Privacy Protocol
Last Updated: May 2026 | Revision v4.2.0
Data Sovereignty
At SecurityInBuilt, your data is treated with the same defensive rigor as our own infrastructure. We operate on a principle of "Zero-Knowledge" storage where possible. Any data transmitted through our assessment tools is end-to-end encrypted and automatically purged after audit completion unless otherwise requested.
Information Collection
Direct Input
We collect information provided during enquiry, audit requests, and ROI calculations to provide tailored defensive strategies.
Technical Logs
Our servers log standard IP addresses and device fingerprints to protect against DDoS and automated threat vectors.
Encryption Standards
All communications are secured via TLS 1.3. Internal data at rest is encrypted using AES-256-GCM. We conduct monthly third-party penetration tests on our own policy enforcement engines.
GDPR & Global Compliance
We are fully compliant with GDPR (UK & EU), CCPA, and PDPA. You have the right to request:
- Full extraction of your identity records.
- Immediate "Right to be Forgotten" execution.
- Audit trails of data access within our systems.
"Security is not a product, but a process. Privacy is the foundation of that process."
Contact Data Protection Officer