top of page

Policies

Our policies outline our commitment to security, transparency, and professional service delivery.

Our Commitment

OVERVIEW

Our policies reflect our commitment to professional service, operational transparency, and secure handling of all client data and inventory. We follow structured processes to ensure accuracy, reliability, and confidentiality in all services we provide.

Terms of Service — FBA Prep & Logistics

TERMS

These Terms of Service govern the use of our FBA preparation, warehousing, and logistics services ("Services"). By using our services, you ("Client") agree to these terms.

 

We provide services including receiving inventory, inspection, labeling, bundling, polybagging, packaging, shipment preparation, and forwarding to fulfillment centers.

 

By using our services, clients authorize us to receive, inspect, prepare, label, package, and ship their inventory as required.

 

Clients are responsible for ensuring that all products comply with applicable requirements before arrival. We are not responsible for delays caused by carriers, fulfillment centers, or incorrect information provided by the client.

 

All services are performed with care and in accordance with established operational and preparation standards.

Privacy & Data Usage Policy

PRIVACY

We collect only the information necessary to provide our services, including contact details, shipment information, and inventory-related data.

 

This information is used solely for communication, service execution, and operational purposes. We do not sell, rent, or share client data with any third party.

 

Client data is retained only for as long as necessary to complete services and maintain operational records. Once no longer required, access to such data is removed or restricted.

 

We are committed to maintaining the privacy and confidentiality of all client information.

Data Security & Access Policy

SECURITY

We maintain strict security controls to protect all client data, inventory information, and operational systems.

 

Access to data and systems is limited to authorized personnel only, based on their roles and responsibilities. Access is granted only when necessary and is removed immediately when no longer required.

 

All systems are managed using secure processes designed to protect data integrity, confidentiality, and availability. Access is monitored and controlled to ensure accountability at all times.

 

We do not disclose or expose client data to unauthorized individuals or external parties.

Data Access & Organizational Change Policy

ORGNAZATIONAL

We are committed to maintaining transparency and accountability in all operational and data-related processes.

 

We agree to notify relevant parties of any significant organizational changes that may impact operations, data handling, or service delivery. This includes changes in ownership, management, or operational structure.

 

We maintain internal controls to ensure that data access remains secure, monitored, and limited to authorized personnel only.

Risk Assessment & Mitigation Policy

RISK

We maintain a structured process for identifying, evaluating, and mitigating risks related to operations, inventory handling, and data security.

 

Potential risks are regularly assessed based on likelihood and impact. Appropriate mitigation measures are implemented, including process improvements, staff training, quality control checks, and secure handling procedures.

 

Risk assessments are reviewed periodically to ensure all controls remain effective and aligned with operational requirements.

Incident Response & Resolution Plan

INCIEDENT RESPONSE

We follow a structured process to respond to any operational, security, or data-related incidents. In the event of an incident, we take the following steps:

 

• Identify and contain the issue

• Assess the impact

• Take corrective action

• Notify relevant parties if required

• Implement measures to prevent recurrence

 

We are committed to maintaining transparency, minimizing disruption, and continuously improving our processes.

Compliance Statement

COMPLIANCE

We follow a structured process to respond to any operational, security, or data-related incidents. In the event of an incident, we take the following steps:

 

• Identify and contain the issue

• Assess the impact

• Take corrective action

• Notify relevant parties if required

• Implement measures to prevent recurrence

 

We are committed to maintaining transparency, minimizing disruption, and continuously improving our processes.

bottom of page