WebBee collects following types of information from user’s during the registration process or for usage of the App:
The personal information is consisted of the data that help us an individual to be identified on the basis of data provided as Name, Telephone Number and Address. Non-personal information received by us is consisted of data that is not directly associated with a user and is generally collected through automated electronic interactions, application usage data, statistical and aggregated information.
First Name, Last Name, Title (if applicable), Telephone Number, E-mail address, Name of the Company a User is Associated With, Some other Important Information a Person is Associated With NetSuite® Account Number. We don’t ask for NetSuite® password or nor have any access to it. Any other personal information, that a user provides during the communication with WebBee
WebBee don’t gathers a user’s data collected, stored or shared through downloading or use of the Software by its users. However, the Software requires authentication in order to access Contacts, to establish an external connection to application programming interface (API) and NetSuite ® credentials including username, role ID and account number. The term User data is referred to any data a user creates or own is stored by him across applications.
It is one of the important phases that protects your business. Our employees are properly trained regarding their incident response roles and responsibilities in the event of the data breach.
A breach or incident could originate from different areas. In this phrase, we deal with various things like as:
Whenever any breach is detected, we securely delete everything so that its impact can be minimized. Our short-term and long-term containment strategies are always ready so that we can restore business operations.
We use our advanced tools to find and eliminate the root cause of the breach. If any trace of malware or security issues remains in your system then you may lose valuable data.
In this process, we restore and return affected systems back into your business environments. At this moment, we get your business operations up and running again without any fear of a breach.