Privacy Policy
Version 1.0 | Effective date: July 29, 2025

C3 Access ("we," "our," or "us") is committed to protecting your privacy. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our software-as-a-service platform C3 Access (the "Service").
By using our Service, you agree to the collection and use of information in accordance with this policy.
1. Information Collection and Use
We collect several different types of information for various purposes to provide and improve our Service to you.
1.1 Personal Information
We may collect the following types of personal information:
Account Information: Name, email address, phone number, company name, job title
Profile Information: User preferences, settings, and profile data
Billing Information: Billing address and payment processing handled offline through traditional payment methods (processed securely outside our digital platform)
Communication Data: Messages, support tickets, and correspondence with us
1.2 Usage Data
We automatically collect information about how you use our Service through Glide Apps analytics:
Technical Data: IP address, browser type, device information, operating system
Usage Analytics: App screens visited, features used, time spent, interaction patterns
Performance Data: App loading times, error occurrences
Session Data: Login frequency, session duration, user preferences
1.3 Form and Input Data
Form Submissions: Data entered through forms and surveys
Spreadsheet Data: Information stored and managed in connected data storage systems
File Uploads: Documents and media files submitted through forms
2. Use of Data
We use collected information for:
Service Delivery: Providing, maintaining, and improving our Service
Account Management: Creating and managing your account, authentication
Customer Support: Responding to inquiries and providing technical assistance
Communications: Sending updates, security alerts, and administrative messages
Analytics: Understanding usage patterns to improve our Service
Security: Detecting fraud, abuse, and security threats
Legal Compliance: Meeting legal obligations and enforcing our terms
3. Third-Party Tools and Services
We use carefully selected third-party services to provide and improve our Service. All our service providers are SOC 2 certified, demonstrating their commitment to security, availability, and confidentiality.
3.1 Infrastructure and Hosting
Cloud hosting platforms for reliable application delivery and data storage
Content delivery networks for optimized performance and security
3.2 Data Storage and Analytics
Secure data storage services with enterprise-grade encryption and access controls
Google Analytics for understanding user behavior and improving our Service
Business intelligence platforms for data visualization and reporting
3.3 Workflow and Integration
Automation platforms for secure data processing and workflow management
Integration services that connect our various systems while maintaining data security
3.4 Communication and Notifications
Email services for system notifications and customer communications
Document management for billing and administrative processes
3.5 Data Collection and Forms
Enterprise form platforms with advanced security features and compliance capabilities
Data entry systems with built-in validation and security controls
3.6 Authentication and User Management
Identity management services with multi-factor authentication support
User authentication systems that protect account access and user data
All our third-party providers maintain their own privacy policies and security standards. We encourage you to review their privacy practices. We carefully vet all service providers to ensure they meet our security and privacy requirements.
4. Data Security
We implement comprehensive security measures to protect your information, leveraging enterprise-grade tools and industry best practices:
4.1 Service Provider Security Standards
Third-party SOC 2 Certification: All our third-party service providers maintain SOC 2 Type II certification, ensuring rigorous security controls
Enterprise-Grade Infrastructure: Our platforms utilize military-grade encryption and advanced security monitoring
Compliance Standards: Our service providers maintain compliance with relevant data protection regulations
4.2 Technical Safeguards
End-to-End Encryption: All data is encrypted in transit using industry-standard TLS encryption and at rest using AES-256 encryption
Advanced Access Controls: Role-based permissions with multi-factor authentication requirements
Security Monitoring: Comprehensive activity logs and automated security monitoring through our service providers
Data Backup and Recovery: Our service providers maintain automated, encrypted backups with tested recovery procedures
4.3 Platform Security Features
Secure Data Processing: All form submissions and data entries are processed through encrypted channels
Session Management: Secure session handling with authentication controls through our platform providers
Audit Logging: Comprehensive activity logs for security monitoring and compliance
4.4 Operational Security
Vendor Security Reviews: Ongoing evaluation of all third-party security practices
4.5 Infrastructure Security
Our service providers maintain enterprise-grade physical and infrastructure security measures including secure data centers, redundant systems, and comprehensive environmental controls. All providers are SOC 2 certified, ensuring adherence to strict physical security standards.
5. Data Sharing and Disclosure
We do not sell, trade, or rent your personal information. We may share your information only in these circumstances:
Service Providers: With trusted third-party vendors who assist in operating our Service
Business Transfers: In connection with mergers, acquisitions, or asset sales
Legal Requirements: When required by law, court order, or government request
Safety and Security: To protect rights, property, or safety of our users or others
Consent: When you explicitly authorize us to share specific information
6. Data Retention
We retain your information for as long as necessary to:
Provide our Service and maintain your account
Comply with legal obligations and resolve disputes
Enforce our agreements and protect our legal rights
7. Your Rights and Choices
Depending on your location, you may have the following rights:
7.1 Access and Portability
Request access to your personal information
Request a copy of your data in a portable format
7.2 Correction and Updates
Update or correct inaccurate personal information
Modify your account settings and preferences
7.3 Deletion and Restriction
Request deletion of your personal information
Restrict or object to certain data processing activities
7.4 Withdrawal of Consent
Withdraw consent for data processing where consent is the legal basis
Opt-out of marketing communications
To exercise these rights, contact us at david@c3pconsulting.com.
8. Cookies and Tracking Technologies
We use cookies and similar technologies to:
Maintain your session and remember your preferences
Analyze usage patterns and improve our Service
Provide personalized experiences
You can control cookie settings through your browser, but some features may not function properly if cookies are disabled.
9. Changes to This Privacy Policy
We may update this Privacy Policy periodically. We will notify you of material changes by:
Posting the updated policy on our website
Sending email notifications to registered users
Displaying prominent notices in our Service
Continued use of our Service after changes constitutes acceptance of the updated policy.
10. Contact Information
If you have questions, concerns, or requests regarding this Privacy Policy or our data practices, please contact us:
Email: david@c3pconsulting.com