☘️ MARCH SPECIAL • Save 15% on iTech CRM Setup Limited-Time Offer • Ends In:

Days
Hours
Minutes
Seconds

Agency Authorization & Code Access Policy

Server And Code Access Policy

1. Purpose

This policy defines who is permitted to access, modify, or work with iTech-developed systems, customizations, and proprietary enhancements.

This policy is separate from the iTech Support Policy and applies specifically to agency partnerships and code-level access.

2. Code Governance & Intellectual Property

While the core CRM framework may be open-source, all iTech customizations, structural modifications, integrations, proprietary enhancements, plugins, architectural configurations, and performance optimizations are protected under iTech intellectual property and internal business standards.

Access to such components is restricted and governed by this policy.

3. Who May Access iTech Code

Access is strictly limited to:

iTech-Approved Agencies

Only agencies formally reviewed and approved by iTech may request structured development access.

Approval is discretionary and not automatic.

4. Agency Qualification Requirements

To be considered for approval, an agency must submit:

  • Full organizational team structure
  • First and last name of each technical team member
  • Role and title of each member
  • Professional profile (LinkedIn or equivalent)
  • Relevant certifications (if applicable)
  • Registered business documentation
  • Signed confidentiality and intellectual property agreements

Incomplete submissions will not be reviewed.

iTech reserves full authority to approve or decline any application.

5. Development Standards Compliance

All approved agencies must comply with iTech technical and architectural standards, including but not limited to:

  • Code structure and file organization
  • Version control requirements
  • Security protocols
  • API standards
  • Naming conventions
  • Documentation procedures
  • Deployment workflow
  • Change tracking and logging

Non-compliant code may be:

  • Rejected
  • Rolled back
  • Removed
  • Billed for correction
  • Cause for access suspension

6. Coordination & Supervision

All approved agencies must:

  • Coordinate development activities in writing
  • Document all changes
  • Submit structured deployment plans
  • Follow approval workflows when required

Unsupervised modifications are not permitted.

7. Restrictions

The following actions are strictly prohibited:

  • Unauthorized access to infrastructure
  • Reverse engineering proprietary enhancements
  • Code duplication or redistribution
  • Resale or rebranding of iTech proprietary components
  • Deployment outside licensed environments
  • Sharing access credentials with unauthorized personnel

8. Termination of Agency Authorization

iTech reserves the right to immediately suspend or terminate agency authorization under the following circumstances:

  • Violation of coding standards
  • Unauthorized access or system modification
  • Breach of confidentiality or intellectual property agreements
  • Misrepresentation of agency credentials
  • Failure to comply with governance procedures
  • Interference with system stability or security
  • Non-payment of agency licensing fees (if applicable)

Termination may occur without prior notice if the violation poses risk to system integrity, data security, or intellectual property.

Upon termination:

  • All access credentials will be revoked immediately
  • All development privileges will cease
  • Agency licensing rights will be suspended or canceled
  • Ongoing projects may be halted pending review

9. Legal Enforcement & Liability

Unauthorized access, misuse of proprietary components, code duplication, redistribution, reverse engineering, or structural replication of iTech customizations constitutes a breach of intellectual property protection.

iTech reserves the right to pursue:

  • Civil legal action
  • Financial damages
  • Injunctive relief
  • Contract enforcement remedies
  • Recovery of legal costs and associated expenses

Agencies found in violation may also be held financially responsible for:

  • System remediation costs
  • Security audit expenses
  • Code reconstruction
  • Operational losses resulting from unauthorized actions

10. Governance Authority

iTech retains sole authority over:

  • Code access approval
  • Architectural direction
  • Version governance
  • Infrastructure standards
  • Technical compliance validation

Approval as an agency does not transfer ownership of proprietary components.

11. Acceptance

By applying for or operating as an iTech-approved agency, the organization agrees to comply fully with this Agency Authorization & Code Access Policy.

Good. This is important — because governance without infrastructure control is weak.

Below is a clean section you can add to your Agency Authorization & Code Access Policy under a new heading.

It is structured, technical, and enforceable.

12. Server & Infrastructure Access Requirements

To maintain system integrity, data security, and version control consistency, the following server requirements apply to all iTech-approved agencies.

12.1 Exclusive Developer Access

The production server environment must be accessible only to:

  • Approved agency developers
  • Authorized iTech technical personnel (if applicable)

Access must not be shared with:

  • Non-technical employees
  • Administrative staff
  • Marketing teams
  • External vendors
  • Unapproved third parties

Credential sharing outside authorized developers is strictly prohibited.

12.2 Shared Infrastructure Safeguards

If the server environment is shared with other business functions or third-party providers, the following technical isolation measures are mandatory:

A. CLI & SSH-Only Developer Access

Approved developers must access the server exclusively through:

  • Secure CLI access
  • SSH with key-based authentication
  • No shared hosting control panels for production modification

Root access must be controlled and logged.

B. Remote or Restricted Database Access

The database must not be publicly accessible.

The following is required:

  • Remote database access restricted by IP allowlist
  • No public database ports exposed
  • Database credentials not stored in plain text
  • Access limited to application layer or secured SSH tunnel

Database visibility must be restricted to authorized developers only.

C. Isolated File & Folder Containerization

File systems must be logically isolated to prevent unauthorized visibility.

This may include:

  • Containerized deployment environments
  • Restricted file permission structures
  • Segmented directory access
  • Role-based file access control
  • No public browsing of application directories

Non-developer staff must not have visibility into application core files, proprietary enhancements, or system configuration directories.

12.3 Logging & Monitoring

All developer access must be:

  • Logged
  • Traceable
  • Auditable

Unauthorized login attempts or access escalation must trigger review.

12.4 Non-Compliance

Failure to maintain these infrastructure requirements may result in:

  • Suspension of agency authorization
  • Temporary suspension of SLA coverage
  • Required security revalidation before support resumes
  • Liability adjustment for security breaches

iTech reserves the right to request infrastructure validation prior to granting or maintaining agency access.

Launch Your Business CRM This March Reserve Your 15% Discount

Let’s Get Your System Started