Privacy Policy

WHITEHAT PRIVACY POLICY

Whitehat Virtual Technologies, LLC. (“Whitehat”) respect your privacy. Protecting the confidentiality and security of client information has always been an integral goal of how we conduct our business. We pledge to aim to ensure that our global business practices protect your privacy.

The Sources of Information

You acknowledge that Whitehat uses certain technology on our website to collect information from visitors, which may include the use of cookies.  Whitehat uses this technology to collect information about how our visitors use our website, including information relating to the frequency of visits to our website, average length of visits, and which pages are viewed during a visit. This information is used to improve the site content and performance. The use by you of any Whitehat password-protected service product or client application may be governed by separate privacy and security policies that may be accessed within such products/applications.  By using those products/applications you are subject to those additional privacy policies and securities policies and you agree to be bound by those terms and conditions. Specifically, you agree that Whitehat may gather usage statistics and usage data from your use of such products/applications to evaluate your use of these products/applications, to improve the Whitehat products and services, and to ensure that you are complying with the terms of the applicable agreements between you and Whitehat. The statistics and data collected may or may not be aggregated. These statistics contain no personal information and will not be used to gather personal information. In addition, “cookies” allow us to recognize your computer each time you return to our website, verify your registration or password information during a particular session so that you do not have to input your password multiple times as you navigate the site, and suggest products or services that may interest you. Most web browsers allow you to modify your preferences to notify you when a cookie is set, or to reject all cookies. If you choose to reject our cookies, some areas of the website may not function properly or may not be accessible. The technology we use cannot obtain information from your hard drive or pass on a computer virus.

The Information We Have About You

When you contact us, provide us with your personal information or use our electronic services, you consent to Whitehat processing the information, including but not limited to your name, company name, contact information, job role and preference information. This information is used by us and/or authorized third parties to support your interaction with us, to deliver our products and services and to contact you again about other services and products we offer. By submitting your personal information to Whitehat you acknowledge and consent to Whitehat processing your personal information accordingly. This may involve the transfer of your personal information to Whitehat offices in countries outside your country of residence, which may not have the same privacy legislation as your country of residence. If you do not wish to receive marketing communications from Whitehat, please let us know by sending an email containing the name of the Whitehat representative you interact with (if any) to salesteam@whitehatvirtual.com.

Protecting Your Privacy

Whitehat is committed to protecting the privacy and the confidentiality of your personal information. Access to personal information is limited to Whitehat personnel and those authorized third parties who may host your data on our behalf (such as our third party CRM provider) or may assist in providing the products and services you requested. Whitehat maintains physical, electronic and procedural safeguards that aim to protect the information against loss, misuse, damage or modification and unauthorized access or disclosure. Some of the features of the Whitehat information security program are:
  1. A dedicated group that designs, implements and provides oversight to our information security program;
  2. The use of specialized technology such as firewalls and access control lists;
  3. Testing of the security and operability of products and services before they are introduced to the Internet, as well as ongoing scanning for publicly known vulnerabilities in the technology;
  4. Monitoring of our systems infrastructure to detect weaknesses and potential intrusions; and
  5. Implementing controls to identify, authenticate and authorize access to various systems or sites.
 

Other Privacy Policies or Statements; Changes to Policy

This policy provides a general statement of the ways in which Whitehat aims to protect your personal information. As noted above, you may, however, in connection with specific products or services offered by Whitehat or the use of certain technology by Whitehat, be provided with privacy policies or statements that supplement this policy. This policy may be changed from time to time to reflect changes in our practices concerning the collection and use of personal information. The revised policy will be effective immediately upon posting to our website. This version of the Whitehat Privacy Policy is effective August 26, 2016.    
x

Citrix Slowing you down
Start speeding things up!

Get Our Ebook