We build security into our services to protect your information. All our products and services are built with strong security features that continuously protect your information. The insights we gain from maintaining our services help us detect and automatically block security threats. We work hard to protect you and our services from unauthorized access, alteration, disclosure, or destruction of information. Measures implemented include but are not limited to:
- We use strong encryption to keep your data private while in transit.
- We encrypt data on all storage devices to keep your data private while at rest.
- We continuously review our information collection, storage, and processing practices, including physical security measures, to prevent unauthorized access to our systems.
- We restrict access to personal information to employees, contractors, and agents who need that information in order to process it. Anyone with this access is subject to strict contractual confidentiality obligations and may be disciplined, terminated, and prosecuted if they fail to meet these obligations.
A cookie is a tiny piece of text sent to your browser by a website you visit. It helps the website to remember information about your visit, like your preferred language and other settings, and to recall who you are after having logged in.
You can set your browser to ask before allowing cookies or to not allow cookies at all. Please refer to your browser's help to find out about the options available. Please be aware, that it is not possible to log on to our services with cookies deactivated.
You can use the social media icons provided on our sites to post content and and to comment on social networks.
When you click on any of these icons, you will be directed to the respective site. That site will be registering that action and may use that information. Please refer to the respective policies of that site to see how exactly they use your information and to find out how to opt out or delete such information.
When you are using our services, our network perimeter devices (e.g. firewalls or routers) collect technical data including data from the device that you use to connect to the internet:
- your ip address
- user-agent string
- HTTP request methods (e.g.
- status codes (e.g.
404 Not Found)
- amount of data transferred
We solely use this information to detect attacks on our infrastructure. Log data is deleted automatically after 90 days.
A content delivery network or content distribution network (CDN) is a geographically distributed network of proxy servers and data centers. The goal is to provide high availability and high performance by distributing the service spatially relative to end-users.
Our own communication services including but not limited to email and voice run on Microsoft Office 365 and Azue (aka: "the Microsoft Cloud"). All services are hosted in european datacenters. Please see Microsoft Trust Center for details on how Microsoft aims to protect personal data. Microsoft is also an active participant in the EU-U.S. Privacy Shield Framework, which regulates the correct and secure transfer of personal data. Please find more information by visiting PrivacyShield.gov.
Zendesk Support by Zendesk, Inc. is a SaaS ("cloud based") solution that we use to manage contact and support requests. Please refer to Zendesk Privacy and Data Protection for details on their measures on Privacy and data Protection. Zendesk is an active participant in the EU-U.S. Privacy Shield Framework, which regulates the correct and secure transfer of personal data. Please find more information by visiting PrivacyShield.gov.
TeamViewer by TeamViewer GmbH is a proprietary software solution for remote control and desktop sharing. We use TeamViewer to connect to our customers endpoints (laptops, desktops, servers, and mobile phones) to provide support and technical assistance.
While we do not collect any data from these support sessions, TeamViewer may collect additional data. Please see TeamViewer Trust Center for details.
- Information to be provided where personal data have not been obtained from the data subject (Art. 14): not applicable, all personal data will be obtained from the data subject
- Right of access by the data subject (Art. 15): you have the right to access your personal data that we hold. This is called a subject access request. We must respond to your request within one month.
- Right to rectification (Art. 16): if you think the data we hold on you is incorrect, please inform us so we can put it right.
- Right to erasure ('right to be forgotten') (Art. 17): you have the right to request that we delete your data. We will do so, provided that we do not have a compelling reason for keeping it.
- Right to restriction of processing (Art. 18)
- Notification obligation regarding rectification or erasure of personal data or restriction of processing (Art. 19)
- Right to data portability (Art. 20): you can obtain and reuse your personal data for your own purposes across different services.
- Right to object (Art. 21): you have the right to object to
- Direct marketing: you can opt out of direct marketing any time by following the instructions on how to unsubscribe included in any direct marketing message that we send to you.
- Any processing where our lawful basis is legitimate interest (see above). If you would like to formally object to any of our legitimate interest processing, please contact us.
- Automated individual decision-making, including profiling (Art. 22): this is not something we do at all. If that ever changes, this policy will be updated accordingly.
Please send formal complaints, feedback, and requests regarding data privacy and data protection to DataPrivacy@THREATINT.com.