Privacy Policy

Provided by Axis Security
Axis Security provides a secure enterprise remote access service (the “Service”).
In order to ensure transparency and give you more control over your personal information, this privacy policy (“Privacy Policy”) governs how we, Axis Cyber Security Ltd. (“Axis Security”, “we”, “our” or “us”) use, collect and store personal information we collect or receive from or about you (“you”) such as in the following use cases:

(i) When you browse or visit our website at axissecurity.com (“Website“);
(ii) When you register for our Webinar(s) on the Website;
(iii) When you request a demo of our Service on the Website;
(iv) When you contact us (e.g. via our Website form, chatbox support, or on social media);
(v) When you register for and use the Service;
(vi) When you attend a marketing event, provide us with your business cards and/or provide us with your personal data for marketing purposes;
(vii) When we use the personal data of our service providers (e.g. contact details); and
(viii) When we process your job application.We greatly respect your privacy, which is why we make every effort to provide a platform that would live up to the highest of user privacy standards. Please read this Privacy Policy carefully, so you can fully understand our practices in relation to personal information. In this Privacy Policy, “personal information” means any information that can be used, alone or together with other data, to uniquely identify any living human being.

Important note: Nothing in this Privacy Policy is intended to limit in any way your statutory right, including your rights to a remedy or means of enforcement.

This Privacy Policy can be updated from time to time and, therefore, we ask you to check back periodically for the latest version of this Privacy Policy. If we implement significant changes to the use of your personal information in a manner different from that stated at the time of collection, we will notify you by posting a notice on our Website or by other means.

1. WHAT INFORMATION WE COLLECT, WHY WE COLLECT IT, AND HOW IT IS USED
Specific personal information we collect
Why is the personal information collected and for what purposes?
Consequences of not providing the personal information
When you browse or visit our Website
Cookies, analytic tools and log files. This may include information such as your computer’s Internet Protocol (“IP”) address, browser type, browser version, the pages of our Website that you visit, the time and date of your visit, the time spent on those pages and other statistics.
For statistics and marketing purposes.
Certain Website features may not be available.
When you register for our Webinar(s) on the Website
  • Full name
  • Company
  • Email address
  • Phone number
  • To register your for our Webinar(s)
  • To send you marketing communications
  • Cannot register your for our Webinar(s)
  • Cannot send you marketing communications
When you request a demo of our products and services on the Website
  • Full name
  • Title
  • Company
  • Phone Number
  • Email address
  • To reach out to you and provide you with a demo of our products and services
  • To send you marketing communications
  • Cannot communicate with you
  • Cannot provide you with a demo version of our services
  • Cannot send you marketing communications
When you contact us (e.g. via our Website form, chatbox support, or on social media)
  • Full name
  • Company
  • Title
  • Email address
  • Phone call
  • Any other information that you provide to us e.g. message
  • To receive, process and respond to your request(s)
  • To send you marketing communications
  • We cannot receive, process and respond to your request(s)
When you register for and use the Service
  • Username
  • Password
  • Data about your usage of the service
  • To register you with an account and to allow you to login and use the Service
  • We use the usage data to monitor the use of and to improve the Service and to detect any unlawful or malicious behavior
  • Cannot register you with an account and to allow you to login and use the Service
  • We cannot monitor the use of and to improve the Service and to detect any unlawful or malicious behavior
When you attend a marketing event, provide us with your business cards and/or provide us with your personal data for marketing purposes
  • Full name
  • Job title
  • Email address
  • Company name / school name
  • Phone number
  • Any other information that you provide us
  • To establish a business connection
  • To send you marketing communications
  • Cannot establish a business connection
  • Cannot send you marketing communications
When we use the personal data of our service providers (e.g. contact details)
  • Full name
  • Email address
  • Phone number
  • Company name
  • Any other information that you provide us
  • To contact our service providers
  • To perform the applicable agreement
  • Cannot contact our service providers
  • Cannot perform the applicable agreement
When we process your job application
  • Full name
  • Email address
  • LinkedIn Profile
  • CV / cover letter
  • Any other information that you provide us
  • To assess you as a candidate
  • To analyze your application
  • Cannot assess you as a candidate
  • Cannot analyze your application
Finally, please note that some of the abovementioned personal information will be used for detecting, taking steps to prevent, and prosecution of fraud or other illegal activity, to identify and repair errors, to conduct audits, and for security purposes. Personal information may also be used to comply with applicable laws, with investigations performed by the relevant authorities, law enforcement purposes, and/or to exercise or defend legal claims. In certain cases, we may or will anonymize or de-identify your personal information. “Anonymous Information” means information which does not enable identification of an individual user, such as aggregated information about the use of our services. We may use Anonymous Information and/or disclose it to third parties without restrictions (for example, in order to improve our services and enhance your experience with them).
2. HOW WE PROTECT AND RETAIN YOUR INFORMATION

2.1. Security
.
We have implemented appropriate technical, organizational and security measures designed to protect your personal information. However, please note that we cannot guarantee that the information will not be compromised as a result of unauthorized penetration to our servers. As the security of information depends in part on the security of the computer, device or network you use to communicate with us and the security you use to protect your user IDs and passwords, please make sure to take appropriate measures to protect this information.

2.2. Retention of your personal information.
In addition to the retention periods mentioned above, in some circumstances we may store your personal information for longer periods of time, for example (i) where we are required to do so in accordance with legal, regulatory, tax or accounting requirements, or (ii) for us to have an accurate record of your dealings with us in the event of any complaints or challenges, or (iii) if we reasonably believe there is a prospect of litigation relating to your personal information or dealings. We have an internal data retention policy to ensure that we do not retain your personal information perpetually. Regarding retention of cookies, you can read more in our cookie management platform.
3. HOW WE SHARE YOUR PERSONAL INFORMATION

We share your personal information as follows:

3.1. With our hosting providers.
3.2. With our service providers and business partners.
3.3. With our staff and other entities within our group.

We may also share your personal information as follows:

3.4. To the extent necessary, with regulators, courts or competent authorities, to comply with applicable laws, regulations and rules (including, without limitation, federal, state or local laws), and requests of law enforcement, regulatory and other governmental agencies or if required to do so by court order;
3.5. If, in the future, we sell or transfer, or we consider selling or transferring, some or all of our business, shares or assets to a third party, we may disclose your personal information to such third party (whether actual or potential) in connection with the foregoing events; and/or
3.6. In the event that we are acquired by, or merged with, a third party entity, or in the event of bankruptcy or a comparable event, we may transfer, disclose or assign your personal information in connection with the foregoing events.
4. YOUR PRIVACY RIGHTS. HOW TO DELETE YOUR ACCOUNT

4.1. Rights
.
You can exercise your rights by contacting us at privacy@axissecurity.com. Subject to legal and other permissible considerations, we will make every reasonable effort to honor your request promptly in accordance with applicable law or inform you if we require further information in order to fulfil your request. When processing your request, we may ask you for additional information to confirm or verify your identity and for security purposes, before processing and/or honoring your request. We reserve the right to charge a fee where permitted by law, for instance if your request is manifestly unfounded or excessive.

In the event that your request would adversely affect the rights and freedoms of others (for example, would impact the duty of confidentiality we owe to others) or if we are legally entitled to deal with your request in a different way than initial requested, we will address your request to the maximum extent possible, all in accordance with applicable law.

4.2. Deleting your account.
Should you ever decide to delete your account, you may do so by emailing privacy@axissecurity.com. If you terminate your account, any association between your account and personal information we store will no longer be accessible through your account. However, given the nature of sharing on certain services, any public activity on your account prior to deletion will remain stored on our servers and will remain accessible to the public.
5. USE BY CHILDREN

We do not offer our products or services for use by children and, therefore, we do not knowingly collect personal data from, and/or about children under the age of eighteen (18). If you are under the age of eighteen (18), do not provide any personal data to us without involvement of a parent or a guardian. In the event that we become aware that you provide personal data in violation of applicable privacy laws, we reserve the right to delete it. If you believe that we might have any such information, please contact us at privacy@axissecurity.com.
6. INTERACTION WITH THIRD PARTY PRODUCTS

We enable you to interact with third party websites, mobile software applications and products or services that are not owned or controlled by us (each a “Third Party Service”). We are not responsible for the privacy practices or the content of such Third Party Services. Please be aware that Third Party Services can collect Personal Data from you. Accordingly, we encourage you to read the terms and conditions and privacy policies of each Third Party Service.
7. LOG FILES

We use log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, clicked pages and any other information your browser may send to us. We use such information to analyze trends, administer the Website, track users’ movement around the Website, and gather demographic information.
8. SPECIFIC PROVISIONS APPLICABLE UNDER CALIFORNIA PRIVACY LAW

8.1. Our California Do Not Track Notice
:
Do Not Track (“DNT”) is a privacy preference that users can set in certain web browsers. Please note that we do not respond to or honor DNT signals or similar mechanisms transmitted by web browsers.

8.2. Deletion of Content from California Residents:
If you are a California resident under the age of 18 and a registered user, California Business and Professions Code Section 22581 permits you to remove content or personal information you have publicly posted. If you wish to remove such content or personal information and you specify which content or personal information you wish to be removed, we will do so in accordance with applicable law. Please be aware that after removal you may not be able to restore removed content. In addition, such removal does not ensure complete or comprehensive removal of the content or personal information you have posted and that there may be circumstances in which the law does not require us to enable removal of content.

8.3. Your Choices:
You have certain choices about your Personal Information. Where you have consented to the processing of your Personal Information, you may withdraw that consent at any time and prevent further processing by contacting us as described in this Privacy Policy. Even if you opt out, we may still collect and use non-Personal Information regarding your activities on our services and for other legal purposes as described above. While we cannot guarantee privacy perfection, we will address any issue to the best of our ability as soon as possible. We will process such requests in accordance with applicable laws. To protect your privacy, we will take steps to verify your identity before fulfilling your request.
9. CONTACT US

If you have any questions, concerns or complaints regarding our compliance with this notice and the data protection laws, or if you wish to exercise your rights, we encourage you to first contact us at privacy@axissecurity.com.