Support

A visible manual support path for billing, reports, privacy requests, and service issues.

Command Secrets provides this public support page so users can identify how plan administration, billing clarification, report-delivery issues, privacy requests, broken links, and security concerns should be handled when they need direct operational review.

Operating emphasis

Support should reduce ambiguity, not add another silent loop.

These public pages are written to be clear, strict, and commercially readable. They explain how Command Secrets handles legal boundaries, customer requests, data safeguards, and protected intellectual property without exposing proprietary calculation logic.

Manual support path

This page exists so users can find a visible route for billing, report-delivery, privacy, and account requests even before every workflow is fully self-served inside the product.

Billing and plan handling

Upgrade, downgrade, cancellation, subscription clarification, and payment-history questions may be handled manually after identity verification and order review.

Operational issue reporting

Broken links, inaccessible pages, crash reports, suspicious activity, and delivery failures should be reported promptly so the service surface can be corrected before they create further user harm.

Support intake flow

Submit a clear support brief into the review queue.

This intake flow stores the request for manual review so billing, privacy, report-delivery, and technical issues can be handled through a controlled support trail.

Stored for manual review • identity verification may still be required

What to include

State the exact request type.

Billing, cancellation, privacy, report delivery, release-status, and technical issues should not be mixed into one vague note.

Use verifiable account details.

If the request affects billing, protected reports, or privacy, the review process may pause until identity can be confirmed.

Submission receipt

Stored request summary

After submission, this panel shows the stored reference code and the request details you sent for manual review.

Submit the intake form to create a stored support request and receive a reference code.

Section

What support is for

The support path is the public operating channel for customers who need human review of account, report, billing, privacy, or service-integrity issues.

Support may be used for subscription questions, upgrade or downgrade requests, cancellation requests, payment clarifications, invoice follow-up, report-delivery issues, account-access problems, privacy requests, suspicious activity reports, and general website or application issues that materially affect the customer journey.

To reduce risk of unauthorized changes, Command Secrets may ask for enough information to verify that the requester is the rightful account holder or authorized payer before discussing protected account details, changing billing status, or reissuing analytical content.

Customers can use the structured intake flow on this page to submit a clear support brief into the review queue. A concise, complete request reduces avoidable back-and-forth and helps the service resolve issues faster.

Section

Billing, upgrades, downgrades, and plan corrections

Billing support is intended to make plan administration visible and controlled, not hidden or guess-based.

If you need to upgrade, downgrade, cancel, correct a payment issue, confirm a charge, or review which plan is attached to your account, use the support path and include enough information for verification. Command Secrets may process plan changes immediately, at the next renewal point, or after a manual review depending on what has already been billed or delivered.

Where additional analytical work, new reports, or premium outputs are triggered by an upgrade, those outputs may become subject to the rendered-analysis no-refund rule once created or made available. Where a downgrade is requested, access to higher-tier features may remain available until the current paid period ends unless a different arrangement is confirmed in writing.

If a customer believes a charge was duplicated, technically misprocessed, or otherwise incorrect, Command Secrets may request transaction references, timestamps, and account identifiers before determining whether a billing correction is appropriate.

Section

Report delivery, watermarking, and access restoration

Analytical outputs are protected deliverables and should be handled through a controlled delivery trail.

If a paid report was expected but not received, if a download link failed, or if a delivered file appears damaged or inaccessible, customers should report the issue promptly through support. Command Secrets may verify order status and resend the output through an appropriate controlled method.

Reports may include watermarking, branding, access references, or other protective measures intended to preserve authorship and discourage unauthorized redistribution of proprietary analytical work. These protections are part of the product's intellectual-property posture and do not by themselves entitle a user to a refund or replacement.

Customers remain responsible for safeguarding files and account emails after lawful delivery. If a user shares or forwards a report to another person, that onward disclosure is the user's own responsibility unless Command Secrets has explicitly agreed otherwise.

Section

Broken links, crash prevention, and service integrity issues

A serious digital service should give users a path to report faults before trust is lost.

If you encounter broken links, inaccessible pages, repetitive navigation loops, failed buttons, loading errors, crashes, or inconsistent report-delivery behaviour, please report the issue with the page address, device type, browser, approximate time, and a short description of what happened immediately before the problem occurred. This information helps isolate the fault more reliably.

Command Secrets aims to monitor for technical faults and maintain a service surface that is stable, readable, and commercially credible. However, no website or application is immune from temporary defects, third-party outages, or unexpected regressions, so user reports remain an important part of service integrity and anti-crash improvement.

If an issue affects security, account control, suspicious scraping, unauthorized access attempts, or apparent cloning, the matter should be reported urgently so it can be triaged as a security event rather than handled as an ordinary content issue.

Related surfaces

Support, legal notice, cancellation terms, and security posture stay connected.

Customers should not have to guess where to find billing help, privacy information, or the boundaries around data use, public-figure references, and protected analytical outputs.