Privacy Policy

Your privacy matters to us. We're committed to protecting your personal information and being transparent about our data practices.

```
Last Updated: January 15, 2025 | Effective Date: January 15, 2025
We may update this policy periodically. Any changes will be posted on this page with an updated revision date.

1. Introduction

EzmCyber (collectively with its affiliates, "EzmCyber," "we," "us," or "our") is committed to protecting your privacy and maintaining the security of your personal information. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you visit our website, use our services, or engage with our cybersecurity solutions.

This policy applies to all personal information collected by EzmCyber through our website, services, communications, and any other interactions you may have with us. By using our services, you acknowledge that you have read and understood this Privacy Policy and agree to the collection, use, and disclosure of your information as described herein.

Our Commitment: As a cybersecurity company, we understand the critical importance of data protection. We apply the same rigorous security standards to your personal information that we recommend to our clients.

2. What Information We Collect

We collect information to provide better services and protect our users. The types of information we collect include:

2.1 Information You Provide Directly

  • Contact Information: Name, email address, phone number, company name, job title
  • Account Information: Username, password, security preferences
  • Communication Data: Messages, inquiries, feedback, and support requests
  • Service-Related Information: Details about your cybersecurity needs, infrastructure, and requirements
  • Payment Information: Billing address, payment method details (processed securely through third-party providers)
  • Marketing Preferences: Newsletter subscriptions, communication preferences

2.2 Information Collected Automatically

  • Technical Data: IP address, browser type and version, operating system, device information
  • Usage Data: Pages visited, time spent on site, click-through rates, search queries
  • Location Data: General geographic location based on IP address
  • Security Data: Information about potential security threats and suspicious activities

2.3 Information from Third Parties

  • Business Partners: Information from authorized partners and referrals
  • Public Sources: Publicly available information for business verification
  • Social Media: Information from social media platforms when you interact with our content

3. How We Use Your Information

We use the collected information for legitimate business purposes, including:

3.1 Service Delivery

  • Providing cybersecurity services, consultations, and support
  • Processing transactions and managing billing
  • Customizing services to meet your specific security needs
  • Maintaining and improving our service quality

3.2 Communication

  • Responding to inquiries and support requests
  • Sending service updates, security alerts, and notifications
  • Providing newsletters and educational content (with consent)
  • Conducting surveys and gathering feedback

3.3 Security and Protection

  • Protecting against fraud, unauthorized access, and security threats
  • Monitoring for malicious activity and preventing cyberattacks
  • Ensuring compliance with legal and regulatory requirements
  • Maintaining audit trails and security logs

3.4 Business Operations

  • Analyzing website usage and improving user experience
  • Developing new services and features
  • Conducting research and analytics
  • Marketing our services (with appropriate consent)

4. How We Share Information

We do not sell, trade, or rent your personal information to third parties. We may share your information only in the following circumstances:

4.1 Service Providers

We may share information with trusted third-party service providers who assist us in operating our business, such as:

  • Cloud hosting and infrastructure providers
  • Payment processing companies
  • Email marketing and communication platforms
  • Analytics and monitoring services

These providers are contractually obligated to protect your information and use it only for specified purposes.

4.2 Legal Requirements

We may disclose information when required by law, court order, or government request, or when necessary to:

  • Comply with legal obligations
  • Protect our rights and property
  • Prevent fraud or security threats
  • Protect the safety of our users and the public

4.3 Business Transfers

In the event of a merger, acquisition, or sale of assets, your information may be transferred to the acquiring entity, with appropriate notice and protection measures.

4.4 Consent-Based Sharing

We may share information with your explicit consent for specific purposes not covered by this policy.

5. Cookies & Tracking Technologies

Our website uses cookies and similar technologies to enhance user experience and analyze site performance.

5.1 Types of Cookies We Use

  • Essential Cookies: Required for website functionality and security
  • Analytics Cookies: Help us understand how visitors use our site
  • Functional Cookies: Remember your preferences and settings
  • Marketing Cookies: Track effectiveness of our marketing campaigns

5.2 Managing Cookies

You can control cookie preferences through your browser settings. However, disabling certain cookies may affect website functionality. Most browsers allow you to:

  • View and delete existing cookies
  • Block or allow cookies from specific sites
  • Set preferences for third-party cookies
  • Receive notifications when cookies are set

6. Data Protection & Security

We implement comprehensive security measures to protect your personal information:

6.1 Technical Safeguards

  • Encryption: Data encrypted in transit and at rest using industry-standard protocols
  • Access Controls: Multi-factor authentication and role-based access restrictions
  • Network Security: Firewalls, intrusion detection, and monitoring systems
  • Secure Infrastructure: Protected servers and secure hosting environments

6.2 Administrative Safeguards

  • Regular security training for all personnel
  • Background checks for employees with data access
  • Incident response procedures and breach notification protocols
  • Regular security audits and assessments

6.3 Physical Safeguards

  • Secure facilities with access controls
  • Environmental controls and monitoring
  • Secure disposal of physical media
Important Note: While we implement robust security measures, no online system is 100% secure. We encourage you to use strong, unique passwords and remain vigilant about your online security.

7. Data Retention

We retain personal information only as long as necessary to fulfill the purposes outlined in this policy or as required by law.

7.1 Retention Periods

  • Account Information: Retained while account is active, plus 3 years after closure
  • Transaction Records: 7 years for tax and legal compliance
  • Communication Data: 3 years or until resolved
  • Marketing Data: Until consent is withdrawn or 2 years of inactivity
  • Technical Logs: 12 months for security and operational purposes

7.2 Secure Deletion

When information is no longer needed, we securely delete or anonymize it using industry-standard methods to prevent unauthorized recovery.

8. Your Privacy Rights

Depending on your location, you may have the following rights regarding your personal information:

8.1 Access and Portability

  • Request access to your personal information
  • Receive a copy of your data in a portable format
  • Obtain information about how your data is processed

8.2 Correction and Update

  • Request correction of inaccurate information
  • Update your contact preferences
  • Modify your account settings

8.3 Deletion and Restriction

  • Request deletion of your personal information
  • Restrict processing of your data
  • Object to certain uses of your information

8.4 Consent Management

  • Withdraw consent for marketing communications
  • Opt-out of non-essential data processing
  • Manage cookie preferences

Exercise Your Rights

To exercise any of these rights, please contact us with your request. We will respond within 30 days and may require identity verification for security purposes.

9. Children's Privacy

Our services are not directed to individuals under the age of 13, and we do not knowingly collect personal information from children under 13. If we become aware that we have collected personal information from a child under 13, we will take steps to delete such information promptly.

Parents and guardians who believe we may have collected information from a child under 13 should contact us immediately.

10. International Data Transfers

Your information may be processed and stored in countries other than your own. We ensure appropriate safeguards are in place for international data transfers, including:

  • Adequacy decisions by relevant authorities
  • Standard contractual clauses
  • Binding corporate rules
  • Other legally recognized transfer mechanisms

11. Third-Party Services

Our website may contain links to third-party websites and services. This Privacy Policy does not apply to these external sites. We encourage you to review the privacy policies of any third-party services you use.

We are not responsible for the privacy practices or content of third-party websites and services.

12. Changes to This Policy

We may update this Privacy Policy periodically to reflect changes in our practices, technology, legal requirements, or other factors. When we make material changes, we will:

  • Post the updated policy on this page with a new effective date
  • Notify users via email if they have accounts with us
  • Provide prominent notice on our website
  • Obtain consent where required by law

We encourage you to review this policy regularly to stay informed about how we protect your information.

13. Contact Information

If you have questions, concerns, or requests regarding this Privacy Policy or our data practices, please contact us:

Get in Touch

Privacy Officer: Niffy

Email: Use our contact form

Response Time: We aim to respond to all privacy-related inquiries within 48 hours.

Your Privacy Matters: As a cybersecurity company, we take privacy seriously. If you have any concerns about how your information is handled, please don't hesitate to reach out. We're here to help and ensure your privacy is protected.

```