We simplify your day-to-day with technology and comprehensive support
Because we understand that your time is invaluable.
What really matters
Your family, your passions, and your friends. We take care of the rest.
Our mission
Optimize your efforts, maximize your results, and give you back your time.
Outstanding experiences
With precision, security, and accessibility. More than tools, they are custom-made solutions.
What else do we offer?
Specialized technical support,
server administration, and personalized attention so that your
technology works to its full potential.
VISION
MISSION
VALUES
Terms of Service
Privacy Policy
Refunds
Security
Service Level Agreement
To be the
leading company in technology and technological support, recognized for
our excellence, innovation, and commitment to customer satisfaction. We
aspire to transform the digital world of businesses and individuals by
providing cutting-edge technological solutions and exceptional service.
To provide
comprehensive and high-quality technological solutions to businesses and
individuals through a highly trained and committed team dedicated to
excellence. We aim to create unique and satisfying digital experiences,
exceeding our clients' expectations and contributing to the success of
their businesses.
Our values are: INNOVATION: We are passionate about exploring new technologies and developing creative solutions for our clients' challenges. EXCELLENCE: We strive to provide exceptional service in everything we do, maintaining the highest standards of quality. COMMITMENT: We are committed to the satisfaction of our clients and the success of their businesses. TRUST: We build trusting relationships with our clients, based on transparency, honesty, and ethics. TEAMWORK: We value teamwork and collaboration among our employees to achieve common goals. RESPONSIBILITY: We are responsible for our actions and the impact we have on the environment and society. PASSION: We are passionate about technology and enjoy what we do, spreading enthusiasm to our clients and collaborators. These
are the guides for all our decisions and actions, allowing us to build a
solid and sustainable company that makes a difference in the digital
world.
Last updated: March 29, 2026
1. Identification
Solucion Exacta I.C.T. Tax ID (CUIT): 20-22223672-0 Email: legales@solucionexacta.com
2. Acceptance
Use of the Service constitutes acceptance of these terms.
3. Service
SaaS platform for companies and/or individuals (management, data processing, remote access, and associated functions). Improvements and new features may be incorporated at any time.
4. Permissible Use
The client agrees to: * Comply with the law * Not breach security measures * Not introduce malicious code Non-compliance may result in suspension or cancellation.
5. Accounts
* The client is responsible for their credentials * All activity under the account is deemed valid
6. Payments
* Subscription-based model * Invoicing in accordance with Argentine regulations * Failure to pay → suspension See the **Refund Policy** for reimbursement details.
7. Analysis and Reporting Features
The
Service may include dashboards, metrics, and visualizations based on
Client data, used exclusively for the operation, improvement, and use of
the Service within the Client's scope.
8. Availability
“Best effort” service: * No guarantee of absolute continuity * Possible interruptions due to maintenance or third parties
9. Liability
The
service is provided “as is.” We are not liable for indirect losses or
loss of profits. Liability is limited to the amount paid during the
current monthly period.
**Last updated:** March 28, 2026
1. Controller Identification
The party responsible for the processing of personal data is: **Solucion Exacta I.C.T.** Tax ID (CUIT): 20-22223672-0 Email: legales@solucionexacta.com Domiciled in the Argentine Republic Registered as a database controller before the Agency for Access to Public Information (AAIP), pursuant to Law 25.326.
2. Scope
This policy applies to the use of the website and SaaS services provided to companies (hereinafter, the “Service”).
3. Types of Data Collected
The following categories of data may be collected: * Identifying data (name, email, phone) * Authentication data (including OAuth) * System usage data * Billing data * Data uploaded by clients into the system
4. Purpose of Processing
Data will be processed to: * Provide system access and authentication * Manage user accounts * Provide the contracted Service * Process payments and issue invoices * Provide technical support * Improve the Service
5. Legal Basis
Processing is based on: * Data subject's consent * Execution of a contractual relationship * Compliance with legal obligations
6. Google OAuth
The system may allow authentication via Google OAuth. In these cases: * Only basic data is accessed (name, email) * No access is granted to other Google account data * Use of such data is strictly limited to authentication * Only the minimum necessary scopes (openid, email, profile) are used Use of this feature implies acceptance of Google's policies: https://policies.google.com/privacy
7. Transfers and Third Parties
Data may be shared with: * Hosting providers * Authentication services (e.g., Google) * Technological infrastructure providers Some providers may be located outside the Argentine Republic. Such third parties operate under confidentiality and data protection obligations.
8. Information Security
Reasonable technical and organizational measures are implemented to protect data: * Access control * Use of encryption where applicable * Protection against unauthorized access
9. Data Retention
Data will be retained: * For the duration of the contractual relationship * For the time necessary to comply with legal obligations
10. Rights of the Data Subject
The subject may exercise: * Right of access * Right to rectification * Right to erasure (deletion) The
subject may exercise the right of access free of charge at intervals of
no less than six months, unless a legitimate interest is proven. To do so, a request must be sent to: legales@solucionexacta.com The
Agency for Access to Public Information (AAIP), as the regulatory body
of Law 25.326, has the authority to handle complaints and claims
regarding non-compliance with personal data protection regulations.
11. Controller vs. Processor Relationship
### 11.1 When solucionexacta.com acts as a Controller
It will be the Controller when it: * Collects its own user data * Manages accounts directly * Defines the purpose of processing
### 11.2 When it acts as a Data Processor
In SaaS services for companies: * The client is the Controller of the uploaded data * solucionexacta.com acts as the Processor
In these cases: * It only processes data according to client instructions * It does not use the data for its own purposes * It applies appropriate security measures
This Refund Policy applies to all SaaS services offered by solucionexacta.com under monthly or annual subscription models.
2. Billing Cycles
The Service is offered under the following schemes: * **Monthly subscription:** recurring billing every 30 days, automatic or otherwise * **Annual subscription:** prepaid billing for 12 months Cycles begin on the date of purchase and renew automatically or not, depending on the chosen option, unless cancelled.
3. General Refund Policy
Unless expressly stated otherwise, **payments made are non-refundable**. Refunds will not be granted for: * Partially used periods * Lack of use of the Service * Voluntary cancellations by the client * Suspensions due to breach of the Terms of Service
4. Subscription Cancellation
The client may cancel their subscription at any time. * Cancellation will be effective at the end of the current billing cycle * The Service will remain active until that date * No refunds will be issued for unused time
5. Upgrades (Switching to a higher plan)
When the client upgrades to a higher plan: * The change is applied immediately * The proportional difference for the remaining period will be billed (**prorated**) * The new plan takes effect at the time of the change
6. Downgrades (Switching to a lower plan)
When the client switches to a lower plan: * The change will apply to the next billing cycle * No refunds or credits are issued for the current period
7. Annual Subscriptions
* Annual subscriptions are paid in advance * They are non-refundable, in whole or in part * Cancellation prevents automatic renewal but does not trigger a refund for the contracted period
8. Exceptions
In
exceptional cases, the owner may evaluate refunds at their sole
discretion, without creating a precedent or future obligation.
9. Billing Errors
In case of improper charges or technical errors: * The client must notify within 7 days * The case will be evaluated and, if applicable, an adjustment or refund will be made
10. Payment Methods
Payments may be processed through third parties (e.g., Stripe or others). The payment provider's policies may apply complementarily.
Solucion Exacta I.C.T. applies a **defense-in-depth** (layered security) approach to protect information and service continuity.
2. Infrastructure
The
platform runs on internationally recognized standard cloud providers,
without public disclosure of technical infrastructure details. The following practices are applied: * Logical isolation between clients (multi-tenant) * Service segmentation * Attack surface reduction
3. Access Control
* Role-Based Access Control (RBAC) * Principle of least privilege * Secure credential management * Option for authentication via OAuth (e.g., Google)
4. Data Protection
* Encryption in transit via TLS * Secure storage of credentials * Logical separation of data per client
5. Monitoring and Logging
* Logging of access and relevant events (logs) * System behavior monitoring * Detection of operational anomalies
6. Vulnerability Management
* Periodic updates of systems and dependencies * Application of security patches * Monitoring of industry security alerts
7. Backups and Recovery
* Periodic backups * Incident recovery procedures * Operational validation of restoration where necessary
8. Security Incidents
In the event of incidents affecting data or availability: * Evaluation and containment of the event * Notification to affected clients without undue delay * Implementation of corrective measures
9. Sub-processors
Technology
providers are used for service operation (infrastructure,
authentication, etc.), selected under security and reliability criteria.
10. Shared Responsibility
Security is a shared model:
**Solucion Exacta I.C.T.:**
* Infrastructure and platform * System security
**Client:**
* User management * Proper use of the system * Protection of credentials
11. Limitations
While reasonable security measures are applied, it is impossible to guarantee the absolute absence of incidents.
12. Continuous Improvement
Security practices are reviewed and improved continuously based on: * New threats * Technological evolution * Business requirements