SIB
Compliance Archive

Privacy Protocol

Last Updated: May 2026 | Revision v4.2.0

Data Sovereignty

At SecurityInBuilt, your data is treated with the same defensive rigor as our own infrastructure. We operate on a principle of "Zero-Knowledge" storage where possible. Any data transmitted through our assessment tools is end-to-end encrypted and automatically purged after audit completion unless otherwise requested.

Information Collection

Direct Input

We collect information provided during enquiry, audit requests, and ROI calculations to provide tailored defensive strategies.

Technical Logs

Our servers log standard IP addresses and device fingerprints to protect against DDoS and automated threat vectors.

Encryption Standards

All communications are secured via TLS 1.3. Internal data at rest is encrypted using AES-256-GCM. We conduct monthly third-party penetration tests on our own policy enforcement engines.

GDPR & Global Compliance

We are fully compliant with GDPR (UK & EU), CCPA, and PDPA. You have the right to request:

  • Full extraction of your identity records.
  • Immediate "Right to be Forgotten" execution.
  • Audit trails of data access within our systems.

"Security is not a product, but a process. Privacy is the foundation of that process."

Contact Data Protection Officer