WhitedovesTech

Terms of Use

Last Updated: December 05, 2025

Welcome to WhitedovesTech. These Terms govern your access to our software, websites, APIs, and professional IT services ("Services"). By accessing or using our platform, you confirm that you understand and agree to be bound by these Terms.

1. Responsible Use of Services

We provide powerful digital infrastructure. To maintain the integrity and security of our platform for all users, we require responsible and ethical usage. This specifically means:

  • Security Integrity: You must not attempt to bypass our security protocols, perform SQL injection attacks, or misuse access credentials.
  • Intellectual Property: You are prohibited from unauthorized monitoring, scraping, copying, or reverse-engineering any Company-owned source code or materials.
  • Credential Protection: You are responsible for safeguarding your login credentials and API keys. Do not share them with unauthorized individuals.
  • Lawful Content: Any project assets you upload or submit must be legally compliant and free from third-party copyright infringement.

Any malicious activity will result in immediate suspension of services and may trigger legal enforcement actions.

2. Service Quality & Availability

We are committed to continuous improvement. We regularly update our Services to enhance security, add new features, and optimize performance.

  • Maintenance Windows: During critical upgrades or external provider disruptions (e.g., cloud outages), access may be temporarily affected. We will provide advance notice via email or our status page whenever possible.
  • Reliability: While we strive for 99.9% uptime, we cannot guarantee uninterrupted service unless explicitly defined in a separate Service Level Agreement (SLA).

3. Intellectual Property Rights

Clarity on ownership is essential for our collaboration. Unless otherwise specified in a Statement of Work (SOW):

  • WhitedovesTech Ownership: All pre-existing frameworks, internal tools, APIs, codebases, and technical processes developed by us remain our exclusive intellectual property.
  • Client Ownership: You retain full ownership of your data, brand assets, and the specific project content you submit to us.
  • Deliverables: Upon full payment, ownership of the final custom deliverables is transferred to you.

4. Financial Terms

Our financial relationship is governed by the following principles:

  • Billing Structure: Payments must adhere to the agreed schedule (e.g., 50% upfront, 50% on completion, or monthly SaaS billing).
  • Timeline Dependencies: Development schedules are estimates that rely on timely feedback from your team. Delays in approval may shift delivery dates.
  • Asset Release: We reserve the right to withhold source code or deployment access if invoices remain unpaid past their due date.

5. Limitation of Liability

To the maximum extent permitted by law, our liability is strictly limited to the amount paid for the specific service in the preceding 12 months.

We are not liable for:

  • Loss of revenue or business opportunities resulting from service interruptions.
  • Damages caused by external bad actors (e.g., hackers) or unauthorized client-side configuration changes.
  • Security breaches resulting from your failure to secure your own account credentials.

Privacy Policy

Last Updated: December 05, 2025

Your privacy is non-negotiable. At WhitedovesTech, we operate with a principle of data minimization—we only collect what is strictly necessary to deliver secure and effective services.

1. Data We Collect

Depending on your interaction with our platform, we may collect the following:

  • Identity Data: Name, email address, company name, and role, used for account management and billing.
  • Technical Logs: IP addresses, browser types, device identifiers, and API usage logs to monitor system health and security.
  • Project Assets: Information and files you voluntarily upload for development or hosting purposes.
  • Financial Information: Billing details processed securely via compliant gateways (e.g., Stripe). We never store raw credit card numbers on our servers.

2. Usage of Information

We process your data solely for legitimate business purposes:

  • To evaluate your requirements and deliver contractual services.
  • To provide technical support and customized recommendations.
  • To communicate critical system updates, maintenance schedules, and security alerts.
  • To detect fraud, prevent abuse, and maintain the integrity of our cybersecurity defenses.

3. Data Sharing & Disclosure

We handle your data with strict confidentiality. We do not sell your personal information. Disclosure occurs only when necessary to provide the Service:

  • Infrastructure Partners: Trusted cloud providers (e.g., AWS, Google Cloud) that host our servers.
  • Integrations: Third-party tools you explicitly choose to connect with your account.
  • Legal Compliance: When required by valid legal process or government request.

4. Data Retention & Security

Your data is stored using enterprise-grade encryption standards. We retain data only for the duration of our active relationship and the legally required period for financial record-keeping.

Clients may request a full data export or permanent account deletion at any time, subject to legal retention obligations.

Cookie Policy

Last Updated: December 05, 2025

We use cookies to ensure our website is secure, fast, and personalized. Cookies allow our systems to recognize returning users, maintain secure sessions, and optimize performance.

1. Understanding Cookies

Cookies are small, encrypted text files stored on your device by your browser. They cannot execute code, carry viruses, or access your personal files. They simply act as a "memory" for the website to improve your experience.

2. Our Cookie Categories

Type Purpose Opt-Out?
Essential Required for security, authentication, and core functionality. No
Functional Remembers preferences like theme (Dark/Light) and language. Yes
Analytics Anonymous data on page performance and usage trends. Yes

3. Managing Your Preferences

You have full control. You can modify your cookie settings directly in your browser or clear stored cookies at any time. Please note that disabling Essential cookies may cause parts of our platform (such as the Client Portal) to malfunction.

Security Protocols

Last Updated: December 05, 2025

Security is not an afterthought; it is embedded into every layer of WhitedovesTech. We implement defense-in-depth strategies to protect your systems, data, and intellectual property.

1. Technical Safeguards

We utilize industry-leading technologies to secure our infrastructure:

  • Encryption: All sensitive data is encrypted at rest using AES-256 standards and in transit using TLS 1.3.
  • Access Control: We enforce strict Role-Based Access Control (RBAC) and Multi-Factor Authentication (MFA) for all internal systems.
  • Threat Detection: Our real-time monitoring systems automatically detect and block suspicious IP addresses, DDoS attempts, and injection attacks.

2. Organizational Security

  • Least Privilege: Employees are granted access only to the specific data necessary for their role.
  • Confidentiality: All staff, contractors, and vendors are bound by strict Non-Disclosure Agreements (NDAs).
  • Code Reviews: Every deployment undergoes rigorous peer review and security testing before reaching production.

3. Incident Response Plan

In the unlikely event of a security incident, we have a structured response protocol:

  1. Containment: Immediate isolation of affected systems to prevent spread.
  2. Notification: Affected clients are notified promptly, in compliance with legal requirements and our transparency values.
  3. Remediation: We conduct a root cause analysis and implement patches to prevent recurrence.

4. Responsible Disclosure

We value the security community. If you are a researcher and believe you have discovered a vulnerability, please report it responsibly:

security@whitedovestech.com

Note: Unauthorized testing or exploitation of our infrastructure without prior permission is strictly prohibited.