About Zipto

ZIPTO provides a fast, safe and convenient one-stop logistics and warehousing solution for cross-border e-commerce business and international exporters.
  • Zipto, a us leading solution provider, provides one-stop localization service for cross-border e-commerce. We fully satisfy demands with innovative service for different cross-border businesses, not limited to cross-border e-commerce, traditional foreign traders, and OEM factories. Founded in 2015, we have established institutions and warehouses in China, the United States, Germany, France and other countries or regions. Zipto has the most complete end-to end service lines and convergence solutions for cross-border e-commerce.

  • We empower you to run your e-commerce with full-link logistics, warehousing, customs clearance, distribution, professional international business, tax, legal, insurance, supply chain finance, marketing, reverse logistics service, and etc.. Our service is innovative, comprehensive and customized for different industry and distinctive requirements. In the course of many years development, we do mind the fundamental needs for e-commerce and master a number of advanced technologies with independent intellectual property rights, including warehousing management, logistics tracking, and intellectual property monitoring areas.

  • In the previous development, we have rapidly expanded our commercial map by more than 500% per year, and has more than 100,000,000 feet of modern warehousing and logistics facilities worldwide. At the same time new, South America warehouse, European warehouse, and Southeast Asia warehouse are also expanding. We are achieving our vision to globalization now.

  • **Privacy Policy for PACIFIC ASIANA LLC (DBA ZIPTO)**

    **01/01/2021:**

    **1. Introduction**

    PACIFIC ASIANA LLC, doing business as ZIPTO ("we," "us," or "our"), respects your privacy and is committed to protecting your personal data. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you interact with our services, websites, mobile applications, or advertisements.


    **2. Information We Collect**

    We may collect the following types of personal data:

    - Contact information (e.g., name, email address, phone number)

    - Demographic information (e.g., age, gender, zip code)

    - Usage data (e.g., browsing history, purchase history)

    - Location data (e.g., IP address, device location)

    - Payment information (e.g., credit card number, billing address)

    - Any other information you choose to provide


    **3. How We Use Your Information**

    We use your personal data to:

    - Provide and improve our services

    - Personalize your experience

    - Process transactions

    - Send marketing communications

    - Respond to your inquiries

    - Comply with legal obligations


    **4. Information Sharing**

    We may share your information with:

    - Service providers assisting with our business operations

    - Marketing partners (with your consent)

    - Law enforcement or government agencies when required by law

    We require all third parties to respect the security of your personal data and treat it in accordance with the law.


    **5. Data Security**

    We implement appropriate technical and organizational measures to protect your personal data, including encryption, firewalls, and access controls.


    **6. Data Retention**

    We retain your personal data only for as long as necessary to fulfill the purposes for which it was collected, including for legal, accounting, or reporting requirements.


    **7. Your Rights**

    Depending on your location, you may have the right to:

    - Access your personal data

    - Correct inaccurate data

    - Request erasure of your data

    - Object to processing of your data

    - Request restriction of processing

    - Request data portability


    To exercise these rights, please contact us at [insert contact email].


    **8. Marketing Communications**

    You can opt out of receiving marketing communications from us by following the unsubscribe instructions included in our emails or contacting us directly.


    **9. Changes to This Policy**

    We may update this Privacy Policy periodically. The revised version will be posted on this page with an updated effective date.


    **10. Contact Us**

    If you have questions about this Privacy Policy, please contact us at:

    PACIFIC ASIANA LLC (DBA ZIPTO)

    Phone: 773-940-2691

    This revised version is more tailored to your client, provides clearer sections, and includes some additional important elements like marketing communications and contact information. Remember to fill in the bracketed information with your client's specific details before finalizing the policy.

  • 1. Purpose The purpose of this Information Security Policy is to protect the confidentiality, integrity, and availability of the organization's information assets. This policy establishes a framework for managing security risks, ensuring compliance with legal, regulatory, and contractual obligations, and promoting a culture of security awareness within the organization.

    2. Scope This policy applies to all employees, contractors, vendors, and third parties who have access to the organization's information systems, networks, and data. It covers all information assets, including but not limited to hardware, software, cloud services, databases, email communications, and any other form of digital or physical information storage.

    3. Roles and Responsibilities

    · Executive Management: Oversees the implementation and enforcement of the policy, allocates necessary resources, and ensures adherence to industry best practices.

    · IT Security Team: Develops, maintains, and monitors security controls, conducts risk assessments, implements security measures, and responds to incidents.

    · Employees and Users: Follow security guidelines, complete mandatory security training, report incidents promptly, and handle organizational data responsibly.

    · Third-Party Vendors: Must comply with the organization's security standards and undergo regular security evaluations before being granted access to systems or data.

    4. Data Classification and Protection

    · Data shall be classified as Public, Internal, Confidential, or Restricted based on sensitivity and regulatory requirements.

    · Confidential and Restricted data must be encrypted in transit and at rest using industry-standard encryption mechanisms.

    · Access to data shall be granted on a need-to-know basis, reviewed periodically, and logged for auditing purposes.

    · Data disposal methods, such as secure shredding and digital wiping, shall be enforced to prevent unauthorized access to discarded information.

    5. Access Control

    · Users must use unique login credentials and strong passwords that comply with organizational security standards.

    · Multi-factor authentication (MFA) is required for accessing sensitive systems and high-risk applications.

    · Role-based access controls (RBAC) shall be implemented to minimize unnecessary access, and access reviews shall be conducted quarterly.

    · Remote access must be secured through Virtual Private Networks (VPN) or other approved encrypted communication channels.

    6. Network and System Security

    · Firewalls, intrusion detection systems (IDS), and endpoint security solutions must be deployed to safeguard the network against cyber threats.

    · All software, operating systems, and firmware must be updated regularly with security patches to mitigate vulnerabilities.

    · Unauthorized devices, including personal laptops and USB drives, are prohibited from connecting to the corporate network unless explicitly authorized and monitored.

    · Data backup procedures must be in place, ensuring critical data is regularly backed up and stored in a secure, offsite location.

    7. Incident Response and Reporting

    · All security incidents, including data breaches, malware infections, and unauthorized access, must be reported immediately to the IT Security Team.

    · An incident response plan shall outline the steps for identifying, containing, eradicating, and recovering from security incidents.

    · Incident response drills shall be conducted periodically to assess and improve the effectiveness of the response procedures.

    · A post-incident analysis shall be conducted to determine the root cause, implement corrective actions, and prevent recurrence.

    8. Employee Training and Awareness

    · Employees shall undergo mandatory cybersecurity training upon hiring, with refresher courses conducted annually.

    · Phishing simulation exercises shall be conducted to raise awareness about social engineering attacks.

    · Regular security bulletins, newsletters, and workshops shall be provided to ensure employees remain informed about emerging threats and best practices.

    9. Compliance and Auditing

    · Regular internal and external audits shall be conducted to assess compliance with this policy and identify potential security gaps.

    · The organization must adhere to relevant legal, regulatory, and industry standards such as GDPR, HIPAA, ISO 27001, NIST, and SOC 2 frameworks.

    · Third-party security assessments shall be conducted to ensure that external vendors and partners meet security requirements.

    10. Policy Review and Updates

    · This policy shall be reviewed at least annually or whenever significant security changes occur.

    · Policy updates shall be communicated to all relevant stakeholders, and employees will be required to acknowledge their understanding of the changes.

    · A designated security officer shall be responsible for ensuring that the policy remains up-to-date with evolving threats and regulatory requirements.

    11. Enforcement

    · Violations of this policy may result in disciplinary action, including suspension, termination of employment, or legal consequences, as applicable.

    · Employees found in violation may be required to undergo additional security training or have their access privileges revoked.

    · The organization reserves the right to take legal action against individuals or entities responsible for severe security breaches.

     

    This Information Security Policy ensures that all individuals within the organization understand their roles and responsibilities in maintaining a secure and compliant environment. Adherence to this policy is critical to protecting organizational assets and mitigating security risks.

     

Trusted By Thousands of Online Sellers
An all-in-one eCommerce solution for your shipping needs