cloudruntech.com

Terms and Conditions

Welcome to Cloud Run Tech! These Terms and Conditions (“Terms”) govern your access to and use of Cloud Run Tech’s website, services, and solutions (collectively, the “Services”). By accessing, Browse, or using any part of our Services, you agree to be bound by these Terms. If you do not agree to these Terms, you may not access or use our Services.

1. Security

While Cloud Run Tech strives to protect the information you provide, no data transmission over the Internet can be guaranteed to be 100 percent secure. As a result, we cannot guarantee or warrant the absolute security of any information you transmit to or receive from us through our website and online Services.

  • Security Policy Review: Our security policies are reviewed on a regular basis, and changes are made as necessary. They undergo an intense annual review by our Information Technology department. These defined security policies detail access privileges, information collection needs, accountability, and other such matters.
  • System Security Standards: Documented system security objectives, policies, and standards are consistent with system security requirements defined in contractual, legal, and other service-level agreements.
  • Access Control: Only a select group of authorized individuals within Cloud Run Tech Datacenters has access to user information. A complete policy with details regarding access, scripting, updates, and remote access is available for review by qualified personnel within our organization. This document is not available to the general public for study.
  • Secure Networks: Cloud Run Tech operates secure data networks that are password-protected and are not available to the public.
  • Data Encryption: When transmitting information between you and Cloud Run Tech, data security is handled through Secured Sockets Layer (SSL) protocol, an Internet security standard using data encryption and Web server authentication. Data transmission using the SSL protocol is performed at industry-standard encryption strength.
  •  

2. Availability

Cloud Run Tech is committed to providing high availability of our network and services.

  • Network Availability: To allow sufficient time for file maintenance and backup, our network will be made available for a maximum of 22 hours per day, 7 days a week.
  • Disaster Recovery: In the event of a disaster or other prolonged service interruption, Cloud Run Tech has arranged for the use of alternative service sites to allow for full business resumption within 24 hours.
  • Policy Review & Updates: Our company’s defined security and availability policies detail access privileges, information collection needs, accountability, and other such matters. They are reviewed and updated at quarterly management meetings and undergo an intense annual review by the Information Technology Department.
  • Access Protocols: Documented system security objectives, policies, and standards are consistent with system security requirements defined in contractual, legal, and other service-level agreements. For example, current policy prohibits shared IDs; each support person has his or her own unique ID to log on and maintain network equipment. A complete policy with details regarding access, scripting, updates, and remote access is available for review by qualified personnel. This document will not be released to the general public for study.

3. Process Integrity

Cloud Run Tech maintains rigorous processes to ensure the integrity of our services and customer interactions.

  • Request for Proposals (RFPs): Request for Proposals published on our website undergo an intensive review process to ensure that our customers get all the information needed to compose a quote. Cloud Run Tech’s trained personnel will work closely with OEM manufacturers new to the outsourcing market to ease their concerns.
  • Service Delivery Policy: Our policy is to deliver services (e.g., server provisioning) within the stipulated time mentioned on the website with respect to receipt of a customer-approved order or payment. We will notify you by e-mail/phone within 4 hours if we cannot fulfill your order as specified at the time you placed it and will provide you the option of canceling the order without further obligation. You will not be billed until the service is provisioned.
  • Payment Terms: We require an electronic funds transfer of fees and costs at the end of the transaction. For new customers, a deposit may be required.
  • Service Cancellation: To cancel your monthly service fee, please send an e-mail or call to your designated Account Manager. Be sure to mention your company name when you call.
  • Internal Policy Communication: Our company’s defined processing integrity policies and related security policies are communicated to all authorized users of the company. These policies detail access privileges, information collection needs, accountability, and other such matters. They are reviewed and updated at quarterly management meetings and undergo an intense annual review by the IT department.
  • Consistent Standards: Documented system security objectives, policies, and standards are consistent with system security requirements defined in contractual, legal, and other service-level agreements. Current policy prohibits shared IDs; each support person has his or her own unique ID to log on and maintain network equipment. A complete policy with details regarding access, scripting, updates, and remote access is available for review by qualified personnel and is not released to the general public.

4. Confidentiality

Cloud Run Tech is committed to protecting the confidentiality of your information.

  • Limited Access: Access to your information is limited to our employees and any third-party subcontractors we may elect to use in preparing our quote or fulfilling your order.
  • Purpose Limitation: We will not use any information you provide for any purpose other than a price quote and subsequent order fulfillment on your behalf.
  • Legal Disclosure: However, access may need to be provided in response to subpoenas, court orders, legal process, or other needs to comply with applicable laws and regulations.
  • Third-Party Information Sharing: When we provide information to third parties, we do not provide your company name. However, we make no representation regarding third-party confidential treatment of such information.

5. Contact Us

  • Security & Availability Concerns: If you feel that there has been a breach to the security or availability of our site or services, or if you are unable to obtain access, please contact us immediately at our Toll Free Number: 1-800-120-0595 or send an email to our Webmaster.
  • General Support & Complaints: Management has in place a consumer hotline to allow customers to telephone in any comments, complaints, or concerns regarding the security of the site and availability of the system. For follow-up or response to your questions or complaints regarding transactions at this site, you may contact us at our Toll Free Number: 1-800-120-0595.
  • Dispute Resolution: Our process for consumer dispute resolution requires that you contact your concerned Account Manager or contact our CRM Team at support@cloud4c.com giving all the required information.
  • External Dispute Resolution: If your follow-up or your complaint is not handled to your satisfaction, you should contact the e-commerce ombudsman who handles consumer complaints for e-commerce in this country.

6. Information Related to Changes

  • Notification of Changes: Highlights of any changes that affect the security of our Web site and availability of the system, as it affects you as a site user, will be communicated to you by e-mail seven days in advance of the anticipated change. The highlights of the change will also be posted to the Web page that summarizes our availability and security policies.
  • Security Policy Updates: Any changes that affect the security of our Web site as it affects you as a site user will be communicated to you by posting the highlight of the change to the Web page that summarizes our security policies and significant controls.