Privacy Policy

This Privacy Policy describes how Easy Peasy Sync (“we”, “our”, “us”) processes personal data in connection with CRM consulting, implementation, and related professional services. We emphasize clarity, accountability, and controlled data stewardship.

1. Information We Collect

We may collect:
(a) contact details (name, email, role),
(b) business profile and workflow information provided to configure systems,
(c) communications exchanged during delivery,
(d) technical environment data required to implement integrations.
We do not intentionally collect sensitive personal data unless specifically required and explicitly agreed in writing.

2. Purpose of Processing

We process personal data to:
• deliver contracted professional services,
• maintain accounts and project collaboration,
• operate CRM workflows and related configurations,
• support legal and compliance obligations.
We do not sell personal data.

We may share identifiers and device data (such as IP address, cookie identifiers, and page interactions) with analytics and advertising partners for cross-context behavioral advertising. You may opt out at any time using the “Do Not Sell or Share My Personal Information” link in our website footer.

3. Legal Basis (where applicable)

Processing may rely on:
• performance of a contract,
• legitimate business interests in delivering and improving Services,
• compliance with legal obligations,
• consent where expressly provided.

4. Retention and Deletion

Active operational records are retained for up to twenty‑four (24) months after the last meaningful project interaction, unless deletion is requested sooner.
Upon verified deletion request, we delete data from active systems within thirty (30) days unless retention is required by law or for the establishment, exercise, or defense of legal claims.
Encrypted automated backups persist for up to forty‑five (45) days and are removed solely through automated backup rotation; such backups are not manually accessed or restored for deletion requests.

4.1 Verification of Deletion Requests

To prevent unauthorized deletion, we verify requester identity:
• Requests must originate from the email associated with the account, OR
• Must be confirmed via one‑time verification link sent to that email.
We do not process deletion requests from unverified sources.

5. Security

We employ layered administrative, technical, and physical controls proportionate to system access and data volume. Controls include least‑privilege access enforcement, multi‑factor authentication for administrative systems, encryption in transit and at rest where supported, environment isolation, internal change governance, and vendor risk review.

6. Sub‑Processors and Service Partners

We use reputable platforms and infrastructure providers under contractual confidentiality and security terms. A current sub‑processor list is available upon request, and notice is provided in the event of material additions.

7. International Transfers

We may transfer data across jurisdictions as required to operate services. Where mandatory, appropriate contractual and technical safeguards are applied, or functional equivalents permitted by law.

8. Consent and Cookie Preferences

We request consent before enabling analytics and marketing cookies. Essential cookies remain always active for core site operation. Users may update preferences at any time using the Cookie Preferences Control provided on the site.

9. Consent Logging (Immutable Journal)

To ensure transparent and verifiable consent handling, we maintain a server‑side, append‑only Consent Journal.

The journal records:
• IP address (server‑captured),
• browser user agent,
• consent selections,
• policy version displayed,
• server timestamp,
• cryptographic hash linking each entry to the previous one.

This forms a hash‑chained audit trail. Any modification, removal, or re‑ordering of entries becomes detectable. Local browser storage (e.g., cookies or localStorage) is used only to store preference state on the device; such storage does not constitute the official consent record.

10. Your Rights

Depending on jurisdiction, you may request:
• access,
• correction,
• deletion,
• restriction,
• portability,
by contacting support@ep-sync.com

We aim to respond within thirty (30) days or provide notice if additional time is required.

11. Contact

Easy Peasy Sync
support@ep-sync.com

12. SMS  Communications

When you provide a phone number in connection with our Services, you acknowledge that we may use this number to send:

(a) transactional and service-related SMS messages (for example, one-time passcodes, security alerts, project or account notifications, appointment confirmations, and similar operational messages); and

(b) where permitted by law and subject to your explicit consent, marketing or informational SMS messages about our Services.

Legal Basis. We process phone numbers for transactional and service-related SMS based on the performance of a contract and our legitimate interests in operating and securing the Services. Marketing SMS are sent only where required consent has been obtained.

Opt-Out. You may opt out of marketing SMS at any time by replying STOP where available or contacting us at privacy@ep-sync.com.

Opting out of marketing SMS will not affect necessary transactional SMS.

We do not share mobile contact information with third parties or affiliates for marketing or promotional purposes. Information may be shared with subcontractors in support services, such as customer service. All other categories exclude text messaging originator opt-in data and consent; this information will not be shared with any third parties.