Privacy Policy
Last Updated: December 2, 2025
1. INTRODUCTION AND AGREEMENT
This Privacy Policy describes how Prime Business Systems ("PBS"), a service of Simplico Solutions LLC ("we," "us," or "our"), located at 8 The Green Suite B, Dover, Delaware 19901 USA, collects, uses, stores, and protects information obtained from our clients and website visitors ("you" or "your") in connection with our services globally.
By accessing our website, using our services, making any payment, submitting any form, or engaging with our platforms, you automatically acknowledge that you have read, understood, and agree to be bound by this Privacy Policy and consent to our data collection and processing practices as described herein.
If you disagree with any part of this Privacy Policy, you may not use our services or access our platforms.
2. SCOPE AND APPLICATION
2.1 Digital Properties Coverage
This policy applies comprehensively to all information collected through:
Website and Digital Platforms:
- Primary website (primebusinesssystems.com)
- All subdomains and associated web properties
- PBS automation platforms and client portals
- Mobile applications and responsive interfaces
- API integrations and third-party connections
- Social media integrations and plugins
- Email systems and communication platforms
Service Delivery Systems:
- Client management systems and databases
- Automation workflow platforms (PBSEngine™)
- Integration configuration systems
- Performance monitoring and analytics tools
- Support ticketing and communication systems
- Payment processing and billing platforms
2.2 Business Operations Coverage
Client Interactions:
- All forms of client communications
- Service delivery and implementation processes
- Payment processing and financial transactions
- Technical support and customer service interactions
- Training sessions and consultation calls
- Marketing activities and promotional communications
Platform Operations:
- System configurations and customizations
- User access logs and platform usage data
- Security monitoring and audit trails
- Performance metrics and optimization data
- Error logs and diagnostic information
2.3 Service Categories
This policy covers all PBS service offerings including:
Core PBSEngine™ Subscription Plans:
- • Essentials ($97/month)
- • Standard ($297/month)
- • Deluxe ($497/month)
Premium PBSEngine™ Subscription Plans:
- • Essentials Plus ($1,000/month)
- • Standard Plus ($2,000/month)
- • Deluxe Plus ($3,000/month)
- • Enterprise ($4,000/month)
- • Premium ($5,000/month)
- • Premium Plus ($6,000/month)
AI Automation Systems:
- • Custom automation development (starting at $5,000)
- • Yearly infrastructure maintenance
- • Usage-based AI processing
Additional Services:
- • PBS Collective Community membership (free access)
- • Business Systems Consulting (starting at $500/hour)
- • AI Enhanced Advertising (starting at $2,000/month + 10% adspend)
- • Brand Development (starting at $5,000 one-time)
- • Search Engine Optimization (starting at $3,000/month)
- • Social Media Management (starting at $3,000/month)
- • Website Development (starting at $500 one-time)
- • Video Production (starting at $1,000)
- • Virtual Assistants ($5,000 setup + monthly fees)
- • Virtual Call Center ($5,000 setup + monthly fees)
- • Sales Management ($10,000 setup + commission)
- • Custom Data Tracking (starting at $1,000 one-time)
- • Performance-Based Partnership (negotiated reduced pricing + profit percentage)
3. COMPREHENSIVE INFORMATION COLLECTION
3.1 Personal and Business Information
Required Account Information:
- Full business and personal contact details
- Legal business entity information and structure
- Primary and secondary contact personnel information
- Account credentials and authentication data
- Billing information and payment method details
- Service preferences and configuration settings
- User permissions and access level assignments
- Communication preferences and contact methods
Professional Information:
- Industry classification and business sector
- Years in business and company history
- Service offerings and specialization areas
- Geographic service areas and market focus
- Professional credentials and certifications
- Business size and employee information
- Revenue ranges and growth metrics
- Competitive positioning and differentiation
3.2 Technical and Usage Data
Platform Usage Information:
- Login frequencies and session durations
- Feature utilization and engagement patterns
- Click-through rates and user interaction data
- Platform navigation and usage flows
- Error encounters and system performance data
- Device information and browser specifications
- IP addresses and geographic location data
- Referral sources and traffic patterns
Integration and Configuration Data:
- Third-party platform connections and authorizations
- API usage and integration performance metrics
- Custom workflow configurations and settings
- Automation rule sets and trigger configurations
- Data mapping and transformation specifications
- Security settings and access controls
3.3 Service-Specific Data Collection
PBSEngine™ Platform:
- All platform configuration and customization data
- Marketing funnel structures and performance metrics
- User account settings and permission assignments
- Contact database information and segmentation criteria
- Automation workflow design and performance data
- Email marketing templates and campaign statistics
- Calendar scheduling and appointment data
- Website and form builder configurations
- E-commerce store settings and product information
- Community and course management data
- Media asset storage and management information
AI Automation Systems:
- Complete business process mappings and workflows
- Sales cycle data and conversion metrics
- Lead generation sources and qualification criteria
- Customer interaction histories and communication logs
- Performance analytics and optimization data
- Custom AI model configurations and training data
- Integration settings with existing business tools
- Automation effectiveness and ROI measurements
PBS Collective Community:
- Membership information and account details
- Community participation and engagement metrics
- Resource access and utilization statistics
- Networking connection and interaction data
- Event participation and contribution information
- Forum posts and knowledge sharing content
3.4 Communication and Interaction Records
Support and Service Communications:
- All support ticket interactions and resolutions
- Phone call recordings and transcripts (with consent)
- Email communications and message histories
- Live chat sessions and real-time interactions
- Video conference recordings and meeting notes
- Training session participation and feedback data
- Implementation consultation records and progress notes
- WhatsApp support communication history
Marketing and Sales Interactions:
- Website form submissions and inquiry details
- Assessment consultation records and recommendations
- Sales presentation materials and proposal documents
- Follow-up communication sequences and responses
- Event participation and webinar attendance data
- Newsletter subscriptions and engagement metrics
4. DATA STORAGE, SECURITY, AND INFRASTRUCTURE
4.1 Enterprise-Grade Security Infrastructure
Primary Security Systems:
- Multi-layered enterprise security architecture
- Advanced encryption protocols for all data transmission
- Secure cloud infrastructure with redundancy and failover
- Continuous security monitoring and threat detection
- Regular penetration testing and vulnerability assessments
- Industry-standard security certifications and compliance
- Automated backup systems with geographic distribution
- Disaster recovery and business continuity planning
Access Control and Authentication:
- Multi-factor authentication requirements for all access
- Role-based access control with minimum privilege principles
- Regular access reviews and permission audits
- Session management and automatic timeout protocols
- Administrative access logging and monitoring
- Secure password policies and regular rotation requirements
4.2 Data Processing and Storage Standards
Encryption and Protection:
- AES-256 encryption for data at rest
- TLS 1.3 encryption for all data in transit
- End-to-end encryption for sensitive communications
- Encrypted database storage with access controls
- Secure key management and rotation procedures
- Regular encryption standard updates and improvements
Platform Infrastructure:
- Enterprise-grade cloud hosting with 99.9% uptime guarantee
- Geographically distributed data centers for redundancy
- Automated scaling and load balancing systems
- Regular system updates and security patch management
- Comprehensive monitoring and alerting systems
- Performance optimization and resource management
4.3 Data Ownership and Client Rights
Client Data Ownership:
- Clients retain full ownership of all business data
- Clear distinction between client data and PBS intellectual property
- Data portability rights and export capabilities during active subscription
- Client control over data sharing and usage permissions
- Transparent data processing and access logging
- Regular data integrity verification and validation
PBS Intellectual Property:
- All PBS-Built Assets (AI systems, automations, websites, workflows) remain PBS property
- Clients receive licensed use rights during active subscription only
- License terminates upon subscription cancellation or termination
- No export or transfer of PBS-Built Assets permitted
- PBS methodologies and frameworks protected as proprietary information
PBS Access and Usage Rights:
- Service delivery access limited to operational necessity
- Support access restricted to issue resolution requirements
- Maintenance access for system optimization and security
- Analytics access for service improvement and platform enhancement
- No unauthorized access or usage of client data
- Strict internal access controls and employee training
5. DATA USAGE, PROCESSING, AND SHARING
5.1 Primary Data Usage Purposes
Service Delivery and Operations:
- Core service delivery and platform functionality
- Custom system development and implementation
- Ongoing service optimization and performance improvement
- Technical support and customer service provision
- Billing processing and account management
- Security monitoring and fraud prevention
- Platform maintenance and system updates
- Performance analytics and reporting
Business Operations and Improvement:
- Service quality assessment and improvement initiatives
- Platform development and feature enhancement
- User experience optimization and interface improvements
- Market research and service development
- Compliance monitoring and regulatory reporting
- Risk assessment and management procedures
5.2 Marketing Communications and Consent
Form Submission Consent: By submitting any form on our website (including but not limited to contact forms, AI automation assessments, consultation requests, service inquiries, newsletter subscriptions, and download requests), you provide explicit consent to receive marketing-related communications from Prime Business Systems.
Marketing Communication Types:
- Email communications about our services and offerings
- Follow-up messages regarding your form submission and interests
- Educational content related to business automation and growth strategies
- Promotional emails about new services, features, or special offers
- Invitations to webinars, events, training sessions, or consultations
- Industry insights and best practice communications
- Company updates and service announcements
Consent Management:
You may withdraw marketing consent at any time through:
- Clicking the unsubscribe link in any marketing email
- Contacting us directly at support@mail.primebusinesssystems.com
- Updating your communication preferences in your account settings
- Requesting removal through any communication channel
Communication Limitations:
Withdrawal of marketing consent does not affect:
- Essential service-related communications for active clients
- Legal, administrative, or compliance communications
- Security notifications and platform updates
- Billing and payment-related communications
- Communications necessary for contracted service delivery
5.3 Third-Party Sharing and Integration
Essential Service Providers: We share data only with essential service providers under strict confidentiality agreements:
Platform and Infrastructure Providers:
- Cloud hosting and infrastructure services
- Database management and backup services
- Security monitoring and protection services
- Email delivery and communication platforms
- Payment processing and billing services
- Customer support and ticketing systems
Integration Partners:
- GoHighLevel (CRM and automation platform)
- Third-party business tools as configured by clients
- Analytics and performance monitoring services
- API integration partners for service delivery
Data Protection Requirements:
All third-party providers must meet:
- Equivalent security and privacy standards
- Contractual confidentiality and data protection obligations
- Regular security audits and compliance verification
- Limited data access restricted to service delivery necessity
- Data processing agreements compliant with applicable regulations
5.4 Data Sale and Commercial Use Prohibition
Strict Prohibition Policy:
- No selling of client data under any circumstances
- No sharing of data for third-party marketing purposes
- No commercial use of data outside service delivery scope
- No aggregation or anonymization for commercial sale
- No data monetization through external partnerships
- Client data used exclusively for contracted service delivery
6. INTERNATIONAL DATA TRANSFERS AND COMPLIANCE
6.1 Cross-Border Data Processing
Processing Locations:
Data may be processed in the following jurisdictions under appropriate safeguards:
- United States (primary processing location)
- Canada (backup and redundancy systems)
- United Kingdom (European service delivery)
- European Union member states (GDPR compliance)
- Australia (Asia-Pacific service delivery)
Transfer Safeguards:
- Standard contractual clauses for international transfers
- Adequacy decisions and approved transfer mechanisms
- Data processing agreements with international standards
- Regular compliance audits and verification procedures
- Privacy shield frameworks where applicable
6.2 Regional Compliance Framework
GDPR Compliance (European Union):
- Lawful basis establishment for all data processing
- Data subject rights implementation and response procedures
- Privacy by design and default principles
- Data protection impact assessments for high-risk processing
- Data protection officer designation and contact procedures
- Breach notification procedures within 72-hour requirements
CCPA Compliance (California):
- Consumer rights disclosure and implementation
- Opt-out mechanisms for data sale (though we don't sell data)
- Personal information category disclosure and purpose statements
- Consumer request processing and verification procedures
- Non-discrimination policies for privacy right exercise
Additional Regional Requirements:
- PIPEDA Compliance (Canada)
- Australian Privacy Principles compliance
- UK Data Protection Act compliance
- State-specific privacy law compliance where applicable
- Industry-specific regulatory requirements (HIPAA, SOX, etc.)
7. CLIENT RIGHTS AND DATA CONTROL
7.1 Comprehensive Access Rights
Data Access and Portability:
- Complete access to all personal and business data we maintain
- Data export in commonly used, machine-readable formats
- Regular data summaries and processing activity reports
- Historical data access for the full retention period
- Integration data and configuration access
- Performance metrics and analytics data access
Data Correction and Update Rights:
- Immediate correction of inaccurate or incomplete data
- Update mechanisms for changed business information
- Profile and preference modification capabilities
- Service configuration and setting adjustments
- Communication preference updates and modifications
7.2 Privacy Control and Management
Privacy Settings and Controls:
- Granular privacy settings for different data categories
- Communication frequency and channel preferences
- Marketing consent management and withdrawal options
- Data sharing permissions and restrictions
- Integration authorization and revocation controls
- Platform access and feature usage controls
Data Deletion and Retention Control:
- Right to request immediate data deletion
- Selective deletion of specific data categories
- Account closure and complete data removal
- Retention period adjustment requests where legally permissible
- Data minimization requests and implementation
7.3 Communication Preferences Management
Notification Categories and Controls:
- Essential service communications (cannot be disabled)
- Technical system updates and maintenance notifications
- Security alerts and important account notifications
- Marketing and promotional communications (opt-out available)
- Educational content and industry insights (opt-out available)
- Event and webinar invitations (opt-out available)
Delivery Method Preferences:
- Email communication preferences and frequency settings
- SMS/text message preferences where applicable
- WhatsApp communication preferences
- Phone call preferences and do-not-call requests
- Mail preferences and opt-out options
- In-platform notification settings and controls
8. DATA RETENTION AND DELETION PROCEDURES
8.1 Retention Period Framework
Active Client Data Retention:
- Full data retention during active service agreements
- Continuous data backup and recovery capabilities
- Historical data maintenance for performance analysis
- Integration data retention for system continuity
- Communication history retention for service quality
- Analytics data retention for optimization purposes
Post-Service Retention Periods:
- 30-day grace period after service termination for data export
- 90-day retention for billing and accounting purposes
- 1-year retention for legal compliance and dispute resolution
- Indefinite retention of aggregated, anonymized performance data
- Immediate deletion of sensitive authentication credentials
- Secure deletion of all personal identifiers after retention period
8.2 Data Deletion Procedures and Methods
Client-Initiated Deletion:
- Immediate processing of deletion requests
- Confirmation procedures and verification requirements
- Complete data removal from all systems and backups
- Third-party integration data removal coordination
- Deletion confirmation and verification reporting
- Appeal and recovery procedures where legally required
Secure Deletion Standards:
- Multi-pass data overwriting for physical storage
- Cryptographic deletion for encrypted data systems
- Secure destruction of backup media containing deleted data
- Certificate of destruction for regulated data types
- Verification procedures to ensure complete data removal
9. ADVANCED SECURITY MEASURES AND PROTOCOLS
9.1 Technical Security Infrastructure
Multi-Layer Security Architecture:
- Network-level firewalls and intrusion detection systems
- Application-level security controls and input validation
- Database-level encryption and access controls
- Operating system hardening and patch management
- Physical security controls for data center facilities
- Regular security assessments and penetration testing
Advanced Threat Protection:
- Real-time threat monitoring and automated response systems
- Machine learning-based anomaly detection and alerting
- Advanced persistent threat (APT) detection and mitigation
- Distributed denial of service (DDoS) protection and mitigation
- Malware scanning and virus protection systems
- Security incident response and forensic capabilities
9.2 Organizational Security Measures
Personnel Security Controls:
- Comprehensive background checks for all employees
- Regular security training and awareness programs
- Confidentiality agreements and non-disclosure requirements
- Access privilege reviews and regular recertification
- Insider threat monitoring and prevention programs
- Secure remote work policies and procedures
9.3 Incident Response and Breach Management
Security Incident Response:
- 24/7 security monitoring and incident detection
- Automated incident response and containment procedures
- Forensic investigation and root cause analysis capabilities
- Stakeholder notification and communication protocols
- Regulatory reporting and compliance procedures
- Post-incident review and security improvement implementation
Data Breach Response Procedures:
- Immediate containment and impact assessment
- Regulatory notification within required timeframes (72 hours for GDPR)
- Client notification with detailed impact assessment
- Credit monitoring and identity protection services where applicable
- Legal and regulatory compliance coordination
- Long-term monitoring and additional security measure implementation
10. ARTIFICIAL INTELLIGENCE AND AUTOMATED PROCESSING
10.1 AI Data Processing and Usage
AI System Data Requirements:
Client data is processed through artificial intelligence systems for:
- Business process analysis and optimization recommendations
- Automated workflow creation and configuration
- Lead scoring and qualification algorithms
- Content personalization and recommendation engines
- Performance prediction and optimization suggestions
- Anomaly detection and system monitoring
- Sales cycle automation and enhancement
- Marketing content optimization and scheduling
- Lead generation and prospect identification
- Customer communication automation and management
AI Processing Safeguards:
- Data minimization principles for AI training and processing
- Anonymization and pseudonymization where technically feasible
- Regular AI model auditing for bias and accuracy
- Transparent AI decision-making processes where applicable
- Human oversight and intervention capabilities for all automated decisions
- Opt-out mechanisms for AI-based processing where legally required
10.2 Automated Decision Making
Automated Processing Categories:
- System configuration recommendations based on business data
- Lead prioritization and routing based on qualification criteria
- Content scheduling and optimization based on engagement data
- Performance alert triggers based on metric thresholds
- Resource allocation based on usage patterns and demand
- Security response automation based on threat detection
- Advertising optimization and campaign management
- Email sequence triggering and personalization
- Social media content optimization and scheduling
- Sales opportunity scoring and prioritization
Human Review and Intervention:
- All significant automated decisions subject to human review
- Client ability to request human review of automated recommendations
- Override capabilities for all automated system configurations
- Regular review of automated decision accuracy and effectiveness
- Client notification of significant automated processing activities
11. INDUSTRY-SPECIFIC AND REGULATORY COMPLIANCE
11.1 Healthcare and HIPAA Compliance
For clients in healthcare industries:
- HIPAA compliance frameworks and business associate agreements
- Enhanced security controls for protected health information (PHI)
- Audit logging and access controls for healthcare data
- Breach notification procedures specific to healthcare regulations
- Staff training on healthcare privacy requirements
- Regular compliance assessments and certification maintenance
11.2 Financial Services Compliance
For clients in financial services:
- SOX compliance for financial data and reporting systems
- Enhanced fraud detection and prevention measures
- Financial data encryption and protection standards
- Regulatory reporting and compliance monitoring
- Customer identification and verification procedures
- Anti-money laundering (AML) compliance support
11.3 Legal and Professional Services
For legal and professional service clients:
- Attorney-client privilege protection and confidentiality
- Legal hold and litigation support procedures
- Professional confidentiality and ethics compliance
- Regulatory reporting for professional licensing bodies
- Enhanced confidentiality agreements and protections
12. PBS COLLECTIVE COMMUNITY SPECIFIC PROVISIONS
12.1 Community Membership Data
Member Profile Information:
- Professional and business identification information
- Expertise areas and professional background
- Networking preferences and connection interests
- Resource access and utilization patterns
- Event participation and engagement metrics
- Membership level and benefit utilization
Community Interaction Data:
- Forum posts and discussion contributions
- Resource downloads and utilization tracking
- Networking connections and communication history
- Event attendance and participation records
- Learning pathway progress and achievement metrics
- Tool and template usage patterns
13. PRIVACY POLICY UPDATES AND MODIFICATIONS
13.1 Update Procedures and Notification
Regular Review Process:
- Annual comprehensive privacy policy review and update
- Quarterly assessment of regulatory changes and compliance requirements
- Monthly review of service changes and data processing modifications
- Immediate updates for material changes in data processing
- Continuous monitoring of privacy law developments and requirements
Notification Procedures:
- Email notification for all material privacy policy changes
- Website posting of updated policy with change highlights
- In-platform notifications for active users
- 30-day advance notice for significant changes where possible
- Historical version maintenance and access availability
13.2 Client Response and Opt-Out Options
Change Response Options:
- Explicit consent requirements for material processing changes
- Opt-out mechanisms for new data processing activities
- Service modification options to accommodate privacy preferences
- Account closure options for clients uncomfortable with changes
- Granular consent options for specific data processing categories
14. CONTACT INFORMATION AND DATA PROTECTION OFFICER
14.1 Privacy Contact Information
For all privacy-related matters, inquiries, and requests:
Primary Privacy Contact:
Prime Business Systems
Email: support@mail.primebusinesssystems.com
Website: primebusinesssystems.com
Response Timeframes:
- General privacy inquiries: 5 business days
- Data access requests: 15 business days
- Data correction requests: 10 business days
- Data deletion requests: 30 business days
- Complaint responses: 5 business days
- Urgent security matters: 24 hours
14.2 Regulatory Authority Contact
For EU/GDPR Matters: Clients may contact relevant data protection authorities in their jurisdiction for complaints or concerns regarding our privacy practices.
For US Privacy Matters: Complaints may be filed with relevant state attorneys general or consumer protection agencies.
15. GOVERNING LAW AND DISPUTE RESOLUTION
15.1 Jurisdiction and Applicable Law
This Privacy Policy and all privacy-related matters are governed by Delaware law, without regard to conflicts of law principles. Any disputes arising from privacy matters shall be resolved through binding arbitration in Delaware, except where prohibited by applicable consumer protection laws.
15.2 International Jurisdiction
For international clients, local privacy laws may provide additional rights and protections. This Privacy Policy is designed to comply with applicable international privacy regulations while maintaining Delaware law as the primary governance framework.
16. SEVERABILITY AND ENFORCEABILITY
If any provision of this Privacy Policy is found invalid, illegal, or unenforceable in any jurisdiction, such provision shall be deemed amended to achieve as closely as possible the economic effect of the original provision, and the remainder of this Privacy Policy shall remain in full force and effect.
17. ENTIRE AGREEMENT AND INTEGRATION
This Privacy Policy, together with our Terms of Service, constitutes the entire agreement between you and Prime Business Systems regarding the privacy and protection of your information. This Privacy Policy supersedes all prior privacy policies and statements.
18. ACKNOWLEDGMENT AND ACCEPTANCE
By using our services, accessing our website, submitting any forms, or engaging with our platforms in any manner, you acknowledge that you have read, understood, and agree to be bound by this Privacy Policy and consent to our collection, use, and disclosure of your information as described herein.
For questions about our privacy practices or to exercise your privacy rights, please contact us at support@mail.primebusinesssystems.com.