Our Terms & Conditions

At CtrlS, we have servers which cater to any and every possible need. Ranging from hosting websites, database servers, application servers or heavy traffic forums and social media platforms, we have the server configuration for you.

Terms & Conditions

Security

Even though we strive to protect the information you provide through CtrlS.com, no data transmission over the Internet can be guaranteed to be 100 percent secure. As a result, even though we strive to protect your information, we cannot guarantee or warrant the security of any information you transmit to or receive from us through our Web site and online services.

We review our security policies on a regular basis, and changes are made as necessary. They undergo an intense review on an annual basis by our Information Technology department. These defined security policies detail access privileges, information collection needs, accountability, and other such matters. Documented system security objectives, policies, and standards are consistent with system security requirements defined in contractual, legal, and other service-level agreements. For example, only a select group of authorized individuals within CtrlS Datacenters has access to user information. A complete policy with details regarding access, scripting, updates, and remote access is available for review by qualified personnel within the organization. This document is not available to the general public for study.

CtrlS.com operates secure data networks that are password-protected and are not available to the public. When transmitting information between you and CtrlS.com, data security is handled through a security protocol called secured sockets layer (SSL). SSL is an Internet security standard using data encryption and Web server authentication. Encryption strength is measured by the length of the key used to encrypt the data; that is, the longer the key, the more effective the encryption. Using the SSL protocol, data transmission between you and the CtrlS.com server is performed at industry standard encryption strength.

Contact Us

If you feel that there has been a breach to the security of this site, please contact us immediately at our Toll Free Number: 1-800-102-8757 or send a mail to the Webmaster of this website.

Information related to Changes

Any changes that affect the security of our Web site as it affects you as a site user will be communicated to you by posting the highlight of the change to the Web page that summarizes our security policies and significant controls.

Availability

To allow sufficient time for file maintenance and backup, the maximum number of hours per day that our network will be made available is 22 hours per day, 7 days a week. In the event of a disaster or other prolonged service interruption, the entity has arranged for the use of alternative service sites to allow for full business resumption within 24 hours. Our company's defined security policies detail access privileges, information collection needs, accountability, and other such matters. They are reviewed and updated at quarterly management meetings and undergo an intense review on an annual basis by the Information Technology Department. Documented system security objectives, policies, and standards are consistent with system security requirements defined in contractual, legal, and other service-level agreements. For example, current policy prohibits shared IDs; each support person has his or her own unique ID to log on and maintain network equipment. A complete policy with details regarding access, scripting, updates, and remote access is available for review by qualified personnel. This document will not be released to the general public for study.

Management has in place a consumer hotline to allow customers to telephone in any comments, complaints, or concerns regarding the security of the site and availability of the system. If you are unable to obtain access to this site, please contact our customer support personnel at +91 40 42030583 | +91 40 23111444

Highlights of any changes that affect the security of our Web site and availability of the system as it affects you as a site user will be communicated to you by e-mail seven days in advance of the anticipated change. The highlights of the change will be posted to the Web page that summarizes our availability and security policies.

Process Integrity

Request for Proposals published on our website undergo an intensive review process to ensure that our customers get all the information needed to compose a quote. CtrlS's trained personnel will work closely with OEM manufacturers new to the outsourcing market to ease their fears.

Our policy is to deliver a server within the stipulated time mentioned on the website with respect to receipt of a customer-approved order or payment. We will notify you by e-mail / phone within 4 hours if we cannot fulfill your order as specified at the time you placed it and will provide you the option of canceling the order without further obligation. You will not be billed until the server is provisioned.

We require an electronic funds transfer of fees and costs at the end of the transaction. For new customers, a deposit may be required. To cancel your monthly service fee, send an e-mail / call to your designated Account Manager. Be sure to mention your company name when you call.

Our process for consumer dispute resolution requires that you contact your concerned Account Manager or contact our CRM Team at crm@ctrls.in giving all the required information.

If you, our customer, require follow-up or response to your questions or complaints regarding transactions at this site, you may contact us at our Toll Free Number: 1-800-102-8757. If your follow-up or your complaint is not handled to your satisfaction, you should contact the e-commerce ombudsman who handles consumer complaints for e-commerce in this country.

Our company's defined processing integrity policies and related security policies are communicated to all authorized users of the company. The security policies detail access privileges, information collection needs, accountability, and other such matters. They are reviewed and updated at quarterly management meetings and undergo an intense review on an annual basis by the IT department. Documented system security objectives, policies, and standards are consistent with system security requirements defined in contractual, legal, and other service-level agreements. For example, current policy prohibits shared IDs; each support person has his or her own unique ID to log on and maintain network equipment. A complete policy with details regarding access, scripting, updates, and remote access is available for review by qualified personnel. This document will not be released to the general public for study.

Confidentiality

Access to your information is limited to our employees and any third-party subcontractors we may elect to use in preparing our quote. We will not use any information you provide for any purpose other than a price quote and subsequent order fulfillment on your behalf. However, access may need to be provided in response to subpoenas, court orders, legal process, or other needs to comply with applicable laws and regulations. When we provide information to third parties, we do not provide your company name. However, we make no representation regarding third-party confidential treatment of such information.

a few of our more recognizable clients

  • Aircel
  • Marriott
  • Verizon
  • Apollo Hospitals
  • Bajaj | Allianz