BASIC.NET Privacy Policy
This policy is effective as of March 1, 2025.
At BASIC.NET, we don’t just build digital systems—we protect them. That starts with safeguarding your personal data. Whether you're a visitor Browse our website, a client using our services, or simply contacting our team, this Privacy Policy sets out how we handle your personal information with care, transparency, and legal integrity.
This policy reflects our deep respect for user rights and outlines the responsibilities we uphold as a modern digital service provider. BASIC.NET is not only committed to technical innovation, but also to ethical data management and robust privacy protection.
By accessing www.basic.net or interacting with our services in any form, you agree to the data practices outlined below. If anything remains unclear, don’t hesitate to reach out at [email protected].
1. What We Collect—and Why It Matters
We gather only what’s necessary. Every piece of data we collect serves a clear, justifiable purpose. We believe in data minimization and transparency from first click to final project delivery.
A. Personal Identifiers
When you reach out to us, request a quote, sign up for newsletters, or enter into a service agreement, we may ask for your name, company, phone number, and email. These identifiers allow us to personalize your experience, deliver proposals, and communicate professionally. They also help us prevent duplicate profiles and manage user accounts securely.
B. Digital Interaction Data
When you visit our website, we automatically collect metadata like IP address, browser type, device ID, and interaction patterns. This data is gathered via cookies and analytics tools and is used exclusively to improve site performance and user experience. We analyze trends, track user journeys, and identify technical issues to continually enhance usability.
C. Project-Specific and Communication Data
If you become a client, we may collect technical requirements, business documentation, and correspondence related to your project. Emails, call logs, support tickets, and submitted forms also form part of this record. This enables us to meet delivery milestones, manage expectations, and ensure compliance with contractual obligations.
D. Account Credentials and Preferences
If we offer client portal access or subscription-based tools, we may collect usernames, encrypted passwords, and preferences (e.g., language, interface settings). This information helps personalize and secure your experience.
2. How We Use Your Data
We never collect data for the sake of it. Each use case is tied to a specific operational or legal need. We categorize our use cases based on function, legitimacy, and benefit to you.
A. To Fulfill Services
Your data powers the development of our solutions—from cloud infrastructure to machine learning applications. Without it, we can’t fulfill contracts or deliver tailored results. We use personal and project-specific data to configure tools, customize dashboards, and set up integrations relevant to your business.
B. To Communicate Effectively
Whether we’re responding to a request, offering technical updates, or sending newsletters (if you’ve opted in), your contact data ensures you’re informed and supported. This also includes transactional emails, system notifications, and maintenance alerts.
C. To Improve and Comply
Usage data helps us make our website better. We assess how users interact with content and features, allowing us to optimize design and eliminate friction points. Meanwhile, compliance data keeps us aligned with Ukrainian law and international privacy standards like the GDPR, CCPA, and ISO/IEC 27001.
D. To Conduct Research and Analytics
Anonymized data may be aggregated for research purposes to identify trends, measure campaign effectiveness, or assess feature performance. This data is not tied to individual identities.
E. To Prevent Fraud and Maintain Security
We monitor for unauthorized access, suspicious behavior, or other security threats using both automated systems and manual audits. In certain scenarios, user behavior data may be logged and flagged for further review.
3. Sharing: Limited and Accountable
We don’t sell data. Ever. But sometimes, sharing is necessary to make things work smoothly.
A. Trusted Providers
Cloud hosts, analytics vendors, IT subcontractors, and payment processors may process limited data on our behalf. Each partner is vetted and bound by strict confidentiality agreements. These providers are only allowed to use the data as instructed by BASIC.NET and for no other purpose.
B. Joint Collaborations
If your project involves a third-party partner or co-developer, and you’ve consented, we may share only what’s essential for seamless delivery. In joint ventures, data is often needed to coordinate timelines, sync deliverables, or manage approvals.
C. Legal and Structural Events
In cases of legal obligation (e.g., government requests) or corporate changes (e.g., merger or acquisition), your data may be disclosed or transferred—with notice where possible. We will never hand over user data without a valid legal basis or court order.
D. Internal Access Control
Within BASIC.NET, access to user data is restricted based on job function. Engineers, project managers, and support staff only see the data required for their tasks.
4. Cookies: Small Files, Big Impact
We use cookies to personalize your experience and streamline functionality. Cookies enable smoother navigation, quicker form-fills, and more relevant content delivery.
A. Types of Cookies We Use
- Essential: Powering features like login and form submission. Without them, basic site functionality may fail.
- Analytics: Tracking page visits and performance anonymously. We use tools like Google Analytics or Matomo with anonymization enabled.
- Marketing: Only used with consent, these personalize ads and content based on interests and behavior.
B. Your Choices
You can manage cookie preferences via your browser or our consent tool. Most browsers allow you to reject cookies altogether or delete them after a session. Note that rejecting certain cookies may impair functionality and user experience.
5. Security Measures
We use encryption, access controls, and secure server infrastructure to protect your data. Our systems undergo regular penetration testing, and we employ firewalls, anti-malware scanners, and automated detection systems.
A. Human-Centric Security Culture
Our team is trained in security protocols, including phishing prevention, password management, and secure development. Data access is role-based and logged for audit purposes.
B. Incident Response
In the unlikely event of a breach, we follow a structured response plan: identify, contain, assess, notify (if applicable), and remedy. You will be informed promptly if your data is affected.
C. Continuous Monitoring
We employ automated monitoring tools to detect anomalies and suspicious behavior. Logs are reviewed regularly to ensure compliance and detect threats early.
6. Your Rights, Clearly Defined
Depending on your location and the nature of your interaction with us, you may have rights under Ukrainian law or the GDPR.
A. You Can:
- Request a copy of your personal data
- Correct or update inaccuracies
- Request deletion (subject to lawful exceptions)
- Limit how we process your data
- Transfer your data elsewhere
- Object to certain uses (e.g., direct marketing)
B. How to Exercise Your Rights
Just send an email to [email protected] with your request. We’ll respond within 30 days unless the law allows more time. For complex requests, we may ask for identity verification or additional information.
C. Appeals and Complaints
If you are dissatisfied with our response, you can lodge a complaint with your local data protection authority or the Ukrainian supervisory body.
7. International Considerations
While we are based in Ukraine, some data may be stored or processed outside of it (e.g., cloud servers in the EU or U.S.).
A. Legal Safeguards
We use Standard Contractual Clauses (SCCs), data processing agreements (DPAs), and, where applicable, certifications (e.g., Privacy Shield or ISO 27001 compliance) to ensure international transfers comply with legal standards.
B. Vendor Risk Assessments
All third-party processors undergo a due diligence process before onboarding, including assessments of their security practices, past compliance record, and data protection terms.
8. External Websites
Our website may include links to third-party services or platforms. Once you leave basic.net, their policies apply—not ours.
A. No Endorsement
Links to third-party websites do not imply endorsement or responsibility. We encourage users to review external privacy policies before engaging.
B. Social Media
Interactions via social platforms (e.g., LinkedIn, Facebook, Twitter) are governed by the privacy practices of those platforms. Comments, likes, or shared content may be visible publicly.
9. Data from Children
Our site and services are not designed for individuals under 16. We do not knowingly collect data from minors.
A. Parental Notification
If a child under 16 has submitted personal data to us without parental consent, we will remove the information as soon as we become aware of it.
B. Reporting Violations
If you suspect we’ve inadvertently collected data from a minor, please notify us at [email protected] so we can investigate and take immediate action.
10. Updates to This Policy
We may modify this Privacy Policy as our services evolve or legal requirements change. Changes are never retroactive, and we always prioritize transparency.
A. Notification
Significant changes will be communicated via email, banners, or notifications within our platform. Minor updates will be reflected by an updated “Effective Date.”
B. Version History
We maintain an internal record of all previous privacy policies and will provide a copy upon request for auditing or reference purposes.
11. Contact Us
Need more information or want to make a privacy-related request?
Email: [email protected]
Address: BASIC.NET, Sichovykh Striltsiv St. 50, Kyiv, 04053, Ukraine
We’re committed to providing clear, honest, and responsive communication around privacy. Thank you for trusting BASIC.NET. We take that trust seriously—and we protect it with every line of code and every word of this policy.