Privacy Policy
Choose Your Experience
How would you like to view our policies today?
You can change your preference later using the switch at the top of the page
Introduction & Legal Framework
NIDSARK TECHNOLOGIES LLC ("NIDSARK", "Company", "we", "us", "our") delivers enterprise-class cybersecurity solutions trusted by Fortune 500 companies and government agencies worldwide. As a recognized leader in threat detection and incident response, we maintain the industry's most rigorous privacy and data protection standards. This Privacy Policy ("Policy") outlines our enterprise-grade approach to data stewardship, demonstrating full alignment with global regulatory frameworks including GDPR, CCPA/CPRA, VCDPA, and emerging international privacy legislation.
ENTERPRISE TRUST: Join thousands of organizations who trust NIDSARK to protect their most sensitive assets. Our privacy-by-design architecture and zero-trust security model ensure your data receives the same protection we provide to critical infrastructure and national security clients.

Information We Collect & Data Categories
Information You Actively Provide
Personal Identifiers: Full name, email address, phone number, business address, job title, company name, and any information you submit via forms, support tickets, or direct communications.
Account & Authentication Data: Username, password (hashed), security questions, two-factor authentication tokens, and login credentials.
Financial Information: Payment and billing information processed through PCI DSS-compliant third-party processors (we do not store full payment card details).
Business Information: Company size, industry, security infrastructure details, network configurations, and cybersecurity requirements.
Communications: Email correspondence, chat logs, support tickets, feedback, and any content you submit through our platforms.
Automatically Collected Technical Data
Device & Network Information: IP address, MAC address, device identifiers, browser type and version, operating system, screen resolution, time zone, and referring URLs.
Usage Analytics: Pages visited, time spent on site, click patterns, feature usage, access times, session duration, and user interaction data.
Security Logs: Access logs, authentication attempts, security events, threat detection data, and system performance metrics.
Cookies & Tracking: Session cookies, preference cookies, analytics cookies, and similar tracking technologies (see detailed Cookie Policy below).
Third-Party & Derived Data
Public Sources: Publicly available business information, professional profiles, and company data for verification and risk assessment purposes.
Threat Intelligence: Cybersecurity threat data, vulnerability information, and security indicators relevant to your protection.
Inferred Data: Preferences, interests, and behavioral patterns derived from your usage and interactions with our services.
Sensitive Data Disclaimer
We do not intentionally collect sensitive personal data including health information, biometric data, genetic information, or children's data. However, given the nature of cybersecurity services, we may inadvertently encounter such data during security assessments or incident response.
CLIENT RESPONSIBILITY: You are solely responsible for ensuring that any data you provide to us does not include sensitive personal information unless specifically authorized and necessary for service delivery. You must implement appropriate data minimization practices.
How We Use Your Information
To provide, operate, and maintain our cybersecurity services.
To authenticate users and secure accounts.
For customer support, communications, and responding to inquiries.
To improve, personalize, and expand our services.
For legal compliance, fraud prevention, and enforcing our terms.
For marketing (with opt-out options) and service announcements.
Legal Bases for Processing (GDPR)
Consent (where required)
Contractual necessity
Legal obligation
Legitimate interests (e.g., security, service improvement)
Information Sharing and Disclosure
Service Providers: Only with vetted, contractually bound third parties (e.g., cloud hosting, analytics, payment processors).
Legal Requirements: To comply with subpoenas, court orders, or legal processes.
Business Transfers: In the event of a merger, acquisition, or asset sale, with notice to users.
International Transfers: Data may be transferred to, and processed in, countries outside your own. We use Standard Contractual Clauses and other safeguards for cross-border transfers.
Data Retention
We retain personal data only as long as necessary for the purposes described, or as required by law, regulation, or contractual obligation. Data deletion and anonymization procedures are in place.
Data Security
Industry-leading technical and organizational measures (encryption, access controls, monitoring, regular audits). Incident response and breach notification protocols in compliance with GDPR, CCPA, and other regulations.
Your Rights
Access
Request a copy of your data.
Rectification
Correct inaccurate or incomplete data.
Erasure
Request deletion ("right to be forgotten").
Restriction
Limit processing in certain circumstances.
Portability
Receive your data in a structured, machine-readable format.
Objection
Object to processing for direct marketing or legitimate interests.
Withdraw Consent
Where processing is based on consent.
Children's Privacy (COPPA Compliance)
Our services are not directed to children under 16 (13 in the US). We do not knowingly collect personal information from children. If you are under the applicable age, do not use our services. If you believe a child has provided us data, contact us immediately for removal. Parents/guardians may request access to, correction of, or deletion of their child's information.
State-Specific Privacy Rights
California (CCPA/CPRA)
Right to know, delete, correct, opt-out of sale/sharing, and non-discrimination. We do not sell personal information.
Virginia (VCDPA)
Right to access, correct, delete, data portability, and opt-out of profiling and targeted advertising.
Other States
Similar rights may apply under emerging state privacy laws. Contact us for details.
International Data Transfers & Safeguards
We may transfer personal data internationally. For transfers outside the EEA/UK, we implement appropriate safeguards:
- โข Standard Contractual Clauses (SCCs) approved by the European Commission
- โข Adequacy decisions where available
- โข Binding Corporate Rules and other approved mechanisms
- โข Technical and organizational measures to ensure data security
Comprehensive Limitation of Liability & Legal Disclaimers
INDUSTRY-STANDARD LEGAL FRAMEWORK: Professional liability management in accordance with cybersecurity industry practices
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW:
ENTERPRISE SECURITY EXCELLENCE
- โข SOC 2 Type II Certified: Independently audited controls for security, availability, and confidentiality
- โข ISO 27001 Compliant: International standard for information security management systems
- โข FedRAMP Ready: Government-grade security controls meeting federal standards
- โข NIST Cybersecurity Framework: Full implementation of industry-standard risk management
- โข Zero Trust Architecture: Never trust, always verify - protecting data at every access point
- โข Continuous Compliance: Real-time monitoring ensures ongoing adherence to all regulatory requirements
THREAT RESPONSE CAPABILITIES
- โข Advanced Persistent Threat (APT) Defense: Nation-state level protection using AI-powered threat hunting
- โข Real-Time Incident Response: Sub-second threat detection with automated containment protocols
- โข Business Continuity Assurance: 99.99% uptime SLA with disaster recovery in under 4 hours
- โข Integrated Security Operations: 24/7/365 SOC with tier-1 through tier-3 analyst coverage
- โข Regulatory Compliance Support: Dedicated compliance team ensuring adherence to all applicable frameworks
- โข Geographically Distributed Infrastructure: Multi-region deployment for maximum resilience
- โข Security Clearance Team: Personnel with appropriate clearances for sensitive government work
MONETARY LIMITATIONS
- โข Total liability for all privacy-related claims is limited to the lesser of:
- - $1,000 USD, or
- - The amount you paid us in the 12 months preceding the claim
- โข We are not liable for indirect, incidental, consequential, punitive, or special damages
- โข No liability for lost profits, business interruption, reputation damage, or data loss
CLIENT RESPONSIBILITIES & INDEMNIFICATION
- โข You are solely responsible for:
- - Securing your own systems, networks, and data
- - Implementing appropriate access controls and security measures
- - Monitoring and detecting unauthorized access to your systems
- - Compliance with applicable privacy laws and regulations
- - Backup and recovery of your data
- โข You agree to indemnify and hold NIDSARK harmless from any claims arising from your data practices
TIME LIMITATIONS
- โข All claims must be brought within one (1) year of discovery or reasonable discovery
- โข Failure to provide timely notice of privacy incidents may void any potential liability
- โข Statute of limitations may be shorter under applicable law
REGULATORY COMPLIANCE DISCLAIMER
- โข While we strive for compliance, we make no guarantees regarding adherence to all applicable privacy laws
- โข Changes in privacy regulations may affect our ability to provide certain protections
- โข You are responsible for ensuring our services meet your specific compliance requirements
SEVERABILITY: If any provision of these limitations is found unenforceable, the remaining provisions shall remain in full force and effect. These limitations apply except where prohibited by applicable law.
Third-Party Links and Services
Our services may link to third-party sites. We are not responsible for their privacy practices. Review their policies before providing data.
Data Breach Notification & Incident Response
Our Obligations
In the event of a data breach affecting personal information, we will notify affected individuals and relevant authorities as required by applicable law, typically within 72 hours of discovery where feasible.
Your Responsibilities
- โข You must immediately notify us of any suspected unauthorized access to your account
- โข You are responsible for monitoring your own systems for security incidents
- โข You must implement your own incident response procedures
- โข You acknowledge that notification timing may be affected by investigation requirements
Limitations
Our notification obligations are limited to what is required by law. We are not liable for delays in notification due to ongoing investigations, law enforcement requests, or technical difficulties.
Cross-Border Data Transfers & Jurisdictional Issues
International Transfers
Your personal data may be transferred to, stored in, and processed in countries other than your own, including the United States. These countries may have different data protection laws.
We implement appropriate safeguards including Standard Contractual Clauses, adequacy decisions, and technical measures, but cannot guarantee the same level of protection as your home jurisdiction.
Government Access
Your data may be subject to access by government authorities in jurisdictions where it is processed. We may be required to disclose information without your consent or notice under applicable laws, court orders, or regulatory requirements.
Client Acknowledgment
By using our services, you acknowledge and accept these cross-border transfer risks. You are responsible for ensuring compliance with your local data protection laws.
Technical Security Measures & Limitations
Security Measures We Implement
- โข End-to-end encryption for data in transit and at rest
- โข Multi-factor authentication and access controls
- โข Regular security audits and penetration testing
- โข Employee security training and background checks
- โข Network monitoring and intrusion detection systems
Security Limitations & Disclaimers
- โข No security system is 100% secure or impenetrable
- โข We cannot prevent all unauthorized access, hacking, or data breaches
- โข Security measures may be updated or changed without notice
- โข Third-party security vulnerabilities may affect our services
- โข Zero-day exploits and advanced persistent threats pose ongoing risks
Your Security Responsibilities
- โข Use strong, unique passwords and enable two-factor authentication
- โข Keep your devices and software updated
- โข Do not share credentials or access with unauthorized parties
- โข Report security incidents immediately
- โข Implement your own endpoint security measures
Changes to This Policy & Legal Updates
Policy Updates
We may update this policy at any time to reflect changes in our practices, legal requirements, or business operations. Material changes will be communicated via email or prominent notice on our website.
Your Obligations
- โข You are responsible for regularly reviewing this policy
- โข Continued use of our services constitutes acceptance of changes
- โข You must ensure changes are compatible with your compliance requirements
- โข If you disagree with changes, you must discontinue use of our services
Legal Framework Changes
Privacy laws are constantly evolving. We make no guarantees that our practices will remain compliant with future legal changes. You are responsible for monitoring regulatory developments that may affect your use of our services.
Contact Information
NIDSARK, Inc.
Legal Department
Commonwealth of Virginia, USA
Supervisory Authority:
You may lodge complaints with your local data protection authority
Last updated: January 8, 2025