Title
Not Logged In [Login Now]

Privacy Policy

Introduction

ThreatFactor respects each individual's right to personal privacy. We will collect and use information through our Web site only in the ways disclosed in this statement. This statement applies solely to information collected at ThreatFactor's Web site.

Information Collection

ThreatFactor collects information through our Web site at several points. On some pages, you can order products, make requests, and register to receive materials. The types of personal information collected at these pages are:
  • Name
  • Title
  • Email Address
  • Phone Number
  • Employer Name
  • Employer Address
  • Website Address
ThreatFactor does not actively market to children, and we never knowingly ask a child under 13 to divulge personal information.

We collect the following general data that is not personally identifiable information:

  • HTTP Cookies Previously Set by This Site
  • Network Routing Information (IP address, domain names, referring URL, landing page, forward proxy)
  • Web Browser Type and Locale
  • Web Statistics (pages viewed, date, time, order)
We collect demographic data in order to improve our service, for marketing purposes and/or for industry reporting purposes. We collect this information through registration forms, clickstream tracking and server logs.

The information is collected involuntarily. To receive our products and services, your name, email address, job title, organization, and country of residency is mandatory so that ThreatFactor can contact it's users, identify it's users. Other information we request is optional.

We do employ cookies. A cookie is a small text file that our Web server places on a user's computer hard drive to be a unique identifier. Cookies enable ThreatFactor to track usage patterns and deliver customized content to users. Our cookies do have an expiration date. Our cookies do not contain personally identifiable information.

Third parties collect the following information at our Web site: source address, requested resource, time of resource request.

Information Usage

Users who provide information may receive email announcements (if requested) and access to ThreatFactor's support site. Registered users may receive additional announcements from us about products, services, special deals, and a newsletter. The information we collect will be used to create customer profiles based on browsing or purchasing history. We will not supplement information collected at our Web site with data from other sources.

We may share data with Google (googleanalytics.com) in order to compile website tracking statistics. These third parties will use the information to identify website usage statistics (times and dates visited, regions of the website visitors, ).

We offer links to other Web sites. Please note: When you click on links to other Web sites, we encourage you to read their privacy policies. Their standards may differ from ours.

Our Web site offers a forum and a feature request message board. Please be advised that information posted in these venues becomes public knowledge. If our policy on information collection or uses changes, we will update this policy statement and other places deemed appropriate.

Access to Information

ThreatFactor maintains the accuracy of our information by allowing users to view and edit the information through the ThreatFactor support site. Users may access their own personal information and may either update it themselves through the ThreatFactor portal or by contacting us to correct (via an email to Support@ThreatFactor.com). Users may delete their information from our database by emailing Support@ThreatFactor.com and requesting that their account be deleted Accounts will be deleted within 30 days of the deletion request.

Problem Resolution

If problems arise, users may contact ThreatFactor by emailing Support@ThreatFactor.com. We are committed to resolving disputes within 30 days.

Data Storage and Security

ThreatFactor protects user information with the following security measures by using SSL when transmitting sensitive information from/to the website and monitoring the website for potentially unauthorized changes.