Software Values & Principles

1. Clear and concise installation

SafeBytes applications installs clearly and concisely. The end-user is always in control and transparency of actions is clear throughout the installation process. The application does not install itself secretly nor does it hide within another application or program. SafeBytes does not participate in “bundling” of any sort.

Learn More: SafeBytes Values and Principles

2. All application functions are shown

SafeBytes primary and main functions will be shown in a graphic user interface in a clear layout for the end-user. SafeBytes will never show third party advertisements, generate popup advertisements, or send any of your personal data to a third party for marketing purposes.

Learn more: SafeBytes End User License Agreement

3. Simple, clean uninstallation

Uninstalling SafeBytes is easy and straightforward. All installed functions, files, and components by SafeBytes are fully removed upon uninstall. No remaining files are left behind. No remaining code whatsoever remains that can be automatically enabled later by itself or another application post uninstall.

Learn more: Uninstall Instructions

4. User is in complete control of the application

SafeBytes application will always be identified as such. All peripheral screens, windows, notifications will be identified as SafeBytes will have clear markings or colors. Any changes to your computer made by the application to your computer will only be made with the user's explicit permission first. The end-user will have the ability to control the application by simply clicking on visible elements generated by the application.

Learn more: SafeBytes End User License Agreement

Learn more:SafeBytes Terms of Service

5. Cookies and other information collected uses both Session Cookies and Persistent Cookies on this website. We use a cookie to recognize your computer when you visit our website, to populate the login box and record whether you are logged in or not. We only do this if you have explicitly registered with us. Whenever you visit our Site, we may collect non-identifying information from you, such as your IP address, interactions with the Site and Service, referring URL, browser, operating system, cookie information, usage, data transferred and Internet Service Provider.

Learn more: SafeBytes Cookie Policy

Learn more: SafeBytes Privacy Policy

6. No bundling ever

“Bundling”, for this purpose of explanation, is when software intended to be installed by a user also installs additional software without any clear consent by end-user. SafeBytes does not and will not participate in this distribution model in any form or capacity.

7. AppEsteem Certification of SafeBytes

SafeBytes software is certified by a third party compliance organization called AppEsteem. AppEsteem's certification criteria holds software technology companies to the highest level of consumer protection best practices along with multifaceted technical standards. SafeBytes has undergone a laborious and thorough review ensuring its applications are met or exceed each of AppEsteem's certification requirements.

Learn more:AppEsteem Certification Requirements

8. Refund Policy

The initial purchase of SafeBytes software is backed by a 30-day unconditional money-back guarantee. If for any reason, or without reason, a customer chooses to have their purchase refunded within 30 days of purchase.

Learn more: SafeBytes Refund Policy

9. Contact Information

For any inquires, questions, or comments on these policies or any other aspect of SafeBytes, please contact us here.

Last Updated: June 28, 2022