Privacy Policy

Introduction

Tech365 (“we,” “our,” or “us”) is committed to protecting the privacy and security of your personal information. This Privacy Policy outlines the types of data we collect, how we use it, and the measures we take to safeguard your information when you use our website and mobile applications (“Services”).

1. Information We Collect

1.1 Personal Information

When you create an account or interact with our Services, we may collect the following personal information:

  • Contact Information: Name, email address, phone number.
  • Account Information: Username, password, and other authentication details.
  • Payment Information: Credit card details, billing address.
  • Location Data: GPS data, IP address (if required for security purposes).

1.2 Usage Data

We automatically collect certain information when you use our Services, including:

  • Device Information: Device type, operating system, browser type.
  • Log Data: IP address, access times, pages viewed, and other usage data.
  • Cookies and Similar Technologies: We use cookies to enhance your experience and gather analytics on usage.

1.3 Communications

If you contact us via email, chat, or other methods, we may collect and store the content of your communication, your email address, and our responses.

1.4 Analytics

We use analytics tools, including services provided by Microsoft, to better understand how users interact with our Services. These tools automatically collect information such as pages visited, time spent on pages, device type, browser type, IP address, and general usage patterns.

This information is used solely to improve the functionality, performance, and user experience of our Services. Analytics data is collected in an aggregated manner and is not used by us to personally identify individual users.

2. How We Use Your Information

2.1 To Provide and Improve Our Services

We use the information we collect to:

  • Create and manage your account.
  • Provide secure access control to your client portal.
  • Send you notifications and updates related to your account.
  • Process payments and manage billing.
  • Improve the functionality, performance, and security of our Services.

2.2 To Communicate with You

We may use your contact information to:

  • Respond to your inquiries and provide customer support.
  • Send you important updates, notifications, and promotional offers (with your consent).
  • Inform you about changes to our Privacy Policy or Terms of Service.

2.3 Legal Compliance and Security

We may use your information to:

  • Comply with legal obligations, such as tax and accounting requirements.
  • Protect our rights, privacy, safety, or property, and that of our users and the public.
  • Detect, prevent, and address fraud, security issues, or other harmful activities.

3. Information Sharing and Disclosure

3.1 Service Providers

We may share your information with trusted third-party service providers, including technology and analytics providers such as Microsoft, who assist us in operating, maintaining, and improving our Services. These providers are contractually obligated to maintain confidentiality and use your information solely to provide services to us.

3.2 Legal Requirements

We may disclose your information if required to do so by law or in response to valid requests by public authorities (e.g., a court or government agency).

3.3 Business Transfers

In the event of a merger, acquisition, or sale of all or a portion of our assets, your information may be transferred as part of that transaction.

4. Data Security

We implement a variety of security measures to protect your personal information. These include encryption, secure access protocols, and regular security audits. However, no method of transmission over the Internet or electronic storage is completely secure, and we cannot guarantee its absolute security.

5. Your Choices and Rights

5.1 Access and Update Your Information

You can access and update your account information at any time by logging into your account on our website or app.

5.2 Opt-Out of Communications

You may opt out of receiving promotional communications from us by following the unsubscribe instructions in those communications. You will continue to receive transactional emails related to your account.

5.3 Data Retention

We retain your personal information only as long as necessary to fulfill the purposes outlined in this Privacy Policy, or as required by law.

5.4 Your Rights

Depending on your location, you may have the right to request access to, correction of, or deletion of your personal information. You may also have the right to object to certain processing activities or request data portability.

6. International Data Transfers

If you are accessing our Services from outside the United States, please be aware that your information may be transferred to, stored, and processed in the United States or other countries where our service providers are located. We take appropriate steps to ensure that your information is treated securely and in accordance with this Privacy Policy.

7. Changes to This Privacy Policy

We may update this Privacy Policy from time to time. If we make significant changes, we will notify you via email or through our Services before the changes take effect. Your continued use of our Services after the changes are made will constitute your acceptance of the new Privacy Policy.

8. Contact Us

If you have any questions or concerns about this Privacy Policy or our data practices, please contact us at:

Tech365
Email: contact@tech365.support
Phone: (317) 762-8362
Address: 176 W Logan St Ste 188
Noblesville, IN 46060

9. Mobile Information Privacy

We respect your privacy and are committed to protecting your personal information. This includes any mobile information you provide to us through sign-up forms, communication platforms, or campaign participation.

Your mobile information will not be sold or shared with third parties for promotional or marketing purposes. This includes your phone number, mobile carrier details, and any related data obtained through our campaigns.
We may use your mobile information solely for purposes related to:

  • Service notifications and account-related updates
  • Appointment reminders or transactional messages (if applicable)
  • Communications you explicitly consent to receive

All messaging is subject to applicable laws and carrier requirements. Standard message and data rates may apply.

If at any point you wish to stop receiving messages, you may opt out by following the instructions provided in the message or by contacting us directly.

10. Children’s Privacy

We do not knowingly collect personal information from children under the age of 13. If we become aware that we have collected personal information from a child without parental consent, we will take steps to delete such information.

When a shared printer stops working, there can be several possible causes, and it often takes a few checks to identify the issue.

Here is how we typically approach printer problems in an office setting:

Checking how the printer is connected and who is affected
Reviewing printer status, errors, and queued jobs
Confirming computers are pointing to the correct printer
Updating or reinstalling printer software if needed
Testing printing once changes are made to confirm results

Opening a suspicious link does not always mean something is wrong, but it is worth a security check.

Here is how we typically help recover files and protect data going forward:

Identifying what data is missing and where it was last stored
Checking available backups and recovery points
Attempting safe file recovery without causing further damage
Confirming what can and cannot be restored
Putting backup and disaster recovery protections in place for the future

Opening a suspicious link does not always mean something is wrong, but it is worth a security check.

Here is how we typically make sure systems remain secure:

Checking the affected device for any unusual activity
Confirming email, account access, and passwords are still protected
Reviewing recent activity to ensure nothing unexpected occurred
Removing anything unsafe if it is found
Helping reduce future risk by implementing simulated phishing emails

Server outages happen, and there are clear steps we take to restore access and minimize disruption.

Here is how we typically help get teams back up and running:

Identifying what caused the outage and how widespread it is
Bringing critical systems and access back online safely
Checking data integrity to make sure nothing was lost or corrupted
Reviewing server health to prevent repeat issues
Putting safeguards in place to reduce future downtime

When Wi-Fi goes in and out, it is usually tied to a few common setup or signal issues.

Here are some of the things we look at to help get Wi-Fi working more consistently:

Making sure Wi-Fi coverage reaches all the areas you need it
Checking for signal interference from nearby devices or networks
Reviewing router placement and basic configuration
Confirming equipment and software are current
Helping reduce ongoing connection problems over time

Slow computers are usually caused by a few common issues, and they are typically fixable.

Here is how we typically help with slow computer issues:

Removing unnecessary background programs and system clutter
Freeing up storage that can slow performance
Fixing update or software conflicts
Checking hardware for early signs of wear
Keeping systems maintained to help prevent future slowdowns