Privacy Policy

Your privacy and data security are our top priorities. Learn how Swyft, LLC., Collects, uses, and protects your information in compliance with global privacy standards.
Last Updated
December 11, 2024

0. PREAMBLE

Swyft, LLC ("we," "our," or "the Company") is committed to protecting the privacy and security of the personal information of our clients, partners, and website visitors. This Privacy Policy outlines how we collect, use, share, and safeguard your information when you interact with our services, including enterprise cybersecurity and information security solutions.

1. INTRODUCTION

This Privacy Policy applies to all personal information processed by Swyft, LLC in connection with the products and services we offer. This includes, but is not limited to, information collected via our website, in-person communications, customer contracts, or any other means through which we provide cybersecurity services.

2. INFORMATION WE COLLECT

We collect various types of information to deliver effective cybersecurity solutions, improve our services, and ensure regulatory compliance. The types of information we collect include:

A. Personal Identifiable Information (PII)
  • Contact Information: Name, address, company, occupation, email address, phone number.
  • Identification Data: Government-issued ID, business identification numbers, or other identifiers required for compliance and contractual purposes
B. Non-Personal Identifiable Information (Non-PII)
  • Device Information: IP address, Internet Service Provider (ISP), browser type, operating system, device identifiers.
  • Usage Data: Pages visited on our website, time spent on those pages, and navigation paths.
C. Sensitive Personal Data (when required for security purposes)
  • Client Information: Information related to cybersecurity services provided to our clients, including network configurations, software usage, and incident reports.
  • Financial Data: Transaction data, including billing information, but not credit card information. Payment processing is handled by third-party payment processors who comply with PCI-DSS standards.

3. HOW WE USE YOUR INFORMATION

We use the collected information to:

  • Provide and Improve Services: To deliver tailored cybersecurity solutions, optimize network configurations, and enhance user experiences.
  • Security Monitoring and Threat Detection: To detect, prevent, and mitigate security threats, vulnerabilities, and breaches.
  • Compliance and Legal Requirements: To comply with applicable laws, regulations, and contractual obligations.
  • Marketing and Communication: To inform you about new products, services, and promotions if you have opted to receive such information.
  • Service Access Authentication: To confirm your permitted access to our services, e.g. logging in, signing up, purchasing a plan.

4. LEGAL BASIS FOR PROCESSING PERSONAL DATA

We process your personal data based on the following legal grounds:

  • Contractual Obligation: We process data as necessary to fulfill our contracts with you or your organization.
  • Consent: We will obtain your explicit consent before collecting and processing sensitive personal data or for marketing communications.
  • Legitimate Interests: In cases where our business needs do not override your privacy rights, such as improving our services or detecting security incidents.
  • Legal Compliance: We process data to comply with our legal obligations, such as tax regulations, cybersecurity regulations, or responding to lawful requests from public authorities.

5. HOW WE SHARE INFORMATION

We may share your information with third parties, including:

  • Service Providers: Trusted third-party vendors that help us deliver services, including cloud service providers, network security firms, and IT support. All vendors must adhere to confidentiality and security measures.
  • Law Enforcement and Government Authorities: We may disclose information when required to comply with legal obligations or respond to lawful requests, such as subpoenas, court orders, or government regulations.
  • Business Transfers: In the event of a merger, acquisition, or sale of all or part of our assets, we may transfer your personal data as part of the transaction.

6. DATA SECURITY

We employ state-of-the-art security measures to protect your data, including:

  • Encryption: We use strong encryption protocols (e.g., AES-256) to secure data in transit and at rest.
  • Access Control: Restricted access to your personal data is limited to authorized personnel with necessary clearances.
  • Network Security: Continuous monitoring and threat detection systems are employed to prevent unauthorized access, data breaches, and cyberattacks.
  • Employee Training: All Swyft, LLC employees are required to undergo rigorous cybersecurity and data protection training.
  • Security Algorithms, AI: All plans include standardized API access to third-party artificial intelligence models to generate performance analytics.

7. DATA COLLECTION FOR VELOCTY

As part of our commitment to providing robust cybersecurity solutions, Velocty collects various types of data to enhance its functionality and ensure your network's security. For additional details, please refer to the Terms of Use. The following outlines the types of data collected, how it is used, and your choices regarding this data:

7a. Types of Data Collected
  • Personal Information: When you register for Velocty, we may collect personal information, such as your name, email address, and contact details.
  • Network and Device Information: Velocty may collect information about your devices and network, including IP addresses, device identifiers, operating system details, and connected device information.
  • Usage Data: We may collect information about how you interact with Velocty, including access times, pages viewed, and features used, to improve our services and user experience.
  • Threat Data: Velocty collects data related to detected threats and vulnerabilities within your network, which may include file scans and malware detection reports.
7b. Purpose of Data Collection

The data collected by Velocty is used for the following purposes:

  • Security Monitoring: To provide real-time monitoring and protection against potential threats and vulnerabilities within your network and devices.
  • Threat Analysis: To analyze and respond to security incidents, including the identification and remediation of malware and other threats.
  • Service Improvement: To enhance the performance and functionality of Velocty, including the development of new features and updates.
  • User Communication: To communicate with you regarding your account, service updates, and promotional offers.
7c. Data Retention

We will retain your data for as long as necessary to fulfill the purposes outlined in this policy or as required by law. When your data is no longer needed, we will securely delete or anonymize it.

7d. Your Choices

You have the right to manage your data preferences, including:

  • Access and Update: You can access and update your personal information at any time through your account settings.
  • Opt-Out: You can opt out of certain data collection practices by adjusting your device settings or contacting us directly. However, please note that opting out may limit your ability to use certain features of Velocty.
7e. Data Security

We implement appropriate technical and organizational measures to protect your data from unauthorized access, use, or disclosure. While we strive to protect your information, no method of transmission over the internet or electronic storage is 100% secure. Therefore, we cannot guarantee its absolute security.

8. DATA RETENTION

We will retain your personal data only as long as necessary to fulfill the purposes for which it was collected, including to comply with legal, contractual, and regulatory obligations. Retention periods are regularly reviewed and data no longer required is securely deleted or anonymized.

9. YOUR DATA RIGHTS

Depending on your location and applicable laws (such as GDPR or CCPA), you may have the following rights:

  • Right to Access: You have the right to request access to the personal data we hold about you.
  • Right to Rectification: You have the right to request corrections or updates to your personal data.
  • Right to Erasure (Right to be Forgotten): You may request the deletion of your personal data, subject to legal and contractual limitations.
  • Right to Data Portability: You have the right to request a copy of your personal data in a structured, machine-readable format.
  • Right to Object: You can object to the processing of your personal data for marketing purposes or in cases where processing is based on legitimate interests.

To exercise any of these rights, please contact us at (swyft.live/contact). We will respond to your request within a reasonable timeframe, in compliance with applicable laws.

10. COOKIES AND TRACKING TECHNOLOGIES

Swyft, LLC uses cookies and similar tracking technologies to improve user experience and monitor website usage. You can manage your cookie preferences through your browser settings or opt-out of tracking through third-party services such as Google Analytics.

11. INTERNATIONAL DATA TRANSFERS

We may transfer personal data to countries outside the jurisdiction in which it was originally collected, including the United States, Canada, and the European Union. These transfers are conducted in compliance with international data protection regulations, using appropriate safeguards such as Standard Contractual Clauses (SCCs) or other legal mechanisms.

12. CHILDREN'S PRIVACY

Our services are not intended for use by individuals under the age of 16, and we do not knowingly collect personal data from children. If we become aware of such data collection, we will take steps to delete the information promptly.

13. CHANGES TO THIS PRIVACY POLICY

We may update this Privacy Policy from time to time to reflect changes in our practices, technologies, legal obligations, or regulatory requirements. Any updates will be posted on our website with a new effective date. We encourage you to review this policy periodically to stay informed about our data practices.