Privacy Policy

Last Update: June 8th, 2022

Breach Insider (“Breach Insider”, we" or “us”) helps online businesses (our “Clients”) detect and address user account compromise and other malicious behaviour on their digital properties. In doing so, we collect information about how our detection methods (“Insiders”) are activated, and how they are interacted with by our Clients’ digital properties such as their websites and mobile applications (their “Applications”), as well as how they are utilised by unauthorised parties.

Introduction

This Policy tells you how we use and protect personal information collected through use of the “Services”, defined as our website(s) and our products and services, including the Breach Insider Service (as that term is defined in the Service Agreement).

This Policy covers only information that is collected through the Services and no other web sites, product or services that may be linked to or available via or from the Services or used in association therewith; nor does this Policy apply to practices of companies that we do not control or to people we do not employ or manage.

You expressly consent to our collection, storage, use and disclosure of your personal and non-personal information as described in this Policy and to all other terms herein.

It may be possible for you to browse our websites without telling us who you are or revealing any information that enables us to directly identify you as an individual. However, you may lose anonymity once you give us personal information about you, and by doing so, you agree to the transfer and storage of that information to our servers and to the terms of this Policy. Our Services use cookies, and therefore use of the Services by you constitutes your acceptance of our use of cookies in accordance with this Policy.

How we collect and use information

We collect the following types of information:

Information about Clients

How we store and protect your information

Any information collected through the Services is stored and processed in the United States. If you use our Services outside of the United States, you consent to have your data transferred to the United States.

Breach Insider maintains strict administrative, technical and physical procedures to protect information stored in our servers, which are located in the United States. Access to information is limited (through username and password credentials, and multi-factor authentication) to those employees who require it to perform their job functions. We use industry-standard Secure Socket Layer (SSL) encryption technology to safeguard the account registration process and sign-up information. Other security safeguards include but are not limited to data encryption, firewalls, and physical access controls to building and files.

To discuss the security programs, procedures and policies that we have selected and utilize to reasonably secure the Services, please contact hello@breachinsider.com. We will be happy to discuss our security program with you.

Our Use of Information

We may combine your information with information we collect from other sources to improve or promote the Services. We do not sell or rent your personal information to non-affiliated third parties for their marketing purposes without your prior consent. You agree that we may use your personal information as specified in the Service Agreement, and to:

Sharing Information

We may also share your personal information with:

How Long We Keep Information

We generally discard information about you when it’s no longer needed for the purposes for which we collect and use it — described in the section above on Our Use of Information — and we’re not legally required to keep it. For example, we keep web server logs that record information about a visitor to our website, like the visitor’s IP address, browser type, and operating system, for approximately 30 days. We retain the logs for this period of time in order to, among other things, analyse traffic to our website and investigate issues if something goes wrong on our website.

Your Use of the Site

Your user ID may necessarily be displayed throughout the Services and to the public. All of your activities as such will be traceable to your user ID. Please understand that if you link your name with your user ID, others will be able to personally identify your activities.

Web Site Features (including cookies)

The Site may utilize “cookies”, which are small text files placed on your computer or device. They are commonly used to make websites work, or to work more efficiently. We use cookies to help the site function, analyse our web page flow, customize our services, gather analytic and other data, measure promotional effectiveness, and promote trust, security and safety. The Site and certain features are only available through the use of cookies, and generally we need to use cookies to help identify you and maintain your signed-in status.

You may also encounter cookies from third parties. Third party cookies are cookies that are served by third parties other than us. You are always free to choose whether to accept or reject website cookies, although doing so may interfere with, terminate and/or restrict your use of the Services. If you wish to reject cookies, you can do so by changing the settings of your web browser, and instructions about how to do this can normally be found in the “help” menu of your web browser.

In addition, the Services may incorporate pixel tags, web beacons or other web site usage measurement technologies. Such devices are used to collect other information, such as the identity of the applicable internet service provider, the user’s IP address of his or her personal terminal device, the type of browser software and operating system in use, the date and time of site access, the website address, if any, from which the user linked to the Services, and other similar traffic-related information. Such information is used for the purposes described above. We may also aggregate such information with similar data collected from other users or disclose such aggregate information to third parties. However, we do not use such data in any way to create or maintain personal information from you.

We do not engage in the collection of personally identifiable information from users across third party sites or applications, except for log-in information that each user provides in order to access the user’s other applications, sites or services via the Breach Insider Service. We do not knowingly enable other parties to collect personally identifiable information about our users’ activities over time and across different sites or services.

Password

Your password to access our Services, if any, deserves careful thought and protection. Use unique numbers, letters, and special characters and do not disclose your password to anyone. If you do share your password or your personal information with others, remember that you are responsible for all actions taken in the name of your account. If you lose control of your password, you may lose substantial control over your personal information and may be subject to legally binding actions taken on your behalf. If your password has been compromised for any reason, you should immediately access your profile on the Site to change your password and notify us immediately at hello@breachinsider.com.

Your rights

You can see, review and change most of your personal information by logging into our websites. You must promptly update your personal information if it changes or is inaccurate. We retain personal information from closed accounts in order to comply with law, prevent fraud, collect any fees owed, resolve disputes, troubleshoot problems, assist with any investigations, enforce our Services-related agreements, and take other actions otherwise permitted by law or as specified elsewhere in this Policy.

If at any time you choose to opt out from allowing us to use your personal information in the future to provide you with special offers or information regarding new products or services, check the “opt-out” box, either at the time you provide your personal information or via any subsequent marketing communication that we send you.

Contacting Us About These Rights

You can usually access, correct, or delete your personal data using your account settings and tools that we offer, but if you aren’t able to or you’d like to contact us about one of the other rights, please contact us at hello@breachinsider.com. When you contact us about one of your rights under this section, we’ll need to verify that you are the right person before we disclose or delete anything. For example, if you are a user, we will need you to contact us from the email address associated with your account. You can also designate an authorized agent to make a request on your behalf by giving us written authorization. We may still require you to verify your identity with us.

Applicability

Except as otherwise expressly included in this Policy, this document addresses only the use and disclosure of information we collect from you.

Children

The Services are not directed to those under 13 years of age, and we do not knowingly collect personal information from children. If you are younger than thirteen, please do not provide any personal information to us. If a person 13 years of age or younger has provided personal information to us, a parent or guardian of such person should contact us at hello@breachinsider.com so that we can remove such personal information from our database. We reserve the right to limit participation in particular programs, offers or promotions to those over 18 years of age.

Changes to our Privacy Policy

Breach Insider may modify or update this Privacy Policy from time to time so you should review this page periodically. If we change the policy in a material manner, for example if we seek to use personal information in a materially different way than we had previously, we will provide at least 30 days notice to the Clients so that you have sufficient time to evaluate the change in practice. Of course, you can always opt-out by deleting your account before the changes take effect.