Client Data & Security Policy

Last updated: May 13, 2026

This Client Data & Security Policy explains how Melkom Systems handles client data, application data, business records, files, and technical information in connection with custom software development, web-based applications, business management systems, downloadable software, support, hosting, and related technology services.

This Policy applies to data provided to Melkom Systems, entered into systems created or supported by Melkom Systems, or processed as part of services provided through melkomsystems.com, custom client applications, client dashboards, support channels, or related systems.

This Policy is intended to work together with our Privacy Policy, Terms & Conditions, Custom Software and Service Terms, Acceptable Use Policy, Support & Maintenance Policy, and any written agreement, proposal, statement of work, invoice, or service plan between Melkom Systems and a client.

1. Purpose of This Policy

Melkom Systems builds custom digital systems for businesses and individuals. These systems may help clients manage jobs, projects, employees, expenses, files, customer information, schedules, business operations, and related records.

Because these systems may store important business information, this Policy explains the general responsibilities of Melkom Systems and its clients regarding data access, security, backups, account use, data retention, third-party services, and incident handling.

2. Types of Data Covered

Depending on the project or service, client systems may process or store different types of information, including:

The exact data collected or processed depends on the specific application, service, project scope, and client configuration.

3. Client-Controlled Data

In many custom applications, the client decides what information is entered into the system, who is authorized to access it, and how the information is used within the client’s business.

Clients are responsible for making sure they have the right to collect, upload, store, use, and share any information they place into a system developed, hosted, supported, or maintained by Melkom Systems.

This includes information about employees, customers, vendors, subcontractors, job sites, expenses, projects, photos, documents, and business operations.

4. How Melkom Systems Uses Client Data

Melkom Systems may access, process, or use client data only as reasonably necessary to provide services, including to:

Melkom Systems does not sell client data for money.

5. Access to Client Systems

Melkom Systems may access client systems when needed to provide development, hosting, support, maintenance, troubleshooting, security, migration, backup, or administrative services.

Access may be performed by Melkom Systems personnel, authorized contractors, service providers, or infrastructure providers when reasonably necessary to provide the applicable service.

Whenever practical, access is limited to the information and system areas needed to perform the service.

6. Account Security and User Responsibilities

Clients and users are responsible for maintaining the security of their accounts and login credentials.

Users should:

Melkom Systems is not responsible for unauthorized access caused by weak passwords, shared credentials, compromised devices, failure to remove former users, or client-side security issues.

7. Security Measures

Melkom Systems uses reasonable administrative, technical, and operational safeguards designed to protect systems and data from unauthorized access, loss, misuse, alteration, or disclosure.

Depending on the project, system, service plan, hosting environment, and client requirements, safeguards may include:

No system, server, website, application, email platform, or internet transmission can be guaranteed to be completely secure. Melkom Systems does not guarantee that unauthorized access, data loss, service interruptions, errors, or security incidents will never occur.

8. Hosting, Cloud Services, and Third-Party Providers

Melkom Systems may use third-party providers to operate, host, store, secure, support, analyze, or process information for websites, applications, databases, email, payments, backups, analytics, authentication, infrastructure, and related services.

Third-party providers may process information according to their own terms, privacy policies, security practices, and service limitations.

Clients are responsible for reviewing and approving any required third-party tools, platforms, integrations, or accounts that are part of their project or service plan.

9. Backups and Data Recovery

Backups and recovery services are provided only when included in a written agreement, proposal, invoice, hosting plan, service plan, or maintenance arrangement.

Backup frequency, retention period, coverage, and recovery options may vary depending on the system, hosting environment, project scope, and service plan.

Unless specifically agreed in writing, Melkom Systems does not guarantee continuous backups, complete data recovery, permanent data retention, or restoration of all lost or corrupted data.

Clients should maintain their own copies of important business records, financial records, legal records, customer records, project files, and other critical information.

10. Data Retention and Deletion

Melkom Systems retains client data only as long as reasonably necessary to provide services, maintain systems, complete projects, comply with legal or contractual obligations, resolve disputes, enforce agreements, maintain backups, or support business operations.

If a client requests deletion, export, or return of data, Melkom Systems will make reasonable efforts to assist, subject to technical limits, service plan limits, legal obligations, backup retention, payment status, and any written agreement between the parties.

Some data may remain temporarily in backups, logs, archives, accounting records, security records, or legal records even after deletion from active systems.

11. Data Export and Portability

Where technically practical and commercially reasonable, Melkom Systems may help clients export data from custom applications.

Export formats, available fields, timing, fees, and technical limitations may depend on the application, database structure, service plan, and written agreement.

Custom data export, migration, cleanup, reporting, or conversion work may be treated as additional billable work unless included in a written agreement.

12. Sensitive and Regulated Information

Unless Melkom Systems specifically agrees in writing, our websites, applications, and services are not designed for storing or processing highly sensitive or specially regulated information.

Clients should not submit, upload, or store information subject to special legal or regulatory requirements unless Melkom Systems has confirmed in writing that the applicable system is designed and authorized for that type of data.

Examples may include protected health information, financial institution data, government-restricted data, highly sensitive identity documents, biometric data, or other regulated information.

13. Employee, Customer, and Third-Party Information

Clients are responsible for providing any notices, consents, disclosures, agreements, or policies required for information they collect from employees, customers, vendors, subcontractors, or other third parties and enter into systems created or supported by Melkom Systems.

Clients are also responsible for determining who within their organization may access employee, customer, vendor, project, expense, job, or business records.

14. Security Incidents

If Melkom Systems becomes aware of a security incident affecting a system or data under its control, we will take reasonable steps to investigate, contain, and address the issue.

When appropriate and legally required, Melkom Systems may notify affected clients or users, provide available information about the incident, and recommend reasonable next steps.

Clients are responsible for notifying their own employees, customers, vendors, regulators, or other third parties when required by law or contract, unless otherwise agreed in writing.

15. Client Responsibilities

Clients are responsible for:

16. Limitations

Melkom Systems provides reasonable security measures but cannot guarantee that systems will be error-free, uninterrupted, immune from cyberattacks, or completely secure.

Security and data protection depend on many factors, including client practices, user behavior, third-party platforms, hosting providers, internet service providers, device security, password strength, browser settings, integrations, and the service plan selected by the client.

Additional security requirements, compliance requirements, monitoring, audits, penetration testing, advanced backups, disaster recovery, or high-availability configurations may require a separate written agreement and additional fees.

17. Changes to This Policy

Melkom Systems may update this Client Data & Security Policy from time to time. When we update it, we will revise the “Last updated” date at the top of this page.

The updated version will be effective when posted unless otherwise stated.

18. Contact Us

If you have questions about this Client Data & Security Policy or how Melkom Systems handles client data, please contact us:

Melkom Systems

California, United States

Email: hello@melkomsystems.com