Privacy Policy and Data Hardening | NovaCore Software
Last updated: March 2026
Responsible Entity: Business of Global Marketing, LLC (trading as BGM Corporation / NovaCore Software)
EIN: 87-1348703
Registered Office: 990 Biscayne Blvd, Ste 501-16, MIAMI, FL US 33132-1556
Jurisdiction: Florida, United States
"This Privacy Policy governs the processing of data by NovaCore Software, a trading name operated and legally represented by Business of Global Marketing, LLC. Our privacy commitment is grounded in United States law and Privacy by Design so that we process only the minimum information required for critical systems."
01 CLAUSE 1: REGULATORY FRAMEWORK AND COMMITMENT
We adhere to the Florida Digital Bill of Rights (FDBOR), the Florida Information Protection Act (FIPA), and applicable standards from the California Consumer Privacy Act (CCPA) to guarantee robust controls, always applying Privacy by Design and minimizing the data we process.
02 CLAUSE 2: DATA CATEGORIES AND COLLECTION
The Company limits the collection of information to the following essential technical categories:
- Technical Identity: Names, titles, and email addresses voluntarily provided in contact forms or during the initial requirements mapping.
- Connectivity and Security: Anonymized IP addresses and connection metadata used exclusively for preventing DDoS attacks, intrusion detection, and perimeter security audits.
- Infrastructure Metrics: Aggregated, non-identifiable usage data intended to optimize the performance and scalability of the delivered software architecture.
03 CLAUSE 3: TECHNICAL PURPOSES OF PROCESSING
Collected data is processed strictly for the following purposes:
- Execution of engineering, development, and deployment contracts for specialized software.
- Validation of integrity and security of the assigned nodes and development environments.
- Compliance with current legal and regulatory obligations in the jurisdiction of Florida, United States.
04 CLAUSE 4: HARDENING AND SECURITY PROTOCOL
We implement enterprise-level security standards and critical infrastructure controls:
- Logical Isolation: Each database and client workspace is logically isolated to prevent any cross-leakage vectors.
- Military-Grade Encryption: We apply AES-256 algorithms for data at rest and TLS 1.3 protocols for all information in transit.
- Zero-Backdoor Architecture: Our systems are designed without backdoors; the Company does not retain master keys or engineering credentials after the final technical transfer to the client.
05 CLAUSE 5: INTERNATIONAL TRANSFERS
When the infrastructure requires international cloud services, the Company ensures that data processing follows strict compliance protocols and protection levels equivalent to those established by Business of Global Marketing, LLC in the United States.
06 CLAUSE 6: TECHNICAL SOVEREIGNTY AND RIGHT TO BE FORGOTTEN
The user or client retains full ownership of any data processed by their infrastructure at all times. The Company guarantees permanent and irreversible deletion of technical data after contract termination or upon express request, respecting the right to be forgotten and the sovereignty of the data subject.
07 CLAUSE 7: DATA PROTECTION OFFICER (DPO) AND CONTACT
For any technical inquiries regarding the protection of your data or the exercise of your rights under Florida law, please contact our Data Protection Officer:
"Security is not a feature, it is a fundamental right of the code."
Data Protection Officer (DPO) and Contact: