Privacy Policy and Data Hardening | NovaCore Software

Last updated: March 2026

Responsible Entity: Business of Global Marketing, LLC (trading as BGM Corporation / NovaCore Software)

EIN: 87-1348703

Registered Office: 990 Biscayne Blvd, Ste 501-16, MIAMI, FL US 33132-1556

Jurisdiction: Florida, United States

"This Privacy Policy governs the processing of data by NovaCore Software, a trading name operated and legally represented by Business of Global Marketing, LLC. Our privacy commitment is grounded in United States law and Privacy by Design so that we process only the minimum information required for critical systems."

01 CLAUSE 1: REGULATORY FRAMEWORK AND COMMITMENT

We adhere to the Florida Digital Bill of Rights (FDBOR), the Florida Information Protection Act (FIPA), and applicable standards from the California Consumer Privacy Act (CCPA) to guarantee robust controls, always applying Privacy by Design and minimizing the data we process.

02 CLAUSE 2: DATA CATEGORIES AND COLLECTION

The Company limits the collection of information to the following essential technical categories:

  • Technical Identity: Names, titles, and email addresses voluntarily provided in contact forms or during the initial requirements mapping.
  • Connectivity and Security: Anonymized IP addresses and connection metadata used exclusively for preventing DDoS attacks, intrusion detection, and perimeter security audits.
  • Infrastructure Metrics: Aggregated, non-identifiable usage data intended to optimize the performance and scalability of the delivered software architecture.

03 CLAUSE 3: TECHNICAL PURPOSES OF PROCESSING

Collected data is processed strictly for the following purposes:

  • Execution of engineering, development, and deployment contracts for specialized software.
  • Validation of integrity and security of the assigned nodes and development environments.
  • Compliance with current legal and regulatory obligations in the jurisdiction of Florida, United States.

04 CLAUSE 4: HARDENING AND SECURITY PROTOCOL

We implement enterprise-level security standards and critical infrastructure controls:

  • Logical Isolation: Each database and client workspace is logically isolated to prevent any cross-leakage vectors.
  • Military-Grade Encryption: We apply AES-256 algorithms for data at rest and TLS 1.3 protocols for all information in transit.
  • Zero-Backdoor Architecture: Our systems are designed without backdoors; the Company does not retain master keys or engineering credentials after the final technical transfer to the client.

05 CLAUSE 5: INTERNATIONAL TRANSFERS

When the infrastructure requires international cloud services, the Company ensures that data processing follows strict compliance protocols and protection levels equivalent to those established by Business of Global Marketing, LLC in the United States.

06 CLAUSE 6: TECHNICAL SOVEREIGNTY AND RIGHT TO BE FORGOTTEN

The user or client retains full ownership of any data processed by their infrastructure at all times. The Company guarantees permanent and irreversible deletion of technical data after contract termination or upon express request, respecting the right to be forgotten and the sovereignty of the data subject.

07 CLAUSE 7: DATA PROTECTION OFFICER (DPO) AND CONTACT

For any technical inquiries regarding the protection of your data or the exercise of your rights under Florida law, please contact our Data Protection Officer:

"Security is not a feature, it is a fundamental right of the code."

Data Protection Officer (DPO) and Contact: