Privacy Policy
Your data protection and privacy rights matter to us. Here's how we handle your information with complete transparency.
Information We Collect
When you work with Zetalexex Hub for security incident monitoring and response services, we collect information that helps us protect your business effectively. This includes technical data from your systems, contact details for incident response, and communication records.
- Technical Information: System logs, network traffic data, security event details, and infrastructure configurations necessary for monitoring services
- Business Contact Data: Names, email addresses, phone numbers, and job titles of designated security contacts and IT personnel
- Communication Records: Email exchanges, incident reports, service tickets, and consultation notes related to your security services
- Account Information: Login credentials, service preferences, billing details, and access permissions for our monitoring platforms
- Website Usage Data: IP addresses, browser information, pages visited, and interaction patterns when using our client portal
We only collect information that directly supports our ability to provide comprehensive security monitoring and incident response. Every piece of data serves a specific purpose in protecting your business infrastructure.
How We Use Your Information
Your information powers our security services and helps us respond quickly when threats emerge. We use collected data exclusively for legitimate business purposes that benefit your cybersecurity posture.
- Security Monitoring: Analyzing system logs and network data to identify potential threats, vulnerabilities, and suspicious activities
- Incident Response: Coordinating rapid response efforts, communicating with your team, and documenting remediation activities
- Service Delivery: Managing your account, processing service requests, scheduling maintenance, and providing technical support
- Compliance Reporting: Generating security reports, maintaining audit trails, and supporting your regulatory compliance requirements
- Service Improvement: Evaluating service effectiveness, identifying enhancement opportunities, and developing better security solutions
We never use your data for marketing to third parties, selling contact lists, or any purpose unrelated to your security services. Your information stays focused on protecting your business.
Data Sharing and Disclosure
We maintain strict control over your information and share it only when necessary for your security services or required by law. Our approach prioritizes your data protection while ensuring effective incident response.
- Authorized Personnel: Only trained Zetalexex Hub security analysts and incident response team members access your data, under strict confidentiality agreements
- Third-Party Security Tools: Some data may be processed through specialized security platforms and threat intelligence services that enhance our monitoring capabilities
- Legal Requirements: We may disclose information when required by valid legal process, court orders, or law enforcement requests related to security incidents
- Emergency Situations: During active cyber attacks or security emergencies, we may share relevant threat information with other affected parties or security authorities
- Service Providers: Limited data sharing with trusted vendors who support our infrastructure, always under strict data protection agreements
We never sell your data to marketers, share it with competitors, or use it for purposes outside our security services. Any sharing follows industry best practices and legal requirements.
Data Security Measures
Protecting your data requires the same rigorous approach we apply to cybersecurity services. We implement multiple layers of protection to ensure your information remains secure throughout our relationship.
- Encryption Standards: All data transmission uses TLS 1.3 encryption, with stored data protected by AES-256 encryption at rest
- Access Controls: Multi-factor authentication, role-based permissions, and regular access reviews limit data exposure to authorized personnel only
- Network Security: Firewalls, intrusion detection systems, and network segmentation protect our infrastructure from unauthorized access
- Regular Audits: Quarterly security assessments, penetration testing, and compliance reviews ensure our protection measures remain effective
- Incident Procedures: Documented response plans, breach notification protocols, and recovery procedures protect against data compromise
Our security team monitors these protections continuously, updating defenses as new threats emerge. We apply the same vigilance to protecting your data that we bring to protecting your business systems.
Your Privacy Rights
You maintain significant control over your personal information and how we use it. These rights help ensure our data practices align with your preferences and legal protections.
- Access Rights: Request copies of your personal data, understand how we're using it, and review the information we maintain in your account
- Correction Rights: Update incorrect information, modify contact details, and ensure your data remains accurate and current
- Deletion Rights: Request removal of personal data when service relationships end or when information is no longer needed for security services
- Processing Limits: Object to certain uses of your data or request restrictions on processing for specific purposes
- Data Portability: Receive your data in standard formats that allow transfer to other service providers if you choose
To exercise these rights, contact our privacy team using the information below. We'll respond within 30 days and work with you to address your requests while maintaining necessary security protections.
Privacy Contact Information
Email: support@zetalexexhub.com
Phone: +1 (808) 428-2094
Address: 6110 Greenville Ave #300, Dallas, TX 75206, United States
Data Retention and Deletion
We keep your information only as long as necessary for security services, legal compliance, and business operations. Our retention practices balance your privacy rights with practical security needs.
- Active Service Data: Security logs and monitoring data retained throughout service relationship, with older logs archived according to compliance requirements
- Contact Information: Business contact details maintained during active service plus two years for potential future security consultation needs
- Incident Records: Security incident documentation kept for seven years to support legal requirements and historical threat analysis
- Communication History: Email exchanges and service tickets retained for three years to maintain service continuity and support resolution
- Account Data: Login credentials and preferences deleted within 90 days of service termination, unless extended retention is legally required
When retention periods end, we securely delete your information using certified data destruction methods. You can request earlier deletion for specific data types, subject to legal and security requirements.
International Data Transfers
Our security operations primarily use United States-based infrastructure and personnel. When international data processing occurs, we ensure appropriate protections for your information.
Some security monitoring tools and threat intelligence services may process data internationally to provide comprehensive threat detection. These transfers always include contractual protections, encryption requirements, and compliance with applicable data protection laws.
If you have specific requirements about data location or cross-border transfers, please discuss these during service setup. We can often accommodate geographic restrictions for sensitive data processing.
Children's Privacy
Zetalexex Hub provides business security services exclusively to organizations and adult decision-makers. We don't knowingly collect personal information from individuals under 18 years old.
If we discover that we've inadvertently collected information from someone under 18, we'll delete it promptly. Parents or guardians concerned about underage data collection can contact us immediately for assistance.
Policy Updates
This privacy policy may change as our services evolve or legal requirements update. We'll notify you of significant changes through email and by posting updated versions on our website.
Minor clarifications or technical updates may be made without individual notification, but we'll always maintain the same core commitment to protecting your privacy and data security.
We encourage reviewing this policy periodically to stay informed about how we protect your information and what rights you have regarding your data.
Last Updated: January 15, 2025