
Privacy Policy
Ghost Systems Inc Privacy Policy
Ghost Systems Inc. (“Ghost Systems,” “we,” “us,” or “our”) is committed to protecting the privacy and confidentiality of our customers and website visitors. This Privacy Policy explains the information we collect, how it is used, and the safeguards we maintain to protect it.
Information We Collect and Use
Personal Information
When you engage our services, we may collect personal information such as your name, contact details, and other information you provide. This information is used solely to deliver requested services, manage your account, and communicate with you.
Technical Information
When you access our website, we may collect information such as your IP address, browser type, operating system, and pages visited. This information helps improve website performance and user experience.
Cookies
We may use cookies to remember your preferences and customize your browsing experience.
​
Client Data and Confidentiality
Ghost Systems does not host customer production data on its own infrastructure. In cases where customers request data backup or continuity services, these are provided through secure, industry-certified cloud platforms that meet recognized compliance and security standards.
All customer information, including operational details, system configurations, and data, is treated as strictly confidential. Ghost Systems will never disclose, share, or use one customer’s information, operations, or data in connection with another customer. Information is only disclosed when required by law or as necessary to provide contracted services.
Information Sharing
Ghost Systems does not sell, rent, or share personal information with third parties for marketing purposes. Information may only be shared in the following circumstances:
-
To deliver the services you have requested
-
To comply with legal obligations
-
To enforce our Terms of Service or protect our rights
Security Safeguards
We apply multiple layers of technical, administrative, and physical controls to protect information from unauthorized access, disclosure, alteration, or destruction. These safeguards include:
-
Enforced multi-factor authentication on all accounts
-
Enterprise-grade password management and access controls
-
Segregated accounts for critical infrastructure
-
Continuous monitoring and security incident response capabilities
-
Regular testing of backup and continuity measures
​
Mobile Communications
By providing your phone number, you consent to receiving service-related text messages. Message and data rates may apply. Frequency may vary, and you may opt out at any time by replying STOP.
No mobile information will be shared with third parties or affiliates for marketing purposes. Opt-in data and consent remain private and will not be disclosed.
​​
Updates to this Privacy Policy
Ghost Systems may revise this Privacy Policy as needed. Any updates will be posted on our website, and continued use of our services will indicate acceptance of the updated policy.
Contact Us:
If you have any questions or concerns about our Privacy Policy, please contact us at contact@ghost-sys.com .
Effective Date: 08/25/2020.

