Last Updated: January 1, 2025
Effective Date: January 1, 2025
Our Commitment to Your Privacy
AI Capital Defender is committed to protecting your personal information and your right to privacy. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our cybersecurity consulting services, visit our website, or engage with our AI-powered security assessment platform.
1. Information We Collect
1.1 Personal Information You Provide
We collect personal information that you voluntarily provide to us when you:
- Request a security consultation or assessment
- Fill out contact forms on our website
- Subscribe to our security bulletins or newsletters
- Engage with our customer support services
- Participate in surveys or provide feedback
This information may include:
- Name and contact information (email, phone number, company address)
- Company information (name, size, industry, website)
- Job title and professional information
- Security concerns and AI usage patterns
- Technical specifications and infrastructure details (when relevant to services)
1.2 Information Automatically Collected
When you visit our website, we automatically collect certain information about your device and usage patterns:
- IP address and general location information
- Browser type, version, and operating system
- Pages visited, time spent, and navigation patterns
- Referral source and search terms used
- Device identifiers and mobile device information
1.3 Technical and Security Information
In the course of providing cybersecurity services, we may collect:
- Network configuration details and security architecture
- Vulnerability assessment data and security incident information
- System logs and security event data (with explicit authorization)
- AI model usage patterns and security assessment results
2. How We Use Your Information
We use the information we collect for the following legitimate business purposes:
2.1 Service Delivery
- Providing cybersecurity consultations and AI security assessments
- Conducting authorized security audits and vulnerability assessments
- Developing customized security recommendations and remediation plans
- Delivering incident response and threat mitigation services
2.2 Communication and Support
- Responding to inquiries and providing customer support
- Sending service-related notifications and security alerts
- Providing updates on security threats relevant to your industry
- Delivering educational content and best practices guidance
2.3 Business Operations
- Processing payments and managing contracts
- Improving our services and developing new security capabilities
- Conducting internal research and analytics to enhance our AI models
- Complying with legal obligations and regulatory requirements
3. Information Sharing and Disclosure
3.1 We Do Not Sell Your Information
AI Capital Defender does not sell, rent, or trade your personal information to third parties for their marketing purposes.
3.2 Limited Sharing for Business Purposes
We may share your information in the following limited circumstances:
- Service Providers: With trusted third-party vendors who assist in service delivery (cloud hosting, email services, payment processing)
- Legal Obligations: When required by law, regulation, or valid legal process
- Business Protection: To protect our rights, property, or safety, or that of our clients and the public
- Business Transfers: In connection with a merger, acquisition, or sale of assets (with notification)
3.3 Client Confidentiality
All security assessment data and client-specific information is treated as strictly confidential and is not shared outside of the authorized engagement scope.
4. International Data Transfers
AI Capital Defender is based in the United States. If you are accessing our services from outside the US, please be aware that your information may be transferred to, stored, and processed in the United States where our servers are located.
For transfers to the United States from the European Economic Area (EEA) or United Kingdom, we rely on:
- Standard Contractual Clauses approved by the European Commission
- Adequacy decisions where applicable
- Your explicit consent for specific processing activities
5. Data Security
We implement comprehensive security measures to protect your personal information:
5.1 Technical Safeguards
- End-to-end encryption for data transmission and storage
- Multi-factor authentication and access controls
- Regular security audits and penetration testing
- SOC 2 Type II certified infrastructure
- ISO 27001 compliant security management systems
5.2 Operational Safeguards
- Employee background checks and security training
- Principle of least privilege access controls
- Regular security awareness training and incident response drills
- Secure development lifecycle and code review processes
6. Data Retention
We retain your personal information only for as long as necessary to fulfill the purposes outlined in this Privacy Policy:
- Contact Information: Retained for 7 years or until you request deletion
- Service Records: Maintained for the duration of the engagement plus 7 years for compliance purposes
- Security Assessment Data: Securely disposed of within 90 days post-engagement unless retention is required by contract
- Marketing Communications: Until you unsubscribe or request deletion
7. Your Privacy Rights
7.1 General Rights
You have the following rights regarding your personal information:
- Access: Request confirmation of what personal information we have about you
- Correction: Request correction of inaccurate or incomplete information
- Deletion: Request deletion of your personal information (subject to legal obligations)
- Portability: Request a copy of your data in a structured, machine-readable format
- Objection: Object to certain types of processing (such as direct marketing)
7.2 Rights for EEA and UK Residents
If you are located in the EEA or UK, you have additional rights under GDPR:
- Restriction: Request restriction of processing under certain circumstances
- Withdraw Consent: Withdraw consent where processing is based on consent
- Supervisory Authority: Lodge a complaint with your local data protection authority
7.3 Rights for California Residents
Under the California Consumer Privacy Act (CCPA), California residents have additional rights:
- Right to know what personal information is collected and how it's used
- Right to delete personal information (with exceptions)
- Right to opt-out of the sale of personal information
- Right to non-discrimination for exercising CCPA rights
8. Cookies and Tracking Technologies
Our website uses cookies and similar tracking technologies to enhance your browsing experience. For detailed information about our cookie usage, please see our Cookie Policy.
9. Children's Privacy
Our services are not directed to individuals under the age of 18. We do not knowingly collect personal information from children under 18. If you become aware that a child has provided us with personal information, please contact us, and we will take steps to delete such information.
10. Changes to This Privacy Policy
We may update this Privacy Policy from time to time to reflect changes in our practices or legal requirements. We will notify you of any material changes by:
- Posting the updated policy on our website with a new "Last Updated" date
- Sending email notifications to registered users for significant changes
- Providing prominent notice on our website for 30 days