CyberStrategies, Inc. Privacy Policy
Effective January 3, 2020
CyberStrategies, Inc. is committed to protecting your privacy. We collect information about our customers only for support and billing services. For example, in order to set up an account, we may also request a credit card number, government identification number, or other financial information. CyberStrategies, Inc. will only use your information for our organization’s in-house needs, and will not sell, lease or loan your email address or any other personal/business information to any third party entities except subcontractors or other colaborators in direct support of work you authorize. If you resell our services, information about your clients will be similarly protected. We will contact these indirect clients only to provide technical support and not to sell our services to them. If you contact us for support, we may keep an internal record of what support was given.
When you leave our service we will retain only information you need manage billing and historical records.
This Privacy Statement applies to data collected on CyberStrategies, Inc. controlled web sites, in person by our staff, through correspondence or by phone. It does not apply to other websites that may be hosted on our servers owned by other entities.
Compliance with Laws and Law Enforcement
We cooperate with government and law enforcement officials and private parties to enforce and comply with the law. We will disclose any information about you to government or law enforcement officials or private parties as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect our property and rights or the property and rights of a third party, to protect the safety of the public or any person, or to prevent or stop activity we consider to be illegal or unethical. We will also share your information to the extent necessary to comply with ICANN's rules, regulations and policies.
How we protect your information.
Our website has security measures in place to protect against the loss, misuse, or alteration of the information under our control. All updates and changes to our websites are done via secure transmission in order reduce risk of exposing any confidential information this includes industry standard Secure Socket Layer (SSL), Secure FTP (sFTP) and secure shell (SSH) to ensure all information you provide is secure. We require email connections for sites we host use secure communications. The information we retain about your company, including contact information, is accessed only over secure connections.
Credit Card Information.
Our servers are validated for security by a national auditing firm. We do not retain Credit Card or other financial information on our servers. For this reason, when you purchase a new service you will be required to re-enter your payment information. If you provide this information either by phone or letter, the local copy is destroyed as soon as possible after being processed. The only information CyberStrategies, Inc. may retain locally is the expiration date of your credit card so we may remind you that you must update the information. We contract our our recurring billing payments who are responsible for securing that information.
The software we provide encrypts credit card information using highest level encryption. As a further precaution our system removes even the encrypted version shortly after the order is marked shipped and if no so marked within 60 days. This is why you need to re-enter credit card information when you order from the same site in the future.
Internet Protocol (IP) addresses and log file data.
We log IP addresses, which is the location of the computer or network accessing CyberStrategies, Inc. for systems administration and troubleshooting purposes. This data helps us diagnose problems with the services we provide as well as track the popularity of the pages that people visit in order to improve the quality of our website. IP addresses do not identify any personal or identifiable information, however, if it were necessary, such information could be used in order to comply with safety and/or security or with legal requirements.
Use of Cookies.
Cookies are pieces of information that a website transfers to your browser. CyberStrategies, Inc. uses "session cookies" that are designed to be erased once a visitor completely closes their browser. While some sites we hostuse cookies track sites that you have visited, CyberStrategies, Inc. does not use cookies for tracking purposes. Although they do identify a user's computer, temporarily as you travel around the CyberStrategies, Inc., the related information on our servers is discarded as soon as the visitor logs out or they are expired (whichever occurs sooner). Note: some browsers do not correctly discard session cookies, but this flaw is beyond our control to fix.