████████╗███████╗██╗  ██╗████████╗   ██████╗  █████╗ ███████╗███████╗██████╗    ███╗   ██╗███████╗████████╗
╚══██╔══╝██╔════╝╚██╗██╔╝╚══██╔══╝   ██╔══██╗██╔══██╗██╔════╝██╔════╝██╔══██╗   ████╗  ██║██╔════╝╚══██╔══╝
   ██║   █████╗   ╚███╔╝    ██║█████╗██████╔╝███████║███████╗█████╗  ██║  ██║   ██╔██╗ ██║█████╗     ██║   
   ██║   ██╔══╝   ██╔██╗    ██║╚════╝██╔══██╗██╔══██║╚════██║██╔══╝  ██║  ██║   ██║╚██╗██║██╔══╝     ██║   
   ██║   ███████╗██╔╝ ██╗   ██║      ██████╔╝██║  ██║███████║███████╗██████╔╝██╗██║ ╚████║███████╗   ██║   
   ╚═╝   ╚══════╝╚═╝  ╚═╝   ╚═╝      ╚═════╝ ╚═╝  ╚═╝╚══════╝╚══════╝╚═════╝ ╚═╝╚═╝  ╚═══╝╚══════╝   ╚═╝   
54 65 78 74 2D 62 61 73 65 64 2E 6E 65 74



1. Privacy:
    Our Customers are classified and protected. Our customer list is
    not available. We do not share nor discuss the names of our customers to
    protect their privacy and right to confidentiality.

2. Integrity:
    you won't find us on social media. Building on item 2; Communicating with
    customers on any social media platform builds a defacto customer list as
    well as  a list of potential customers that deserve to retain their
    anonyimity. 

3. Security:
    In the age of digital warfare information is ammunition. Building on items
    1 and 2, Client Information can only be subepeoned via a valid United States
    court with proper jurisdiction. Data encryption is available.

4. Service:
    Our service is first provided in the protections listed in items 1 through 3.
    We are all dependent on information to power business decisions and movement
    of product or delivery of services. Privacy, Integrity, and Security
    are core foundations of the service we provide.