Adapt Cloud Services Privacy Policy
Adapt Cloud Services and its affiliates (“ACS“, eHub Solutions, “we” or “us“) is committed to protecting the privacy of the users of its website and or eHub portal address “ehubcloud.sharepoint.com” (the “Site“) and its online products, including the ACS public website and eHub Solutions portal ™ (each a “Service” and collectively the “Services“).
-
A User may be either an entity which executed an agreement with ACS or with ACS’s resellers or distributors who provide ACS’s Services (“Customer“) or Customer’s users of the Services (“End User(s)“) or visitors of the Site (collectively “Users” or “you“).
-
This Policy explains the types of information we may collect from you or that you may provide when you visit the Site or use the Services and our practices for collecting, using, maintaining, protecting, and disclosing that information.​
CONSENT AND PRINCIPALS OF PROCESSING DATA
​
-
ACS processes data fairly, lawfully, in a transparent manner and in accordance with individuals’ rights (as applicable). The use of information collected through our Services shall be limited to the purpose of providing the service for which our Client has engaged ACS.
-
ACS may process data of an End User on behalf of the Controller when the Controller obtains consent from an End User or when there is another basis for doing so under applicable law. For purposes of this Privacy Policy, a Controller may mean a Customer or anyone acting a Customer’s behalf. (the “Controller”), Customers who cause ACS to process Personal Information of an End User are obligated to hold all appropriate consents (if applicable) and may only utilize the Services pursuant to applicable law. If you are an End User of the Services, please contact the Controller for additional detail. We may transfer Personal Information to companies that help us provide our Services. Transfers to subsequent third parties are covered by the service agreements with our Customers (the Controller).
-
ACS acknowledges that you have the right to access your Personal Information. We have processes in place to accommodate an End User’s rights to access data and receive Personal Data or Sensitive Data in a machine readable commonly used format, all subject to reasonable technical restraints and abilities.
-
Personal Information or Personal Data is information by which an individual may be personally identified, including name, address, e-mail address, telephone number or any other information that is defined as Personal Information, Personal Data, or Personally Identifiable Information under an applicable law (hereinafter referred to as “Personal Information”)
-
Please note that consent for the gathering and processing of data for one Service does not automatically mean that a User consents to the processing of data in connection with other Services. Controller should always make sure that the User’s consent is relevant, clear, valid, and to the extent reasonably possible, not “bundled” with any other written agreement (especially if required under applicable laws), unambiguous and if required under applicable law, affirmative and active (meaning not by virtue of any inaction).
-
ACS aims to process only adequate, accurate and relevant data limited to the needs and purposes for which it is gathered. It also aims to store data for the time period necessary to fulfill the purpose for which the data is gathered. ACS only collects data in connection with a specific legitimate purpose and only processes data in accordance with our Privacy Policy.
INFORMATION SECURITY
​We take great care in implementing, enforcing and maintaining the security of our Services, Site and Users’ information. ACS implements, enforces and maintains security policies to prevent the unauthorized or accidental access to or destruction, loss, modification, use or disclosure of Personal Information or Personal Data and to monitor compliance of such policies on an ongoing basis.
-
The information is hosted on the eHub Solutions Microsoft Office 365 Tenant is compliant with industry security measures. All information is stored with logical separation from information of other Customers. However, we do not guarantee that unauthorized access will never occur.
-
We use a combination of processes, technology and physical security controls to help protect Personal Information and Personal Data from unauthorized access, use, or disclosure.
-
When Personal Information or Personal Data is transferred over the Internet, we encrypt it using Transfer Layer Security (TLS) encryption technology or similar technology. Each server is protected by a firewall, exposing it only to the minimum ports necessary. However, no security controls are 100% effective, and we cannot completely ensure or warrant the security of your Personal Information and Personal Data.
-
Unless otherwise agreed with the Customer and subject to applicable law, ACS shall act in accordance with its policies to promptly notify Customer in the event that any Personal Information or Personal Data processed by ACS on behalf of a Customer is lost, stolen, or where there has been any unauthorized access to it.
-
ACS uses third party vendors and hosting partners to provide the necessary hardware, software, networking, storage, and related technology required to run the ACS Service. Where practical, we seek to obtain confidentiality agreements that are consistent with this Privacy Policy and that limit others’ use or disclosure of your Personal Information and Personal Information.