Privacy Policy  
  Updates to Our Privacy Policy (2018.5.24)

The new European General Data Protection Regulation (GDPR) goes into effect on May 25, 2018. We would like to inform you that we take your personal data seriously and we are taking all the necessary actions to be compliant with this GDPR regulation.

under this constenmatnces, we have updated our Privacy Policy.

This updated Privacy Policy automatically come into effect for all Software and services users from May 25, 2018. If you continue to use our software or service, you are agreeing to the changes to these policies.

 If you do not agree with the updates to our Privacy Policy, please stop using our software or cloud service, and you have to uninstall our software from your computer and deactivate your cloud service acount before May 25, 2018.
Privacy Policy:

Softnexx and Starcom2000 software take your privacy seriously. By using our software or our cloud Service, you agree to the content described in this Privacy Policy (this "Policy").

What Does This Policy Cover?

This Policy covers how we treats personal information that we collects and receives, including via , all related websites , our software which is installed on your personal PCs and cloud services , and information about you that is personally identifiable - such as your name, address, email address, phone number, IP address and device ID.

Information You Provide

When you install our software, visiting our website or using our cloud service, there are information should be submitted to us in order to continue using our service. if you want to use our online shopping website, you will need to supply your name, address, email address, phone be able to let the sellers to contact with you and ship the products to you; if you use our software to manage your company's daily business transactions, after the installation ,you will need to activate your software license key, the moment when your activation succeed, your device ID will be submitted to us in order to identify if the software is a legal installation; if you use our cloud service, the moment when the cloud service is activated, your IP address in this location and the device ID will be submitted to us in order to let the cloud service to connect the correct sites.

"Cookies" Information

When you use our websites, we use cookies , a cooke is small text files containing a string of alphanumeric characters. We use both session cookies and persistent cookies. A session cookie will disappear after you close your browser. A persistent cookie will remain after you close your browser and may be used by your browser for later usage. You can change your cookie settings from your browser, Please note that if you choose not to accept the cookie from our website, the website service may not continue.

How Do We Use the Information We Collect?

We use the information we collect in different ways in providing the Service , including the following:

◦if you want to use our online shopping website, you will have to supply your name, address, email address, phone be able to let the sellers to contact with you and ship the products to you, as an end user, please be noted,we have differnt companies to use our web shopping service with their own domain, so the domain owner has the right to access all the information you supplied to the web domain.

◦if you use our software to manage your company's daily business transactions, after the installation ,you will need to activate your software license key, the moment when your activation succeed, your device ID will be submitted to us in order to identify if the software is a legal installation; for our software users, if you collect personal information from your clients, you will have your own Privacy Policy with your own customers.

◦if you use our cloud service, the moment when the cloud service is activated, your IP address in this location and the device ID will be submitted to us in order to let the cloud service to connect the correct sites.

About sharing Or disclosing Information

we will not disclose your information to third parties without notifying you. We may disclose information to third parties if you let us to do so or in the following circumstances:

◦ We may disclose your information if required to do so by law that such action is necessary to comply with state laws.
◦ We may transfer your information to third party if our company is sold to or merge with other company.

Your Choices ---------------------
You have the right to inform us to delete your personl data , To exercise that right, you may contact us at, Please note, If we change or delete your personal data or if you decline to share certain personal data with us, we may not be able to provide to you the Service or some of the features and functionality of the Service, it may cause the following consequences.

◦ for users who using our software, you will have to stop using our software and uninstall from your computer, or you will have to need to reactivate the software.

◦ for users who are using online shopping website, you may not be able to login to the shopping site again.

◦ for users who are using our cloud service, you may not be able to connect any sites of your company.

Please be noted,if any of the above happens to cause the termination of our service, there will be no refund from us.

Confidentiality And Security
We cannot, however, ensure or warrant the security of any information you supplied us, and you do so at your own risk. We also cannot guarantee that such information may not be accessed, disclosed, altered in any cases. If we learn of a security issue, then we may attempt to notify you so that you can take appropriate protective steps. We may also post a notice through the Service if a security issue occurs.

Cookie Policy



What are cookies in computers?


Also known as browser cookies or tracking cookies, cookies are small, often encrypted text files, located in browser directories. They are used by web developers to help users navigate their websites efficiently and perform certain functions. Due to their core role of enhancing/enabling usability or site processes, disabling cookies may prevent users from using certain websites.


Cookies are created when a user's browser loads a particular website. The website sends information to the browser which then creates a text file. Every time the user goes back to the same website, the browser retrieves and sends this file to the website's server. Computer Cookies are created not just by the website the user is browsing but also by other websites that run ads, widgets, or other elements on the page being loaded. These cookies regulate how the ads appear or how the widgets and other elements function on the page.For Managing cookies for different browsers see here


Standard uses for browser cookies


Website servers set cookies to help authenticate the user if the user logs in to a secure area of the website. Login information is stored in a cookie so the user can enter and leave the website without having to re-enter the same authentication information over and over.More information


Session Cookies are also used by the server to store information about user page activities so users can easily pick up where they left off on the server's pages. By default, web pages really don't have any 'memory'. Cookies tell the server what pages to show the user so the user doesn't have to remember or start navigating the site all over again. Cookies act as a sort of “bookmark” within the site. Similarly, cookies can store ordering information needed to make shopping carts work instead of forcing the user to remember all the items the user put in the shopping cart.


Persistent or tracking Cookies are also employed to store user preferences. Many websites allow the user to customize how information is presented through site layouts or themes. These changes make the site easier to navigate and/or lets user leave a part of the user's “personality” at the site. For Information on session and persistent and tracking cookies, see here


Cookie security and privacy issues


Cookies are NOT viruses. Cookies use a plain text format. They are not compiled pieces of code so they cannot be executed nor are they self-executing. Accordingly, they cannot make copies of themselves and spread to other networks to execute and replicate again. Since they cannot perform these functions, they fall outside the standard virus definition.


Cookies CAN be used for malicious purposes though. Since they store information about a user's browsing preferences and history, both on a specific site and browsing among several sites, cookies can be used to act as a form of spyware. Many anti-spyware products are well aware of this problem and routinely flag cookies as candidates for deletion after standard virus and/or spyware scans.See here for some privacy issues and concerns.


The way responsible and ethical web developers deal with privacy issues caused by cookie tracking is by including clear descriptions of how cookies are deployed on their site. If you are a web developer and need advice on implementation of cookies and a privacy policy, we suggest you contact marketing specialists who offer search engine optimisation services. These privacy policies should explain what kind of information is collected and how the information is used. Organizations using the cookies initiative started by IAB Europe include: InviteMedia : andAntor


Most browsers have built in privacy settings that provide differing levels of cookie acceptance, expiration time, and disposal after a user has visited a particular site. Backing up your computer can give you the peace of mind that your files are safe.


Other cookie-based threats


Since identity protection is highly valued and is every internet users right , it pays to be aware of what threat cookies can pose.


As cookies are transmitted back and forth between a browser and website, if an attacker or unauthorized person gets in between the data transmission, the sensitive cookie information can be intercepted. Although relatively rare, this can happen if the browser is connecting to the server using an unencrypted network like an non-secured WiFi channel.Internet security is only attainable if you regualrly use a anti-virus protection programme.See our anti virus protection section.


Other cookie-based attacks involve exploiting faulty cookie-setting systems on servers. If a website doesn't require browsers to use encrypted channels only, attackers can use this vulnerability to trick browsers into sending sensitive information over insecure channels. The attackers then siphon off the sensitive data for unauthorized access purposes.


New Laws for the use of cookies and other technologies that store online user information.


On May 26th 2011, new rules governing the use of cookies by websites comes into force in Europe.


Rather than the "Opt out" option for website visitors, websites will need to specifically gain the consent of their visitor and they must "Opt In" to be able to store cookies on their computer or other devices.This is expected to be difficult to manage and enforcement will more than likely be done subtlely and with encouragement rather than with the threat of fines and penaltys.


What does the new law say?

The new requirement is essentially that cookies can only be placed

on machines where the user or subscriber has given their consent.

6 (1) Subject to paragraph (4), a person shall not store or gain

access to information stored, in the terminal equipment of a subscriber

or user unless the requirements of paragraph (2) are met.

(2) The requirements are that the subscriber or user of that terminal


(a) is provided with clear and comprehensive information about the

purposes of the storage of, or access to, that information; and

(b) has given his or her consent.

(3) Where an electronic communications network is used by the

same person to store or access information in the terminal equipment

of a subscriber or user on more than one occasion, it is sufficient for the purposes of this regulation that the requirements of paragraph (2)

are met in respect of the initial use.

“(3A) For the purposes of paragraph (2), consent may be signified by a

subscriber who amends or sets controls on the internet browser which

the subscriber uses or by using another application or programme to

signify consent.

(4) Paragraph (1) shall not apply to the technical storage of, or

access to, information--

(a) for the sole purpose of carrying out the transmission of a

communication over an electronic communications network; or

(b) where such storage or access is strictly necessary for the

provision of an information society service requested by the subscriber

or user.


Key tips for safe and responsible cookie-based Web browsing


Due to their flexibility and the fact that many of the largest and most-visited websites use cookies by default, cookies are almost unavoidable. Disabling cookies will lock a user out of many of the most widely-used sites on the Internet like Youtube, Gmail, Yahoo mail, and others. Even search settings require cookies for language settings. Here are some tips you can use to ensure worry-free cookie-based browsing:


Customize your browser's cookie settings to reflect your comfort level with cookie security or use the cookie cleaner included in Abine's free Privacy Suite.


If you are very comfortable with cookies and you are the only person using your computer, you may want to set long expiration time frames for storing your personal access information and browsing history.


If you share access on your computer, you may want to set your browser to clear private browsing data every time you close your browser. While not as secure as rejecting cookies outright, this option lets you access cookie-based websites while deleting any sensitive information after your browsing session.


Install and keep antispyware applications updated


Many spyware detection, cleanup applications, and spyware removers include attack site detection. They block your browser from accessing websites designed to exploit browser vulnerabilities or download malicious software.


Make sure your browser is updated


If you haven't already, set your browser to update automatically. This eliminates security vulnerabilities caused by outdated browsers. Many cookie-based exploits are based on exploiting older browsers' security shortcomings.


Cookies are everywhere and can't really be avoided if you wish to enjoy the biggest and best websites out there. With a clear understanding of how they operate and how they help your browsing experience, you can take the necessary security measures to ensure that you browse the Net confidently.