Privacy Policy

Ipseity Security is committed to protecting the privacy of individuals who interact with our organization by engaging us for Services or visiting our website (“Users” and “Visitors”).

This Privacy Policy applies to data provided on or through the Ipseity Security website located at www.ipseity.solutions. This Privacy Policy describes Ipseity Security’s privacy practices in connection with the use of Ipseity Security’s website. It also describes the choices available to you with regard to the use of your personal information and how you can access and update this information.

The use of information collected shall be limited to the purposes of providing the offerings of Ipseity Security (“Services”) for which the User engaged Ipseity Security and as otherwise described below in more detail in this Privacy Policy.

Things You Should Know

  1. When a Visitor contacts Ipseity Security and/or requests information about Ipseity Security, we may collect the Visitor’s email address and other contact information so that we may fulfill the Visitor’s request. Some information provided to us may individually identify a Visitor or User, and that information may be referred to in this Privacy Policy as “Personal Information.”

  2. Ipseity Security uses information, including Personal Information, as supplied by you to provide the Services and for internal operations purposes such as fulfilling contact requests, research, marketing, invoicing and for other similar internal purposes. Ipseity Security utilizes third party tools such as software, Software-as-a-Service or cloud applications to help facilitate some of these internal operations.

  3. Ipseity Security collects the minimum amount of Personal Information we believe is required to interact with Users, generally limited to contact information without which we would not be able to communicate with you at all and therefore would not be able to effectively deliver our Services. Should you choose to limit the disclosure of this information even further, you are able to call us and inquire about our Services thereby choosing to share whatever level of Personal Information you desire. However, please note that should you engage us for Services, without at least your contact information, we are not able to effectively offer our Services to you. If your desired Services require further Personal Information to what is described in this Privacy Policy, we will not collect such Personal Information until you opt-in via your written consent.

  4. Ipseity Security will share your information, including Personal Information, in order to respond to investigations, court orders, legal process, or to investigate, prevent or take action regarding illegal activities, suspected fraud, or situations involving potential threats to the physical safety of any person, or as otherwise required by law.

  5. Please be aware that third party websites that may be accessed through our site may collect your Personal Information. Ipseity Security does not share your Personal Information with those websites and is not responsible for their privacy practices. Please check the applicable Privacy Policy of those sites.

  6. All of your Personal Information remains private and confidential. The security of your Personal Information is important to us. We follow generally accepted standards to protect Personal Information submitted to us, both during transmission and once we receive it. No method of transmission over the Internet, or method of electronic storage, however, is 100% secure. Therefore, we cannot guarantee its absolute security.

  7. By providing Ipseity Security with your e-mail address you may be subscribed to our newsletter(s) or provided with requested information. You may choose to stop receiving our newsletter or marketing emails by following the unsubscribe instructions included in each of these emails, or you can contact us.

  8. To be in compliance with Canadian Anti-Spam Legislation, on an annual basis you will be sent an e-mail where you will be asked if you wish to continue to receive e-mails from Ipseity Security. We will retain your information for as long as you remain on our mailing list. We will retain and use your information as necessary to comply with our legal obligations.

  9. Ipseity Security uses a technology called “cookies” to store session information. A cookie is a small amount of data, which often includes an anonymous unique identifier, which is sent to your browser from a website’s computers and stored on your computer’s hard drive. We use session ID cookies. A session ID cookie expires when you close your browser. If you reject cookies, you may still use our site, but your ability to use some areas of our site will be limited. You may change your acceptance and revoke cookies at any time.  

  10. As is true of most websites, we gather certain information automatically and store it in log files. This information includes internet protocol (IP) addresses, browser type, internet service provider (ISP), referring/exit pages, operating system, date/time stamp, and clickstream data.

  11. We use this information, which does not identify individual users, to analyze trends, to administer the site, to track Visitors’ and Users’ movements around the website and to gather demographic information about our user base as a whole.

  12. Ipseity Security may update this Privacy Policy from time to time and will notify users of such changes in the way we treat any Personal Information. We encourage you to periodically review this page for the latest information on our privacy practices.

  13. Ipseity Security commits to cooperate with EU data protection authorities (DPAs) and will comply with the advice given by such authorities with regard to human resources data transferred from the EU in the context of the employment relationship.

  14. If you wish to access, correct, update or request deletion of your Personal Information, you can do so at any time by contacting legal@ipseity.solutions.

We provide security-centric advisory and consulting services for organizations to secure their perimeter-less digital transformation to meet business and security requirements.

Follow Us On:

  • LinkedIn
  • Twitter
  • Facebook