Privacy Policy
Privacy Policy – Bespoke Digital LLC
Effective Date: July 1, 2025
Last Updated: July 1, 2025
Bespoke Digital LLC (“we,” “our,” or “us”) is committed to protecting your privacy and personal information. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you visit our website, use our services, or engage with us for custom software development projects.
By using our website or services, you agree to the collection and use of information in accordance with this Privacy Policy.
Information We Collect
Personal Information You Provide
Contact Information:
- Full name, business email address, direct phone numbers, and alternative contact methods you provide when requesting consultations or submitting project inquiries through our website forms
- Complete company information including business name, your job title and department, organizational structure details, and decision-making authority levels relevant to software development projects
- Physical business addresses, regional locations, and international office information necessary for project planning, on-site consultations, and understanding regulatory compliance requirements
- Detailed communication preferences including preferred contact methods, meeting scheduling availability, response time expectations, and notification settings for project updates
Project Information:
- Comprehensive business requirements documentation including current workflow processes, pain points, efficiency goals, user roles and permissions, integration needs with existing systems, and specific functionality requests
- Complete technical environment details including current software applications, database systems, network infrastructure, security protocols, compliance requirements, and any limitations or constraints affecting development approaches
- Detailed budget parameters including total project investment levels, payment schedule preferences, cost allocation across different project phases, and any financial approval processes that may impact project timelines
- Extensive technical documentation including system architecture diagrams, database schemas, API specifications, user interface mockups, security requirements, and any existing code or documentation that will inform the development process
Communication Records:
- Complete email correspondence history including initial inquiries, proposal discussions, contract negotiations, project status updates, technical clarifications, and post-project support communications
- Detailed meeting notes and audio/video recordings (with explicit consent) from discovery sessions, requirements gathering meetings, progress reviews, user training sessions, and project closure discussions
- Comprehensive support request documentation including issue descriptions, troubleshooting steps taken, resolution procedures implemented, escalation processes followed, and client satisfaction feedback
- Client testimonials, project feedback, case study information, and success metrics that help us improve our services and demonstrate our capabilities to prospective clients
Automatically Collected Information
Website Usage Data:
- Complete IP address information and geographic location data including city, state, country, and ISP details that help us understand our audience demographics and ensure appropriate service delivery
- Comprehensive browser and device information including browser type and version, operating system details, screen resolution, device capabilities, and plugin configurations that help optimize website performance
- Detailed page navigation patterns including specific pages visited, time spent on each section, scroll depth, click patterns, form interactions, and conversion funnel progression that inform website improvements
- Complete referral source tracking including search engines used, specific search terms entered, social media platforms, email campaigns, and other websites that directed traffic to our site
Technical Information:
- Unique device identifiers and hardware characteristics including device type, model, manufacturer, processor information, memory capacity, and network connection details necessary for troubleshooting and optimization
- Comprehensive connection and performance data including internet speed, connection stability, latency measurements, bandwidth usage, and any connectivity issues that may affect service delivery
- Detailed performance metrics and diagnostic information including page load times, server response rates, error frequencies, system resource usage, and application performance benchmarks
- Complete error reporting and logging data including JavaScript errors, server errors, failed requests, timeout issues, and any technical problems that help us maintain and improve our systems
How We Use Your Information
Primary Business Purposes
Service Delivery:
- Responding to inquiries and providing consultations
- Developing project proposals and estimates
- Creating and implementing custom software solutions
- Providing ongoing support and maintenance
Communication:
- Sending project updates and status reports
- Sharing relevant technical information and resources
- Responding to support requests
- Conducting satisfaction surveys
Business Operations:
- Processing payments and maintaining financial records
- Improving our services and website functionality
- Analyzing usage patterns and performance metrics
- Conducting internal research and development
Legal and Security Purposes
Compliance:
- Meeting legal and regulatory requirements
- Protecting intellectual property rights
- Maintaining accurate business records
- Responding to legal requests and court orders
Security:
- Preventing fraud and unauthorized access
- Protecting against cyber threats and attacks
- Monitoring for suspicious activity
- Maintaining system integrity and performance
Information Sharing and Disclosure
Limited Sharing Circumstances
Service Providers: We may share information with trusted third-party service providers who assist us in:
- Website hosting and technical infrastructure
- Payment processing and financial services
- Communication tools and platforms
- Analytics and performance monitoring
Business Transfers: In the event of a merger, acquisition, or sale of assets, your information may be transferred as part of the business transaction.
Legal Requirements: We may disclose information when required by law or to:
- Comply with legal processes and court orders
- Protect our rights and intellectual property
- Ensure safety and prevent harm
- Investigate potential violations of our terms
Information We Do Not Share
Never Shared Without Consent:
- Your proprietary business information
- Custom software source code and specifications
- Financial details and payment information
- Personal communications and private data
Data Security and Protection
Security Measures
Technical Safeguards:
- Encrypted data transmission and storage
- Secure authentication and access controls
- Regular security assessments and updates
- Network monitoring and intrusion detection
Administrative Controls:
- Employee training and access limitations
- Regular security policy reviews
- Incident response procedures
- Vendor security requirements
Physical Security:
- Secure facilities and equipment storage
- Controlled access to sensitive areas
- Environmental protection systems
- Backup and disaster recovery procedures
Data Retention
Retention Periods:
- Project information: Retained for duration of engagement plus 7 years
- Communication records: Maintained for 3 years after last contact
- Website analytics: Anonymized after 2 years
- Financial records: Kept per legal requirements (7 years)
Secure Deletion: When information is no longer needed, we securely delete or anonymize it using industry-standard methods.
Cookies and Tracking Technologies
Types of Cookies
Essential Cookies:
- Session management and authentication
- Security and fraud prevention
- Basic website functionality
- Form submission and error handling
Analytics Cookies:
- Website traffic and usage patterns
- Performance monitoring and optimization
- User experience improvements
- Feature usage statistics
Preference Cookies:
- Language and region settings
- Display preferences and customizations
- Communication preferences
- Previous form submissions
Cookie Management
You can control cookie usage through your browser settings. Note that disabling certain cookies may limit website functionality.
Browser Controls:
- Accept, reject, or delete cookies
- Block third-party tracking
- Clear browsing data and history
- Set privacy preferences
Your Rights and Choices
Access and Control
Information Access:
- Request copies of your personal information
- Review accuracy of stored data
- Understand how information is used
- Receive information in portable formats
Correction and Updates:
- Update contact and profile information
- Correct inaccurate or outdated data
- Modify communication preferences
- Request information deletion
Communication Preferences
Opt-Out Options:
- Unsubscribe from marketing communications
- Limit promotional messages
- Adjust notification frequency
- Choose preferred communication methods
Contact Methods: To exercise your rights or update preferences, contact us at support@bespokedigitalllc.com
Children’s Privacy
Our services are not intended for individuals under 18 years of age. We do not knowingly collect personal information from children. If we become aware that we have collected information from a child without proper consent, we will delete it immediately.
International Data Transfers
While we primarily serve clients in the United States, we may transfer information internationally for business purposes. All transfers comply with applicable privacy laws and include appropriate safeguards.
Third-Party Services
External Links
Our website may contain links to third-party websites. We are not responsible for the privacy practices of these external sites. We encourage you to review their privacy policies before sharing information.
Integrated Services
We use various third-party services for business operations:
- Cloud hosting and storage providers
- Communication and collaboration tools
- Analytics and monitoring services
- Payment processing platforms
Each service provider maintains their own privacy policies and data protection measures.
Privacy Policy Updates
Notification of Changes
We may update this Privacy Policy periodically to reflect:
- Changes in our business practices
- New legal requirements
- Technology updates and improvements
- Enhanced privacy protections
Update Notifications:
- Email notice to active clients
- Website banner announcements
- Updated effective date posting
- Summary of significant changes
Review Recommendations
We encourage you to review this Privacy Policy regularly to stay informed about how we protect your information.
Data Breach Response
Incident Management
In the unlikely event of a data security incident:
- Immediate containment and investigation
- Assessment of affected information
- Notification to relevant authorities
- Direct communication with affected individuals
Notification Timeline: We will notify affected parties within 72 hours of discovering any breach that poses a risk to personal information.
Geographic Scope
Jurisdiction
This Privacy Policy is governed by the laws of Texas and the United States. Our primary business operations are located in Houston, Texas, Harris County.
International Compliance
While based in Texas, we strive to comply with international privacy standards including:
- European Union General Data Protection Regulation (GDPR)
- California Consumer Privacy Act (CCPA)
- Other applicable state and federal privacy laws
Contact Information
Privacy Questions and Requests
For any privacy-related questions, concerns, or requests:
Email: support@bespokedigitalllc.com
Subject Line: Privacy Policy Inquiry
Response Time: Within 2 business days
Data Protection Officer
For complex privacy matters or formal complaints, you may contact our designated privacy officer at the above email address with “DPO Inquiry” in the subject line.
Compliance and Certifications
Industry Standards
We maintain compliance with relevant industry standards and best practices:
- ISO 27001 security management principles
- NIST Cybersecurity Framework guidelines
- SOC 2 Type II controls and procedures
- Industry-specific compliance requirements
Regular Audits
We conduct regular privacy and security audits to ensure ongoing compliance and continuous improvement of our data protection practices.
