Policies

Members Area

Policies
Wireless Data Solutions

Terms of Service

These terms of service (TOS) are entered into between Wall Street Software, Inc., d.b.a. Wireless Data Solutions (WDS, we, us, or our) and you (Customer, you, or your). We agree to be bound by this TOS when you, or your agent, click “I agree.” The date you agree to this TOS is the “Effective Date”. The entity set out in our records is considered by us to be our customer.

TOS applies automatically to all WDS clients upon subscription to the Services including subscription through a third party or any commercial partner. BY SUBSCRIBING TO WDS’ SERVICES YOU ACCEPT THE POLICIES LISTED HEREIN AND AGREE TO RESPECT THEM. The Services are described as the package description presented on our web site and ordered
by you.

If you are reselling the Service, or are an End User of a reseller, it is your obligation to ensure that our records accurately reflect ownership and control of the Service. This TOS contains provisions that you are required to apply to your customers (End Users). It is your responsibility to ensure that these provisions, or those no less protective of our interests, are included in contracts and other agreements with your End Users. You are responsible for your End Users under this TOS. If you intend to resell the Services, you must also sign our Reseller Agreement.

These TOS may be amended by us. Except in an emergency, we agree to provide you with thirty days notice prior to the effective date of any amendment. Notice will be provided to you though your control panel. If the amendment materially affects your ability to use the Services, you may terminate this TOS by providing us with written notice prior to the effective date of the amended TOS, or, if we have amended the TOS in an emergency, within thirty days from the date of our amendment.

  1. Article 1 – Other agreements are incorporated into the TOS

    The present TOS incorporates our Acceptable Use Policy (AUP), our Site and Social Media Privacy Policy, Our Secure Pack/Secure Phone Privacy Policy, and our Encrypted BlackBerry Services Privacy Policy.

     

    To the extent that these agreements conflict, this TOS shall prevail, followed by the AUP and Privacy Policies. In certain cases, you may purchase services from us using another agreement which is also incorporated into this TOS. If that agreement conflicts with this TOS, the terms of that agreement will prevail over the TOS, but only to the extent that the agreements conflict. After that, the agreements will have the precedence set out above.
  2. Article 2 – Object

    WDS agrees to provide the Services to the customer subject to the following Terms of Service (TOS). Use of the Services constitutes acceptance and agreement to these Terms Of Service and all attachments. WDS will make all reasonable efforts to provide a quality service to the Customer.
  3. Article 3 – Services

    The features and details of the services governed by this TOS are described on our web site “http://www.wirelessdatasolutions.net/policies/#terms_of_service” as of
    the Effective Date. Should any of the product description change subsequent to the Effective Date, WDS has no obligation to modify the Services to reflect such a change. The specific services chosen by you are referred totogether as the “Services”. You agree to use the Services in a way that respects the right of our other users to use the Services, and not to act in a way that unreasonably interferes with our ability to provide the Services to other users.

     

    Certain aspects of the Services may be provided by third parties. These third parties may have reserved the right to make changes, including material changes, to the products provided by them and incorporated into the Service. If a third party makes a change to its products, you may not terminate this TOS based on such a change, even if it materially affects the Services.
  4. Article 4 – Support

    1. What we support:

      1. Common Services
        We continually monitor and ensure that all basic services are working, such as Apache PHP, email, SSH, Secure Voice and Secure Chat Servers, BES servers, Secure Phone Admin Panel, web services and our control panel. Our number one priority is to make sure that the web servers, data centers, and network connections are functioning at optimal performance levels.
      2. Basic e-mail and FTP client configuration
        We provide instructions for using the most common e-mail clients. If you need additional help, do not hesitate to open a support ticket or call us. We will do our best to assist you with making a connection to your account.
      3. Server Software
        We will maintain and secure all software that resides on a server, such as MySQL, Apache PHP, email, SSH, Secure Voice and Secure Chat Servers, BES servers, Secure Phone Admin Panel, Exchange, web services and our control panel. We will determine the version and configuration of the software on our servers. As a result, the software we have installed may not always be the latest version available to the public or be compatible with your application.
    2. What we do not support

      1. Data Backup
        You are responsible for maintaining current backups of your email and device data. We maintain our own backups in the event of a disaster; however, we do not guarantee the availability or restoration of any lost data, as the data stored on our system is largely encrypted, and cannot be verified in any way by us. Loss of a key could render your entire mailbox illegible. Should you request a restore of any lost or corrupt data, should it exist, a fee of 150$ will automatically be charged to your account. In the event the lost data was the fault of WDS, we would waive any associated restore fees. Only unencrypted emails would be covered by this fee, encrypted data is best effort only.
      2. Email Restore
        We do not offer recovery of lost or deleted emails. We recommend you first check your deleted items folder if you accidentally delete an email. If you have your deleted items folder set to auto-clean or you delete the messages from your deleted items folder, these messages will not be
        retrievable by us. We do not guarantee the availability or restoration of any lost data, as the data stored on our system is largely encrypted, and cannot be verified in any way by us. Loss of a key could render your entire mailbox illegible. Should you request a restore of any lost or corrupt mailboxes, should it exist, a fee of 150$ will automatically be charged to your account. In the event the lost data was the fault of WDS, we would waive any associated restore fees. Only unencrypted emails would be covered by this fee, encrypted data is best effort only.
      3. Third party applications
        Whether server-side or client-side, we do not support applications other than those that are distributed with our hosting accounts. This also excludes any custom application added to our Secure Phone Admin Panel or BES servers from our support scope.
      4. Hardware not provided or maintained by us
        Some customers like our support so much, they ask us to help them with things completely unrelated to their services or account (e.g. configuring a printer on their network). We wish this were feasible!
  5. Article 5 – Term

    This TOS will continue for the term set out on the product description page (Initial Term). After the expiration of the Initial Term, this TOS will renew for successive periods of equal length (Renewal Term). If the product description page does not contain an Initial Term, the Initial Term shall be one month.
  6. Article 6 – Payment

    You are responsible for the fees and charges set out on the product description page (Fees). You may be charged seven days prior to the date set out on the product description page (Due Date).
    Our obligation to provide the Services is contingent on your payment of the Fees by the Due Date. It is your responsibility to ensure that we receive payment of the Fees. You must pay the Fees without set off or deduction. Should the Services be suspended, for any reason, Fees will continue to accrue. If the Fees are
    not paid by your financial institution on the Due Date, your account will be considered delinquent. To reinstate your account, you will be required to pay, depending on the reason for the delinquency: (i) a returned check fee in the amount of 60$ ; (ii) interest in the amount of 22 % per month; (iii) collection charges; (iv) any fees levied on us by our financial institution; and/or (v) an investigation fee of 35$.
    You may choose to purchase products and services that are not included in the Service but which are offered for sale by other parties through WDS (Third Party Services). Third Party Services may be billed separately from the Service. Fees for the Third Party Services may not be billed on the month on which they are delivered. You agree to pay for these Third Party Services regardless of the length of time elapsed between their delivery date and the date on which you are charged.
  7. Article 7 – Bill disputes

    If you believe there is an error on your bill you must contact us in writing. We each agree to work together in good faith to resolve any billing disputes. Your dispute must include sufficient facts for us to investigate your claims and be received by us at least five days prior to the Due Date (Dispute Deadline). You waive your right to dispute any charges or Fees if you fail to meet Dispute Deadline. If we find that
    your claim is valid, we agree to credit the account that is the subject of the dispute the next time Fees are due. If you contact your credit card company, prior to notifying us of the dispute, and initiate a “charge back” based on this dispute, and your charge back claim is past the Dispute Deadline, you will be charged a 200$ investigation fee. This fee compensates us for the investigation your credit card issuer requires us to conduct in order to demonstrate our right to payment.
  8. Article 8 – Termination

    1. Money Back Guarantee

      The Service carries an unconditional 7 day satisfaction guarantee (Guarantee). To cancel the Service covered by the Guarantee, and receive a refund, you must contact us within 7 calendar days following the Effective Date for the Service covered by the Guarantee. If you wish to retain your domain name, the cost of your domain name will be deducted from your refund at our regular, non-discounted, price. If you paid us by credit card we will credit the card on file, otherwise we will send you a check. The Guarantee only applies to an individual Service for 7 calendar days following the Effective Date. If you purchase more than one Service from us, the Guarantee only applies to the Service that falls within this 7 day period. Set up and domain name registration charges are not refundable for any reason and are excluded from our Guarantee.
    2. Termination prior to renewal

      Either party may choose not to renew this TOS by providing written notice to the other no later than ten days before the expiration of the Initial Term or Renewal Term for the particular Service that the party does not want to renew. If you terminate this TOS prior to its expiration, you will not receive a refund of any prepaid Fees.
    3. Termination for material breach

      One party may terminate this TOS upon the occurrence of a material breach, if this breach has not been cured by the other party within thirty days of their receipt of written notice of the breach. Notices of material breach must contain sufficient detail for the party against whom the assertion of material
      breach is directed to identify the breach and attempt to take corrective action. A decision to cease offering Third Party Services will not be a material breach.
    4. Termination for your violation of our policies

      We reserve the right to immediately suspend the Service and/or terminate this TOS: (i) for a violation of any of our policies, including those incorporated by reference or those of Third Party Service providers; and/or (ii) your failure to pay any amounts due. This right of termination is without prejudice to any other rights we may have. You are not entitled to any type of notice or protest should we exercise these rights, nor will you receive a refund of any Fees.
    5. Disposition of data upon suspension or termination

      When your account is suspended or terminated, the data and other technology resident on WDS’ servers may be deleted. It is your obligation, regardless of whether you believe a suspension or termination is authorized under this TOS, to secure this data and ensure that it remains available to you. WDS has no obligation to preserve data after a suspension or termination.
  9. Article 9 – Use of the Services

    Your use of the Services must be reasonable. You may not place excessive burdens on our CPUs, servers or other resources. You agree that we may place restrictions on your use of the Service, and charge you excess bandwidth fees, to the extent that they exceed the use of the Service by similarly situated customers. You understand that bandwidth, connection speeds and other similar indices of capacity are maximum numbers. Consistently reaching these capacity numbers may result in our need to place restrictions on your use of the Service.
    You agree to cooperate with us to facilitate your use of the Service. This cooperation includes, but is not limited to, providing us with correct contact and billing information, designing material that is “server ready” and ensuring that you, your employees and/or agents have sufficient technical expertise to understand how to implement the Service.
    Upon termination or expiration, your account will be closed. We have no responsibility to forward email or other communications for you once your account is closed. We also have no responsibility to preserve or secure your data. You are encouraged to keep the Service active during a transition period should you seek
    to forward your email or other communications, or to move your data to another provider.
  10. Article 10 – Representations and Warranties

    1. Reciprocal

      We each warrant to the other that: (i) we have the power, authority and legal right to enter into this TOS; and (ii) we have the power, authority and legal right to perform our obligations under this TOS and all incorporated provisions.
    2. Representations and Warranty

      You represent and warrant to WDS that: (i) you have the experience and knowledge necessary to use the Service; (ii) you understand and appreciate the risks inherent to you, your business and your person, that come from accessing the internet; (iii) you will provide us with material that may be implemented by us to provide the Service without extra effort on our part; (iv) you have sufficient knowledge about administering, designing and operating the functions facilitated by the Service to take advantage of the Service; (v) that in entering into this TOS, and performing the obligations set out in it, you will not violate any applicable laws and regulations; (vi) that you will make back up copies of your data even if you purchase “back up” services from WDS; (vii) that you will pass through applicable terms of this TOS, our AUP and Privacy Policy to End Users; (viii) that you own the entire right, title and interest to, or have an appropriate license to use, all materials provided to WDS, or which may be accessed or transmitted using the Service and that, at our request, you will provide us evidence of such ownership or license; and (ix) that to the extent you do business with other parties using the Service, that they have the same ownership interests in the materials provided to you, or accessed via you, that are set out in this paragraph.
  11. Article 11 – Disclaimer and limitation of liability

    1. Disclaimer

      THE SERVICE IS PROVIDED ON AN AS-IS AND AS-AVAILABLE BASIS. OTHER THAN AS EXPRESSLY SET OUT IN PARAGRAPH 10.1, WDS HAS NOT, AND DOES NOT, MAKE ANY WARRANTIES WHETHER EXPRESS OR IMPLIED. THIS
      DISCLAIMER INCLUDES, BUT IS NOT LIMITED TO, THE WARRANTIES OF NON-INFRINGEMENT, FITNESS FOR A PARTICULAR PURPOSE, WARRANTIES OF MERCHANTABILITY AND TITLE. WDS DOES NOT WARRANT THAT THE SERVICE WILL BE UNINTERRUPTED, ERROR-FREE, SECURE, OR FREE FROM VIRUSES OR OTHER HARMFUL COMPONENTS. WDS IS NOT LIABLE, AND EXPRESSLY DISCLAIMS ANY LIABILITY, FOR THE CONTENT OF ANY DATA TRANSFERRED EITHER TO, OR FROM, YOU OR STORED BY YOU OR AN END USER VIA THE SERVICE PROVIDED BY US. WDS SPECIFICALLY DISCLAIMS ANY AND ALL
      WARRANTIES REGARDING SERVICES PROVIDED BY THIRD PARTIES, REGARDLESS OF WHETHER THOSE SERVICES APPEAR TO BE PROVIDED BY WDS. NO WARRANTIES MADE BY THESE THIRD PARTY ENTITIES TO WDS SHALL BE PASSED THROUGH TO YOU, NOR SHALL YOU CLAIM TO BE A THIRD PARTY BENEFICIARY OF SUCH WARRANTIES.

       

      THIS WARRANTY DISCLAIMER EXTENDS TO ANY ORAL OR WRITTEN INFORMATION YOU MAY HAVE RECEIVED FROM WDS, ITS
      EMPLOYEES, THIRD-PARTY VENDORS, AGENTS OR AFFILIATES. YOU MAY NOT RELY ON SUCH INFORMATION.

       

      SOME STATES/PROVINCES DO NOT ALLOW WDS TO EXCLUDE CERTAIN WARRANTIES. IF THIS APPLIES TO YOU, YOUR WARRANTY IS LIMITED TO 90 DAYS FROM THE EFFECTIVE DATE FOR AN INDIVIDUAL SERVICE.
    2. Limitation of liability

      You agree that WDS has no liability, whatsoever, for: (i) content that you or an End User access from the internet; or (ii) for unauthorized access to, or any corruption, erasure, theft, destruction, alteration or inadvertent disclosure of data, information or content, transmitted, received, or stored on our network.

       

      IN NO EVENT WILL WDS’ LIABILITY HEREUNDER EXCEED THE AGGREGATE FEES ACTUALLY RECEIVED BY WDS FROM YOU FOR THE THREE-MONTH PERIOD IMMEDIATELY PRECEDING THE EVENT GIVING RISE TO SUCH LIABILITY. FOR THE PURPOSES OF THIS PARAGRAPH ONLY, THE TERM WDS SHALL BE INTERPRETED TO INCLUDE WDS’ EMPLOYEES, AGENTS, OWNERS, DIRECTORS, OFFICERS, AFFILIATES, AND THIRD PARTIES PROVIDING SERVICES TO YOU THROUGH WDS.

       

      YOU AGREE THAT, TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, YOU WILL NOT UNDER ANY CIRCUMSTANCES INCLUDING, BUT NOT LIMITED TO, NEGLIGENCE, HOLD WDS OR ITS LICENSORS, AGENTS, EMPLOYEES, OFFICERS AND/OR THIRD PARTY VENDORS, LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR PUNITIVE DAMAGES WHATSOEVER INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS, COST SAVINGS, REVENUE, BUSINESS, DATA OR USE, OR ANY OTHER PECUNIARY LOSS BY YOU, ANY OF YOU R END USERS OR ANY OTHER THIRD PARTY. YOU AGREE THAT THE FOREGOING LIMITATIONS APPLY WHETHER IN AN ACTION IN CONTRACT OR TORT OR ANY OTHER LEGAL THEORY AND APPLY EVEN IF WDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME JURISDICTIONS DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES; YOU AGREE THAT IN THOSE JURISDICTIONS WDS’ LIABILITY WILL BE LIMITED TO THE EXTENT PERMITTED BY LAW.
  12. Article 12 – Indemnification

    You agree to indemnify, defend and hold harmless WDS and its parent, subsidiary and affiliated companies, Third Party Service providers and each of their respective officers, directors, employees, shareholders and agents (each an “indemnified party” and, collectively, “indemnified parties”) from and against any and all claims, damages, losses, liabilities, suits, actions, demands, proceedings (whether legal or
    administrative), and expenses (including, but not limited to, reasonable attorneys’ fees) threatened, asserted, or filed by a third party against any of the indemnified parties arising out of or relating to: (i) your use of the Service; (ii) any violation by you of any of WDS’ policies; (iii) any breach of any of your representations, warranties or covenants contained in this TOS; (iv) any acts or omissions by you; (v) any material supplied by you infringing or allegedly infringing on the proprietary rights of a third party; and/or (vi) infringement related to products sold using the Services. The terms of this paragraph shall survive any termination of this TOS. For the purpose of this paragraph only, the term “you” as set out in subparagraphs (i) through (vi) include you, End Users, visitors to your website, and users of your products or services, the use of which is facilitated by us.
  13. Article 13 General Provisions

    1. Notices

      Notices will be sent to you at the address you provide to us. Notices to you may be provided by email. It is your obligation to ensure that we have the most current address for you in our records and to verify that our Notices are not flagged as spam by your spam filter.

      Please refer to our website for contact information for most issues, including technical support and billing. Notices regarding this TOS and other WDS policies should be directed to:

      Attention: Wall Street Software (Wireless Data Solutions) Legal Notices
      301 Clematis Street, Suite 3000
      W. Palm Beach, Florida
      33401, United States

      Email: legal@wirelessdatasolutions.net
    2. Force Majeure

      Except for the obligation to pay the Fees, neither party shall be liable for any delay or failure in performance due to events outside the defaulting party’s reasonable control, including without limitation acts of God, earthquake, labor disputes, shortages of supplies, riots, war, fire, epidemics, failures of telecommunication carriers, delays of common carriers, or other circumstances beyond its reasonable control. The obligations and rights of the excused party shall be extended on a day-to-day basis for the time period equal to the period of the excusable delay. The party affected by such an
      occurrence shall notify the other party as soon as possible, but in no event less than ten days from the beginning of the event.
    3. Choice of Law, Jurisdiction and Venue

      This Agreement is governed by the laws of the state of Florida and the laws of the United States applicable therein. The Parties irrevocably submit all disputes arising out of this Agreement to Florida courts, judicial district of West Palm Beach.

    4. No Waiver

      No waiver of rights under this TOS, or any WDS policy, or agreement between you and WDS shall constitute a subsequent waiver of this or any other right under this TOS.
    5. Assignment

      This TOS may be assigned by WDS. It may not be assigned by you. This TOS shall bind and inure to the benefit of the corporate successors and permitted assigns of the parties.
    6. Severability

      In the event that any of the terms of this TOS become or are declared to be illegal or otherwise unenforceable by any court of competent jurisdiction, such term(s) shall be null and void and shall be deemed deleted from this TOS. All remaining terms of this TOS shall remain in full force and effect.
    7. No Agency

      This TOS does not create any agency, partnership, joint venture, or franchise relationship. Neither party has the right or authority to, and shall not, assume or create any obligation of any nature whatsoever on behalf of the other party or bind the other party in any respect whatsoever.
    8. Changes and rights

      We may vary these rules and regulations from time to time in our sole discretion, and you agree to comply with all other reasonable security requirements that WDS may impose from time to time.

 

Acceptable Use Policy

This Acceptable Use Policy (“AUP”) describes activities that are not permitted on the Wireless Data Solutions network. The AUP is incorporated by reference in your Agreement with us.

  1. Customers and End Users are solely responsible for content.

    We do not review, edit, censor, or take responsibility for any information customers or End Users may create. As a result, we cannot, and do not, accept any responsibility from customers, end users, or third parties, resulting from inaccurate, unsuitable, offensive, or illegal content or transactions. While we do not review, edit, censor, or take responsibility for any customer created content, we cannot and will not ignore it if it comes to light. Ways such abuse can come to light is via reports from other users (recipients of abusive mail, as an example), unencrypted support emails outlining problems with an activity we do not support, or listing of our domains (through your email or username) on spam sites or other blacklists. We respect the privacy of our customers, but will NOT be held responsible for housing criminal activity, even by omission, or failure to investigate claims.

     

    We specifically reserve the right to refuse to provide the service to customers or end users engaged in the dissemination of material that may cause us to be subject to attacks on our network, or that while technically legal, run counter to our corporate principles. This type of content may include, but is not limited to, racist, pornographic, hateful material or generally any material that creates or may, in our sole judgement, customer service or abuse issues for us.
  2. Use of the Service

    1. Abusive Conduct

      The transmission, storage, or presentation of any information, data or material in violation of any applicable law or regulation, this AUP, or our TOS, is strictly prohibited. In addition, you may not use the Service to directly facilitate the violation of any law or regulation. Specific activities that are abusive include, but are not limited to:
      1. Activities that violate American export control laws or regulations, including those related to software or technical information or violating American laws or regulations concerning the doing of business with certain sanctioned countries or with designated persons or entities.
      2. Forging, misrepresenting, omitting or deleting message headers, return mailing information, and/or internet protocol addresses, to conceal or misidentify the origin of a message;
      3. Any action which directly or indirectly results in any of our IP space being listed on any abuse database (i.e. Spamhaus);
      4. Introducing whether unintentionally, knowingly or recklessly, any virus or other contaminating code into the Services or creating or sending internet viruses, worms or Trojan horses, flood or mail bombs, or engaging in denial of service attacks;
      5. Collecting or using information, including email addresses, screen names or other identifiers, through deceit, (such as, phishing, Internet scamming, password robbery, spidering, and harvesting);
      6. Hacking, and/or subverting, or assisting others in subverting, the security or integrity of our products or systems, including unauthorized access to or use of data, systems or networks, comprising any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network.
      7. Distributing advertisement delivery software unless: (i) the user affirmatively consents to the download and installation of such software based on a clear and conspicuous notice of the nature of the software, and (ii) the software is easily removable by use of standard tools for such
        purpose included on major operating systems (such as Microsoft’s “add/remove” tool);
      8. Soliciting the performance of any illegal activity, even if the activity itself is not performed;
      9. Acting in any manner that might subject us to unfavorable regulatory action, subject us to any liability for any reason, or adversely affect our public image, reputation or goodwill, as determined by us in our sole and exclusive discretion.
      10. Failure to provide complete, truthful and accurate information regarding the customer’s identity and locations as requested on all of WDS’ application forms.
      11. interference with a third party’s use of WDS’ network or Services, or ability to connect to the Internet or provide services to Internet users.
      12. Managing a proxy server.
      13. Facilitating, aiding, or encouraging any of the above activities, whether using WDS’ network or Services by itself or via a third party’s network or service.
    2. Offensive content

      You may not transmit, distribute or store on or via the services any content or links to any content that WDS reasonably believes:
      1. constitutes, depicts, fosters, promotes or relates in any manner to child pornography, bestiality, non-consensual sex acts, or otherwise unlawfully exploits persons under 18 years of age;
      2. that is excessively violent, incites violence, threatens violence, contains harassing content or hate speech, creates a risk to a person’s safety or health, or public safety or health, compromises national security or interferes with an investigation by law enforcement;
      3. is unfair or deceptive under the consumer protection laws of any jurisdiction, including chain letters and pyramid schemes;
      4. is defamatory or violates a person’s privacy; or
      5. is otherwise malicious, fraudulent, morally repugnant.
    3. Intellectual Property and Other Proprietary Rights

      You may not use our Services in a manner that infringes on or misappropriates the rights of a third party in any work protected by copyright, trade or service mark, invention, or other intellectual property or proprietary information. For example:
      1. You may not use the Services to download, publish, torrent, distribute, use, or otherwise copy in any manner any text, music, software, art, image, or other work protected by copyright law unless you have permission from the owner of the work to use or copy the work in that manner, or you are otherwise permitted by established intellectual property law to copy or use the work or rights in that manner;
      2. you may not use the Services to publish content intended to assist others in defeating technical copyright protections;
      3. you may not use a domain name that is in violation of its relevant domain name dispute resolution policy; and
      4. you may not display another person’s trademark without permission.
    4. Email services

      We define unsolicited commercial e-mail as e-mail that has not been requested by the recipient, is not compliant with the American Anti-Spam Act, or that, even if requested, or compliant with the American Anti-Spam Act, causes other entities to block our IP Addresses.

       

      You may not use the Service to host a site that is advertised in SPAM (a spamvertized site), even if you yourself are not engaged in spamming. If we determine that you or an End User are spamming, we will suspend or terminate your account, at our discretion.

       

      Furthermore, you may not use our email service:
      1. in connection with pyramid schemes, spamming or any unsolicited messages (commercial or otherwise);
      2. to restrict or inhibit any other user from using or enjoying such service;
      3. under a false identity for the purpose of misleading others or forge the headers of your email messages in any way;
      4. to use, download or otherwise copy, or provide (whether or not for a fee) to a person or entity any directory of users of such service or other user or usage information or any portion thereof;
      5. to promote or facilitate the transmission of unsolicited email messages.
      6. send messages to disrupt or cause difficulties in receiving other email;
      7. in the event that you maintain one or more bulk “opt-in” email lists, you must have a method of confirmation of subscriptions and be able to provide such information when requested by us. At our discretion, if no such evidence is available, such bulk emailings may be considered as
        unsolicited;
      8. we reserve the right, in our sole discretion, to set an upper limit on the number of recipients of customer initiated email, the number of subscribers on a customer’s bulk “opt-in” email lists, and the number of messages a customer may send or receive through our services.

       

      While we do not undertake to monitor the materials that are sent through our email service, we reserve the right to review such materials, and to remove any materials at our sole discretion. We may decide, at our sole discretion, to terminate your access to our email service at any time, without notice. However, even as administrators, we have no access to encrypted files or the keys to open them.
  3. Notices

    If you believe that our AUP has been violated, you may send your inquiry to: abuse@wirelessdatasolutions.netPlease not that we do not review anonymous inquiries. Your notice must contain, at a minimum, your first and last name, and either a working, monitored e-mail address, or a working, monitored, telephone number.
  4. Cooperation with Investigations and Legal Proceedings

    If we are legally required to permit any relevant authority to inspect your content or traffic, you agree we can do so; provided however that, where possible without breaching any legal or regulatory requirement, we may choose to give you reasonable prior notice of such requirement. As stated, we cannot and will not be held responsible for housing criminal or suspected criminal activity, or abuse of our acceptable use policy, whether by omission, or by failing to investigate claims. If activity in breach of our terms is discovered or made known to us, we may, without notice to you, report to the appropriate authorities any conduct by you that we believe violates applicable law, and provide any information we have about you, or your users or your traffic and cooperate in response to a formal request from a law enforcement or regulatory agency investigating any such activity, or in response to a formal request in a civil action that on its face meets the requirements for such a request. Law enforcement agencies that seek information about customers, End Users, and third parties and/or their use of the Service, are required to submit a subpoena, or other similar document, pursuant to which we are required by law to produce this information (Subpoena). Unless specifically required by law and so clearly communicated to us, the Subpoena will be transmitted to the customer, End User, or third party. Civil requests for information, such as discovery requests and similar demands (Civil Demands) must be part of a filed and pending litigation matter. Responses to Civil Demands are at our discretion.
  5. Excessive Use of Shared System Resources

    Our email service is considered unlimited, meaning, within reason, there are no limits on storage space, number of emails sent or received per day, nor number of device connections. However, since you will be sharing bandwidth and storage with hundreds of others on our servers in a virtual community, our offerings are really not intended to support enterprise level or large company requirements. To ensure that our hosting is first-class, reliable, and available to all customers within that server community, an individual customer’s usage cannot adversely affect the performance of other customers’ service. This means that while there is no set limit on storage, bandwidth usage, or emails in or out-bound, we will need to monitor for possible misuse.

    An example of misuse would be using auto-mailing for spam purposes. If you are generating a consistent outbound flow of several thousand emails, and your inbox is filling by a gigabyte a day, we can safely assume that you are using shared resources frivolously. Other potential violations could include using our email service to store an excessive amount/type of materials, to the point it adversely affects other users rights to service. An example could be sending yourself an excessive amount of large attachments such as mp3’s, images or short video files. We do not monitor content, but general behavior and types of files stored can become a red flag. Flooding other users email inboxes could be a potential breach as well, as it can be construed as a DoS (Denial of Service) attack.

    In the vast majority of cases, if you use the email hosting service appropriately, you will be able to view, send, receive, upload, download, and attach as much content as you wish. However, in certain circumstances, our server processing power, server memory, or anti-abuse controls could place limits. Violators to the above rule will not be tolerated. You can use our service as much as you require each month subject to the rules as outlined above.

  6. Suspension and/or Termination of products and Credits.

    If you violate our AUP and we suspend or terminate the Service, you will not receive a refund of any fees paid to us. Your failure to abide by any of the items set out in this AUP is grounds for suspension or termination of the Service. Any termination or suspension may be undertaken with, or without, notice to you. You agree to hold us harmless from any claims that a suspension or termination of products for this reason has damaged you.

 

Service Level Agreement

Choosing a communication product suite is never easy and it seems to be risky when your privacy and data is at stake. We know that the availability of your services and data is of utmost importance and entrusting your communication and information to Wall Street Software (Wireless Data Solutions) is something that we take seriously. That’s why we have built this Service Level Agreement (SLA) to cover the multiple components that keep your services up and running.
By signing up for WDS services on the Internet, or by using any other means of subscription including subscription via a third party, a sales representative or commercialization partner, you benefit from the present network and power up-time guarantee if you are billed directly by WDS.
We want you to feel at ease with your decision to purchase services from us, and to know that we take your communication and data as seriously as you do.

SECTIONS OF THIS SLA AND ASSOCIATED SERVICES:

  1. General Terms And Conditions For All Services
  2. App Service: WDS’ application service making available shared resources on a server to make an application usable on their device.
  3. Exchange Hosting Service: WDS’ application service for email, calendaring and task management created using Microsoft Exchange server software.
  1. Article 1 General terms and conditions for all services

    1. Account Administration

      WDS provides your designated administrators with access to an dedicated account management tool. Via this tool, you or your designated administrators will be able to change passwords, enable new user accounts and disable old user accounts and other similar management functions.

      You are entirely responsible for maintaining the confidentiality of your administrators’ passwords and accounts. Furthermore, you are entirely responsible for any and all activities that occur under your account. You agree to notify WDS immediately of any unauthorized use of your account or any other breach of security. WDS will not be liable for any loss that you may incur as a result of someone else using your password or account, either with or without your knowledge. You may not use anyone else’s account at any time, without the permission of the account holder.

    2. Customer Service, Billing and Sales Enquiries

      For Customer service, Billing and Sales enquiries, you may contact us via the email form or the live messaging system, both available at https://support.wirelessdatasolutions.net/

    3. Systems Support

      We provide systems support to your designated administrators. Systems support is defined as support associated with issues/faults with our servers. There are no additional charges for this support (We ask that you please check the Server Status Page on our website before calling our systems support). You may designate up to four (4), but no more than four (4), administrators who are authorized to call WDS’ client support services

    4. 1.4 End-Users and Custom Support Services

      No support to your end-users shall be provided by WDS unless specifically agreed to in writing by us. Directing your end-users or any third party which are not administrators to our technical support service shall constitute a breach of this SLA. We do offer affiliates agreement for our services. Additionally, several support services may be provided on an as-needed basis, with separate pricing for each support service or on a per-project basis. Please contact us for details.

    5. Migration Services

      At your request, WDS will provide an advance estimate of fees for migration from one system or provider to our services, based on the information you provide. However, you acknowledge that our fees will be calculated on the basis of the actual amount of data migrated and may exceed the estimate. You acknowledge that after we begin the migration services it is possible that we discover technical limitations related to the configuration of your data that prevent us from successfully completing the migration. You acknowledge
      that there is a special risk that data will be lost during a migration and you undertake to create a reliable backup of all data to be migrated prior to the time that WDS begins the migration. You agree that WDS will not be liable to you or to any third party for damages resulting from the loss or corruption of your information or third party information as part of the migration.

    6. Server Software

      We exercise industry’s standard practices to ensure that software is correctly configured in all material respects. If there is more than one way to configure software, we will choose the configuration that we determine, in our sole discretion, to be the most appropriate. We reserve our rights to install security
      patches, updates, and service packs, at our sole discretion and only to the extent that such security patches, updates and service packs exist and are compatible with our Services. Software updates may change system behaviour and functionality and as such may negatively affect your applications. We cannot foresee nor can we be held responsible for service disruption or changes in functionality or performance due to implementation of software patches and upgrades or other scheduled maintenance. If such disruption or
      changes occur, we will provide our best efforts to remedy the situation as soon as possible after being notified of the problem by you.

      We are not responsible for problems that may arise from incompatibilities between new versions of software and your content, regardless of whether it was a requested, required or discretionary upgrade.

    7. Security

      Access to our data center and systems is restricted to authorized personnel. We ensure that our employees and contractors are familiar with and understand our policies. We will make our best commercial efforts to
      protect the security of our systems and services, and the data that resides therein.

    8. Data Retention

      WDS shall not be held responsible for retaining any of your data after account termination, unless as expressly provided hereunder. All data is deleted from the servers after the account is terminated and from back-ups during scheduled back-up rotation or earlier, at our convenience. We shall not restore, provide on any storage media, or otherwise transmit any data pertaining to existing or terminated accounts.

    9. Incident Reports, Credits and Refunds

      If an incident causes one or several of the Services selected by you to be unavailable temporarily, you may be credited and/or refunded in accordance with the “Service Unavailability Credits” section applicable for each Service.

      WDS SHALL HAVE NO LIABILITY OF ANY KIND WHATSOEVER FOR SERVICE UNAVAILABILITY OTHER THAN WHAT IS EXPRESSLY PROVIDED IN THE APPLICABLE “SERVICE UNAVAILABILITY CREDITS” SECTIONS HEREIN.

      To request a credit and/or a refund for any loss of Service, the client must file a
      report (an“Incident report”) within fifteen (15) days of the loss of Service event’s occurrence to support@wirelessdatasolutions.net . This Incident report must contain a detailed description of the Services affected, observed problems and duration of the event. Before processing any credit request, our accounting team will validate the information you provided in the Incident report to confirm the loss of Service availability, its time-frame and corresponding credit and/or refund. Credit shall be applied to the next invoice for the affected Service.

    10. Maximum Aggregate Credits And Refunds

      In any case credits and/or refunds are granted to a client for such loss of Service, the maximum aggregate cumulative amount of such credits and/or refunds, in any given month for any given Service shall not exceed
      to total amount of fees otherwise payable by you for this Service during this month.

      You are not entitled to a credit and/or refund if you are in breach of the terms of services, the acceptable usage policy (and any of the documents incorporated thereof), including breach of payment obligations, at the time of the occurrence of the event giving rise to the credit until you have cured the
      breach. You are not entitled to a credit and/or refund if the event giving rise to the credit and/or refund would not have occurred but for your breach of the terms of services or acceptable usage policy (and any of the documents incorporated thereof) or your fault or negligence.

    11. Previous Versions of this SLA

      This version of the SLA supersedes any and all previous versions of the applicable SLA distributed or made available by WDS, its representatives or agents. The procedure to change this SLA is governed by our terms and conditions.

  2. Article 2 SPECIFIC TERMS AND CONDITIONS: App Services

    1. Services description

      If selected, we will make available dedicated resources on several servers to make possible the services required for our flagship applications, Secure Voice, Secure Chat, and Secure Email, the latter two to be made available for both BlackBerry and Android devices, including our dedicated Android devices, called Secure Phone.

      Secure Group and WDS provide Secure Pack as a secure communication suite comprised of three separate apps, Secure Voice, Secure Chat, and Secure Email. Of the three only Email requires any true hosting. Secure Voice makes use of server space and software, but does not store any data beyond basic (and very limited) user information. Calls made are peer to peer, and not reliant on storage. For that reason, only the server configurations and services applicable are backed up for this application. Secure Chat is largely the same, save it relies on XMPP server configurations for base functionality. Messages can be stored, but only until they can be delivered to the recipient. Once downloaded by the recipient device, they are no longer available on our servers. References to backups in upcoming paragraphs therefore only apply to the server configurations for Secure Chat and Secure Voice, user information and keys required to authenticate.

    2. Disaster Recovery

      We schedule nightly backups to the shared backup devices. Backups are monitored and checked for errors, and regularly scheduled tests of the restoration procedures are performed. Backup copy retention time is 15 days. We do not warrant, however, that a valid backup is available for every day of this 15 day period, as applicable. If a disruption of the Service occurs, we will assign our highest priority and will make our best commercial efforts to ensure the timely restoration of the Service. Depending on the type of disruption that has occurred, we might elect to first restore the Service without the data. Any data not immediately accessible after a disruption in the Service will be restored from the most recent backup and made accessible with WDS’ highest priority.

    3. Restoration

      WDS recognizes that from time to time, your users or administrators may mistakenly delete, in whole or in part, items in your mailbox or public folders, as applicable. As this is not a system fault and restoration may require partial implementation of our disaster recovery procedures, we reserve the right to
      charge you, and you agree to pay for, restoration fees of 150$ per hour (with a minimum fee of 100$), plus applicable taxes. We do not warrant the integrity of the Web content or mailbox content, as applicable, of each individual backup.
      This is only applicable to email data, and you are reminded that we do not retain any keys to your encrypted material, and cannot recover encrypted items in any form other than raw data.

    4. Maintenance

        1. Planned maintenance:
          Planned maintenances are typically scheduled between 1am and 3am EST, and typically performed over the weekend. Two-day prior notice shall be given by WDS.
        2. Hot Fixes:
          Installation of urgent “hot fixes” is scheduled as quickly as possible after testing, and a notification is sent to you. The two-day notification mentioned above is waived for urgent hotfixes. WDS also reserves additional two (2) two-hour maintenance windows on Wednesdays and Saturdays from 11:00 PM to 1:00 AM (EST), during which the servers may be offline for urgent fixes.
    5. Servers availability

      1. Servers Availability

        Subject to sub-section 2.5.4, WDS undertakes to maintain 99.9% server uptime, defined as the ability to connect to the Email, Chat, or Voice servers, calculated on a monthly basis. WDS will not monitor availability of individual users or accounts but only monitors the server availability as a whole.

        WDS calculates uptime as a percentage of the time in a month (30 days X 24 hours X 60 minutes) during which the system is available, excluding, but not limited to, the conditions above and all scheduled and urgent maintenances.

        Any loss of Service availability lasting less than five minutes will not be included in the calculation of Service availability. WDS calculates Service Availability based on both monitoring system and incident report from engineering team.

      2. Exclusion

        Any circumstance beyond WDS’ reasonable control, including but not limited to the following conditions, will not be included in email, XMPP, BES, web, and other server availability calculations:

        1. Problem located on the client’s side, including network/Internet issue, problem with 3rd party application; loss of Service availability due to Network Attacks such as DDoS;
        2. SYN or similar attacks, issue caused by DNS resolution and/or domain name or certificate expiration;
        3. Mail bombing or other flooding attacks;
        4. Software “bugs” or problems within used products creating service interruptions, hardware bug or failure beyond high-availability system;
        5. Problem located outside our control within the Datacenter exploited by WDS , such as Internet and power availability or any other situation mentioned within this SLA.
    6. Service Unavailability Credits

      On a per-Service basis, for each month in which the availability is below the target availability of section 2 herein above, WDS will reduce the amounts due and payable to it relating to such Service for such month by 5%. In addition, for every 1% loss of availability below target availability of section 2 during the same calendar month, WDS will further reduce the amounts due and payable to it relating to such Service for such month by another 2.5%.

      Because of the architecture that WDS has created to provide the Service, users within an organization may be spread across separate and distinct servers. In the case where one server suffers downtime exceeding the Service level warranty, your organization will be compensated only for the users with accounts on the non-complying server, on a pro-rated basis. Rarely, a Service may be functioning in some areas and not functioning in others. Any of these diminished functioning are not considered downtime and are excluded from availability calculations.

    7. Claim procedure

      All requests must be made within seven (7) days following the end of the month in question. Reclamations must include the starting time of the unavailability, the time when services came back to normal and at least 3 “traceroute” commands taken during the unavailability. Any incomplete reclamation form will be discarded. The request will be processed within 10 to 15 days following its reception.

  3. Article 4 SPECIFIC TERMS AND CONDITIONS : Exchange Hosting Service

    1. Services description

      If selected, WDS will make available application services for email, calendaring and task management created using Microsoft Exchange server software, integrating PGP functionality for encryption. Our liability will be limited to configuration help, and ensuring the servers are healthy and functioning.

    2. Disaster Recovery

      WDS schedules daily backups to the shared backup devices. Backups are monitored and checked for errors, and regularly scheduled tests of the restoration procedures are performed. Backup copy retention time is seven (7) days. On a weekly basis, backups are sent off-site. WDS does not warrant, however, that a valid backup is available for every day of this 7 days period, as applicable. If a disruption of the Service occurs, WDS will assign its highest priority and will make its best commercial efforts to ensure the timely restoration of the Service. Depending on the type of disruption that has occurred, WDS may elect to first restore the Service without the data. Any data not immediately accessible after a disruption in the Service will be restored from the most recent backup and made accessible with WDS’ highest priority. In order to ensure the readiness of WDS’ operators to complete the offline restoration process, WDS runs frequent drills to test restoration performance. WDS is not liable for data loss resulting from the failure or loss of backup media.

    3. Mail Server Availability

      Subject to subsection 2.4 and 2.5, WDS undertakes to maintain 99.9% Mail server uptime. Mail server uptime is defined as the ability to retrieve the SMTP and POP headers from the mail server, calculated on a monthly basis. WDS will not monitor availability of individual mail accounts or mailboxes but only monitors the server availability as a whole.

      The outgoing email protocol used on the mail server (SMTP) is a “store-and- forward” type of protocol that does not warrant immediate delivery of email messages. If the mail server’s first email delivery attempt fails, it will re-attempt delivery according to a predefined schedule. If the message fails to be sent for 24 to 72 hours, the messages will be returned to the sender.
      WDS calculates uptime as a percentage of the time in a month (30 days X 24 hours X 60 minutes) during which the system is available, excluding, but not limited to, the conditions above and all scheduled and urgent maintenances. Any loss of Service availability lasting less than five minutes will not be included in the calculation of Service availability.

      WDS calculates Service availability based on both monitoring system and incident report from engineering team.

    4. Restoration

      WDS recognizes that from time to time, your users or administrators may mistakenly delete, in whole or in part, items in your database, mailbox or public folders, as applicable. As this is not a system fault and restoration may require partial implementation of our disaster recovery procedures, we reserve the right to charge you, and you agree to pay for, restoration fees of 150$ per hour (with a minimum fee of 100$), plus taxes. We do not warrant the integrity of the Web content or mailbox content, as applicable, of each individual backup.

      Items within a mailbox that have been accidentally deleted can usually be restored directly from the Deleted Item Folder by the end user, even after the Deleted Item folder has been emptied. (Instructions for this procedure are contained within the Outlook® Help system.) Note, however, that WDS retains these deleted items online for no more than seven (7) days. If a public folder or mailbox cannot be recovered from the online Deleted Items storage, WDS must restore the items from the backup tapes employed in its disaster recovery systems. WDS will restore these items within 96 hours of an approved request from your designated administrator acknowledging the fees.

      Please note that email storage is subject to Retention Policies applied at the user and organizational level. If a retention policy is used, and emails are deleted on such a policy’s schedule, they will NOT be retrievable. In addition you are reminded that only unencrypted email can be categorically recovered. We do not warrant in any way the legibility of email that is encrypted, due to loss of a key. Encrypted emails due to loss of a key cannot be retrieved by any means, and you will be made aware of this before any paid recovery attempt is made.

    5. Maintenance

        1. Planned maintenance:
          Planned maintenances are typically scheduled between 1am and 3am EST, and will typically fall on a weekend. Two-day prior notice shall be given by WDS .
        2. Hot Fixes:
          Installation of urgent “hot fixes” is scheduled as quickly as possible after testing, and a notification is sent to you. The two-day notification mentioned above is waived for urgent hotfixes. WDS also reserves additional two (2) two-hour maintenance windows on Wednesdays and Saturdays from 11:00 PM to 1:00 AM (EST), during which the servers may be offline for urgent fixes.
        3. Mailboxes Movement:
          WDS may move mailboxes within the Exchange Hosting Service, among the different WDS servers, at its discretion. WDS does not warrant that it will send a notification prior to these moves, and they should not affect users whose software is installed and configured correctly. Incorrect configuration of the user’s software, which may result in the inability to connect to the Service, is not considered downtime and is excluded from the calculation of system availability.
    6. Mail delivery terms and conditions

        1. Email Delivery Restrictions:
          In order to prevent bandwidth issues for our clients, WDS limits attachments to 30 MB. Consistent sending of files of this size may result in action against your account, if it proves to adversely affect the performance of our servers, or negatively impact our other clients. We reserve the right to impose restrictions upon individual users, as required.
        2. Mail Delivery Time:
          Individual email messages including attachments of less than 20 Mb that are received inbound from the Internet gateways, or those sent from one mailbox on the Exchange Hosting Service to a second mailbox on the Service, generally will be delivered in 60 seconds or less.
          Email messages including attachments of less than 20 Mb outbound to Internet gateways generally will be sent from the Exchange Hosting Service within 60 seconds; delays at the gateways due to Internet issues are not covered by this SLA.
        3. Exceptions:
          WDS makes no covenant regarding the timing of delivery or receipt of mail being processed on the Internet. Delivery times covered by this SLA are only for mail sent between servers, mailboxes, and/or gateways on the Exchange Hosting Service. Additionally, WDS’ spam control functionality performs additional analysis and processing of inbound emails, so the delivery times specified above do not apply for delays due to same.
    7. Application Service availability

      Subject to subsection 3.6, WDS undertakes to maintain 99.9 average uptime availability of the Exchange Hosting Service’s mailboxes and/or public folders and timely delivery 99.9 % of email messages in accordance with subsection 4.5 and 4.6 above.

      Exclusion:

        1. Any circumstance beyond WDS reasonable control, including but not limited to the following conditions are excluded from the calculation of availability and timely delivery:
              1. problem located on the client’s side, including network/Internet issue;
              2. problem with 3rd party application;
              3. loss of Service availability due to Network Attack such as DDoS, SYN or similar attacks,
              4. issue caused by DNS resolution and/or domain name or certificate expiration;
              5. software “bugs” or problems within used products creating service interruptions, hardware bug or failure beyond high-availability system;
              6. problem located outside our control within the Datacenter exploited by WDS , such as Internet and power availability or any other situation mentioned within this SLA.

          WDS calculates uptime as a percentage of the time in a month (30 days X 24 hours X 60 minutes) during which the system is available, excluding, but not limited to, the conditions above and all scheduled and urgent maintenances. Any loss of Service Availability lasting less than five minutes will not be included in the calculation of Service Availability. WDS calculates Service Availability based on both monitoring system and incident report from engineering team.
          On a per-Service basis, for each month in which the availability is below an average of 99.9% as calculated above, WDS will reduce the amounts due and payable to it relating to such Service for such month by 5%. In addition, for every 1% loss of availability below the 99.9% targeted average availability.

    8. Service Unavailability Credits

      If WDS fails to provide Exchange Hosting Service’s availability in accordance with section above for an aggregate total of 2 hours or more in any given month, WDS will reduce the amounts due and payable to it relating to the Exchange Hosting Service for such month by 5% for each mailbox affected. For every additional 2 hours of delay of email service during the same calendar month, WDS will further reduce the amounts due and payable to it relating to the Exchange Hosting Service by another 5% of the original price charged for such month. The maximum credit per month for message delays shall be 15%.

    9. Claim procedure

      All requests must be made within seven (7) days following the end of the month in question. Reclamations must include the starting time of the unavailability, the time when services came back to normal and at least 3 “traceroute” commands taken during the unavailability. Any incomplete reclamation form will be discarded. The request will be processed within 10 to 15 days following its reception.

    10. Protection Against Viruses

      WDS provides inbound anti-virus scanning as part of the Exchange Hosting Service, and will make its best commercial efforts to protect against SMTP borne viruses and other computer software threats. While WDS’ anti-virus protection is state of the art, due to the rapidly evolving nature of viruses, Trojan Horses, and other email-borne security issues, WDS can make no warranties against these types of threats or the effectiveness of its anti-virus solution.

    11. Protection Against Spam

      WDS provides anti-spam filtering as part of the Exchange Hosting Service, and will make its best commercial efforts to protect against unwanted emails. WDS cannot make any warranties in the system’s filtering efficiency.

 

PRIVACY POLICY SECURE PACK/PHONE

Thank you for using Secure Pack or Secure Phone by Secure Group, provided under agreement by Wireless Data Solutions. Secure Pack applications allow you to encrypt and send audio, video, voice, email and text messages, so that you can communicate on your android safely, securely, anonymously — and easily. In addition to Android services, WDS also offers similar services for Blackberry, and email support for desktops.

This document, our Privacy Policy, governs how Secure Pack (“we,” “us,” etc.) handles our users (“you,” “your,” etc.) data both in the Secure Pack applications themselves(the “Secure Pack Apps”) and on our website/servers (collectively, the “Services”).

Our Privacy Policy is incorporated into and is subject to our Terms of Service, so please read both documents carefully. Your use of the Secure Pack Services indicates your consent to this Privacy Policy and our Terms of Service. If you do not want to be bound by these agreements, you may not use our Services.

We work very hard to preserve your privacy and security, and we do our best to be as transparent as possible in explaining how we use your data in providing our Services. Please contact us if you have any questions at privacy at wirelessdatasolutions dot net.

Our Privacy Practices, in Brief:

Secure Pack has to collect some information from you in order to provide our Services to you, but we do so in a highly limited, highly secure way.

  • We use military-grade encryption. Our encryption is based on 256-bit symmetric AES encryption, RSA 4096 encryption, ECDH521 encryption, transport layer security, and our proprietary algorithm.
  • We only see the information you give us. This would only include such things as required billing and contact information for purchasing our services.
  • Deletion is forever. When you delete a message, or when a message expires, our “secure shredder” technology uses forensic deletion techniques to ensure that your data can never be recovered by us or anyone else.
  • You own your data. We do not share or sell any data about our users. Period.

What Information Does Wireless Data Solutions Collect, and How Is It Used?

We are committed to limiting our collection of your information to what is necessary to provide you with our Services.

We only collect information from users who create Secure Pack Accounts. You must create a Secure Pack Account to use the Secure Pack Apps.

What We Donʼt Collect: Equally important to us is the information we donʼt collect. We will NEVER collect any location information or have access to the contents of the communications you send using the Secure Pack Apps. After messages are deleted (or after they expire), they are forensically deleted and are not retrievable by us or anyone else. (Remember, however, that if you send a Secure Pack message to another Secure Pack user, that message might remain on their device even after you delete it from yours, depending on the value you set for the self-destruct time of that message.)

User-Provided Information: We collect some very limited information from you after you download the Secure Pack Apps in order to allow you to create a Secure Pack Account, and begin using the Secure Pack Apps.

  • Your Secure Pack ID: Your Secure Pack username is how you allow others to contact you via Secure Pack. It does not have to be your real name or provide any reference to your identity.
  • Your Password: We require you to have a password to use the Secure Pack Apps, but we never store your password on our servers and don’t store it by default in any form on your device. For your own security, we recommend that you use a long, unique password consisting of a mix of upper- and lower-case letters, numbers, and symbols.

Optional User-Provided Information: Within the Secure Pack Apps, we provide a few optional features for your convenience. None ask for your personal information, but may allow you to inadvertently provide it. If you want to keep your use of Secure Pack as anonymous as possible, please read these sections carefully in order to understand how we associate information you provide with your Secure Pack Account.

  • Email Headers and optional encryption: Our Secure Email app (part of Secure Pack) provides the option to encrypt any email sent from your mailbox. However, it is only an option. Simply having the Secure Email app does not protect your information or your identity. In addition, we cannot protect your anonymity if you place your name as part of the email header.
  • Optional Encryption in chat: Secure Chat allows users to communicate with other users on XMPP based clients in addition to our secured OTR protocol. Such communications are not secured by OTR, as the protection is reliant on two parties having the software. You must actively share your username with any potential contact, however, if you also share your name with a potential contact, prior to establishing a secure OTR connection, we cannot provide any assurances of protection.
  • Encrypting Files and Images: The Secure Pack Apps will allow you to share PDFs and image files. The Secure Pack Apps will make encrypted copies of these files for sending as Secure Pack messages. Secure Email will disguise not only the file but also its type by labelling it attachment.pgp. Remember though, that encryption is not automatic. If you elect to send unencrypted emails, attachments will NOT be protected either. By the same token, sending files to an unsecured XMPP contact who does not have OTR protection will also not be protected.
  • Auto-Login: By default, the Secure Pack Apps will automatically log out of your account after a set period of inactivity, and in order to use the Secure Pack Apps again, you will have to reenter your password. If you enable Auto-Login, you will be able to use the Secure Pack Apps after a period of inactivity without having to enter your password each time. While you will still benefit from Secure Packʼs security (e.g., deletion, encryption, etc.) and may find that your user experience is more seamless, this option is less secure than the default logout and password requirements, and we suggest that users who enable Auto-Login retain other security measures on their devices, like enabling screen locks and PINs through your device settings.
  • Crash Log: For the purpose of debugging and error correction as well as for system continuity, users might choose to send crash logs to Secure Pack when prompted by the app. The logs do not contain any user personal information and they pertain only to the Secure Pack Apps. The process is voluntary and users can choose not to send their crash logs to us at any time. Participating in errors/crash reporting will help Secure Pack to become a better app.

Automatically Collected Information: Secure Pack collects two types of information automatically during your setup and use of the Secure Pack Apps: Device Information and Aggregate Usage Data.

  • Device Information: The Secure Pack Apps will collect a hashed representation of both your mobile device type and your mobile device’s hardware ID during registration, in order to connect that information with your account and to tie your account to your device.
  • Aggregate Usage Data: During the operation of our services, we also collect aggregate, anonymous information about basic usage statistics, such as the number of messages sent by all Secure Pack users daily, what types of messages our users tend to send (e.g., voice messages more often than text), and so forth. We never attempt to (and cannot) identify users associated with any of this information.
What Information Does Secure Pack Share with Third Parties?

We do not share any user information we have with third parties, with the exception of the third-party service with whom we share your phone number for the sole purpose of sending you an SMS confirmation if you choose to associate your phone number with your Secure Pack ID. Please note that the provision of a phone number is completely at the user’s discretion.

Law Enforcement:

Please see our Law Enforcement Guidelines but here are the highlights.

We will always notify you of any third party requests for your information unless legally unable to do so. We require a warrant before handing over the contents of your communication, however, because of the nature of our technology, the contents of your communication will be undecipherable if obtained.

We Retain As Little Data As Possible, for the Least Time Possible

Data Retention on Secure Packʼs Servers: Our servers store the encrypted messages that you send and receive only long enough to ensure their reliable delivery. Undelivered messages are deleted after a reasonable period of time. We retain non- message data (i.e. Types of messages, usernames) for as long as you use the Secure Pack Services and for an indefinite time thereafter.

Data Retention on Your Device: All messages are stored encrypted on end users’ mobile devices. You choose your own retention policy for your messages by choosing how long a message is saved before it is deleted (via the self-destruct time for sent messages and manual deletion for your device). Deleted messages cannot be recovered.

We Are Serious About Security

We are concerned about safeguarding the confidentiality of your information. We provide physical, electronic, and procedural safeguards to protect information we process and maintain. For example, we limit access to this information to authorized employees who need to know that information in order to operate, develop, or improve our Services. No sensitive information is in the clear: we make reasonable efforts (as described in the Privacy Policy) to ensure that everything we store is not retrievable by us or anyone else.

However, as security experts, we know that no security system can prevent all potential security breaches. Therefore we have limited the potential implications of such a breach by designing our system so that in the event of a breach, we would have the least possible information about you.

Children and COPPA

In order to comply with the COPPA, Secure Pack does not allow Users age 13 and under to purchase our services without an adults’ permission.

We Can Change This Privacy Policy

This Privacy Policy may be updated from time to time, for any reason. We will notify you of any changes to our Privacy Policy by posting the new Privacy Policy here along with information about what has changed and an archive of past policies. You are advised to consult this Privacy Policy regularly for any changes.

Users Outside Canada

If you use our Services and reside outside the U.S., your information will be transferred to the U.S. and will be processed and stored there under United States Privacy Standards. By using our Services and providing information to us, you consent to such transfer to and processing in the United States.

You are responsible for complying with any laws or regulations in your country that govern use of applications and services like Secure Pack.

Contact Us if You Have Questions

If you have any questions regarding privacy while using our Services, or have questions about our practices, please contact us via email at privacy at wirelessdatasolutions dot net.

 

PRIVACY POLICY ENCRYPTED BLACKBERRY SERVICES

Thank you for using Encrypted Blackberry Services by Wireless Data Solutions. Encrypted Blackberry Services applications allow you to encrypt and send email and text messages, so that you can communicate on your Blackberry safely, securely, anonymously — and easily. In addition to BlackBerry services, WDS also offers similar services for Android, and email support for desktops.

This document, our Privacy Policy, governs how Encrypted Blackberry Services(“we,” “us,” etc.) handles our users (“you,” “your,” etc.) data both in the Encrypted Blackberry Services applications themselves(the “EBS Apps”) and on our website/servers (collectively, the “Services”).

Our Privacy Policy is incorporated into and is subject to our Terms of Service, so please read both documents carefully. Your use of the Encrypted Blackberry Services indicates your consent to this Privacy Policy and our Terms of Service. If you do not want to be bound by these agreements, you may not use our Services.

We work very hard to preserve your privacy and security, and we do our best to be as transparent as possible in explaining how we use your data in providing our Services. Please contact us if you have any questions at privacy at wirelessdatasolutions dot net.

Our Privacy Practices, in Brief:

Encrypted Blackberry Services has to collect some information from you in order to provide our Services to you, but we do so in a highly limited, highly secure way.

  • We use military-grade encryption. Our encryption is based on 256-bit symmetric AES encryption, RSA 4096 encryption, ECDH521 encryption, transport layer security, and our proprietary algorithm.
  • We only see the information you give us. This would only include such things as required billing and contact information for purchasing our services.
  • Deletion is forever. When you delete a message, or when a message expires, our “secure shredder” technology uses forensic deletion techniques to ensure that your data can never be recovered by us or anyone else.
  • You own your data. We do not share or sell any data about our users. Period.

What Information Does Wireless Data Solutions Collect, and How Is It Used?

We are committed to limiting our collection of your information to what is necessary to provide you with our Services.

We only collect information from users who create Encrypted Blackberry Services Accounts. You must create a Encrypted Blackberry Services Account to use the EBS Apps.

What We Donʼt Collect: Equally important to us is the information we donʼt collect. We will NEVER collect any location information or have access to the contents of the communications you send using the EBS Apps. After messages are deleted (or after they expire), they are forensically deleted and are not retrievable by us or anyone else. (Remember, however, that if you send a Encrypted Blackberry Services message to another Encrypted Blackberry Services user, that message might remain on their device even after you delete it from yours, depending on the value you set for the self-destruct time of that message.)

User-Provided Information: We collect some very limited information from you after you download the EBS Apps in order to allow you to create a Encrypted Blackberry Services Account, and begin using the EBS Apps.

  • Your EBS ID: Your EBS username is how you allow others to contact you via EBS. It does not have to be your real name or provide any reference to your identity.
  • Your Password: We require you to have a password to use the EBS Apps, but we never store your password on our servers and don’t store it by default in any form on your device. For your own security, we recommend that you use a long, unique password consisting of a mix of upper- and lower-case letters, numbers, and symbols.

Optional User-Provided Information: Within the EBS Apps, we provide a few optional features for your convenience. None ask for your personal information, but may allow you to inadvertently provide it. If you want to keep your use of EBS as anonymous as possible, please read these sections carefully in order to understand how we associate information you provide with your EBS Account.

  • Email Headers and optional encryption: Our Secure Email app (part of Encrypted Blackberry Services) provides the option to encrypt any email sent from your mailbox. However, it is only an option. Simply having the Secure Email app does not protect your information or your identity. In addition, we cannot protect your anonymity if you place your name as part of the email header.
  • Optional Encryption in chat: Secure Chat allows users to communicate with other users on XMPP based clients in addition to our secured OTR protocol. Such communications are not secured by OTR, as the protection is reliant on two parties having the software. You must actively share your username with any potential contact, however, if you also share your name with a potential contact, prior to establishing a secure OTR connection, we cannot provide any assurances of protection.
  • Encrypting Files and Images: The EBS Apps will allow you to share PDFs and image files. The EBS Apps will make encrypted copies of these files for sending as Secure Pack messages. Secure Email will disguise not only the file but also its type by labelling it attachment.pgp. Remember though, that encryption is not automatic. If you elect to send unencrypted emails, attachments will NOT be protected either. By the same token, sending files in chat to an unsecured XMPP contact who does not have OTR protection will also not be protected.
  • Auto-Login: By default, the EBS Apps will automatically log out of your account after a set period of inactivity, and in order to use the EBS Apps again, you will have to reenter your password. If you enable Auto-Login, you will be able to use the EBS Apps after a period of inactivity without having to enter your password each time. While you will still benefit from Secure Packʼs security (e.g., deletion, encryption, etc.) and may find that your user experience is more seamless, this option is less secure than the default logout and password requirements, and we suggest that users who enable Auto-Login retain other security measures on their devices, like enabling screen locks and PINs through your device settings.
  • Crash Log: For the purpose of debugging and error correction as well as for system continuity, users might choose to send crash logs to EBS when prompted by the app. The logs do not contain any user personal information and they pertain only to the EBS Apps. The process is voluntary and users can choose not to send their crash logs to us at any time. Participating in errors/crash reporting will help Secure Pack to become a better app.

Automatically Collected Information: Encrypted Blackberry Services collects two types of information automatically during your setup and use of the EBS Apps: Device Information and Aggregate Usage Data.

  • Device Information: The EBS Apps will collect a hashed representation of both your mobile device type and your mobile device’s hardware ID during registration, in order to connect that information with your account and to tie your account to your device.
  • Aggregate Usage Data: During the operation of our services, we also collect aggregate, anonymous information about basic usage statistics, such as the number of messages sent by all Secure Pack users daily, what types of messages our users tend to send (e.g., voice messages more often than text), and so forth. We never attempt to (and cannot) identify users associated with any of this information.
What Information Does Secure Pack Share with Third Parties?

We do not share any user information we have with third parties, with the exception of the third-party service with whom we share your phone number for the sole purpose of sending you an SMS confirmation if you choose to associate your phone number with your EBS ID. Please note that the provision of a phone number is completely at the user’s discretion.

Law Enforcement:

Please see our Law Enforcement Guidelines but here are the highlights.

We will always notify you of any third party requests for your information unless legally unable to do so. We require a warrant before handing over the contents of your communication, however, because of the nature of our technology, the contents of your communication will be undecipherable if obtained.

We Retain As Little Data As Possible, for the Least Time Possible

Data Retention on Secure Packʼs Servers: Our servers store the encrypted messages that you send and receive only long enough to ensure their reliable delivery. Undelivered messages are deleted after a reasonable period of time. We retain non- message data (i.e. Types of messages, usernames) for as long as you use the Encrypted Blackberry Services and for an indefinite time thereafter.

Data Retention on Your Device: All messages are stored encrypted on end users’ mobile devices. You choose your own retention policy for your messages by choosing how long a message is saved before it is deleted (via the self-destruct time for sent messages and manual deletion for your device). Deleted messages cannot be recovered.

We Are Serious About Security

We are concerned about safeguarding the confidentiality of your information. We provide physical, electronic, and procedural safeguards to protect information we process and maintain. For example, we limit access to this information to authorized employees who need to know that information in order to operate, develop, or improve our Services. No sensitive information is in the clear: we make reasonable efforts (as described in the Privacy Policy) to ensure that everything we store is not retrievable by us or anyone else.

However, as security experts, we know that no security system can prevent all potential security breaches. Therefore we have limited the potential implications of such a breach by designing our system so that in the event of a breach, we would have the least possible information about you.

Children and COPPA

In order to comply with the COPPA, Encrypted Blackberry Services does not allow Users age 13 and under to purchase our services without an adults’ permission.

We Can Change This Privacy Policy

This Privacy Policy may be updated from time to time, for any reason. We will notify you of any changes to our Privacy Policy by posting the new Privacy Policy here along with information about what has changed and an archive of past policies. You are advised to consult this Privacy Policy regularly for any changes.

Users Outside the United States

If you use our Services and reside outside the USA, your information will be transferred to the U.S. and will be processed and stored there under American Privacy Standards. By using our Services and providing information to us, you consent to such transfer to and processing in the U.S.

You are responsible for complying with any laws or regulations in your country that govern use of applications and services like Encrypted Blackberry Services.

Contact Us if You Have Questions

If you have any questions regarding privacy while using our Services, or have questions about our practices, please contact us via email at privacy at wirelessdatasolutions dot net.

 

PRIVACY POLICY FOR WEBSITE, AFFILIATE SITES, ADMIN PORTAL, BLOG, AND SOCIAL MEDIA

Wall Street Software, d.b.a. Wireless Data Solutions,(“WDS ” or “us” or “we”) believes the right to privacy is one of paramount importance. This is why we have implemented this privacy policy, allowing the protection of your integrity and of your right to disclose or not your personal information.

This privacy policy discloses how WDS collects, protects, uses and shares personal information gathered about you, with regards to our site, portal and social media pages. See our Privacy Policy for Secure Pack for information specific to our product line.

Our privacy practices are consistent with:

  • California Online Privacy Protection Act of 2003
  • Canada’s federal privacy legislation, the Personal Information Protection and Electronic Documents Act (hereinafter “PIPEDA”);
  • Quebec’s provincial privacy legislation the Act respecting the Protection of Personal Information in the Private Sector (hereinafter “PPIPS”);
  • Principle – Accountability

WDS may share information, including Personal Information provided on a voluntary basis with its promotion and marketing agency and mass-mailing agency.

All Personal Information is collected with your voluntary consent. Personal Information is not accessible to anyone outside the specific function for which it is collected. WDS values the privacy of its customers, employees, job applicants and other visitors to its website who may choose to provide Personal Information.

This Privacy Policy will assist you to understand what types of information we may collect on www.wirelessdatasolutions.net (hereinafter the “Website”), how that information may be used and with whom the information may be shared.

  1. Wireless Data Solutions’ Commitment: Our Privacy Principles

    Our commitment regarding your Personal Information is reflected in a series of 10 Privacy Principles, which are as follows:

    1. Principle – Accountability

      WDS is responsible for personal information under its control.

    2. Principle – Identifying the Purposes for collection of Personal Information

      WDS will identify the purpose for which personal information is collected at or before the time the information is collected. Some of the identified purposes for which WDS collects, uses and discloses your personal information are described below in this Privacy Policy. If we intend to collect, use or disclose your personal information for additional purposes, we will seek your consent.

    3. Principle – Consent for Collection, Use, or Disclosure of Personal Information

      WDS will obtain your informed consent for the collection, use or disclosure of your personal information, except as permitted by law.

    4. Principle – Limiting Collection of Personal Information

      WDS will limit the collection of personal information, both the amount and the type of information, to what is necessary for the purposes identified by WDS.

    5. Principle – Limiting Use, Disclosure and Retention of Personal Information

      WDS will not use or disclose personal information for purposes other than the identified purposes for which it was collected, except with your consent or as required or permitted by law. WDS will retain your personal information only as long as necessary to fulfill the identified purposes.

    6. Principle – Accuracy of Personal Information

      WDS will attempt to make sure that your personal information will be as accurate, complete and up-to-date as is necessary for the purposes for which it is to be used.

    7. Principle – Security Safeguards

      WDS will protect your personal information by security safeguards appropriate to the sensitivity of the information.

    8. Principle – Openness Concerning Policies and Practices

      WDS will make readily available to you specific information about our policies and practices relating to the management of personal information.

    9. Principle – Individual Access to Personal Information

      Upon written request, subject to certain exceptions, WDS will inform you of the existence, use, and disclosure of your personal information and will give you access to that information. You are able to challenge the accuracy and completeness of the information and have it amended as appropriate.

    10. Principle – Challenging Compliance

      You have the right to address a challenge concerning compliance with this Privacy Policy to WDS’ Privacy Officer.

  2. Consent

    1. This Privacy Policy applies to all information gathered for and on behalf of WDS , whether in writing, verbally or electronically, through any website operated by or on behalf of WDS , including, but not limited to, www.wirelessdatasolutions.net. By using the Website, registering for WDS’ services or participating in any program or service managed by WDS , you consent to the data collection and use practices described in this Privacy Policy. If you have question about this Privacy Policy or the protection of your information, please refer to section 6 on how to contact our Privacy Officer.
    2. BY SUBMITTING PERSONAL INFORMATION TO WDS , OR BY ACCESSING AND USING THE WEBSITE OR THE SERVICES OF WDS , YOU AGREE THAT WE MAY COLLECT, USE AND DISCLOSE SUCH PERSONAL INFORMATION IN ACCORDANCE WITH THIS PRIVACY POLICY AND THE TERMS AND CONDITIONS AS PERMITTED OR REQUIRED BY LAW.
  3. Consent to Share and Disclose Information

    1. In addition to consenting to this Privacy Policy and our Terms and Conditions, including any relevant supplemental policies, you expressly consent to WDS sharing the information that you have provided, as described herein. WDS may share information with its promotion and marketing agency and mass-mailing agency.
  4. Consent to Electronic Notice if there is a Security Breach

    1. If WDS is required to provide notice of unauthorized access of certain security systems, you agree that WDS may do so when required or voluntarily by posting notice on the Website or sending notice to any email address that we have for you, at WDS’ sole discretion. You agree that notice to you will count as notice to any other individual for whom you are acting and agree to provide the notice to any such individual.
  5. 5. Type of information we may collect

    1. “Personal Information” is defined as any information concerning the personal or material circumstances of an identified or identifiable individual. An identifiable person is one who can be identified, directly or indirectly, by reference to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity.
    2. Personal Information shall include but is not limited to: name, home address, home postal code, home telephone number, mobile phone number, email address and employment related information such as may be found on resumes, applications, background verification information, or in employment references.
    3. Non-personal Information is information that is already a matter of public record or knowledge. Business contact information is considered non-personal information and not subjected to special protection and it can be routinely shared with anyone inside or outside of the business. Business contact information shall include but is not limited to: business name, business address, business telephone number, and is not considered personal information in certain jurisdictions.
  6. Internet Users – Cookies, Internet Protocol (IP) Address, Aggregate Information

    1. Cookies – in addition to Personal Information, we use data collection devices such as “cookies” on certain web pages to facilitate the transactions to be completed on the Website, help analyze our web page flow and measure promotional effectiveness. Cookies are pieces of information a website sends to an individual’s hard drive while they are viewing the website. Cookies allow the website to remember important information that will make your visit to the site more useful. We use cookies to help improve your future visits. If you do not wish to receive a cookie or if you wish to set your browser to warn you each time a cookie is being sent, or if you wish to turn off all cookies, use the options on your browser to assist you. The “Help” option on your browser may assist you in changing your cookie preferences. Please note that by turning cookies off, you will not have access to many features available on our website.
    2. Cookies can expire at the end of a browser session (from when a user opens the browser window to when they exit the browser) or they can be stored for longer.
    3. Internet Protocol (IP) Address – an Internet Protocol (IP) Address is associated with your computer’s connection to the internet. WDS may use your IP address to help diagnose problems with WDS’ servers, to administer the Website and to maintain contact with you as you navigate through the Website. Your computer’s IP address also may be used to provide you with information based upon your navigation through the Website. WDS does not link IP addresses to any Personal Information.
    4. Aggregate Information – is used to measure the visitors’ interest in, and use of, various areas of the Website and the various services and programs that WDS offers, WDS will rely upon aggregate information, which is information that does not identify you, such as statistical and navigational information. With this aggregate information, WDS may undertake statistical and other summary analyses of the visitors’ behaviors and characteristics. Although WDS may share this aggregate information with third parties, none of this information will allow anyone to identify you, or to determine anything else personal about you.
    5. We also use the services of Google analytics to gather Aggregate Information on our website. To opt out of being tracked by Google Analytics across all websites visit: tools.google.com/dlpage/gaoptout.
  7. Our Use of your Information

    1. We use your Personal Information to facilitate the services you request. We have tailored our Privacy Policy to adequately inform you of the use of your Personal Information.
    2. With your prior consent, WDS may market to you directly by email, mail or by telephone for the purposes, among others, of offering you some of WDS new or current product. You may remove yourself from our list at any time.
    3. WDS undertakes not to use any Personal Information it gathers in compliance with this policy or with any applicable legislation, to any other purposes unless we obtain your consent for that purpose or in certain exceptional circumstances, where we believe in good faith that the law requires or allows it.
  8. Collection and Use of Employee Personal Information

    1. WDS also collects Personal Information from its employees and applicants (human resource data) in connection with administration of its human Resources programs and functions. These programs and functions include, but are not limited to: job applications and hiring programs, compensation and benefit programs, performance appraisals, training, access to WDS and its affiliates facilities and computer networks, employee profiles, internal intranet employee directories, human resource record-keeping, and other employment related purposes.
    2. It is the policy of WDS to keep all past and present employee information private from disclosure to third parties. There are certain business related exceptions and they are:
      1. To comply with municipal, regional, provincial or federal agency requests;
      2. Inquiries from third parties with a signed authorization from the employee to release the information, except in situations where limited verbal verifications are acceptable (see below);
      3. Third parties with whom WDS has contractual agreements to assist in administration of company sponsored benefits.
  9. Collection and Use of Customer Information

    1. WDS will not collect Personal Information, unless you register for our services directly. In the future, and only to the extent that you expressly consented thereto, it is possible that we may use this information to contact you regarding products or promotions, as well as other products and services, which may be of interest to you. If you do provide us with Personal Information and expressly consent thereto, we may use the information to contact you, via e-mail, regular mail, telephone or other means, to provide you with information that you requested about specific products or services, provide additional future information about products or services that may be of interest to you, and to learn about and develop products and services. You may withdraw your consent at any time by un-subscribing from our database or contacting us in writing, as described below in the section 6.
  10. Mobile Information

    This section applies to individuals who visit our Website through a mobile device such as cellphone or tablet computer:

    1. Mobile Information We Collect

      1. Personally identifiable information (e.g. Name, email address) we collect only of what you share with us. For example, we may ask for this type of information so that we may contact you by phone or email at your request.
      2. If you use any location-enabled products, you may be sending us location information. WDS does not store or use this information other than to provide the service you requested.
      3. Some mobile applications will utilize Google Analytics (or similar tool) to help us better serve our customers through improved products, services, and revisions to the mobile applications. This collected information will not identify you to WDS. It may, however, let us know anonymously, which services and features you are using the most within the application, as well as device type and hardware features, country and language of download.
      4. Use of 3rd party services such as social sharing sites (e.g., Facebook, Twitter, Google+, and Pinterest) is governed by the privacy practices of those services. WDS does not capture or store your login information or other personally identifiable information for these services; however session info or cookies may be stored.
    2. How We Use Mobile Collected Information

      1. We use the information collected through your mobile device to personalize your experience with the application and to improve your overall experience including the development of new products, services, and features. We also use the information to provide customer support, and when applicable, register and administer your account. Additionally, we may use the information you provide to contact you about updates to our service.
      2. Information you provide may be used to fulfill the service(s) or carry out the transaction(s) you have requested or authorized.
      3. Except as required by law, WDS does not share any collected mobile information with 3rd parties with the following exceptions:
        1. WDS may provide some personal data to third-party partners that are providing services essential to your mobile user experience.
        2. All requests are sent through your mobile carrier’s network and your carrier may have access to it. Consult your carrier’s privacy policies for additional information.
  11. Opt-Out of Email and Mobile Updates

    1. You may have the opportunity to elect to receive email and mobile communications from us. We will only email you if you consented to receive emails from us. If you elect to receive emails, WDS will send you occasional updates about new additions to the Website as well as special offers and promotions of which you can take advantage. If at any time you decide you would rather not receive these types of communications from WDS , you can opt-out by clicking the unsubscribe link at the bottom of any WDS’ email. You may opt-out by contacting us, according to section 6 of the present Privacy Policy.
  12. Sharing of Personal Information

    1. WDS does not sell Personal Information to third parties. Except as described in this Privacy Policy, WDS will not disclose Personal Information with a third party, unless a customer requests or, consents to such disclosure, or such disclosure is required or authorized by law.
    2. We may share your Personal Information with agents, affiliates or service providers who act for or on behalf of WDS in connection with the business of WDS , or for further processing the data in accordance with the purpose(s) for which the data was originally collected, e.g., account creation, billing, third party maintenance of secure listing databases. We require our agents, affiliates and service providers to agree in writing to maintain the confidentiality and security of Personal Information they maintain on our behalf and not to use it for any purpose other than the purpose for which we retained them. We also require any third parties we retain to protect Personal Information disclosed by us in accordance with all applicable privacy requirements and the general privacy principles described in this Privacy Policy.
    3. The Personal Information you provide us is considered a company asset and may be disclosed and/or transferred to a third party in the event of a proposed or actual purchase, sale, lease, merger, amalgamation or any other type of acquisition, disposal, or financing of all or any portion of WDS or of any of the business assets or a division thereof, in order to permit the third party to evaluate the proposed transaction to enable a customer to continue to receive the same products and services from the third party. We will require such third parties to agree in writing to maintain the confidentiality and security of Personal Information they receive and not to use it for any purpose other than the evaluation of a proposed purchase, sale, lease, merger, amalgamation or any other type of acquisition, disposal, or financing, or the delivery of services to you in accordance with the terms of this Privacy Policy.
    4. Although we make every effort to preserve user privacy, we reserve the right to disclose Personally Identifiable Information to a third party in certain limited circumstances, specifically: to comply with a law, regulation, search warrant, subpoena, judicial proceeding, a court order, or as otherwise may be required by law, to enforce our policies or contracts, to collect amounts owed to us, to protect users of our sites from fraudulent or abusive use, during emergencies when safety is at risk, as determined by us, or otherwise where necessary for the establishment, exercise or defense of legal claims. In addition, from time to time, server logs may be reviewed for security purposes; for example, to detect unauthorized activity on the Website. In such cases, server log data, containing IP addresses, would be shared with law enforcement bodies in order that they may identify users in connection with their investigation of the unauthorized activities.
  13. Security

    1. We endeavor to protect your Personal Information using physical, electronic or procedural security measures appropriate to the sensitivity of the information in our control. These measures include safeguards to protect Personal Information against loss or theft, as well as unauthorized access, disclosure, copying, use and modification.
    2. We safeguard your Personal Information on the Internet by using industry-standard practices. Although “guaranteed security” does not exist either on or off the Internet, we make commercially reasonable efforts to make the collection and security of such information consistent with our Privacy Policy and all applicable laws and regulations. We maintain physical, electronic and procedural safeguards as appropriate to safeguard your Personal Information.
  14. Storage, Retention and Accuracy of Personal Information

    1. WDS takes all reasonable steps to insure that Personal Information is safeguarded against loss, access, use, modification, disclosure or other misuse. All reasonable steps are taken to prevent unauthorized use or disclosure of your Personal Information.
    2. WDS will retain your Personal Information only for as long as necessary to fulfill the purpose(s) for which it was collected and to comply with applicable laws and your consent to such purpose(s) remains valid after termination of our relationship with you.
    3. We take all reasonable steps to insure that your Personal Information is accurate, up-to-date, complete, relevant and not misleading.
    4. We may store your Personal Information in our databases located in Montréal, Canada or in other datacenter outside Canada. Additionally, some of our service providers may reside in other countries outside of Canada and will be subject to the laws of the local jurisdiction. As a result, in certain circumstances, foreign governments, courts, law enforcement agencies or regulatory agencies may be entitled to access the Personal Information collected and held by WDS.
  15. Access, Control and Update Information About You

    1. We want to be sure that we keep only the most accurate and up-to-date Personal Information in our records. Therefore, whenever you believe that your Personal Information needs to be updated, you may use your account manager or you may contact us (see section 6) to update your contact information. You may choose at any time to remove your name, telephone numbers, and postal and email addresses from the lists we use to send notices or updates and elect not to receive correspondence from us also by contacting the Privacy Officer.
  16. Links to Non-WDS Web Sites and Third Parties

    1. Please note that the www.wirelessdatasolutions.net website may contain links to other websites for your convenience and information. WDS does not control those sites or their privacy practices, which may differ from www.wirelessdatasolutions.net. Our privacy policy cannot and does not apply to external websites. We do not endorse or make any representations about third party websites. The personal data you choose to give to unrelated third parties is not covered by this Privacy Policy. We encourage you to review the privacy policy of any company or website before submitting your Personal Information. Some third parties may choose to share their personal data with us; that sharing is governed by that third party’s privacy policy.
  17. Social Media and Online Engagement

    1. We use a variety of new technologies and social media options to communicate and interact with consumers. These sites and applications include popular social networking and media sites, open source software communities and more. To better engage the public in ongoing dialog, we uses several third-party platforms including, but not limited to, Facebook, Twitter, Google+ and Pinterest. Third-Party Websites and Applications (TPWA) are Web-based technologies that are not exclusively operated or controlled by us. When interacting with our presence on those TPWA, you may reveal certain personal information to WDS or to third parties. Except when used by our employees for the purpose of responding to a specific message or request, we will not use, share, or retain your Personal Information gathered through a TPWA.
    2. At this time, we are present on five (5) Social Media websites, Facebook.com/wirelessdatasolutions, twitter.com/WdsGroup, plus.google.com/+WirelessdatasolutionsNet/, youtube.com/user/Thewirelessdata, pinterest.com/wirelessdata/ and linkedin.com/company/wireless-data-solutions-wds-
    3. Facebook: On our Facebook page, we post news and other items of interest to individuals. If you have a Facebook account or ‘Like’ Facebook.com/wirelessdatasolutions Facebook page, you can post comments or click on the ‘like’ option for individual entries. If you comment or click on the ‘like’ button, personally identifying information will be visible to us and other Facebook site visitors. The amount of visible personal information will depend on your own Facebook privacy settings. Our staff does not collect, use or disclose any information about visitors who comment or ‘like’ the WDS Facebook site. Facebook collects and reports on non-personally identifiable information about activities on Facebook pages. This information is password protected and only available to the WDS employees, members of the WDS Communications and Web Teams, and other designated staff who require this information to perform their duties. The Facebook privacy policy is available at: http://www.facebook.com/about/privacy/.
    4. Twitter: WDS uses Twitter to send short messages (up to 140 characters) or ‘Tweets’ to share information about us with visitors and respond to comments and inquiries we received via Twitter. While visitors may view our Twitter feeds without subscribing or follow us, visitors who want to subscribe to (or follow) us must create a Twitter account at www.twitter.com. To create an account, you must provide some personal information, such as name, user name, password and email address. Visitors have the option to provide additional personal information including a short biography, location or a picture. Most information you provide for a Twitter account is available to the public, but you can modify how much of your information is visible by changing your privacy settings on the Twitter.com Web site. While we do monitor the number of subscribers and respond to comments and queries via Twitter, we never gather Personal Information belonging to our followers. We do not collect, maintain, disclose or share any information about our followers. The Twitter privacy policy is available at: http://twitter.com/privacy.
    5. Google+WDS: On our Google+ page, we post news and other items of interest to individuals. If you have a Google+ account you can post comments or click on the “+1” option for individual entries. If you comment or click on the “+1” button, personally identifying information will be visible to us and the other follower of our page. The amount of visible personal information will depend on your own Google+ privacy settings. Our staff does not collect, use or disclose any information about visitors who comment or “+1” our Google+. Google collects and reports on non-personally identifiable information about activities on Google+pages. This information is password protected and only available to the WDS employees, members of the WDS Communications and Web Teams, and other designated staff who require this information to perform their duties. The Google privacy policy is available at: https://www.google.com/intl/en/policies/privacy/
    6. YouTube: WDS uses YouTube to share videos with its visitors. While you may view our videos without creating an account, if you want to subscribe or comment on our video, you must create a Google account at www.youtube.com. To create an account, you must provide some personal information, such as name, user name, password and email address. You will have the option to provide additional personal information including a short biography, location or a picture. Most information you provide for a YouTube account is available to the public, but you can modify how much of your information is visible by changing your privacy settings on YouTube’s website. While we do monitor the number of subscribers and respond to comments made on our videos, we never gather Personal Information belonging to subscribers. We do not collect, maintain, disclose or share any information about our follower. The Google privacy policy is available at: https://www.google.com/intl/en/policies/privacy/
    7. Linked: WDS uses Linkedin to share business contacts and organization information with its visitors. While you may view basic information without creating an account, if you want to add a connection to our organization or those associated on our Linkedin page, you must create a Linkedin account at https://www.linkedin.com. To create an account, you must provide some personal information, such as name, user name, password and email address. You will have the option to provide additional personal information including a short biography, location or a picture. Most information you provide for a Linkedin account is available to the public, but you can modify how much of your information is visible by changing your privacy settings on Linkedin’s website. While we do monitor the number of subscribers and respond to comments made on our videos, we never gather Personal Information belonging to subscribers. We do not collect, maintain, disclose or share any information about our followers. The Linkedin privacy policy is available at: https://www.linkedin.com/legal/privacy-policy?trk=hb_ft_priv
    8. Pinterest: WDS uses Pinterest to pin articles and post that we believe to be relevant with our services or web site creation and management. While you may view the list of our boards without creating an account, if you want to view to content of a board, you must create a pinterest account at www.pinterest.com. To create an account, you must provide some personal information, such as name, user name, password and email address. The Pinterest privacy policy is available at: https://about.pinterest.com/en/privacy-policy
  18. Our Privacy Office

    1. You may contact our Privacy Office to access, correct or delete your Personal Information. If necessary, the Privacy Officer will contact the appropriate employee to fulfill your request.
    2. Should you have any questions or complaints, do not hesitate to contact the Privacy Officer. The Privacy Officer may be reached: |

      By phone at:
      1-877-447-0825

      By mail at:
      Attention: Wall Street Software(Wireless Data Solutions) Privacy Officer
      301 Clematis Street, Suite 3000
      W. Palm Beach, Florida
      33401, United StatesBy Email:
      privacy@wirelessdatasolutions.netBy facsimile at:
      1-786-228-5524
  19. Changes to our Privacy Policy

    1. This Privacy Policy is effective as of November 30, 2014. We reserve the right to update this Privacy Policy occasionally. When posting changes to this Privacy Policy, we will also revise the “Last Updated” date above on our Privacy Policy. er encourage you to review this Privacy Policy periodically to be informed of how we are protecting your information and to be aware of any changes to the Privacy Policy. Your continued use of the site after the posting of any amended Privacy Policy shall constitute your agreement to be bound by any such changes. This Privacy Policy is incorporated into any Terms and Conditions governing the Website and any programs or services operated or managed on or behalf of WDS . Any changes to this Privacy Policy are effective immediately after being posted by WDS .
  20. Terms and Conditions of Website Use

    1. The Terms and Conditions governing your use of this Website are located at #terms_of_service contain important provisions disclaiming and excluding the liability of WDS regarding your use of our Website and provisions determining the applicable law and exclusive jurisdiction for the resolution of any disputes regarding your use of this Website. Each of these provisions applies to any disputes that may arise in relation to this privacy policy and the collection, use and disclosure of your personal information, and are of the same force and effect as if they had been reproduced directly in this Privacy Policy.

 

Refund Policy

Like any vendor, we strongly hope you have nothing but positive experiences using our applications and products. If you have changed your mind and are not entirely satisfied with our services, simply contact us within 7 calendar days, and ask us to cancel. No questions asked. If you paid us by credit card, we would credit the card on file; otherwise we will send you a check. Our apps and services are all extended this policy. Please note that this policy does not apply to products being shipped to Wireless Data Solutions members. For products requiring shipment, the refund policy will be described in the offer details. Unfortunately, setup and domain registration cannot be included in our policy, as once paid, the domain is removed from the available pool, and cannot be returned until the lease is up. The domain name is yours and can be taken with you to another provider. Please let us know if you are keeping the domain name and planning to reuse as there can be some coordination required for hosting/registration change purposes.

If it is the terms or length of the commitment that are the basis for your decision to cancel, please contact sales at sales@wirelessdatasolutions.net , and we can see if there is a package better suited to your needs.

Our resellers are legally bound to honor the same policy, so if you did not get your subscription from us directly, contact the reseller for your refund. For more information see our terms and conditions.

 

Affiliate Terms

The Wall Street Software, Inc., d.b.a. Wireless Data Solutions (WDS, we, us, or our) affiliate program (the “Affiliate Program”) is designed to help you generate income in exchange for reselling WDS products, or referring new clients to use our services. These Affiliate Program Terms (the “Affiliate Agreement”) are a contract between WDS and you (the “Affiliate” or “you”), and it governs the terms and conditions of your participation in the Affiliate Program.

BY REGISTERING AS AN AFFILIATE YOU ARE AGREEING TO THE TERMS AND CONDITIONS. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, YOU ARE NOT PERMITTED TO PARTICIPATE IN THE AFFILIATE PROGRAM.

  1. Payment Requirements:

      1. As a Wireless Data Solutions affiliate, you may accrue a one-time referral fee for each purchase of a hosting account that you refer to WDS that meets the definition of a “Qualified Purchase” and the requirements set forth herein. A “Qualified Purchase” is the purchase of WDS’ applications and subscriptions by a new and unique customer who: (i) clicks on an affiliate tracking link, (ii) completes the signup process within ninety (90) days of clicking on the affiliate tracking link, (iii) maintains an active account with WDS for a minimum of ninety (90) days; and (iv) did not transfer from a WDS partner or related company.
      2. Affiliate accounts must be active at the time of the referral. No referral fee will accrue for sales that occurred before your participation in the Affiliate Program.
      3. Affiliates are solely responsible for ensuring that all payee information is accurate and up to date in the affiliate system. WDS is not responsible for any lost or stolen payments.
      4. Missing or untracked affiliate referrals must be reported during the then current referral period (either between the 1st and the 15th of the month or between the 16th and the end of the month) and will be credited to your account at our sole discretion, provided that such credit has accrued pursuant to the terms contained herein. Referrals that are not reported during the then current referral period will not be credited to your account.
      5. The affiliate referral fees are determined approximately 45 days after the end of the month in which the Qualified Purchase is recorded. Payments are then processed and sent to Affiliates between the 16th of the month and the last day of the month. EXAMPLE: A Qualified Purchase recorded in January will be sent to the Affiliate between March 16th and March 31st.
      6. Payments are sent using the PayPal mass payment system. WDS pays for the transaction fee associated with the mass payment system. You are required to supply a PayPal address to receive payments. If you would prefer to receive payments by check, you must notify WDS and payments will be sent to the address you provide. Please note that payments by check take up to an additional thirty (30) days to arrive. For larger affiliates with balances of over USD $10,000 per month, WDS offers a wire transfer option. To update your payment information, please contact the affiliate department.
      7. In the event that WDS re-issues any payment, a USD$35 charge will apply and be deducted from the Affiliate’s earnings.
      8. Affiliates are responsible for making sure they are able to accept payments. Please ensure that your bank or PayPal account can accept payments from US-based companies.
      9. Affiliates are responsible for any and all fees, taxes, exchange rates, surcharges and other expenses incurred in order to receive their referral fees. Please check with your local banking institution or PayPal to find out if any of these apply for your account.
      10. Because of the high frequency of credit card fraud and cancellation rates, WDS reserves the right to hold referral fees for up to two (2) additional months for verification. At WDS’ sole discretion, we reserve the right to cancel referral fees in the event that we are unable to collect funds, the order is fraudulent, the customer cancels within the first ninety (90) days, or if we learn that the referral fee was earned improperly for any other reason.
  2. Reversals:

      1. If a referred customer initially purchases a hosting package with a term of at least one (1) year and then downgrades their hosting package to a term of less than one (1) year within one (1) year of their initial purchase, the applicable referral fees paid to the Affiliate will be reversed and deducted from future earnings.
      2. Referred customers that issue a chargeback or are found to be fraudulent (e.g. false information, fake/stolen credit cards, selling counterfeit goods etc.), as determined in WDS’ sole discretion, will be reversed regardless of the amount of time that has passed since the signup occurred.
      3. Customers using non-standard rates (rates not available through the Affiliate Program) are not eligible for affiliate referral fees, as determined at WDS’ sole discretion. Non-standard rates include but are not limited to: sales, promotions, email offers, prepaid accounts and discounted pricing offered for educational, government, non-profit or charity organizations.
  3. Affiliate Restrictions and Responsibilities:

      1. Affiliates MAY NOT offer cash back, rewards or other incentives to drive traffic/sales via their affiliate tracking links.
      2. Affiliates MAY NOT use traffic that is generated by pay to click, pay to read, banner exchanges, click exchanges, CPV advertising, pop-up/under, SPAM, purchased traffic or similar methods.
      3. Affiliates MAY NOT use cookie stuffing techniques that set the tracking cookie without the user actually clicking on the referral link (for example a 1×1 pixel iframe).
      4. Affiliates MAY NOT bid on or use WDS’ trademark, trademark +, or misspelled keywords for the purpose of PPC on Internet search engines (Google, Yahoo, MSN, Ask etc.).
      5. Affiliates MAY NOT use WDS’ trademark, trademark +, or misspelled keywords in their domain names.
      6. Affiliates are responsible for ensuring their tracking code is working properly before sending traffic to WDS servers. Any modification to the links is the sole responsibility of the Affiliate. Referral fees may not be paid for tracking errors caused by editing, masking, redirecting or tampering with affiliate links, as determined in WDS’ sole discretion.
      7. Affiliates MAY NOT use redirected pages and links to send a user to our site. For example, you may not have a PPC link on a search engine that redirects the user to our site.
      8. Domain forwarding is prohibited — you may not purchase a domain and set it to forward directly to our site using your affiliate link.
      9. Affiliates MAY NOT copy WDS’ website or any portions thereof, including, without limitation, any of WDS’ trademarks or other intellectual property, and display them on their own site or subdomain or use them in any way without WDS’ prior express written permission.
      10. Affiliates MAY NOT engage in the advertisement of business-opportunity sites or use marketing practices that attract fraudulent or short-term customers (customers with low retention and renewal rates) which shall be determined at our sole discretion.
  4. FTC Disclosure Policy:

      1. It is our intent to treat our customers fairly. Accordingly, we require all WDS affiliates to comply fully with all applicable laws, regulations and guidelines concerning advertising and marketing, including without limitation, the Federal Trade Commission (FTC) Endorsement Guides (See the FTC Endorsement Guide for more information.), which require that material connections between advertisers and endorsers be disclosed. This means that all affiliate websites (e.g. directories, review/rating sites, blogs and other websites) and any email or collateral that provide an endorsement or assessment of WDS, must prominently disclose the fact that you may receive compensation for referring customers to WDS.
      2. For more information and suggestions about how to comply with these guidelines, please click the “FTC Disclosure” tab under the Terms tab when logged in to your affiliate account. Please note that the FTC Disclosure page is only intended to provide guidance. It does not purport to provide legal advice and it does not guarantee that you will be in compliance with FTC regulations if you follow the suggestions presented. You are advised to seek and obtain your own legal advice on how these rules apply to your website or other promotional activities for which you receive compensation.
      3. At our sole discretion, we reserve the right to withhold referral fees and/or terminate the affiliate relationship for your failure to comply with WDS’ FTC disclosure policy or with any other applicable regulations or guidelines, as determined by WDS at our sole discretion.
  5. Deactivation:

      1. Affiliate accounts may be deactivated at any time without warning or notice at our sole discretion. Any affiliate who violates WDS’ Terms of Service, including without limitation, these Affiliate Program Terms, or any applicable law is subject to having their affiliate account deactivated immediately, and any and all accrued, but not yet received, referral fees will be forfeited.
      2. In our sole discretion, any false or misleading advertising or suspected fraudulent activity associated with your affiliate account will result in immediate deactivation.
      3. Affiliate accounts generating a large number of fraudulent accounts, as determined in our sole discretion, will be deactivated.
      4. If you would like to discontinue your participation in the Affiliate Program at any time, simply remove your affiliate links from your website and no longer promote them. For accounting purposes, our systems will retain your account and personal information.
  6. Changes:

      1. Wireless Data Solutions may change any of the terms and conditions in this Affiliate Agreement, in whole or in part, at any time at WDS’ sole discretion. Unless otherwise provided, such modifications will take effect when posted on WDS’ website and apply to all referral fees that have not yet accrued. If we make any significant changes to this Affiliate Agreement, we will post a notice on this page for at least thirty (30) days after the changes are posted and will indicate at the bottom of this Affiliate Agreement the date of the last revision. In addition, WDS will use reasonable efforts to provide you with seven (7) days advance notice of any changes that materially impact your participation in the Affiliate Program. Unless otherwise provided, your continued participation in the Affiliate Program following our posting of any modification on our website will constitute your acceptance of all changes. If you do not agree to any such changes, your sole and exclusive remedy is to deactivate your account as described above.

    If you have any questions regarding our Affiliate Program, please open a Ticket in the Affiliate queue or call us toll free at 1-877-447-0825

    Thank You,
    Wall Street Software (Wireless Data Solutions)

 

Law enforcement guide line

  1. What are Secure Pack and Encrypted Blackberry Services?

    Secure Pack and Encrypted Blackberry Services are application bundles created by Secure Group, and distributed byWall Street Software, Inc., d.b.a. Wireless Data Solutions (referred hereafter as WDS, we, us, or our) that provides for android military-grade encryption of the three major communication modes used by mobile phone users: email, chat, and voice. For Blackberry, email and chat encryption are provided.

    Secure Email: Our email application enhances regular email functionality with an intuitive and easy to use iteration of the open source technology of PGP encryption. Any email encrypted by PGP is irretrievable by us or any other party. The body of the email is secure and so is any attachment. Our solution even disguises the file type of any attachment, by labelling all as ‘attachment.pgp’.

    Secure Chat: Secure Chat offers secure communication over XMPP based chat servers. Our secure communication servers use the OTR protocol to ensure your conversations are entirely private, eliminating even the meta-data that plagues email encryption solutions. Unlike other secure chat programs, no data is stored on our servers, not even messages waiting to be delivered. Rather than storing chat messages on the server until the recipient is online, the messages are held on the device until the recipient is available.

    Secure Voice: As with Secure Chat, Secure Voice does not store any data on our servers, meaning that nothing can be retrieved in transit by a third party, without by-passing the best-in-breed encryption technology for voice communication, ZRTP. ZRTP is a truly peer-to-peer service, ensuring conversations are protected against man-in-the-middle attacks. We cannot divulge any conversation conducted over our ZRTP servers, not even who made a call, as no data is kept on our servers whatsoever, beyond the user names of those who use our service.

    Secure Voice is as yet unavailable on Blackberry.

    WDS is committed to operating in an environment of complete transparency and to cooperating with law enforcement while respecting each individual’s right to privacy.

  2. Requests for user information

    Requests for user account information from U.S. law enforcement should be directed to WDS at:

    By phone at:
    1-877-447-0825

    By mail at:
    Attention: Wall Street Software(Wireless Data Solutions) Legal Notices
    301 Clematis Street, Suite 3000
    W. Palm Beach, Florida
    33401, United States

    By Email:
    legal@wirelessdatasolutions.net

    By facsimile at:
    1-786-228-5524

    Wireless Data Solutions (WDS) responds to valid legal process issued in compliance with United States law.

  3. Private Information Requires a Subpoena or Court Order

    Non-public information about WDS users’ accounts will not be released to law enforcement except in response to appropriate legal process such as a subpoena, court order, or other valid legal process.
  4. Contents of Communications Are Not Available

    Requests for the contents of communications require a valid search warrant from an agency with proper jurisdiction over WDS. However, our response to such a request will reflect that either the content is not available or that, in very limited instances where a message has not yet been retrieved by the recipient, the content will be limited to scrambled data which is indecipherable.
  5. Will Wireless Data Solutions Notify Users of Requests for Account Information?

    Yes. WDS’ policy is to notify users of requests for their account information prior to disclosure including providing user with a copy of the request, unless we are prohibited by law from doing so. Since we cannot envision a scenario in which the provision to law enforcement of the date an account was created, the type of device, and the date of last use, will assist in an emergency situation, we maintain that user notification will occur unless legally bound not to notify users of law enforcement requests for their user information.
  6. What Information Can Wireless Data Solutions Supply You With?

    WDS has the following information about User Accounts:

    • Date an account was created
    • Name provided by purchaser and method of billing used (if purchased on behalf of an organization, only the purchaser will have a name associated)
    • username selected
    • Type of device on which such account was installed
    • Date of last use
  7. What Must Be Included in Account Information Requests?

    When requesting user account information, you must include ALL of the following:

    • User name (WDS username) for account being investigated
    • A valid official email address
    • Law enforcement letterhead
    • Description of account information being sought
  8. Service of Process

    We do not accept legal process via email. Receipt of correspondence and communication with law enforcement by email do not waive any objections to the lack of jurisdiction or proper service inherent in attempted service of process via email.
  9. Address

    Address:
    Attention: Wall Street Software(Wireless Data Solutions) Legal Notices
    301 Clematis Street, Suite 3000
    W. Palm Beach, Florida
    33401, United States

    Email:
    legal@wirelessdatasolutions.net

    Once again, for service of process, email is not accepted. But you can notify us of upcoming mail delivery and what to look for to expedite matters.

  10. Production of Records and Authentication

    We provide responsive records in electronic format and believe that any records produced in response to a valid law enforcement request are self-authenticating. If you require a declaration, please explicitly note that in your request. At this time we do not anticipate seeking reimbursement for the costs of producing records because we believe those costs will be de minimus based on the limited information we can supply.
  11. Mutual Legal Assistance Treaties

    WDS’ policy is to promptly respond to requests that are issued via American courts upon proper service of process either by way of a mutual legal assistance treaty or letter rogatory.