Privacy First Commitment
We are committed to protecting your privacy with enterprise-grade security measures. We never share, sell, or monetize your personal information.
Effective Date & Contact Information
Information We Collect
Authentication Information
- Account Credentials: Username, email address, and encrypted password hashes
- Multi-Factor Authentication: TOTP secrets, SMS verification numbers, hardware security key identifiers
- Session Data: Login timestamps, IP addresses, user agent strings for security monitoring
Security & Audit Information
- Access Logs: Authentication attempts, endpoint access, and security events
- Rate Limiting Data: Request frequency data to prevent abuse
- Compliance Audit Trails: Required for SOC2, ISO27001, and government security standards
Technical Information
- Device Identifiers: Browser fingerprints for fraud detection
- Network Information: IP addresses for geolocation security policies
- Performance Metrics: Response times and system health data (anonymized)
What We DON'T Collect
- Personal information beyond what is necessary for authentication
- Cookies for tracking or advertising
- Biometric data (unless explicitly configured by your administrator)
- Social media platform data for collection
How We Protect Your Information
Encryption Standards
- Data at Rest: AES-256 encryption for all stored data
- Data in Transit: TLS 1.3 encryption for all communications
- Password Security: Argon2id hashing with per-user salts
- Database Encryption: Column-level encryption for sensitive fields
Security Infrastructure
- Zero-Trust Architecture: Every request is authenticated and authorized
- Network Segmentation: Isolated environments with firewall protection
- Intrusion Detection: Real-time monitoring for security threats
- Regular Security Audits: Quarterly penetration testing and vulnerability assessments
Access Controls
- Role-Based Access Control (RBAC): Principle of least privilege
- Multi-Factor Authentication: Required for all administrative access
- Session Management: Automatic timeout and secure session tokens
- Audit Logging: Comprehensive logging of all data access
Cy4Secure™ Integration
When configured by your administrator, we may use Cy4Secure™ (by Cy4 Data Labs) for advanced encryption key generation. Important:
- Cy4Secure™ generates encryption keys and tokens but never has access to your actual data
- They are an on-demand encryption service that only provides cryptographic keys
- Your data remains encrypted and inaccessible to Cy4Secure™ at all times
- This integration can be disabled by your administrator at any time
Data Sharing & Third Parties
Zero Data Sharing Commitment
We never share, sell, rent, or monetize your personal information. Your data is yours and yours alone.
Single Sign-On (SSO) Authentication
When SSO is enabled by your administrator and you choose to use it:
- Minimal Data Exchange: We only share the minimum information required for authentication (typically just your email/username)
- User Control: You choose whether to use SSO; it's never mandatory
- Administrator Controlled: SSO providers are configured and approved by your organization's administrator
- Standard Protocols: We use industry-standard OAuth 2.0 and OpenID Connect protocols
Service Providers
We may share data with service providers only when:
- Legally Required: Court orders, government requests with proper legal authority
- Security Incidents: Coordination with law enforcement for cybersecurity threats
- Infrastructure Providers: Cloud hosting providers with strict data processing agreements
- Emergency Situations: To prevent immediate harm to persons or property
Government & Military Compliance
We maintain compliance with FedRAMP, FISMA, NIST Cybersecurity Framework, and other government security standards. Data sharing only occurs under lawful government authority with proper legal process.
Your Rights & Data Control
Under GDPR (European Union)
- Right to Access: Request a copy of your personal data
- Right to Rectification: Correct inaccurate personal data
- Right to Erasure: Request deletion of your personal data
- Right to Restrict Processing: Limit how we process your data
- Right to Data Portability: Receive your data in a structured format
- Right to Object: Object to processing based on legitimate interests
- Right to Withdraw Consent: Withdraw consent for data processing
Under CCPA (California)
- Right to Know: What personal information we collect and how it's used
- Right to Delete: Request deletion of personal information
- Right to Opt-Out: Opt-out of the sale of personal information (we don't sell data)
- Right to Non-Discrimination: Equal service regardless of privacy choices
Under PIPEDA (Canada)
- Right to Access: Access your personal information we hold
- Right to Correct: Correct inaccurate personal information
- Right to Complain: File complaints with the Privacy Commissioner
Exercising Your Rights
To exercise any of these rights, contact us at:
Retention Periods
- Active Accounts: Data retained while account is active
- Inactive Accounts: Data deleted after 2 years of inactivity (configurable by administrator)
- Security Logs: Retained for 7 years for compliance and security monitoring
- Audit Trails: Retained per regulatory requirements (typically 7-10 years)
- Session Data: Deleted after 90 days
Secure Deletion
- Cryptographic Erasure: Encryption keys are destroyed, making data unrecoverable
- Multi-Pass Overwriting: Physical storage is overwritten multiple times
- Certificate of Destruction: Available upon request for compliance purposes
- Data Residency: Your data is stored in the region specified by your administrator
- Transfer Protections: All international transfers use Standard Contractual Clauses (SCCs)
- Adequacy Decisions: We prioritize transfers to countries with adequate data protection
- No Surveillance Concerns: We implement safeguards against unlawful government surveillance
In the unlikely event of a data breach:
- 72-Hour Notification: We notify relevant authorities within 72 hours
- User Notification: We notify affected users without undue delay if there's high risk
- Transparency: We provide clear information about what happened and what we're doing
- Remediation: We take immediate steps to secure systems and prevent future breaches
Privacy Compliance
- GDPR (General Data Protection Regulation)
- CCPA (California Consumer Privacy Act)
- PIPEDA (Personal Information Protection and Electronic Documents Act)
- COPPA (Children's Online Privacy Protection Act)
Security Standards
- SOC 2 Type II
- ISO 27001
- NIST Cybersecurity Framework
- FedRAMP (when applicable)
- FISMA Compliance
Contact Information
Privacy Inquiries
Email: [email protected]
Response Time: 24-48 hours
Data Protection Officer
Email: [email protected]
Role: GDPR Compliance & Data Protection
Security Concerns
Email: [email protected]
Response Time: Immediate for critical issues
Mailing Address
Your Company NamePrivacy Officer
123 Main Street
City, State, ZIP