Skip to main content
Last updated: 30 January 2026 This Privacy Policy explains how Centipid Technologies (“we,” “our,” or “the Company”) handles customer data within our ISP billing system. We are committed to protecting your privacy and maintaining the security of your personal information.

Data Collection and Purpose

Centipid Technologies collects specific information necessary for the operation of our ISP billing services. The information we collect includes customer identification details, service usage data, and payment information. This data is essential for processing payments, maintaining service quality, and ensuring system functionality. We maintain detailed records of service usage solely for billing accuracy and technical maintenance purposes.

Limited Access Protocol

Our data access protocol strictly limits system access to authorized technical personnel. Access to customer data occurs only during specific circumstances, primarily system debugging and technical support resolution. Each debugging session is thoroughly documented, including the reason for access, duration, and actions taken. This ensures complete transparency and maintains the integrity of our privacy commitment.

No Contact Policy

Centipid Technologies maintains a strict no-contact policy regarding customer communications. We do not initiate contact with your clients for marketing, promotional, or sales purposes. Our communication is limited to:
  • Automated billing notifications
  • System maintenance alerts
  • Direct responses to customer-initiated support requests
  • Legal or service-affecting notifications

Data Protection Measures

We implement comprehensive security measures to protect your information. All data is encrypted using industry-standard protocols during transmission and storage. Our security infrastructure includes:
  • Multi-layer firewall protection
  • Regular security audits and updates
  • Strict access control protocols
  • Continuous system monitoring
  • Secure data backup systems

No Data Sharing Commitment

Centipid Technologies explicitly prohibits the sharing or selling of customer data to third parties. Your information remains strictly within our billing system and is used solely for service provision. We do not:
  • Share customer information with marketing agencies
  • Sell or trade customer data
  • Use customer information for advertising purposes
  • Provide customer data to external analytics services

Data Retention and Management

We retain customer data only for the duration necessary to provide services and comply with legal requirements. Upon service termination, non-essential data is securely deleted from our systems. Financial records are maintained according to applicable laws and regulations, with strict security protocols governing their storage.

Customer Rights

As a Centipid Technologies customer, you maintain control over your personal information. You have the right to:
  • Request a comprehensive report of your stored data
  • Correct any inaccurate information
  • Export your data in a standard format
  • Request deletion of your information upon service termination
  • Receive notification of any security incidents affecting your data

Compliance and Updates

This privacy policy complies with current data protection regulations and industry standards. We regularly review and update our privacy practices to ensure continued compliance and optimal data protection.

Payment Data Protection

We implement additional security measures specifically for payment-related data:
  • Payment card information is encrypted using PCI DSS compliant protocols
  • Bank account details are stored with enhanced encryption standards
  • Payment processing logs are maintained with restricted access
  • Automated monitoring systems detect unusual payment patterns
  • Regular PCI compliance audits are conducted

Financial Data Retention

Our financial data retention policies include:
  • Transaction records are maintained for 7 years as per regulatory requirements
  • Payment method details are securely stored only until account closure
  • Audit logs of financial transactions are preserved for compliance purposes
  • Automated data purging occurs after retention periods expire

Automated Billing Data Processing

Our billing system employs automated processing to ensure accuracy and efficiency:
  • Usage data is automatically collected and processed for billing purposes
  • Automated notifications are sent for payment due dates, successful payments, and failed transactions
  • System algorithms analyze usage patterns solely for billing accuracy
  • Automated data validation checks ensure billing information integrity
  • All automated processes are regularly audited for compliance and accuracy

Third-Party Payment Processors

When using third-party payment processors:
  • We select only PCI-compliant payment processors with strong security records
  • Minimal necessary information is shared with payment processors to complete transactions
  • We maintain contractual agreements requiring processors to protect your data
  • Payment processor interactions are logged and monitored
  • We regularly review and assess the security practices of our payment partners

Data Breach Response Protocol

In the unlikely event of a data breach affecting billing information:
  • We will notify affected customers within 72 hours of breach confirmation
  • Detailed information about the breach scope and affected data will be provided
  • We will cooperate fully with law enforcement and regulatory authorities
  • Remediation steps will be implemented immediately to prevent further exposure
  • Credit monitoring services may be provided for affected customers when appropriate

Billing System Access Logs

Our billing system maintains detailed access logs:
  • All administrator access to billing data is logged with timestamps and action details
  • Customer account access is recorded for security monitoring
  • Failed login attempts are monitored and flagged for security review
  • Access logs are retained for as long as your account is active
  • Regular access pattern analysis is conducted to detect potential security issues

Contact Information

For any privacy-related concerns or inquiries, please contact us at director@centipidtechnologies.com.