Privacy Policy
Your privacy is important to us. This policy explains how Incorruptible Solutions collects, uses, and protects your personal information.
- Last Updated: February 1, 2026
Incorruptible Solutions (“we,” “our,” or “us”) is committed to protecting your privacy and ensuring the security of your personal information. This Privacy Policy describes how we collect, use, disclose, and safeguard your information when you visit our website, use our services, or engage with us in any way. By accessing our services, you consent to the practices described in this policy.
Information We Collect
Personal Information
We collect information you provide directly, including name, email address, phone number, company name, job title, and any other information you choose to provide when contacting us or using our services.
Usage Data
We automatically collect certain information when you visit our website, including IP address, browser type, operating system, referring URLs, pages viewed, and the date/time of your visit.
Cookies and Tracking
We use cookies and similar tracking technologies to collect information about your browsing activities. See our Cookie Policy for more details.
How We Use Your Information
Service Delivery
To provide, maintain, and improve our cybersecurity consulting services, including vCISO services, compliance assessments, and security training.
Communication
To respond to your inquiries, send service updates, provide technical support, and share relevant security insights and industry news.
Analytics and Improvement
To analyze usage patterns, improve our website functionality, and develop new services that meet our clients’ evolving security needs.
Information Sharing
Third-Party Service Providers
We may share information with trusted third parties who assist us in operating our website, conducting business, or servicing you, provided they agree to keep this information confidential.
Legal Requirements
We may disclose information when required by law, court order, or government regulation, or when we believe disclosure is necessary to protect our rights or the safety of others.
Business Transfers
In the event of a merger, acquisition, or sale of assets, your information may be transferred as part of that transaction.
Data Security
Security Measures
We implement industry-standard security measures including encryption, secure servers, firewalls, and access controls to protect your personal information from unauthorized access, alteration, or destruction.
Data Retention
We retain your personal information only for as long as necessary to fulfill the purposes outlined in this policy, unless a longer retention period is required by law.
Incident Response
In the event of a data breach, we will notify affected individuals and relevant authorities in accordance with applicable laws and regulations.
Your Rights
Access and Correction
You have the right to access, correct, or update your personal information at any time by contacting us directly.
Deletion
You may request deletion of your personal information, subject to certain legal exceptions and our legitimate business interests.
Opt-Out
You may opt out of receiving marketing communications from us at any time by clicking the unsubscribe link in our emails or contacting us directly.
GDPR Compliance
For users in the European Economic Area (EEA), we comply with the General Data Protection Regulation (GDPR). Under GDPR, you have additional rights including:
- Right to data portability - receive your data in a structured, machine-readable format
- Right to restriction of processing - limit how we use your data
- Right to object - object to processing based on legitimate interests
- Right to lodge a complaint with your local data protection authority
