Securicy

Privacy Policy




<p>By using our website you agree to our privacy policy.</p> Accept &lt;iframe src="https://www.googletagmanager.com/ns.html?id=GTM-T5WZG4R" height="0" width="0" style="display:none;visibility:hidden"&gt;&lt;/iframe&gt. <ul> <li>Login</li> <li>Blog</li> <li>Careers</li> <li>Contact</li> </ul> <ul> <li>Product</li> <li>Solutions <ul> <li>SOC 2 Audit Readiness</li> <li>HIPAA Compliance Fast Track</li> <li>Business Continuity Plan Builder</li> </ul> </li> <li>Pricing</li> <li>Resources</li> <li>About</li> <li> Book a Demo Get Securicy Free </li> </ul> Privacy Policy of Securicy.com <p> The Securicy website, the Securicy web application and supporting applications collect some personal data from users. </p> <strong>Owner and Data Controller</strong> <p>Securicy Data Solutions Ltd. 92 Hillcrest Ave, Sydney, NS B1R 1V2 is the Data Owner and Data Controller<br> <strong>Owner and Data Controller contact email:</strong>&nbsp;info@securicy.com.</p> <strong>Types of Data Collected</strong> <p> Among the types of Personal Data Securicy website, the Securicy web application and supporting applications collect include: Cookies, Usage Data (page and link clicks, time on page), email address, phone number, first name, last name, province, state, country, ZIP/Postal code, city, address, and company name. </p> <p> Complete details on each type of Personal Data collected are provided in the dedicated sections of this privacy policy or by specific explanation texts displayed prior to the Data collection. </p> <p> Personal Data may be freely provided by the User, or, in case of Usage Data, collected automatically when using this website, the Securicy web application and supporting applications. </p> <p> Certain Data is required for the Securicy web application and supporting applications to provide services. Cases where data is mandatory are noted throughout the website and Securicy web application. In cases where the website and Securicy web application specifically state that data is not mandatory, Users are free not to communicate this Data without consequences to the availability or the functioning of the Service. </p> <p> Users who are uncertain about which Personal Data is mandatory are welcome to contact Securicy at&nbsp;info@securicy.com.</p> <p> Any use of Cookies – or of other tracking tools – by the Securicy website, the Securicy web application and supporting applications serves the purpose of providing the Service required by the User, in addition to any other purposes described in the present document and in the Cookie Policy. </p> <p> Data obtained by third-party applications is provided to the owner and Data controller, Securicy Data Solutions Ltd. </p> <p> </p> <strong>Mode and Place of Processing the Data&nbsp;Methods of Processing</strong> <p> Securicy Data Solutions Ltd (Owner and Controller) takes appropriate security measures to prevent unauthorized access, disclosure, modification, or unauthorized destruction of the Data. </p> <p> The Data processing is carried out using computers and/or IT enabled tools, following organizational procedures and modes strictly related to the purposes indicated. In addition to the Owner, in some cases, the Data may be accessible to employees of Securicy Data Solutions Ltd that are involved with the operation of the Securicy website, the Securicy web application and supporting applications. This includes but is not limited to administration, sales, marketing, legal, and system administrators. The data may also be accessible to external parties (such as third-party technical service providers, mail carriers, hosting providers, and IT companies) appointed, if necessary, as Data Processors by Securicy Data Solutions Ltd. </p> <p> The updated list of these parties may be requested from Securicy Data Solutions Ltd at any time. </p> <strong>Legal Basis of Processing</strong> <p> Securicy Data Solutions (the Owner and Data Controller) may process Personal Data relating to Users if one of the following applies: </p> <ul> <li> Users have given their consent for one or more specific purposes. Note: Under some legislations the Owner may be allowed to process Personal Data until the User objects to such processing (“opt-out”), without having to rely on consent or any other of the following legal bases. This, however, does not apply, whenever the processing of Personal Data is subject to European data protection law. </li> <li> Provision of Data is necessary for the performance of an agreement with the User and/or for any pre-contractual obligations thereof. </li> <li> Processing is necessary for compliance with a legal obligation to which the Owner is subject. </li> <li> Processing is related to a task that is carried out in the public interest or in the exercise of official authority vested in the Owner. </li> <li> Processing is necessary for the purposes of the legitimate interests pursued by the Owner or by a third party. </li> </ul> <p> In any case, the Owner will gladly help to clarify the specific legal basis that applies to the processing, and in particular whether the provision of Personal Data is a statutory or contractual requirement, or a requirement necessary to enter into a contract. </p> <strong>Place</strong> <p> The Data is processed at the Owner’s operating offices and in any other places where the parties involved in the processing are located. </p> <p> Depending on the User’s location, data transfers may involve transferring the User’s Data to a country other than their own. To find out more about the place of processing of such transferred Data, Users can check the section containing details about the processing of Personal Data. </p> <p> Users are also entitled to learn about the legal basis of Data transfers to a country outside of Canada, the United States of America and the European Union or to any international organization governed by public international law or set up by two or more countries, such as the UN, and about the security measures taken by the Owner to safeguard their Data. </p> <p> If any such transfer takes place, Users can find out more by checking the relevant sections of this document or inquire with the Owner using the information provided in the contact section. </p> <strong>Retention Time</strong> <p>Personal Data shall be processed and stored for as long as required by the purpose they have been collected for. </p> <p> Therefore: </p> <ul> <li> Personal Data collected for purposes related to the performance of a contract between the Owner and the User shall be retained until such contract has been fully performed. </li> <li> Personal Data collected for the purposes of the Owner’s legitimate interests shall be retained as long as needed to fulfill such purposes. Users may find specific information regarding the legitimate interests pursued by the Owner within the relevant sections of this document or by contacting the Owner. </li> </ul> <p>The Owner may be allowed to retain Personal Data for a longer period whenever the User has given consent to such processing, as long as such consent is not withdrawn. Furthermore, the Owner may be obliged to retain Personal Data for a longer period whenever required to do so for the performance of a legal obligation or upon order of an authority. </p> <p>Once the retention period expires, Personal Data shall be deleted. Therefore, the right to access, the right to erasure, the right to rectification and the right to data portability cannot be enforced after expiration of the retention period. </p> <strong>The Purposes of Processing</strong> <p> The Data concerning the User is collected to allow the Owner to provide its Services, as well as for the following purposes: Analytics, User database management, Managing contacts and sending messages, Handling payments, Interaction with external social networks and platforms, Remarketing and behavioral targeting, Contacting the User, Displaying content from external platforms, Hosting and backend infrastructure, Interaction with live chat platforms and SPAM protection. </p> <p> Users can find further detailed information about such purposes of processing and about the specific Personal Data used for each purpose in the respective sections of this document. <br> </p> <strong>Detailed Information on the Processing of Personal Data</strong> <p> Personal Data is collected for the following purposes and using the following services: </p> <strong>Analytics</strong> <p> The services contained in this section enable the Owner to monitor and analyze web traffic and can be used to keep track of User behavior. </p> <p> <strong>HubSpot Analytics (HubSpot, Inc.)</strong> <br>HubSpot Analytics is an analytics service provided by HubSpot, Inc. </p> <p> Personal Data collected: Cookies and Usage Data. </p> <p>Place of processing: US –&nbsp;Privacy Policy – Opt Out.</p> <p> <strong>Google Analytics (Google Inc.)</strong> <br> Google Analytics is a web analysis service provided by Google Inc. (“Google”). Google utilizes the Data collected to track and examine the use of this Application, to prepare reports on its activities and share them with other Google services. </p> <p> Google may use the Data collected to contextualize and personalize the ads of its own advertising network. </p> <p> Personal Data collected: Cookies and Usage Data. </p> <p>Place of processing: US –&nbsp;Privacy Policy&nbsp;–&nbsp;Opt Out.</p> <p> <strong>FullStory</strong> <br>FullStory is an analytics service provided by FullStory, Inc..</p> <p> Personal Data collected: Cookies and Usage Data. </p> <p>Place of processing: US –&nbsp;Privacy Policy.</p> <p> <strong>Twitter Ads Conversion Tracking (Twitter, Inc.)</strong> <br> Twitter Ads conversion tracking is an analytics service provided by Twitter, Inc. that connects data from the Twitter advertising network with actions performed on this Application. </p> <p> Personal Data collected: Cookies and Usage Data. </p> <p>Place of processing: US –&nbsp;Privacy Policy.</p> <p> <strong>Google Ads Conversion Tracking (Google Inc.)</strong> <br> Google Ads conversion tracking is an analytics service provided by Google Inc. that connects data from the Google Ads advertising network with actions performed on this Application. </p> <p> Personal Data collected: Cookies and Usage Data. </p> <p>Place of processing: US –&nbsp;Privacy Policy. Privacy Shield participant.</p> <p> <strong>Google Tag Manager (Google Inc.)</strong> <br> Google Tag Manager is an analytics service provided by Google Inc.</p> <p> Personal Data collected: Cookies and Usage Data. </p> <p>Place of processing: US –&nbsp;Privacy Policy.</p> <p> </p> <strong>Contacting the User</strong> <p> <strong>Mailing List or Newsletter (The Securicy Web Application)</strong> <br> By registering on the mailing list or for the newsletter, the User’s email address will be added to the contact list of those who may receive email messages containing information of commercial or promotional nature concerning the Securicy web application. Your email address might also be added to this list as a result of signing up via the Securicy website, the Securicy web application or after making a purchase. </p> <p>Personal Data collected: address, city, company name, Cookies, country, email address, first name, last name, phone number, job role, province, state, Usage Data and ZIP/Postal code. </p> <p> <strong>Phone Contact (The Securicy Web Application)</strong> <br> Users that provided their phone number might be contacted for commercial or promotional purposes related to the Securicy web application, as well as for fulfilling support requests. </p> <p> Personal Data collected: Phone Number. </p> <p> <strong>Contact Form (The Securicy Web Application)</strong> <br> By filling in the contact form with their Data, the User authorizes the Securicy web application to use these details to reply to requests for information, quotes or any other kind of request as indicated by the form’s header. </p> <p>Personal Data collected: address, city, company name, country, email address, first name, last name, phone number, job role, province, state, and ZIP/Postal code. </p> <p> </p> <strong>Displaying Content from External Platforms</strong> <p>This type of services allows you to view content hosted on external platforms directly from the pages of the Securicy web application and interact with them.</p> <p>This type of service might still collect web traffic data for the pages where the service is installed, even when Users do not use it.</p> <p> <strong>Google Fonts (Google Inc.)</strong> <br>Google Fonts is a typeface visualization service provided by Google Inc. that allows this Application to incorporate content of this kind on its pages.</p> <p>Personal Data collected: Usage Data and various types of Data as specified in the privacy policy of the service.</p> <p>Place of processing: US –&nbsp;Privacy Policy. Privacy Shield participant.</p> <p> <strong>YouTube Video Widget (Google Inc.)</strong> <br>YouTube is a video content visualization service provided by Google Inc. that allows the Securicy website, and Securicy web application &nbsp;to incorporate content of this kind on its pages.</p> <p>Personal Data collected: Cookies and Usage Data.</p> <p>Place of processing: US –&nbsp;Privacy Policy.</p> <p> </p> <strong>Handling Payments</strong> <p>Payment processing services enable the Securicy web application to process payments by credit card, bank transfer or other means. To ensure greater security, the Securicy web application shares only the information necessary to execute the transaction with the financial intermediaries handling the transaction.</p> <p>Some of these services may also enable the sending of timed messages to the User, such as emails containing invoices or notifications concerning the payment.</p> <p> <strong>Stripe (Stripe Inc)</strong> <br>Stripe is a payment service provided by Stripe Inc.</p> <p>Personal Data collected: various types of Data as specified in the privacy policy of the service.</p> <p>Place of processing: US –&nbsp;Privacy Policy.</p> <p> <strong>PayPal (PayPal Inc.)</strong> </p> <p>PayPal is a payment service provided by PayPal Inc., which allows Users to make online payments using their PayPal credentials.</p> <p>Personal Data collected: various types of Data as specified in the privacy policy of the service.</p> <p> <strong>Xero (Xero Limited)</strong> </p> <p>Xero is an accounting and invoicing service provided by Xero Limited, which allows organizations to invoice Users and users to make online payments.</p> <p>Personal Data collected: various types of Data as specified in the privacy policy of the service.</p> <p>Place of processing: US –&nbsp;Privacy Policy.</p> <p> </p> <strong>Hosting and Backend Infrastructure</strong> <p> This type of services has the purpose of hosting data and files that enable the Securicy website and the Securicy web application to run and be distributed as well as to provide a ready-made infrastructure to run specific features or parts of the application. Some of these services work through geographically distributed servers, making it difficult to determine the actual location where the Personal Data are stored. </p> <strong>Amazon Web Services (AWS) (Amazon)</strong> <p>Amazon Web Services is a hosting and backend service provided by Amazon.com Inc.</p> <p>Personal Data collected: various types of Data as specified in the privacy policy of the service.</p> <p>Place of processing: See the Amazon privacy policy –&nbsp;Privacy Policy.</p> <p> </p> <strong>Managing Contacts and Sending Messages</strong> <p>This type of services makes it possible to manage a database of email contacts, phone contacts or any other contact information to communicate with the User.</p> <p>These services may also collect data concerning the date and time when the message was viewed by the User, as well as when the User interacted with it, such as by clicking on links included in the message.</p> <p> <strong>HubSpot Email (HubSpot, Inc.)</strong> <br>HubSpot Email is an email address management and message sending service provided by HubSpot, Inc.</p> <p>Personal Data collected: email address and Usage Data.</p> <p>Place of processing: US –&nbsp;Privacy Policy.</p> <p> <strong>Twitter Remarketing (Twitter, Inc.)</strong> <br>Twitter Remarketing is a Remarketing and Behavioral Targeting service provided by Twitter, Inc. that connects the activity of this Application with the Twitter advertising network.</p> <p>Personal Data collected: Cookies and Usage Data.</p> <p>Place of processing: US –&nbsp;Privacy Policy&nbsp;–&nbsp;Opt Out.</p> <p> <strong>Twitter Tailored Audiences (Twitter, Inc.)</strong> <br>Twitter Tailored Audiences is a Remarketing and Behavioral Targeting service provided by Twitter, Inc. that connects the activity of this Application with the Twitter advertising network.</p> <p>Personal Data collected: Cookies and email address.</p> <p>Place of processing: US –&nbsp;Privacy Policy&nbsp;–&nbsp;Opt Out.</p> <p> <strong>AdWords Remarketing (Google Inc.)</strong> <br>AdWords Remarketing is a remarketing and behavioral targeting service provided by Google Inc. that connects the activity of this Application with the Adwords advertising network and the Doubleclick Cookie.</p> <p>Personal Data collected: Cookies and Usage Data.</p> <p>Place of processing: US –&nbsp;Privacy Policy&nbsp;–&nbsp;Opt Out.</p> <p> <strong>Remarketing with Google Analytics (Google Inc.)</strong> <br>Remarketing with Google Analytics is a remarketing and behavioral targeting service provided by Google Inc. that connects the tracking activity performed by Google Analytics and its Cookies with the Google Ads advertising network and the Doubleclick Cookie.</p> <p>Personal Data collected: Cookies and Usage Data.</p> <p>Place of processing: US –&nbsp;Privacy Policy&nbsp;–&nbsp;Opt Out. Privacy Shield participant.</p> <p> </p> <strong>SPAM Protection</strong> <p> This type of services analyzes the traffic of the Securicy website, and the Securicy application, potentially containing Users’ Personal Data, with the purpose of filtering it from parts of traffic, messages and content that are recognized as SPAM. </p> <strong>User Database Management</strong> <p>This type of services allows the Owner to build user profiles by starting from an email address, a personal name, or other information that the User provides to this Application, as well as to track User activities through analytics features. This Personal Data may also be matched with publicly available information about the User (such as social networks’ profiles) and used to build private profiles that the Owner can display and use for improving this Application.</p> <p>Some of these services may also enable the sending of timed messages to the User, such as emails based on specific actions performed on the Securicy website and Securicy web application.</p> <p> <strong>HubSpot CRM (HubSpot, Inc.)</strong> <br>HubSpot CRM is a User database management service provided by HubSpot, Inc.</p> <p>Personal Data collected: email address, phone number and various types of Data as specified in the privacy policy of the service.</p> <p>Place of processing: US –&nbsp;Privacy Policy.</p> <p> <strong>HubSpot Lead Management (HubSpot, Inc.)</strong> <br>HubSpot Lead Management is a User database management service provided by HubSpot, Inc.</p> <p>Personal Data collected: various types of Data as specified in the privacy policy of the service.</p> <p>Place of processing: US –&nbsp;Privacy Policy.</p> <p> <strong>Selling Goods and Services Online</strong> <br>The Personal Data collected are used to provide the User with services or to sell goods, including payment and possible delivery.</p> <p>The Personal Data collected to complete the payment may include the credit card, the bank account used for the transfer, or any other means of payment envisaged. The kind of Data collected by this Application depends on the payment system used.</p> <strong>Further Information about Personal Data</strong> <p> <strong>The Rights of Users</strong> <br>Users may exercise certain rights regarding their Data processed by the Owner.</p> <p>In particular, Users have the right to do the following:</p> <ul> <li> <strong>Withdraw their consent at any time.</strong>&nbsp;Users have the right to withdraw consent where they have previously given their consent to the processing of their Personal Data. </li> <li> <strong>Object to processing of their Data.</strong>&nbsp;Users have the right to object to the processing of their Data if the processing is carried out on a legal basis other than consent. Further details are provided in the dedicated section below. </li> <li> <strong>Access their Data.</strong>&nbsp;Users have the right to learn if Data is being processed by the Owner, obtain disclosure regarding certain aspects of the processing and obtain a copy of the Data undergoing processing. </li> <li> <strong>Verify and seek rectification.</strong>&nbsp;Users have the right to verify the accuracy of their Data and ask for it to be updated or corrected. </li> <li> <strong>Restrict the processing of their Data.</strong>&nbsp;Users have the right, under certain circumstances, to restrict the processing of their Data. In this case, the Owner will not process their Data for any purpose other than storing it. </li> <li> <strong>Have their Personal Data deleted or otherwise removed.</strong>&nbsp;Users have the right, under certain circumstances, to obtain the erasure of their Data from the Owner. </li> <li> <strong>Receive their Data and have it transferred to another controller.</strong>&nbsp;Users have the right to receive their Data in a structured, commonly used and machine readable format and, if technically feasible, to have it transmitted to another controller without any hindrance. This provision is applicable provided that the Data is processed by automated means and that the processing is based on the User’s consent, on a contract which the User is part of or on pre-contractual obligations thereof. </li> <li> <strong>Lodge a complaint.</strong>&nbsp;Users have the right to bring a claim before their competent data protection authority. </li> </ul> <p> </p> <strong>Details About the Right to Object to Processing</strong> <p>Where Personal Data is processed for a public interest, in the exercise of an official authority vested in the Owner or for the purposes of the legitimate interests pursued by the Owner, Users may object to such processing by providing a ground related to their particular situation to justify the objection.</p> <p>Users must know that, however, should their Personal Data be processed for direct marketing purposes, they can object to that processing at any time without providing any justification. To learn, whether the Owner is processing Personal Data for direct marketing purposes, Users may refer to the relevant sections of this document.</p> <p> <strong>How to Exercise These Rights</strong> <br>Any requests to exercise User rights can be directed to the Owner through the contact details provided in this document (info@securicy.com). These requests can be exercised free of charge and will be addressed by the Owner as early as possible and always within one month.</p> <p> <strong>Cookie Policy</strong> <br>The Securicy website and Securicy web application use Cookies.</p> <p>To learn more and for a detailed cookie notice, the User may consult the&nbsp;Cookie Policy.</p> <strong>Additional Information about Data Collection and Processing</strong> <p> <strong>Legal Action</strong> <br>The User’s Personal Data may be used for legal purposes by the Owner in Court or in the stages leading to possible legal action arising from improper use of this Application or the related Services.</p> <p>The User declares to be aware that the Owner may be required to reveal personal data upon request of public authorities.</p> <strong>Additional Information about User’s Personal Data</strong> <p> In addition to the information contained in this privacy policy, this Application may provide the User with additional and contextual information concerning particular Services or the collection and processing of Personal Data upon request. </p> <p> <strong>System Logs and Maintenance</strong> <br>For operation and maintenance purposes, this Application and any third-party services may collect files that record interaction with this Application (System logs) use other Personal Data (such as the IP Address) for this purpose.</p> <p> <strong>Information Not Contained in This Policy</strong> <br>More details concerning the collection or processing of Personal Data may be requested from the Owner at any time. Please see the contact information at the beginning of this document.</p> <p> <strong>How “Do Not Track” Requests are Handled</strong> <br>This Application does not support “Do Not Track” requests.</p> <p>To determine whether any of the third-party services it uses honor the “Do Not Track” requests, please read their privacy policies.</p> <strong>Changes to This Privacy Policy</strong> <p>The Owner reserves the right to make changes to this privacy policy at any time by giving notice to its Users on this page and possibly within this Application and/or – as far as technically and legally feasible – sending a notice to Users via any contact information available to the Owner. It is strongly recommended to check this page often, referring to the date of the last modification listed at the bottom.</p> <p>Should the changes affect processing activities performed on the basis of the User’s consent, the Owner shall collect new consent from the User, where required.</p> <p> </p> <strong>Definitions and Legal References</strong> <p> <strong>Personal Data (or Data)</strong> <br>Any information that directly, indirectly, or in connection with other information — including a personal identification number — allows for the identification or identifiability of a natural person.</p> <p> <strong>Usage Data</strong> <br>Information collected automatically through this Application (or third-party services employed in this Application), which can include: the IP addresses or domain names of the computers utilized by the Users who use this Application, the URI addresses (Uniform Resource Identifier), the time of the request, the method utilized to submit the request to the server, the size of the file received in response, the numerical code indicating the status of the server’s answer (successful outcome, error, etc.), the country of origin, the features of the browser and the operating system utilized by the User, the various time details per visit (e.g., the time spent on each page within the Application) and the details about the path followed within the Application with special reference to the sequence of pages visited, and other parameters about the device operating system and/or the User’s IT environment.</p> <p> <strong>User</strong> <br>The individual using this Application who, unless otherwise specified, coincides with the Data Subject.</p> <p> <strong>Data Subject</strong> <br>The natural person to whom the Personal Data refers.</p> <p> <strong>Data Processor (or Data Supervisor)</strong> <br>The natural or legal person, public authority, agency or other body which processes Personal Data on behalf of the Controller, as described in this privacy policy.</p> <p> <strong>Data Controller (or Owner)</strong> <br>The natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of Personal Data, including the security measures concerning the operation and use of this Application. The Data Controller, unless otherwise specified, is the Owner of this Application.</p> <p> <strong>This Application</strong> <br>The means by which the Personal Data of the User is collected and processed.</p> <p> <strong>Service</strong> <br>The service provided by this Application as described in the relative terms (if available) and on this site/application.</p> <p> <strong>European Union (or EU)</strong> <br>Unless otherwise specified, all references made within this document to the European Union include all current member states to the European Union and the European Economic Area.</p> <p> <strong>Cookies</strong> <br>Small piece of data stored in the User’s device.</p> <p> </p> <strong>Legal Information</strong> <p>This privacy statement has been prepared based on provisions of multiple legislations, including Art. 13/14 of Regulation (EU) 2016/679 (General Data Protection Regulation).</p> <p>This privacy policy relates solely to this Application, if not stated otherwise within this document.</p> <p>Latest update: March 24, 2020</p> <p> <strong>Securicy Data Solutions Ltd.<br> </strong>Attention: Laird Wilton<br>92 Hillcrest Ave <br>Sydney, Nova Scotia<br>Canada, B1R 1V2<br>Email:&nbsp;info@securicy.com</p> <ul> <li>Email* </li> <li>CommentsThis field is for validation purposes and should be left unchanged.</li> </ul> Product <ul> <li>Pricing</li> <li>Product</li> <li>Book a Demo</li> <li>Case Studies</li> <li>Support</li> <li>Login</li> </ul> Resources <ul> <li>The InfoSec Blog</li> <li>Webinars</li> <li>Security Awareness Training Videos</li> <li>Leadership Track Video Course</li> <li>Glossary</li> </ul> Company <ul> <li>Our Story</li> <li>Partners</li> <li>Careers</li> <li>Press Kit</li> <li>Contact Us</li> </ul> <ul> <li> </li> <li> </li> <li> </li> <li> Book a Demo </li> </ul> <p> <strong>Securicy © 2020 | Privacy Policy | Terms of Use</strong> </p>





Comments:
On 2020-12-15 00:47:12 UTC, michielbdejong (6) Staff wrote:

Crawled, old length: 29702, new length: 29690