|
|
|
|
|
|
|
|
|
|
|
Our Commitment
|
We are committed to keeping all information we gather from you private and secure. After all, we are a security company, and we have worked hard to gain your trust. We will spare no cost to implement the latest technology available to keep our committment to you.
|
|
Information We Gather
|
We may gather your company name, contact person's name, address, phone numbers and email address when you purchase our products or services. We treat all information we gather from our customers as highly confidential.
|
|
How We Keep Your Information Private
|
We only use the information you provide us for its intended purpose. The contact information we gather will only be used when we need to contact you regarding our products, services or to provide customer support. We will never disclose any information you provide us to any third party. We will only contact you using your contact information in response to your request for customer support, or when we need to communicate some important information to you about a product or service you have purchased. In certain circumstances we may provide information to you about our products, services or general security issues. In these cases, we will always ask your permission beforehand, and will always give you the ability to stop receiving these informational communications.
|
|
How We Keep Your Information Secure
|
We are a security company and we practice what we preach. We have implemented multiple lines of defense in order to protect your confidential informaiton as well as our own confidential information. Some of the defenses we have deployed are described further. We have implemented various firewall technologies to prevent unauthorized access to our systems. We have implemented various intrusion detection systems to actively monitor, detect and alert us to any attempted intrusions into our company network. We have implemented various network and system monitoring technologies to actively monitor our network and servers to ensure they are available at all times. We have implemented a robust data backup plan that maintains critical data in various locations to ensure that it is not lost. We have physically secured our entire computing infrastructure so that no unauthorized personnel have access to it. Finally, we have implemented a large array of computer and security policies that we enforce emphatically and update regularly. All of these measures ensure that your information remains as secure as possible at all times.
|
|
|
|
|
|
|
|
|
|