Home
Services
  • Network Security
  • Security Engineering
  • Security Operations
  • Cloud Security
  • Compliance
  • Security Assessment
  • Vulnerability Management
  • Incident Response
  • Penetration Testing
  • Threat Hunting
  • Information Technology
Company
Contact
Blog/Insights
Home
Services
  • Network Security
  • Security Engineering
  • Security Operations
  • Cloud Security
  • Compliance
  • Security Assessment
  • Vulnerability Management
  • Incident Response
  • Penetration Testing
  • Threat Hunting
  • Information Technology
Company
Contact
Blog/Insights
More
  • Home
  • Services
    • Network Security
    • Security Engineering
    • Security Operations
    • Cloud Security
    • Compliance
    • Security Assessment
    • Vulnerability Management
    • Incident Response
    • Penetration Testing
    • Threat Hunting
    • Information Technology
  • Company
  • Contact
  • Blog/Insights
  • Home
  • Services
    • Network Security
    • Security Engineering
    • Security Operations
    • Cloud Security
    • Compliance
    • Security Assessment
    • Vulnerability Management
    • Incident Response
    • Penetration Testing
    • Threat Hunting
    • Information Technology
  • Company
  • Contact
  • Blog/Insights

Privacy Policy

 

Privacy Policy

Last Updated: 09.15.2024

At Breach Proof Solutions LLC, safeguarding your privacy and ensuring the security of your personal data is of paramount importance. This Privacy Policy outlines how we collect, use, protect, and share your personal information, ensuring compliance with applicable laws, including the General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Health Insurance Portability and Accountability Act (HIPAA), Federal Risk and Authorization Management Program (FedRAMP), Sarbanes-Oxley Act (SOX), and other relevant regulations.

By using our services, you agree to the collection and use of information in accordance with this Privacy Policy.

1. Information We Collect

A. Personal Information

We may collect the following types of personal information:

  • Contact Details: Name, email address, phone number, and mailing address.
  • Employment Information: Job title, company name, and related professional details.
  • Financial Data: Payment information, including credit card details and billing information for transactions.
  • Identifiers: IP address, device ID, browser type, and cookies.

B. Sensitive Information

  • Health Data (if applicable): When required to fulfill certain service contracts, particularly in healthcare-related services, we may collect health data in compliance with HIPAA.
  • Security Credentials: Login credentials and encryption keys when necessary for security purposes.

C. Automatically Collected Information

  • Technical Data: Information related to your interaction with our website and services, such as browser type, IP address, time zone settings, and device information.
  • Usage Data: Information about how you use our services, including visited pages, length of stay, and activity logs.

2. How We Use Your Information

We use the information we collect for the following purposes:

  • Service Delivery: To provide IT and cybersecurity services, including Network Security Architecture, Security Operations, and Risk Governance.
  • Client Support: To respond to inquiries, provide technical support, and improve the quality of our services.
  • Legal and Compliance Purposes: To ensure compliance with relevant legal obligations such as GDPR, CCPA, HIPAA, FedRAMP, SOX, and contractual obligations with the U.S. Department of Defense and Intelligence Community.
  • Marketing and Communication: To send promotional materials, newsletters, and information about our services, when consent is provided.
  • Fraud Prevention and Security: To detect, prevent, and mitigate security threats and breaches.

3. Legal Bases for Processing (GDPR Compliance)

We process your personal information based on the following legal grounds:

  • Contractual Necessity: To fulfill our obligations under the contracts we enter into with you.
  • Legitimate Interests: To provide, maintain, and improve our services while ensuring the security of your data.
  • Consent: For marketing activities and any processing of sensitive information, we will obtain your explicit consent.
  • Legal Obligation: When processing is required by applicable laws, including SOX, HIPAA, and GDPR.

4. Data Sharing and Disclosure

We do not sell your personal information. However, we may share your data under these circumstances:

  • Service Providers: We share your information with trusted third-party service providers to support our business operations (e.g., payment processors, cloud service providers, and security monitoring services). These parties are bound by confidentiality agreements and are required to protect your data.
  • Compliance with Legal Obligations: We may disclose your information to comply with legal obligations, court orders, or in response to lawful requests by public authorities, including meeting national security or law enforcement requirements.
  • Business Transfers: In the event of a merger, acquisition, or sale of assets, your data may be transferred as part of the business transaction.
  • Security Investigations: We may disclose your information as necessary to investigate or remedy potential security breaches.

5. Your Rights (GDPR, CCPA Compliance)

You have the following rights concerning your personal information:

  • Right to Access: You may request access to the personal data we hold about you.
  • Right to Rectification: You may request corrections to your personal data if it is inaccurate or incomplete.
  • Right to Erasure: You may request the deletion of your personal data under certain circumstances.
  • Right to Restriction: You may request that we limit the processing of your personal data in specific instances.
  • Right to Data Portability: You have the right to request your personal data in a structured, commonly used, and machine-readable format.
  • Right to Object: You may object to certain processing activities, including direct marketing.
  • Do Not Sell My Information (CCPA): You may opt-out of the sale of your personal data by contacting us.

To exercise your rights, please contact us at [Insert Contact Information].

6. Data Retention

We retain personal data only as long as necessary to fulfill the purposes outlined in this Privacy Policy, or as required by law (e.g., SOX data retention obligations). For clients subject to HIPAA, we comply with specific retention guidelines to protect sensitive health information.

7. Data Security

We implement industry-standard security measures, including encryption, secure networks, and multi-factor authentication, to protect your personal data from unauthorized access, disclosure, or destruction. While we strive to use commercially acceptable means to protect your personal information, no method of transmission over the internet or electronic storage is 100% secure. In the event of a security breach, Breach Proof Solutions LLC will take all reasonable steps to mitigate any damage. However, we are not liable for breaches beyond our control, such as those caused by unforeseen or uncontrollable security vulnerabilities.

8. Liability Limitation in the Event of Data Breach

Breach Proof Solutions LLC takes every precaution to protect your data, but in the case of an external data breach or other cyber incident beyond our control, we shall not be held liable for any damages unless due to proven gross negligence or willful misconduct on our part. We advise all clients to maintain their own insurance policies, such as cyber insurance, to mitigate potential risks related to such incidents.

9. International Data Transfers

As we provide global services, your personal data may be transferred and processed in countries outside of your home country, including the United States. We take all necessary steps to ensure that your data is transferred securely and in accordance with this Privacy Policy and applicable data protection laws.

10. Cookies and Tracking Technologies

We use cookies and other tracking technologies to enhance your browsing experience and analyze website usage. Cookies are small data files that are placed on your device. You can manage your cookie preferences through your browser settings.

11. Children's Privacy

Our services are not intended for individuals under the age of 16, and we do not knowingly collect personal data from children. If we become aware that we have collected personal data from a child under 16, we will delete that information immediately.

12. Changes to This Privacy Policy

We may update this Privacy Policy periodically to reflect changes in our practices, technologies, or legal requirements. The updated version will be posted on our website with the revised date. Continued use of our services after any such changes will constitute your acknowledgment of the updated Privacy Policy.

13. Contact Us

If you have any questions about this Privacy Policy, or if you wish to exercise your data protection rights, please contact us at:

Breach Proof Solutions LLC
30 North Gould Street, Sheridan, Wyoming 82801, United States
Toll-Free: 1 (800) 260-9321
Email: Support@breachproofsolutions.com

This Privacy Policy is designed to protect both your clients and your company, ensuring legal compliance and reducing your liability in the case of data breaches or security incidents beyond your control.


Copyright © 2024 Breach Proof Solutions - All Rights Reserved.

  • Company
  • Contact
  • Blog/Insights
  • Privacy Policy
  • Terms of Service

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept