top of page

Privacy Policy

At Zenith Secure 7, we value and protect the privacy of our clients, partners, and website visitors. This Privacy Policy outlines how we collect, use, store, and safeguard your information in compliance with applicable laws and regulations. By accessing our site or using our services, you agree to the terms detailed below.

Table of Contents

  1. Definition of Personal Information

  2. Scope of This Policy

  3. Information We Collect

  4. Use of Personal Information

  5. Disclosure of Personal Information

  6. Safeguarding and Security Measures

  7. Data Retention and Storage

  8. GDPR and Other Regulations

  9. Your Rights

  10. Changes to This Privacy Policy

  11. Contact Us

1. Definition of Personal Information

“Personal Information” is any information relating to an identified or identifiable person, such as a name, email address, phone number, employment details, or any other data that could be used to determine an individual’s identity directly or indirectly. This also includes any data that may have been initially identifiable but has been aggregated, anonymized, or de-identified.

2. Scope of This Policy

This policy applies to any Personal Information collected by Zenith Secure 7 and its third-party service providers. It covers data received from:

  • Visitors to our websites or digital platforms

  • Prospective and current clients utilizing our services

  • Business partners and service providers

  • Current and potential employees

Your decision to use our services or visit our website signifies your agreement with this Privacy Policy.

3. Information We Collect

3.1 Information Provided by Clients

We may gather details you provide while using our services—such as contact information, project requirements, and technical data required to deliver custom cybersecurity and related services. We use this information strictly for service provision and in accordance with any relevant agreements or contracts.

3.2 Employment-Related Information

Job applicants and employees may provide personal details during the hiring process or throughout employment, including résumés, references, and emergency contact information. We collect and process these data to manage recruitment, compensation, benefits, and ongoing employment requirements.

3.3 Automatically Collected Information

We may automatically collect certain technical details when you visit our website—such as IP address, browser type, access times, and referring URLs. This information helps us analyze trends and improve our online platforms.

Cookies and Tracking

Our website may use cookies, pixel tags, and similar technologies to enhance user experience and gather website usage data. You can adjust your browser settings to refuse cookies or alert you when they are used, though some site features may be limited as a result.

3.4 Social Media and Third-Party Platforms

If you interact with our site through a social media application (for example, logging in via a third-party platform), we may receive basic profile information subject to that platform’s privacy settings. Any additional data collected by these platforms are governed by their respective policies.

4. Use of Personal Information

  1. Service Provision
    We use your information to deliver the cybersecurity services you request—such as penetration testing, secure code reviews, or other consulting tasks—ensuring that we meet contractual obligations.

  2. Marketing and Communications
    With your consent (where required by law), we may send updates, newsletters, or offers related to our services. You may opt out of these communications at any time.

  3. Analytics and Site Improvements
    We analyze aggregated usage data to improve website functionality, content relevance, and user experience.

  4. Legal and Regulatory Compliance
    We may process Personal Information to fulfill legal requirements, respond to lawful requests, or safeguard our organization’s rights and interests.

5. Disclosure of Personal Information

  1. Third-Party Services
    We may engage trusted third parties (e.g., hosting providers, analytics tools, payment processors) to assist with our operations. These partners are contractually obligated to use Personal Information solely for the agreed purpose and to maintain confidentiality.

  2. Legal Obligations
    If legally required, or if we must protect our rights, safety, or property, we may disclose Personal Information to regulatory or law enforcement authorities.

  3. Business Transactions
    In the event of a merger, acquisition, or similar corporate restructure, your Personal Information may be transferred as part of the transaction. We will ensure that any receiving party upholds equivalent privacy standards.

6. Safeguarding and Security Measures

We employ a range of technical, administrative, and physical measures to protect your data against unauthorized access, loss, or misuse. Examples include:

  • Encryption for data at rest and in transit

  • Secure Access Controls limiting who can view Personal Information

  • Regular Audits and Monitoring to ensure compliance with our security protocols

7. Data Retention and Storage

We keep Personal Information only as long as necessary to fulfill the purposes outlined in this policy or to comply with legal and contractual obligations. When such data is no longer needed, we securely erase or de-identify it in a manner consistent with industry best practices.

8. GDPR and Other Regulations

For individuals within the European Economic Area, we process Personal Information under the General Data Protection Regulation (GDPR) guidelines. Similarly, we observe relevant privacy regulations in other jurisdictions to the best of our capability. We only store or transfer data outside of recognized areas if adequate protective measures are in place, such as standard contractual clauses or equivalent safeguards.

9. Your Rights

Depending on your location and applicable law, you may have various rights regarding the Personal Information we hold about you. These may include:

  • Access and Update: Request a copy of your data or correct inaccurate information.

  • Erasure: Ask us to delete your data, subject to certain legal constraints.

  • Restriction or Objection: Restrict or object to specific types of data processing.

  • Data Portability: Receive your information in a structured format, where feasible.

To exercise any of these rights, please contact us using the information in the Contact Us section.

10. Changes to This Privacy Policy

We reserve the right to update this Privacy Policy to reflect evolving legal requirements or changes in our practices. Any modifications will become effective immediately upon posting on our website. We recommend checking this page periodically to stay informed about how we protect your information.

11. Contact Us

For questions, concerns, or requests related to this Privacy Policy or our data-handling practices, please reach out to:

Zenith Secure 7
info@zsecures.com

If you have any unresolved privacy or data use concern that we have not addressed satisfactorily, you may also contact your local data protection authority or equivalent regulatory body.

logo new.png

Zenith Secure 7

Empowering You to Rise Above Cyber Threats

Quick Links:
Home | Research & Tools | Services | About Us | Contact

Stay Informed:
Subscribe to Our Newsletter | Read the Latest Blog Posts | Follow Us on GitHub

Connect With Us:
LinkedIn | Twitter | YouTube | GitHub

© 2024 Zenith Secure 7. All Rights Reserved.
Crafted with Integrity, Fueled by Innovation.

bottom of page