1. Information We Collect
At Shrkdeep, we are committed to transparency about the information we collect and how we use it to provide our cybersecurity services. We collect several types of information to deliver and improve our services:
Personal Information
When you engage with our services, we may collect personal information including but not limited to:
- Contact details (full name, email address, telephone number, business address)
- Professional information (company name, job title, department)
- Account credentials and authentication data
- Billing and payment information
- Communication preferences and marketing consent
Technical and Operational Data
To ensure the security and performance of our services, we collect:
- IP addresses, browser type and version, time zone settings
- Device information including hardware model, operating system
- Network information and connection data
- Service usage patterns, feature interactions, and performance metrics
- Security logs, threat detection data, and system events
Business Information
For enterprise clients, we may process:
- Organizational structure and security requirements
- Compliance documentation and audit trails
- Security incident reports and response documentation
- Service level agreements and contractual obligations
2. How We Use Your Information
We utilize the collected information for specific business purposes aligned with our cybersecurity mission:
Service Delivery and Operations
- Providing, maintaining, and improving our cybersecurity services
- Configuring security controls and threat detection systems
- Monitoring service performance and reliability
- Processing transactions and managing billing
- Delivering technical support and customer service
Security and Protection
- Detecting, preventing, and addressing security threats
- Investigating security incidents and potential vulnerabilities
- Implementing access controls and authentication mechanisms
- Maintaining audit trails for compliance and forensic purposes
- Protecting against fraud, abuse, and unauthorized access
Business Operations and Development
- Developing new security features and service enhancements
- Conducting research and analysis to improve threat intelligence
- Personalizing user experiences and service recommendations
- Communicating important service updates and security advisories
- Managing our business operations and strategic planning
Legal and Compliance
- Complying with legal obligations and regulatory requirements
- Responding to lawful requests and legal processes
- Enforcing our terms of service and agreements
- Protecting our rights, privacy, safety, and property
3. Data Sharing and Disclosure
We understand the sensitivity of cybersecurity information and limit data sharing to specific circumstances:
Service Providers and Partners
We may share information with trusted third-party providers who assist in delivering our services, including:
- Cloud infrastructure providers for hosting and storage
- Security technology partners for threat intelligence
- Payment processors for financial transactions
- Customer support and communication platforms
All third-party providers are contractually bound to protect your information and may only process it for specified purposes.
Legal Requirements
We may disclose information when required by law, such as:
- Responding to valid legal processes, court orders, or subpoenas
- Cooperating with law enforcement investigations
- Complying with regulatory requirements and audits
- Protecting against legal liability and claims
Business Transfers
In the event of a merger, acquisition, or sale of assets, customer information may be transferred as part of the transaction, subject to confidentiality commitments.
4. Data Security Measures
As a cybersecurity company, we implement comprehensive security measures to protect your information:
Technical Safeguards
- Advanced encryption for data in transit and at rest
- Multi-factor authentication and access controls
- Regular security assessments and penetration testing
- Intrusion detection and prevention systems
- Secure development practices and code review processes
Organizational Controls
- Employee security training and background checks
- Strict access policies based on role and necessity
- Regular security audits and compliance monitoring
- Incident response planning and disaster recovery procedures
- Vendor security assessments and due diligence
Data Retention
We retain personal information only for as long as necessary to fulfill the purposes outlined in this policy, unless a longer retention period is required or permitted by law. Retention periods vary based on:
- Ongoing business relationships and service requirements
- Legal and regulatory obligations
- Security and forensic investigation needs
- Historical analysis and service improvement
5. Your Rights and Choices
We respect your privacy rights and provide mechanisms to exercise control over your information:
Access and Correction
You have the right to access and update your personal information. You can review and edit your account information through our customer portal or by contacting us directly.
Data Portability
Where applicable, you may request a copy of your personal data in a structured, machine-readable format.
Deletion and Restriction
You may request deletion of your personal information, subject to certain legal and operational requirements. We may need to retain some information for legitimate business purposes or legal compliance.
Marketing Communications
You can opt-out of marketing communications at any time by using the unsubscribe link in our emails or updating your communication preferences in your account settings.
Cookies and Tracking
You can manage cookie preferences through your browser settings. However, disabling certain cookies may affect the functionality of our services.
6. International Data Transfers
As a global cybersecurity provider, we may transfer and process information in various locations worldwide. We ensure appropriate safeguards are in place for international data transfers, including:
- Standard contractual clauses approved by regulatory authorities
- Adequacy decisions for transfers to approved jurisdictions
- Binding corporate rules for intra-organizational transfers
- Additional technical and organizational security measures
7. Policy Updates
We may update this Privacy Policy periodically to reflect changes in our practices, services, or legal requirements. We will notify you of significant changes through appropriate channels, such as email notifications or service announcements.
The "Last updated" date at the top of this policy indicates when the most recent changes were made. We encourage you to review this policy regularly to stay informed about how we protect your information.
8. Contact Information
If you have any questions, concerns, or requests regarding this Privacy Policy or our data practices, please contact our Privacy Team: