TERMS OF SERVICE

SECURITY :

We review our security policies on a regular basis and changes are made as per need. They undergo a review on an annual basis by our Information Technology department. These defined security policies contain detailed access privileges, information collection needs, accountability, and other such matters. Documented system security objectives, policies, and standards are consistent with system security requirements defined in contractual, legal, and other service-level agreements. For example, only a selected group of authorized individuals within Development-cart has access to user information. A complete policy with details regarding access, scripting, updates, and remote access is available for review by qualified personnel within the organization. This document is not available to the general public for study.

During transmission of information, data security is handled through a security protocol called Secure Sockets Layer (SSL). SSL is an Internet security standard using data encryption and Web server authentication. Encryption strength is measured by the length of the key used to encrypt the data; i.e., the longer the key, the more effective the encryption. Using the SSL protocol, data transmission between you and our server is performed at industry-standard encryption strength.

AVAILABILITY :

Allow sufficient time for file maintenance and backup, the maximum number of hours per day that our network will be made available is 24 hours per day, 7 days a week. In the event of a disaster or other prolonged service interruption, the entity has arranged for the use of alternative service sites to allow for full business resumption within 24 hours. Our company’s defined security policies detail access privileges, information collection needs, accountability, and other such matters. They are reviewed and updated at quarterly management meetings and undergo a review on an annual basis by the Information Technology Department. Documented system security objectives, policies, and standards are consistent with system security requirements defined in contractual, legal, and other service-level agreements. For example, current policy prohibits shared IDs; each support person has his or her own unique ID to log on and maintain network equipment. A complete policy with details regarding access, scripting, updates, and remote access is available for review by qualified personnel. This document will not be released to the general public for study.

Highlights of any changes that affect the security of our Website and availability of the system when it affects you as a site user will be communicated to you by an e-mail 7 days in advance of the anticipated change. The highlights of the change will be posted to the webpage that summarizes our availability and security policies.

PROCESS INTEGRITY:

Requests for Proposals published on our website undergo a review process to ensure that our clients get all the information needed to compose a quote. Development-cart’s trained personnel will work closely with OEM manufacturers new to the outsourcing market to ease their fears.

Our policy is to deliver services within the stipulated time mentioned in our SOW with respect to receipt of a client-approved order or payment. 

Our process for consumer dispute resolution requires that you contact your concerned Account Manager or contact our Sales Team at sale@developmentcart.com giving all the required information. If you require follow-up or response to your questions or complaints regarding transactions at this site, you may write to us at support@developmentcart.com.

CONFIDENTIALITY:

We maintain complete confidentiality of all the personal information and data you share with us and will not use any information you provide for any purpose other then your work.

Get in Touch

info@developmentcart.com
+91 8085772706
201, SS Pride, Silicon City, Indore, Madhya Pradeshs
0 / 500