Legal Information
Company Registration
CHI SOFTVER DOOEL Vrapchishte, Vrapchishte
| Unique Company ID | 7424973 |
| Short Name | CHI SOFTVER DOOEL Vrapchishte, Vrapchishte |
| Official Seat | Str. RD 100 Vrapchishte, Vrapchishte |
| Type of Registration | Limited Liability Company Sole Proprietorship |
| Foundation Date | 24.04.2020 |
| Type of Ownership | Private ownership |
| TIN | 4042020503709 |
Tax Information
CHI- SOFTVER DOOEL is registered as a taxpayer in North Macedonia and complies with all applicable tax regulations.
VAT Exemption
As a service company in North Macedonia with CHI SOFTVER DOOEL is exempt from VAT registration and collection requirements.
VAT is not calculated according to Article 15 - LAW ON ESTABLISHING PUBLIC INTEREST AND NOMINATING A STRATEGIC PARTNER FOR IMPLEMENTATION OF THE PROJECT FOR CONSTRUCTION OF INFRASTRUCTURE CORRIDOR 8 (SECTION: TETOVO-GOSTIVAR-BUKOJČANI AND THE PROJECT FOR THE HIGHWAY TREBENISHTA-STRUGA-QAFASAN) AND CORRIDOR 10D (SECTION OF THE HIGHWAY PRILEP-BITOLA) IN THE REPUBLIC OF NORTH MACEDONIA.
Terms of Service
By using this website and responding to the cookie consent notice, you acknowledge and agree to these Terms of Service. Both accepting all cookies or rejecting non-essential cookies constitute acceptance of these website usage terms. Continued use of the website signifies your ongoing agreement to these terms and our Privacy Policy.
Website Usage Terms
These terms govern your use of the CXI website (cxi.mk). Product and service-specific terms are provided separately upon purchase.
1. Acceptance of Terms
By accessing and using the CXI website, you accept and agree to be bound by these terms. If you do not agree to these terms, please do not use our website.
2. Digital Products & Services - Separate Terms
Important: Each digital product or service purchased from CXI comes with its own specific Terms of Service and License Agreement. These product-specific terms will be:
- Presented during the purchase process
- Included with product delivery and documentation
- Accessible within the product/service interface
- Sent via email upon purchase completion
Product-specific terms may cover licensing, usage rights, support, updates, refunds, and other product-related conditions that differ from these general website terms.
3. Services Provided
CXI provides:
- Custom website development
- Enterprise data management systems
- Cloud infrastructure solutions
- Cross-platform application development
- Software consulting services
- Software sale and release
- Export-import services
4. Intellectual Property
All content, code, designs, and materials on this website and created by CXI remain the intellectual property of CXI unless otherwise agreed upon in writing. Custom solutions developed for clients will be governed by separate agreements.
5. Website Usage
You agree to:
- Use the website only for lawful purposes
- Not attempt to gain unauthorized access to any part of the website
- Not interfere with the proper functioning of the website
- Provide accurate information when requested
6. Payment Terms
General payment terms for custom projects:
- 50% upfront deposit to commence work
- 50% upon project completion and delivery
- Monthly billing for ongoing support and maintenance
Digital product purchases are governed by their specific payment and refund terms provided at checkout.
7. Limitation of Liability
CXI strives to deliver high-quality software solutions and maintain website availability. However, we are not liable for any indirect, incidental, or consequential damages arising from the use of our website or services. Product-specific liability terms are covered in individual product agreements.
8. Modifications to Terms
We reserve the right to modify these website terms at any time. Continued use of the website after changes constitutes acceptance of the modified terms. Product-specific terms are updated independently and communicated to product owners.
9. Governing Law
These terms are governed by the laws of the Republic of North Macedonia.
Privacy Policy
Information We Collect
We collect information necessary to provide our services, including:
- Contact information (name, email, phone)
- Business information for project requirements
- Technical data for system optimization
How We Use Your Information
Your information is used to:
- Deliver and improve our services
- Communicate about projects and support
- Send relevant updates and information
- Comply with legal obligations
Data Protection
We implement industry-standard security measures to protect your data. Your information is never sold to third parties. We retain data only as long as necessary to provide services or as required by law.
Your Rights
You have the right to:
- Access your personal data
- Request correction of inaccurate data
- Request deletion of your data
- Withdraw consent at any time
Location & Regional Services
To provide you with the most relevant experience and accurate pricing, we may use approximate location signals derived from your browser, device settings, or IP address.
Purpose of Location Use
Location information is used strictly for service optimization, including:
- Displaying product prices in an appropriate local currency (for example, MKD for North Macedonia, EUR for EU countries, and USD for other regions)
- Prefilling certain checkout fields such as country to streamline your purchase experience
- Applying region-specific legal, tax, or compliance information where required
Type of Location Data Collected
We do not use precise GPS tracking on our website. Instead, we rely on:
- Approximate geolocation inferred from IP address
- Language and region settings exposed by your browser
- Manually selected country or region in our forms
Data Protection & Retention
Location-related data is processed in accordance with our general data protection and security standards:
- Used only for the purposes listed above and not for continuous tracking
- Stored only as long as necessary to provide the relevant service or as required by law
- Not sold or shared with third parties for advertising or unrelated profiling
Your Choices
You may choose to:
- Manually change your country or region during checkout if it was detected incorrectly
- Adjust your browser or device settings to limit sharing of location-related information
- Contact us at contact@cxi.mk for questions about how location is used in relation to your account or transactions
Data Security & Checkout Security
CXI implements enterprise-level security measures that meet and exceed international banking and payment processing standards. Our checkout system is designed with multiple layers of protection to ensure your transactions and personal data remain completely secure.
Payment Card Industry Data Security Standard (PCI DSS)
Our payment processing infrastructure is built to comply with PCI DSS Level 1 requirements, the highest level of payment security certification. This includes:
- Tokenization: Card data is never stored on our servers. Payment information is converted into secure tokens that are meaningless if intercepted
- Encrypted Transmission: All payment data is transmitted using TLS 1.3 encryption with 256-bit keys
- No Storage of Sensitive Data: We do not store CVV codes, full card numbers, or authentication data
Multi-Layer Fraud Prevention
Every transaction is protected by sophisticated fraud detection systems:
- Real-Time Monitoring: AI-powered systems analyze transactions for suspicious patterns and anomalies
- Device Fingerprinting: Unique device identification helps detect and prevent fraudulent activities
- Velocity Checks: Rate limiting prevents automated attacks and multiple rapid transaction attempts
- Geographic Verification: Transaction locations are verified against customer profiles and shipping addresses
- Bot Detection: Advanced honeypot fields and behavior analysis identify and block automated attacks
- 3D Secure Authentication: Additional verification layer for card-not-present transactions
Session & Access Security
Your checkout session is protected through multiple mechanisms:
- Session Timeout: Automatic 15-minute session expiration with warnings at 2 minutes remaining
- CSRF Protection: Cross-Site Request Forgery tokens prevent unauthorized transaction submissions
- Activity Monitoring: Session duration is extended based on legitimate user activity
- Secure Session IDs: Cryptographically random session identifiers that cannot be predicted or hijacked
- Single-Use Tokens: Critical operations require fresh tokens that expire immediately after use
Data Encryption Standards
All customer data is protected at multiple levels:
- Transport Layer Security: TLS 1.3 encryption for all data transmission between your browser and our servers
- Database Encryption: All stored customer information is encrypted at rest using AES-256 encryption
- Secure Key Management: Encryption keys are rotated regularly and stored in isolated, secure environments
- End-to-End Protection: Data remains encrypted throughout the entire transaction lifecycle
Input Validation & Sanitization
We prevent injection attacks and data corruption through:
- Server-Side Validation: All input is validated on our secure servers, not just in the browser
- XSS Prevention: Cross-site scripting protection through input sanitization and content security policies
- SQL Injection Prevention: Parameterized queries and prepared statements prevent database attacks
- Email Verification: Disposable email addresses are detected and rejected to prevent fraud
- Country-Specific Format Validation: Postal codes, phone numbers, and addresses are validated against regional standards
Security Headers & Browser Protection
Our checkout pages implement strict security policies:
- Content Security Policy (CSP): Prevents unauthorized scripts from executing on checkout pages
- X-Frame-Options: Protects against clickjacking attacks by preventing page embedding
- HSTS Headers: Forces secure HTTPS connections and prevents protocol downgrade attacks
- Referrer Policy: Controls information shared with third parties to protect customer privacy
Compliance & Auditing
We maintain the highest standards of security compliance:
- GDPR Compliance: Full adherence to European data protection regulations
- Regular Security Audits: Quarterly penetration testing and vulnerability assessments
- Transaction Logging: Comprehensive audit trails for all transactions (excluding sensitive payment data)
- Incident Response Plan: Documented procedures for rapid response to any security events
- Data Breach Notification: Immediate customer notification protocols in compliance with GDPR (within 72 hours)
Customer Data Rights
Under our security framework, you have the right to:
- Request complete deletion of your personal data from our systems
- Download all data we hold about you in a portable format
- Be informed immediately in case of any security incident affecting your data
- Opt out of data processing for marketing purposes at any time
- Request detailed information about how your data is protected and used
Payment Processing Architecture
Our checkout system is processor-agnostic and designed for maximum security flexibility:
- Payment Gateway Independence: Our system uses industry-standard tokenization that works with any PCI DSS Level 1 certified payment processor
- No Vendor Lock-In: We maintain the freedom to integrate with the most secure and reliable payment providers available
- Future-Ready Integration: Currently preparing integration with a secure payment provider B2B B2C payment system for localized payment processing
- Multiple Payment Methods: Support for credit/debit cards, PayPal, bank transfers, and cash on delivery
- Currency Flexibility: Multi-currency support including MKD (Macedonian Denar), EUR (Euro), and USD (US Dollar)
Third-Party Security
We carefully vet all third-party services:
- Payment Processors: Only PCI DSS Level 1 certified providers with proven security track records
- Cloud Infrastructure: Enterprise-grade hosting with SOC 2 Type II compliance
- SSL Certificates: Extended Validation (EV) certificates from trusted certificate authorities
- CDN Security: DDoS protection and web application firewall on all static assets
Continuous Security Improvements
Our security measures are constantly evolving:
- Regular updates to encryption protocols and security libraries
- Monitoring of emerging threats and vulnerabilities
- Implementation of cutting-edge fraud detection technologies
- Staff training on security best practices and threat awareness
- Bug bounty program encouraging responsible disclosure of vulnerabilities
If you notice any suspicious activity or potential security issues, please report them immediately to security@cxi.mk. We take all reports seriously and respond within 24 hours.
Cookie Policy
Our website uses minimal cookies to ensure proper functionality and improve user experience. We do not use tracking cookies for advertising purposes.
Contact for Legal Inquiries
For any legal questions or concerns, please contact us:
Email: contact@cxi.mk
Address: Str. RD 100 Vrapchishte, Vrapchishte, North Macedonia
Last updated: November 16, 2025
Company ID: 7424973 | TIN: 4042020503709