Privacy Policy

How we protect your data and ensure GDPR/NIST/ISO27001 compliance in our security infrastructure

Information We Collect

We collect technical data required for secure operations including:

  • Authentication metadata (device fingerprints, IP geolocation)
  • Threat detection analytics (attack signatures, anomaly patterns)
  • Compliance audit logs (access timestamps, role-based activity)

All data collection occurs under strict zero-trust protocols with real-time encryption.

Data Usage

Collected information is used for:

Security Operations

Real-time anomaly detection, adaptive threat response, and automated system hardening.

Compliance

Generating SOC2, HIPAA, and GDPR required audit trails for regulatory bodies.

User Rights

Access

Request copy of all data collected about your account

Submit request

Erasure

Delete all personally identifiable information from our systems

Initiate deletion

Export

Download your data in standard JSON format for external management

Export data

Security Safeguards

FIPS 140-2 and FIDO2 compliant security modules

Zero-trust architecture with micro-segmentation controls

256-bit AES-GCM encryption for all persistent data