ShipSaving服务条款

ShipSaving的网址为https://s.shipsaving.com/。使用条款适用于有关网站的所有功能。其中一些可能受制于新的或不同的规则、条款和指南。所有提到的功能将会在官方网站上发布,并附上相应的细节。这些规则或指南也将纳入以下可用条款。ShipSaving使用条款标注所有访问者都会受到相关的法律约束。所有访问ShipSaving的用户都表明已阅读并同意遵守使用条款。所有访问ShipSaving的用户都必须年满18岁。所有不同意使用条款的人应立即退出本网站。

访问ShipSaving网站

ShipSaving公司向所有访问者授予使用该平台进行个人和商业应用的非排他性有限许可。不同的许可证相对应于不同的使用类型。许可证会受到以下限制:

  • 访问者不可出售、租赁、出租、转让、分发、托管或使用免费许可的网站;
  • 所有的访问者都不能改变网站的布局,添加新的线路,或以任何方式影响网站的整体功能;
  • 访问者访问网站的目的不可是复制网站背后的内容或架构;
  • 除非另有规定,否则访问者和用户不可转载或重新发布网站上的章节或内容。

所有与ShipSaving相关的内容必须在该文件(包括副本)上有适当的通知和标记。

ShipSaving有权在客人未收到通知的情况下的任何时候终止网站服务。所有访客同意并接受ShipSaving不承担任何进一步的修改、改进、暂停或站点终止的责任。访客也同意,本公司没有义务为非相关业务或要求提供任何形式的客户服务。

您同意此时此刻以及未来在使用ShipSaving时获得或者发现的所有内容仅属于ShipSaving。您对上述元素不具有任何权利、利益或所有权。如前所述,所有访客均可部分或完全访问。

SHIPSAVING使用入门

ShipSaving是一款用于处理标签、批量打印标签、协助装运和提供智能扫描功能的电商平台管理软件,可在https://shipsaving.com上登录软件。

所有ShipSaving用户需要先选择网站上提供的版本并注册账号。每个用户必须创立一个独立的用户名和密码,不可与第三方共享。在ShipSaving主页面中可以添加已有的电商平台以便帮助您处理发货和提高处理时间和效率。

ShipSaving网站上还可以提供管理仓库的服务帮助,管理使用在线商店发送的所有发货。

ShipSaving目前可集成多达20多个电子商务平台上。该软件允许用户跟踪发货,并使用开发的实时报告,以增强整体发货体验,使整个过程更节省时间。要获取详细的集成信息,请查看https://shipsaving.com/en/partners。ShipSaving有权将新合作伙伴添加到列表中,而无需通知您或未来的用户有关新建立的合作伙伴。新的合作伙伴可以在公司的官方网站上找到。

其他用户、广告和第三方链接

ShipSaving可能会在网站上显示第三方广告和链接。这些链接和广告不受ShipSaving的控制,所以ShipSaving公司不接受这些链接和广告内容或性质的责任。ShipSaving可以为方便访问者而提供这些链接。这些链接没有经过ShipSaving公司的测试、审查或认可。访问者同意接受其他对应点击ShipSaving其他使用条款中发现的链接和广告适用于以下网站和地点。访问者接受条款和使用链接和广告的风险由他们自己承担,ShipSaving不对任何特定时刻可能发生的任何问题负责。

ShipSaving对其他用户之间可能发生的纠纷不承担责任。ShipSaving将不对数据和内容的丢失或损坏负责。我们不对用户以任何方式创建、管理或导入的内容负责。特此所有访客同意ShipSaving公司和所有员工、经理、代理、开发人员、测试人员,或任何其他人员均不会已数据损失、数据损坏等内容损坏进行任何承担及不强制参与任何纠纷。

对于来自美国加州的访客,您在此接受民法典第1542条规定:“一般免除不适用于债权人在执行免除时不知道或怀疑对其有利的债权,如果债权人知道这些债权一定对他或她与债务人的和解产生重大影响。”

网络信标和ShipSaving cookie

ShipSaving使用cookie和网络信标来增强用户在访问网站时的体验。cookie有可能存储也可能不存储您的偏好。然而所获得的资料,只供ShipSaving公司及其合作伙伴日后提供更好的服务及更详细的网站功能之用。免责声明:ShipSaving不保证或担保该网站将完全满足用户的要求,也保证未来不包含任何类型的恶意软件或病毒。这个条款适用于ShipSaving网站及其所有合作伙伴。如有必要,所有涉及以上提到的的保证将在初次访问网站后90天内生效。所有不在管辖区内的访问者不受上述部分的保护。

服务定价

ShipSaving提供多种类型的服务。您如果有每月或每年的服务费,我们将会根据您选用并同意过的服务结算。在使用服务期间,您要承担所有可能产生的费用(其中包括但不限于:邮费、承运商产生的费用、包裹保险、直接或间接产生的第三方服务供应商的费用、ShipSaving收取的包裹运输费用或其他服务费用,或您其他服务产生的额外费用。所预估的总运费可能包含第三方运输的费用,同时会按照您账户的状况收费。ShipSaving 有权决定是否更新ShipSaving Rate。如需要,ShipSaving可酌情为您提供可替代的服务。

 

运输规定

ShipSaving提供运输服务。您将严格遵守承运商的条款(包括但不限于USPS、FedEx、UPS、DHL Express)和承运商提供的运输规定。违反承运商规定而造成的罚款全权由您承担。您必须在7天内付清所有欠款。由于承运商账单包含敏感信息,ShipSaving将不提供此账单给任何用户。如逾期不付款,ShipSaving保留追究法律责任的权利。

注册成为ShipSaving用户后,您只能通过访问https://s.shipsaving.com/的ShipSaving系统购买ShipSaving认证的承运商账号购买运费。您只能通过ShipSaving的帐户为您自己的货物、集成商店订单、并通过ShipSaving系统上传跟踪信息。您不得将ShipSaving的账户出借、出售或以任何方式与未经授权的第三方共享。发货地址必须从ShipSaving授权的仓库发出,您不得与未经授权的仓库共享访问ShipSaving承运人账户的权限。如果帐户被未经证实的第三方访问,ShipSaving保留追究其法律责任的权利。

您可以通过ShipSaving要求未使用邮资的退款,但该退款的申请取决于对应的承运商的政策。如果承运商拒绝退款,ShipSaving将不负责退还任何邮费。ShipSaving可酌情退还除邮费外已付的任何费用。如果我们收到退款,我们将在收到退款的30天后退返给您。如果需要申请USPS的邮费退款,USPS规定必须在购买邮费或订单创建后的23个日历天内提交。任何其他邮费或费用退款要求必须在邮费或订单创建后30个日历日内提出。ShipSaving不负责任何海关费用、进口税、关税费用或任何其他类似在运输途中发生的费用。您认可并承担在完成订单之前或后这些可能会出现的附加费用。如果我们被有关当局收取任何因为您账号下的包裹造成此类费用,您将在我们被收取此费用后的30天内全额偿付我们。

取消订单

如果ShipSaving的用户希望取消在ShipSaving软件提供下购买的面单(运输标签),则用户必须在购买该面单的承运商下的指定时间内取消其订单。ShipSaving所合作的部分承运商分别的面单撤销时限为:i)USPS购买面单日期起的23天内。ii)UPS/FEDEX/DHL购买面单日期起的30天内。ShipSaving有权拒绝任何超过上述承运商规定的时间期限的面单作废请求。在上述承运商指定的时间期限外,ShipSaving不承担任何形式的退款或补偿所有订单作废。在上指定的时间期限外,ShipSaving概不负责和承担用户对任何财政或法律损失的索赔。


帐户服务及期限

ShipSaving保留因不当使用、延时付款或违反条款而暂停或终止您的帐户的权利。正常情况下,所有ShipSaving用户帐户拥有永久维护的服务,直到账户被终止。

  1. 如果ShipSaving用户想终止其帐户,则用户必须向billing@shipsaving.com提交请求以进行处理。我们将在申请用户帐上所有交易完结后的20个工作日内全部返还账户上的余额。终止账户的最终流程和所有有关账户的详细信息将在账户终止完成后发送到用户的电子邮件中。
  2. 如果ShipSaving用户想在不终止其帐户的情况下从其帐户中提取其余额,则必须向billing@shipsaving.com提交其请求以得到处理。余额提款请求批准后,用户将在20个工作日内收到全部余额。

账户取消/终止

所有访问者和ShipSaving的所有用户以及相关合作伙伴和公司中,只要是ShipSaving和您目前所在网站的用户,就同意当前的使用条款。无论是否有事先通知的情况下,我们有权在任何时候暂停甚至终止ShipSaving的服务。ShipSaving有权终止并关闭所有违反使用条款的用户帐户。您接受终止您的帐户可能遇到问题或丢失数据,但ShipSaving对您帐户的丢失、损坏或任何其他问题不承担任何责任。根据ShipSaving公司的使用条款,ShipSaving不承担任何责任。

付款方式

ShipSaving目前主要接受信用卡。ShipSaving可接受的付款方式也可能随时变换。当您使用我们的服务时,您必须提供正确的信息(例如,您在信用卡公司注册的地址和电话号码)。信息不正确可能导致服务建立延迟。所有您的信息,包括信用卡和/或银行账户信息,将按照ShipSaving的隐私政策进行处理。请注意,ShipSaving可能会从您的银行收到有关您的支付卡账户、借记卡账户或银行账户的更新。接受使用条款后,您在此同意我们收到这些更新。例如,ShipSaving可能会收到卡的更新到期日期或帐号信息。在注册帐户时,ShipSaving可能会核实您的信用卡是否可以有效支付您帐户相关的服务费。

通过您提供的信用卡详情并同意这些条款后,您授权我们从您的信用卡中扣除欠我们的任何款项的权利。如果您提供错误的包裹尺寸和/或重量,我们可能因此向您收取任何额外的费用,外加每箱10美元的行政费用。

我们将尽力确保我们所掌握有关您的任何付款信息的安全。同时确保我们的员工或有权访问这些信息的代理不会进行任何未经授权的使用、修改、复制或披露。我们可能聘请提供安全支付交易的第三方金融机构方便您网上支付。在这种情况下,我们将不会取得任何您的支付信息。

费用- ShipSaving的服务费和任何其他相关费用到期时(包括邮费或运费),ShipSaving保留自动从帐户持有人的信用卡扣款或直接从帐户持有人的银行帐户提款的权利。

您在此同意接受任何ShipSaving、ShipSaving的关联公司或合作伙伴提供的部分或全部服务的费用,包括收费方时不时的费用变更。

禁运和限运货物

ShipSaving不允许运输违禁和受限制的物品。严禁并会受到法律制裁的物品有:弹药、安全气囊、汽油、大麻、易爆物等。

上述物品严格禁止在美国境内以任何形式运输。ShipSaving不承担潜在用户无视此条款和运输违禁物品的责任。

在美国境内被限制运输的项目,同时也被ShipSaving所限制。这些物品可由相关部门妥善处理或销毁。ShipSaving不允许邮寄任何任何数量的气溶胶、酒精饮料、香烟和烟草、干冰、人类遗体或骨灰、枪支和武器、胶水、锂离子电池、活着的动物、处方药、火柴、药物、指甲油、油漆、香水、易腐物品、毒药,等等。

ShipSaving用户还必须遵守综合承运人(USPS/DHL/FEDEX/UPS)对违禁物品的规定。如果不遵守上述运输公司关于禁运和限制物品的规则和条例,ShipSaving不负责任何可能会导致罚金和法律上的惩罚。

ShipSaving不承担在美国境内或境外运输受限制物品的用户的责任。所有用户有义务接受ShipSaving的使用条款中明确规定特定物品禁止使用任何承运人运输的协议,包括某些限制在国内或境外运输的物品。

API条款

我们可以决定是否为您提供一个API(应用程序接口)。您可以通过访问ShipSaving的API取得您的ShipSaving账户数据。任何关于API的使用都受本协议的约。其中包括通过由第三方访问ShipSavin的API的使用。

我们不承担任何因您使用API或通过API访问数据的第三方产品而产生的直接、间接、附带、特殊、后果性或惩戒性损害赔偿的责任。其中包括但不限于对于利润、商誉、使用、数据或其他无形损失的损害赔偿(即使ShipSaving已被告知此类损害赔偿的可能性)。

滥用或过度频繁地通过API向ShipSaving提出请求可能会导致您的帐户暂时或永久暂停访问API。我们将自行判断您是否滥用或过度使用API,并将在暂停使用之前尝试向您(或非您的帐户持有人)发出警告。我们保留在任何时候修改或暂时或永久终止您对API(或其任何部分)访问的权利,无论事先通知与否。

责任限制

在任何情况下,ShipSaving公司、其员工和合作伙伴都不会对金钱损失、数据损失或任何其他可能的损失负责。ShipSaving的所有访问者和用户都已被告知这一点。在访问者和用户访问ShipSaving网站的时候就代表了他们接受使用条款,并同意所有条款。使用和访问ShipSaving完全是您的个人责任,您将自行承担风险。

根据本条款,您同意,在ShipSaving被发现对其网站、服务或软件的故障负责期间,ShipSaving将不承担任何与您运输费用无关的损害。

版权法案

ShipSaving尊重用户的实体产权和知识产权,同时要求您也给与同样的尊重。我们有权删除和上报任何违反使用条款的有问题的、被民事或当地法律禁止的链接、帖子、数据或类似的网络资源。如果您知道、怀疑或曾联系过违反ShipSaving使用条款或使用ShipSaving禁止的内容的用户,您同意并有义务通过ShipSaving的客户支持电子邮件或电话上报。在这些情况下,用户或访问者有义务提供以下所有内容。

您怀疑有害数据或实物的分发、张贴或合作的书面声明

一份书面声明,其中您提供有关问题的真实事实和诚实的主张。

请注意,所有虚假指控将导致您遭受被指控用户的层成本、费用和潜在损失。本公司对此不承担任何责任,并与双方均不存在任何关系。

ShipSaving使用条款的基本要点

您目前正在阅读的使用条款只有ShipSaving有权在任何特定时刻更改。一旦发生变化或平台做了任何修改,我们可以通过您提供的电子邮件地址通知您。所有用户都有义务为此和其他使用条款的要求提供一个精确、准确和最新的电子邮件地址。使用条款的更改、更新或修订将立即适用于所有新用户、访客并上传到ShipSaving网站。所有当前和注册用户将在更新后30天内得到适当通知。通知后,新的更新将立即发布。继续使用ShipSaving站点将默认您、用户或访问者接受站点的更新和更改。请您耐心阅读使用条款和任意协议的所有要点,以达到完全理解的水平。强制性的有约束力的仲裁和放弃诉讼都在问题的内容中提出。

非法或违禁使用条款

作为您使用这个网站的条件,您不会用ShipSaving网站做任何违法的行为或违反条款上或者您的信封/包裹被寄往的地方管辖区的法律和法规。您不得以任何可能损坏、禁用、超载或损害本网站或ShipSaving的方式使用本网站。您不可以有意或者无意试图获取任何材料或信息非发布与本站。ShipSaving保留为执行任何适用法律、法规、法律程序或政府要求而随时披露任何必要信息的权利。

仲裁协议

使用和应用

用户和ShipSaving公司之间无法通过非正式解决方案解决的所有争议将通过以下仲裁协议最终确定。所有细节、索赔和仲裁协议下的程序目前都以英语处理。如果出现其他可用语言,在您创建自己的账号之后ShipSaving会通过您提供的电子邮件地址的方式通知您。您正在阅读的仲裁协议适用于ShipSaving的所有访客和用户,以及涉及该公司的所有关系、合作伙伴和其他人员,以及两者之间的关系。

在进行任何争议或索赔之前,一方必须向另一方发出书面通知。对ShipSaving的正式索赔或争议必须通过网站上的联系表格发送。所有争议将在30个工作日内解决(旺季可能需要更长时间)。如果争议/索赔不能解决,双方可以立即启动仲裁程序。仲裁程序可以在最后一次非正式解决争议的尝试后30天内开始。

仲裁规则

以下仲裁协议涵盖的所有争议将提交给美国仲裁协会(简称AAA)。如果上述提供方无法考虑、接受或接受该争议,将选择另一种ADR。双方必须就新的ADR提供方达成一致,不得有任何形式的例外。美国仲裁协会可以在线查询,任何一方都可以使用在线表格随时联系AAA。

所有可能以10,000美元的总裁决解决的争议可以通过适用于参与过程的双方的非到场仲裁来完成。对于所有裁决金额在10,000美元以上的纠纷,美国仲裁协会将根据仲裁规则安排一方或双方的听证会。所有的听证会都安排在离该党住所100英里的范围内。如果您居住在美国以外或您同意ShipSaving公司的其他规定,则此规则不适用。ShipSaving有责任根据使用条款和任意协议拒绝您的争议。根据争议的复杂性,最高可判赔款为$ 10,000。用户或访客有法律义务支付费用和全部诉讼费用。美国仲裁协会也由每个用户支付而ShipSaving拒绝支付所有可能为此申诉的费用。

在双方同意或美国仲裁协会指定的情况下,可以选择不出席仲裁。在上述案例场景中,将通过网络、电话或书面方式获取纠纷并解决纠纷。除非双方指定,美国仲裁协会将不包括额外的证人或任何出席。适用于仲裁的时间限制由AAA规定。所有的截止日期和时限都是由AAA指定和申请的。

仲裁:权威

当仲裁被选择,一个仲裁员将指定所有责任和所有权利的用户和公司,ShipSaving。争议自行处理,不与其他争议或其他各方以任何可能的形式合并。被选定的仲裁员将有权对争议作出货币赔偿、非货币解决方案,并使用AAA条款和规则所规定的完整规则和法律清单。仲裁员拥有作为法庭法官的充分权利,他或她有权使裁决成为永久性和终局的。

陪审团或放弃审判条款和规定

如果双方无法找到争议的披露,他们同意根据他们的宪法和法定权利跳过法院。因此,该争议将按照仲裁协议来判定。选择该方案是出于以下原因。与使用法庭相比,这个方案更快、更经济,而且通常更省时。ShipSaving网站的用户或访问者放弃以陪审团为基础的法庭,并同意使用仲裁协议。如果仲裁协议无法找到解决方案,将选择一名法官,同样没有陪审团。所有的索赔和争议必须单独讨论、处理和解决。根据使用条款,您同意上述的所有提到的规定。所有纠纷不能与其他用户的索赔或纠纷合并,必须独立处理。

保密条款

所有索赔或争议点和任意协议都是严格保密的,不会以任何形式与第三方分享,使用法庭除外。根据法律,人们可以与官员分享私人和敏感信息。ShipSaving公司的使用条款不会阻止您与法庭和律师分享信息和细节。所有其他分享、提交或提供细节的行为都是被严格禁止的。在严重的情况下,当用户已经分享了细节时,ShipSaving有充分的权利拒绝使用法院或任意协议。如果任意协定的部分根据民法或宪法无效,这些部分将从协定中删除。每个用户都有完全的权利放弃任意协议的所有要点和章节,此行为不影响争议的最终结果。在您与ShipSaving公司的关系正式终止后,仲裁协议将继续使用。公司、ShipSaving或用户有权在小额索赔法院单独提起个人诉讼或依法提起诉讼。

紧急平等救济

根据任意协议,争端双方都有权要求紧急的公平救济。这项请求的唯一目的是维持现状,并可在联邦或州法院使用。此要求不会被视为一方对任何义务或权利的放弃。

无法仲裁的争议

所有计算机欺诈、数据伪造、滥用行为、侵犯版权、交易或任何使用对方专利的行为都不符合仲裁协议的条件。在上述情况下,双方同意寻求专业法律帮助,了解在当地法院解决该问题需要采取的具体行动。根据用户所在地和当地法律,ShipSaving可能有资格获得美国进出口法律和其他国家相同规则的仲裁。ShipSaving是一家面向全球用户的网络公司。

赔偿

您同意为ShipSaving、其高级管理人员、董事、雇员和代理辩护,使其免受损害,并向其赔偿因以下原因产生的所有索赔、损害赔偿、义务、损失、责任、成本或债务和费用(包括但不限于律师费和行政费用):(i)您对本网站、服务和软件的使用和访问;(ii)您违反本条款的任何条款;(iii)您违反了任何第三方权利,包括但不限于任何版权、财产或隐私权;或(iv)您的任何对第三方造成损害的索赔申诉。此抗辩和赔偿义务将在本条款和您使用本网站后继续存在


沟通

在发生争议或潜在争议时,ShipSaving和您双方必须使用适当的沟通方式。可用的沟通方式可以使是电话、电子邮件或信件。访问本网站并使用ShipSaving服务的用户同意:接受以通过公司的电子邮件和信件的形式接收通知;接受电子邮件和电话联系的方式得到关于申诉请求的官方通知;接受电子邮件、书面交流和电话沟通。ShipSaving有充分的权利使用上述任何形式的方式联系用户。如果正式的写作媒介无法到达用户,其他媒介将在特定的订单、电子邮件和电话中使用。

杂项

帐户访问——所有源自您的帐户的交易是您的责任。帐户持有人要承担产生的所有费用。

账户拖欠——如果试图充值的金额被撤销,ShipSaving有权将自动从用户的账户中扣除该特定金额。当帐户内的金额到达负数时,您的ShipSaving帐户在有足够的余额之前将被暂停或终止。如果您多次未能支付服务费用,或您的帐户余额为负,ShipSaving可自行决定终止您的帐户。在这种情况下,连同所有其他欠款,ShipSaving可能收取25美元的处理费。

授权——通过完成注册流程,您同意支付您所选择的服务计划条款下您的账户产生的所有费用。如果ShipSaving账户是为企业或其他实体设立的,则设立账户的人表示,他或她具有代表作为负责任账户持有人的企业或其他实体在ShipSaving开设账户的所有必要权限。

催收——各方同意,如果任何到期款项未能按时支付,受害方可以直接追讨过去的到期款项,或指派催收代理公司追讨过去的到期款项以及法律允许的任何利息或费用。

信用验证—ShipSaving保留对申请服务的所有人员或公司的证书进行验证的权利。

禁止未成年人——如果您未满18岁,您不可以注册服务。通过注册您向ShipSaving代表您已年满18岁。 

订单接受/拒绝——ShipSaving保留在收到产品或服务订单后的任何时间以任何理由接受或拒绝订单的权利。

搬迁——您同意在搬迁或其他变更时向ShipSaving提供更新有效的地址和注册信息。

损失风险——ShipSaving不负责任何损失风险。请参阅承运人的政策以获得更多信息。

服务变更——ShipSaving保留在任何时候定期或临时或永久地自行决定修改或停止其服务的任何功能和特征的权利,但法律另有禁止的除外。ShipSaving保留自行决定向每个客户提供第三方合作伙伴的选定产品的权利,不保证或表示将通过ShipSaving的服务提供每个合作伙伴的完整服务。ShipSaving可酌情为任何选定的服务提供替代服务。

可分割性

如果本条款的任何条款被认为无效或不可执行,该条款将被视为根据适用法律尽可能地反映原始意图的重述,而本条款的其余部分将保持完全有效。本条款构成双方就本协议标的物达成的完整协议,并取代和取代所有先前或同时就该标的物达成的书面或口头谅解或协议。只有以书面形式并经ShipSaving签署后的条款才可以有效放弃。未能执行本条款下的任何权利不应视为放弃该条款或在以后的时间执行该条款的权利。

网站错误

尽管我们尽合理努力提供准确的价格信息和产品说明,但有关产品可用性的错误可能会发生。我们保留对任何与运输费用无关的损害负责的权利。

第三方条款和条件

您有责任遵守通过本网站访问的所有运营商和合作伙伴的条款和条件。请访问每个网站以获取和审查其条款和条件。通过ShipSaving平台使用承运人服务的风险由您自行承担。ShipSaving对您使用承运商服务不承担任何责任。您使用的承运商服务是和他们的直接客户关系。您同意遵守承运商的条款和条件使用的服务,包括任何有关的费用的支付和承运商打开、检查和评估您的包裹寄出前和收到后的权利。

违反法律

ShipSaving服务不得违反任何法律或以任何方式不当干涉他人使用该服务。

最终条款

这些条款是ShipSaving公司的私有财产,因此可以在公司的官方网站上使用。如果发现任何可能未能涵盖某一事实点的情况,用户无权利用缺乏数据放弃订单或索赔。所有用户都是ShipSaving的独立承包商,彼此之间不是合作伙伴。未经ShipSaving的书面完全同意,不得将使用条款共享、使用、复制或发送给其他方。我们有充分的权利在任何时候分享和更改使用条款而无需事先通知。在这里加载的使用条款中出现的所有标识、章节、图片和其他标记都是ShipSaving的财产,因此禁止在其他网站和其他用户共享和使用。唯一的例外是ShipSaving的书面同意必须包含在我们的财产的副本中。


AGREEMENT BETWEEN USERS AND SHIPSAVING.COM
ShipSaving.com reserves the right, in its sole discretion, to change the Terms and Privacy Policy under which ShipSaving.com is offered. The most current version of the will supersede all previous versions. ShipSaving.com encourages you to periodically review all information to stay up to date.

PRIVACY POLICY
Users of ShipSaving.com are subjected to ShipSaving.com’s Privacy Policy which includes our data collection practices. ShipSaving.com reserves the right to change their Privacy Policy at all times. All modifications, edits, deletes and additions are effective immediately. Please read the Privacy Policy carefully and periodically review to stay up to date. Your continuous use of ShipSaving.com after updates to Privacy Policy means that you agreed to be bound by the modified and updated . As permitted by applicable law and regulations, we will retain your information as long as necessary to serve and maintain your account for as long as your account is active, or as otherwise needed to operate our business.

PERSONAL INFORMATION COLLECTED
In order to access the features provided by ShipSaving.com, it is necessary for Users to provide us with Personal Information. It is the User’s voluntary decision whether or not to provide the request information to use ShipSaving.com. If no information or data is provided then use of ShipSaving.com would be severely limited as a result. ShipSaving.com collects personal information such as name, address, telephone numbers, email addresses, shipping information and payment details as part of your registration and use of ShipSaving.com’s products and services.

NON-PERSONAL INFORMATION COLLECTED
ShipSaving.com may collect information on User based on use of ShipSaving.com. ShipSaving.com may store “cookies” in your computer to better serve you. Cookies can gather non-personal information such as the internet site that you have previously visited before ShipSaving.com, the website you visited after ShipSaving.com, the browser you are viewing ShipSaving.com from your IP address, location tracking and more. The purpose is to improve the quality of ShipSaving.com and increase ShipSaving.com’s marketing initiatives. You may limit the usage of cookies from your browser settings.

HOW INFORMATION IS SHARED
We will not use your Personal and Non-Personal Information for any reason beyond the legitimate business purposes defined by the law. ShipSaving.com reserves the right to share your information to guarantee the fulfillment of ShipSaving.com’s services which can include third-party companies that work with us to provide our Services such as couriers, insurance companies, and payment providers. ShipSaving.com uses the collected personal and non-personal information for reasons such as but not limited to: 1. Allow Users to register as members of ShipSaving.com 2. Contact User about products and services offered by ShipSaving.com and ShipSaving.com’s partners. 3. Contact User pertaining to administrative notices and updates relevant to accounts/services maintained with ShipSaving.com. 4. Follow up on service calls, questions, requests and complaints submitted by User. 5. Provide Tracking and Shipping Services to Users. Allows User to operate and use ShipSaving.com. 6. To gather and analyze data in respect to the use of ShipSaving.com and for ShipSaving.com’s internal use. 7. Solve disputes, troubleshoot problems, and enforce any agreements with ShipSaving.com including and not limited to ShipSaving.com’s Terms of Use and Privacy Policy. 8. Share information with ShipSaving.com’s partner in the event that a partner of ShipSaving.com is investigating or enforcing a violation of its policies, procedures, terms of agreement. ShipSaving.com will share information with ShipSaving.com’s partner to conduct in its investigation of a possible problem, issue or concern. 9. In the event that all or part of ShipSaving.com becomes part of a sale, merger or transfer, ShipSaving.com reserves the right to transfer any and all information that it collects to third parties. 10. In the event of a court order or cooperate with a law enforcement investigation, ShipSaving.com will disclose all requested information and reserve the right to report to law enforcement any activities that ShipSaving.com suspects to be unlawful.

THIRD PARTY PRIVACY POLICIES AND DATA COLLECTION
ShipSaving.com’s Terms and Privacy Policy only addresses the collection, use and disclosure of information by ShipSaving.com and does not cover third party practices. ShipSaving.com is not responsible for the policies or practices of any third party.

OTHERS TERMS AND USAGE AGREEMENTS
Account Information: Information provided during registration becomes part of ShipSaving.com’s business records. ShipSaving.com may retain past information as part of our business records. Minors: This website is directed to adults and not for children under 13. ShipSaving.com does not knowingly collect or use personally identifiable information from anyone under the age of 13. Children under 18 may use ShipSaving.com with guardian or parent permission. If you have any questions about this Privacy Policy, please contact ShipSaving.com.

ELECTRONIC COMMUNICATIONS
User consent to receive electronic communications and user agree that all agreements, notices, disclosures and other communications that we provide to you electronically, via email and on the Site, satisfy any legal requirement that such communications be in writing upon visiting ShipSaving.com

ACCOUNT SECURITY
ShipSaving.com follows industry standards to protect the personal information and data submitted by Users to the Website. However, no method of security is 100% secure. User is responsible for maintaining the confidentiality of User’s account or password and accepting responsibility for all activities that occur under User’s account or password. User acknowledges that ShipSaving.com is not responsible for third party access to accounts that results from theft or misappropriation of User’s account. ShipSaving.com and its associates reserve the right to refuse or cancel service, terminate accounts, or remove or edit content at our sole discretion.

CANCELLATION/REFUND POLICY
You may close your account at any time, upon the fact that your account has no pending or negative balance. When you terminate or stop using your account, we may continue to communicate with you about our services, updates, and products. We may also continue to use some of your information for business purposes and to improve our business. We will retain and use your information as required by applicable law. ShipSaving.com’s information management policies will comply with legal and reporting obligations, resolve disputes, and enforce our agreements.

LINKS TO THIRD PARTY SITES/THIRD PARTY SERVICES
ShipSaving.com may contain links to other websites ("Linked Sites"). The Linked Sites are not under the control of ShipSaving.com and ShipSaving.com is not responsible for the contents, links, terms of usage or services of any Linked Site. Certain services made available via ShipSaving.com are delivered by third party sites and organizations. By using any product, service or functionality originating from the ShipSaving.com domain, you hereby acknowledge and consent that ShipSaving.com may share such information and data with any third party with whom ShipSaving.com has a business relationship to provide the requested service on behalf of ShipSaving.com users and customers. By using any services or functionality of ShipSaving.com, you hereby acknowledge and comply with terms and conditions from any other third Party Businesses/Services/Websites/Companies/Organizations, including but not limited to: FedEx,UPS,USPS,eBay and Amazon.

INTERNATIONAL USERS
The Service is controlled, operated and administered by ShipSaving.com from our offices within the USA. If you access ShipSaving.com outside the USA, you are responsible for compliance with all local laws. You agree that you will not use the ShipSaving.com in any country or in any manner prohibited by any applicable laws, restrictions or regulations.

INDEMNIFICATION
You agree to indemnify, defend and hold harmless ShipSaving.com, its officers, directors, employees, agents and third parties, for any losses, costs, liabilities and expenses (including reasonable attorneys' fees) relating to or arising out of your use of or inability to use the Site or services. Any actions committed by User in violation of any terms of this ShipSaving.com’s, terms of a third party, any applicable laws, rules or regulations will result in ShipSaving.com the right, at its own cost, to assume the exclusive defense and control of any matter otherwise subject to indemnification by you, in which event you will fully cooperate with ShipSaving.com in asserting any available defenses.

THIRD PARTY ACCOUNTS
In the event that You will be able to connect your ShipSaving.com account using a third party accounts, you acknowledge and agree that you are consenting to the continuous release of information about you to others (in accordance with your privacy settings on those third party sites). If you do not want information about you to be shared in this manner, do not connect your ShipSaving.com account using a third-party account.
LIABILITY DISCLAIMERThe information, software, products, and services included in or available through the site may include inaccuracies or typographical errors. Changes are periodically added to the information herein. ShipSaving.com and associates may make improvements and/or changes in the site at any time. ShipSaving.com and it’s partners make no representations about the reliability, usefulness, accuracy of the information, services, software and graphics contained on this site for any purpose. To the maximum extent permitted by applicable law, ShipSaving.com operates “as is” without warranty or condition of any kind for ShipSaving.com’s contents. This “as is” without warranty extends to all implied warranties or conditions of merchantability, fitness for a particular purpose, title and non-infringement. To the maximum extent permitted by applicable law, in no event shall ShipSaving.com and it’s partners be liable for any direct, indirect, punitive, incidental, special, consequential damages or any damages whatsoever including, without limitation, for loss of use, data or profits, arising out of or in any way connected with the use or performance of the site, with the delay or inability to use the site or related services, the provision of or failure to provide services, or for any information, software, services and contents obtained through the site, or otherwise arising out of the use of the site, whether based on contract, tort, negligence, strict liability or otherwise, even if ShipSaving.com and it’s partners has been advised of the possibility of damages. If you are dissatisfied with ShipSaving.com in any way, please discontinue using the site.

TERMINATION/ACCESS RESTRICTION
ShipSaving.com reserves the right, in its sole discretion, to terminate your access to the Site and the related services without notice. You are not allowed to ship items that are prohibited by Carriers or by law or regulation of any federal, state or local government in the origin or destination countries. To the maximum extent permitted by law, this agreement is governed by the laws of the State of California and you hereby consent to the exclusive jurisdiction and venue of courts in California in all disputes arising out of or relating to the use of the Site. Use of the Site is unauthorized in any jurisdiction that does not give effect to all provisions of these Terms, including, without limitation, this section. Usage of ShipSaving.com does not have a partnership or employment relationship between ShipSaving.com and User. ShipSaving.com is subject to existing laws and is in compliance with governmental, court and law enforcement requests relating to the Site and information by ShipSaving.com in respect to legal use. If any part of these Terms and Privacy Policy is determined to be invalid then the invalid provision will be deemed superseded by a valid, enforceable provision that most closely matches the intent of the original provision and the rest of the Terms and Privacy Policy shall continue in effect. Unless otherwise specified herein, this Terms and Privacy Policy constitutes the entire agreement between the user and ShipSaving.com and it voids all prior communications and agreements between the user and ShipSaving.com. These Terms and Privacy Policy and any additional Terms and Privacy Policies in English shall be admissible in judicial or administrative proceedings based upon or relating to this agreement to the same extent and subject to the same conditions as other business documents and records originally generated and maintained in printed form.








DATA SECURITY
ShipSaving works diligently to ensure the confidentiality, integrity, and availability of your data.

· Encryption in transit protects the confidentiality, integrity, and authenticity of your data. As an industry best-practice, we use HTTPS to encrypt customer data sent and received by our servers. This includes, but is not limited to, all data transmitted over the RESTful JSON API that communicates with our backend microservice architecture. This protects your information from tampering and unauthorized disclosure. We also implement AES-GCM (an authenticated encryption algorithm based on a pre-shared key) to protect both the confidentiality and integrity of data transmissions.

· Database access controls restrict access to authorized users and IP addresses. Developers undergo strict account management. Auditing and robust log records provide relevant insights to personnel who regularly review database access for signs of malicious operation. Database passwords must adhere to internal standards for complexity. Database contents are encrypted both at rest and in transit.

· Field-level encryption with the AES-GCM algorithm protects sensitive database entries from unauthorized tampering or disclosure. When the application writes data to the database, sensitive fields are encrypted with an additional key. When the contents of an encrypted database field are retrieved, the results cannot be deciphered without the respective key. This second line of defense significantly reduces the potential impact of leaked data. Our software developers and database administrators (DBAs) operate by default on encrypted fields. Access to the original contents of encrypted fields is granted to staff only on a "need-to-know" basis.

· Data desensitization protects sensitive customer data such as phone numbers, email addresses, and payment card information. Predefined rules tokenize, hide, or mask this data. For extremely sensitive data such as payment card information, we only persist a subset of the original, significantly increasing customer safety.

ACCESS CONTROL
Role-based access control (RBAC) assigns functional and data permissions to designated roles, and one or more roles to individual user accounts. A "super administrator," for instance, not only possesses global access to all actions and data, but will also typically customize other roles as needed and assign them to users. Our system administrators apply specific role assignments to customers. This ensures that customers possess functional authority and data authority over only their own data. Malicious actions may attempt to tamper with input parameters to conceal executable commands or cross trust boundaries. This can lead to the unauthorized acquisition of server permissions and the unauthorized disclosure of customer data. The system addresses these concerns as follows:

· Cross-site scripting (XSS) occurs when untrusted JavaScript or other scripting code is supplied from one source and rendered in an unexpected location, such as another user's browsing session. An XSS attack can tamper with or expose data, opening up customer accounts to compromise and endangering their normal operation. To prevent this class of attack, the system is designed to refuse unsafe inbound content. The system will check, filter, and escape any customer input with whitelists of trusted character sets and HTML tags. As an additional layer of defense, the system will filter and/or sanitize output before rendering HTML content to users.

· Buffer overflows occur when a system receives input of a length that overflows the memory area designated for its storage. A malicious user who succeeds at this attack may tamper with or expose data, or possibly gain system root access. To avoid receiving data that exceeds system capacity, we treat external data as untrusted input and perform boundary checks before committing to our systems.

· Cross-site request forgery (CSRF) can occur when an attacker causes a victim's browser to automatically submit a request. This attack is similar to, but different from, a cross-site scripting (XSS) attack. In the case of CSRF, the attacker crafts a malicious request directed at a particular website. If the customer has an active browsing session on that website, the request can be executed to create, read, update, or delete data as the customer themselves. This is equivalent to the attacker logging in with the customer's own credentials to carry out harmful actions within the scope of the customer's authority. To prevent CSRF attacks and protect customer accounts, the system validates CSRF tokens, HTTP referer headers, and CAPTCHA responses.

· Path traversal can occur when query parameters and server paths are not properly sanitized or validated before use in accessing a server-side file system location. An attacker may supply a string with directory navigation operators, possibly escaped (e.g., "../" or "%2E%2E%2F"), to gain unauthorized access to information systems. To prevent this, all customer input is validated and/or escaped after transmission.

· A web shell is a type of remote access trojan (RAT) that exploits a script upload vulnerability to create a command execution environment. An attacker will often use this shell environment through a web browser. This can lead to a series of hazards such as unauthorized information disclosure and tampering. To avoid receiving a web shell, we strictly limit and verify uploaded files. Customers may upload only static files and the system does not trust original filenames. In addition to restricting the upload of malicious code files, the system restricts the execution permissions of related directories.

· Unexpected data disclosure may occur when access logs record sensitive query parameters. To prevent this, the HTTP GET method is not used to transmit sensitive data into the system. When sensitive data must be transmitted into the system, the HTTP POST method is used, and sensitive data placed in the body of the request. The HTTP GET method may be used to transmit non-sensitive data to the system, and to retrieve both sensitive and non-sensitive data from the system.

LOGIN SECURITY
Customer password security promotes not only the security of customer information on our platform but also the stability of the system as a whole. Some customers may use the same password on multiple platforms; once this password is cracked, the risk of data leakage exists on any other platforms with which it is shared. We mitigate the potential for damage as follows:

· The system assigns an authentication token to customers at login. This token accompanies the customer throughout their session and grants the ability to access assigned functions and data. The system reduces the potential for unauthorized disclosure or tampering by requiring a valid token with requests for privileged functions and data.

· User authentication checks occur with every request. We encourage customers to log out manually when they are finished with the system. As a protection against abandoned sessions, if authentication credentials expire or the authentication process fails, the customer will be required to log in again to minimize the potential for data leakage.

· Cookies are protected from unauthorized disclosure and tampering with the HttpOnly and Secure attributes. The HttpOnly flag prevents customer information in cookies from being read by malicious JavaScript files. The Secure flag ensures that a client browser will submit the cookie only with HTTPS requests.

· The AES-GCM encryption algorithm promotes authenticity in the system with authentication codes and authenticated encryption with associated data (AEAD). If system decryption functions note authenticity issues during the decryption process, an exception will be thrown to prevent further processing of corrupted or tampered customer data.

· Customer password length and complexity requirements mitigate the likelihood of brute-force password cracking. We guarantee that customer passwords are not stored in plaintext. Customer passwords are salted and hashed on the frontend with a slow hash operation. Sensitive data, including authentication credentials, will be transmitted to the backend only over a connection encrypted with HTTPS.

· Two-factor verification validates customer ownership of email addresses used for website authentication. When we detect a customer account at risk of misappropriation, the affected customer must correctly supply both their password and a one-time code that the system will send to their email address. CAPTCHA affords an additional layer of protection for this process.

AUDIT LOGS
We are continuously strengthening our product security controls to ensure the maximum confidentiality, integrity, and availability of customer accounts and data.

The vast majority of customer operations trigger the creation of audit logs. This provides customers the ability to trace events when necessary. We provide operation logs for each event that include a timestamp, customer ID, the object being operated on, and the contents of the operation. To facilitate unified management, system administrators have the ability to view the operation logs of all customers.

· We record operations performed by customers on their own data. If an operation involves sensitive data, such as password or payment card information, metadata attached to log entries will be encrypted to minimize the potential for data leakage.
· Customer requests for data will be approved or denied based upon credentials and additional security considerations. The results of these decisions will be recorded.
· Multiple customer user accounts may collaborate as a team. In these cases, a team administrator may be designated as an approver for purchase orders placed by other team members. For example, a warehouse manager who wishes to create a purchase order will submit an application to their administrator for approval. The administrator can then choose to deny or approve the application. If the application is approved, the purchase order will be created. The system records these decisions with per-application granularity.
· Potentially risky operations trigger alarms to be handled by dedicated personnel.
· Logs are retained for 180 days.

Developers are subject to sound auditing and log management. We mitigate the potential for developer credential misuse by logging the following events:
· Login and logout timestamps;
· Database and server access attempts;
· Data, file, and network access attempts;
· Changes to customer data, such as deletion or modification of sensitive info;
· Exceptions or other signs of abnormal activity, which may trigger alarms.

SERVER SECURITY
Firewalls and network security policies deny or redirect data flow to reduce the efficacy of malicious network-based attacks. Security rules are optimized to establish a proper security perimeter for system components.

Network Access Control (NAC) restricts server access to authorized developers, originating from whitelisted IP addresses, who comply with pertinent security policies.

When network bandwidth becomes saturated it can exhaust server processing capacity, preventing legitimate users from being able to access resources. A distributed denial-of-service (DDoS) is one sort of malicious attack that can produce this result. To address this risk, we:
· Limit the frequency of requests from individual IP addresses;
· Apply load-balancing to shunt traffic toward available servers;
· Disable ICMP on security devices such as firewalls;
· Deny or redirect abnormal traffic with a hardware firewall that mitigates the potential for DDoS with rule-based packet-filtering, deep packet introspection (DPI), and Web Application Firewall (WAF) filtering based on request contents and disposition;
· Apply ISP near-source cleaning and operator traffic suppression to minimize the potential for incidents that could adversely affect service availability to customers;
· Strictly limit, at the application layer, the number of connections and CPU usage time from individual IP addresses;
· Reduce unnecessary dynamic database queries.

A competent patch management process regularly reviews and addresses operating system vulnerabilities. Timely application of patches minimizes the potential for malicious attacks.

Unnecessary service ports are closed as part of the system hardening process.

Audit logs record every server operation. Designated security personnel regularly review these logs and respond immediately when an incident is noted.

PAYMENT SECURITY
To protect customer financial information, we do not store data from payment cards.A third-party vendor, Stripe, acts as our payment processor. Please refer to Stripe for more information on their security policies and procedures.

DEVELOPER SECURITY
Developers regularly undergo training to improve security and privacy awareness.The use of external storage media (USB disks, portable hard drives, thumb drives, etc.) is prohibited on company computers.The use of unsecured public cloud applications, including file synchronization tools such as Dropbox and Google Drive, is also prohibited on company computers.

DATA BACKUPS
Our customers fulfill orders with the aid of transactional and other data ("Platform Data") synchronized into our system from third-party e-commerce platforms ("Marketplaces"). To ensure the availability of Platform Data when it is needed, we perform regular backups. Each Marketplace imposes its own policies on the use, protection, and retention of Platform Data.

ShipSaving treats Platform Data, and backups thereof, in strict accordance with the requirements of each Marketplace. We do not maintain Platform Data beyond the retention periods mandated by Marketplaces. We do not sell, share, or otherwise disclose customer data in any manner that would violate our agreements with Marketplaces.

Backup frequency
· Full database backups occur weekly at 23:59 on Sunday.
· Incremental database backups occur daily at 03:00, 09:00, 15:00, and 21:00.

Backup plan
· The database currently utilizes master-slave synchronization to promote data redundancy. Binary logging on the slave database is enabled for off-site backup.
· Future plans include database read-write separation ("master write, slave read") to promote scalability and high-availability. This master-slave synchronization architecture, with backups in accordance with the original backup scheme, may entail a split into separate databases and additional tables to further improve the ShipSaving recovery time objective (RTO) and recovery point objective (RPO) metrics.

SECURITY INCIDENT RESPONSE PLAN(SIRP)
We maintain a security incident response plan (SIRP) and we review and verify this plan every six months and after any major infrastructure or system change. When our backend engineering managers investigate security incidents, or when automation mechanisms trigger an alarm.

· We identify the type and extent of any associated events.
· We disconnect any relevant systems from the network.
· We gather evidence. System logs may be viewed without shutting down associated servers, which promotes forensic analysis of potential evidence in memory, if required.
· In the event that a breach may affect passwords, we will lock down sensitive information and rotate any relevant passwords.
· The impact of a data breach will be assessed based upon logs and other available evidence. Once a root cause analysis is performed, remedial measures will be taken. These may include, but are not limited to, cryptographic erasure of affected systems, patching of relevant software or operating systems, reconfiguration of firewalls, isolation of subnets, malware scanning, and recalibration of automated alarm thresholds.