# PRIVACY POLICY
We collect the minimum data necessary to deliver our cybersecurity services. Your privacy is paramount, and our practices reflect enterprise-grade security standards.
## Data Collection
→ Contact information (name, email, company)
→ Service usage data and logs
→ Technical metadata for incident response
## Data Processing
✓ Encrypted at rest (AES-256)
✓ Encrypted in transit (TLS 1.3)
✓ Zero-knowledge architecture where applicable
✓ SOC 2 Type II & ISO 27001 compliant
## Your Rights
You have the right to access, modify, or delete your data at any time.
## Data Retention
We retain data only as long as necessary for service delivery and legal compliance. Incident response data is purged according to contractual agreements.
## Updates
Last updated: 2025-01-12
This policy may be updated periodically. Material changes will be communicated via email.