets

- Healthcare practice management

- Legal case management

- Financial service records

- Real estate transactions

- Commercial service data

b) Custom Solutions

- Industry-specific workflows

- Specialized integrations

- Custom metrics

- Vertical-specific automations

- Compliance data

4. DATA STORAGE AND SECURITY

4.1 Infrastructure Security

a) Primary Systems

- Enterprise-grade secure infrastructure

- Multi-layer security protocols

- Regular security audits

- Continuous monitoring

- Intrusion detection

b) Processing Systems

- Secure processing environments

- Encrypted data transmission

- Access control systems

- Security logging

- Performance monitoring

4.2 Data Protection

a) Encryption Standards

- Data encryption in transit

- Encryption at rest

- Industry-standard protocols

- Regular updates

- Security compliance

b) Access Controls

- Role-based access

- Authentication requirements

- Activity logging

- Regular audits

- Security training

4.3 Data Ownership and Access

a) Client Rights

- Full data ownership

- Access controls

- Export capabilities

- Deletion rights

- Privacy controls

b) GES Access

- Service delivery access

- Support requirements

- Maintenance needs

- Security monitoring

- Performance optimization

4.4 Business Continuity

a) Operational Changes

- Data preservation

- Service continuity

- Platform access

- Client notification

- Transition support

b) Data Accessibility

- GoHighLevel infrastructure

- Continued data access

- Platform availability

- Security maintenance

- Access procedures

5. DATA USAGE AND SHARING

5.1 Primary Uses

a) Service Operations

- Service delivery

- Platform maintenance

- Support provision

- Performance optimization

- Security management

b) Business Operations

- Account management

- Billing processing

- Service improvements

- Compliance requirements

- Analytics

5.2 Third-Party Sharing

a) Essential Services

- GoHighLevel (platform provider)

- Payment processors

- Security services

- Analytics providers

- Service providers

b) Data Protection

- Confidentiality requirements

- Security standards

- Access limitations

- Usage restrictions

- Compliance requirements

5.3 Data Sale Prohibition

- No data selling

- No unauthorized sharing

- No commercial use

- No third-party marketing

- No unrelated purposes

6. INTERNATIONAL DATA TRANSFERS

6.1 Cross-Border Processing

a) Processing Locations

- United States

- Canada

- United Kingdom

- European Union

- Australia

b) Transfer Safeguards

- Security measures

- Legal compliance

- Data protection

- Privacy shields

- Contractual protections

6.2 Compliance Framework

a) Regional Requirements

- GDPR compliance

- CCPA compliance

- PIPEDA requirements

- Australian Privacy Principles

- UK Data Protection

b) International Standards

- ISO compliance

- Security certifications

- Privacy standards

- Industry best practices

- Regular audits

7. CLIENT RIGHTS AND CHOICES

7.1 Access Rights

a) Data Management

- View information

- Request corrections

- Export data

- Delete information

- Update preferences

b) Service Controls

- Privacy settings

- Access controls

- Communication preferences

- Marketing options

- Service customization

7.2 Communication Preferences

a) Notification Types

- Service updates

- Technical notices

- Marketing communications

- Support messages

- Security alerts

b) Control Options

- Opt-out choices

- Frequency settings

- Channel preferences

- Content selection

- Timing options

8. DATA RETENTION AND DELETION

8.1 Retention Periods

a) Active Subscriptions

- Full data retention

- Regular backups

- Continuous access

- Security maintenance

- Performance optimization

b) Post-Termination

- 30-day retention

- Export period

- Deletion process

- Backup removal

- Access termination

8.2 Deletion Procedures

a) Client-Initiated

- Deletion requests

- Data removal

- Access termination

- Confirmation process

- Record maintenance

b) System-Initiated

- Automatic cleanup

- Inactive accounts

- Expired trials

- Failed payments

- Compliance requirements

9. SECURITY MEASURES

9.1 Technical Security

a) Infrastructure

- Encryption protocols

- Firewall protection

- Access controls

- Monitoring systems

- Intrusion detection

b) Application Security

- Secure development

- Regular testing

- Vulnerability scanning

- Patch management

- Security updates

9.2 Organizational Security

a) Internal Controls

- Staff training

- Access policies

- Security protocols

- Audit procedures

- Incident response

b) External Controls

- Vendor assessment

- Compliance monitoring

- Security reviews

- Risk assessment

- Regular audits

10. CHANGES TO THIS POLICY

10.1 Update Procedures

- Regular reviews

- Necessary updates

- Notice of changes

- Version control

- Archive maintenance

10.2 Notification

- Material changes

- Update notices

- Implementation timing

- Client communication

- Documentation

11. CONTACT INFORMATION

For privacy-related matters:

Prime Business Systems

[email protected]

12. GOVERNING LAW

This Privacy Policy is governed by Alberta law, without regard to conflicts of law principles. Any disputes shall be resolved through arbitration in the province of Alberta.

13. SEVERABILITY

If any provision of this Privacy Policy is found invalid or unenforceable, remaining provisions remain in full effect.

By using our services, you acknowledge reading and agreeing to this Privacy Policy. For questions about our privacy practices, please contact us at [email protected].

GROWTH ENGINE SYSTEMS © ALL RIGHTS RESERVED
PRIVACY POLICY | TERMS OF SERVICE