ThreatPoint Privacy Policy

This privacy policy will explain how ThreatPoint uses the personal data we collect from you when you use our website and verification services.Topics:

  • What data do we collect?
  • How do we collect your data?
  • How will we use your data?
  • How do we store your data?
  • Marketing
  • What are your data protection rights?
  • What are cookies?
  • How do we use cookies?
  • What types of cookies do we use?
  • How to manage your cookies
  • Privacy policies of other websites
  • Changes to our privacy policy
  • How to contact us
  • How to contact the appropriate authorities

What data do we collect?

When using our verification products, ThreatPoint collects the following data:

  • Personal identification information (email address, ip address and device fingerprint information.) where applicable. For IP reputation – ip address information is collected for example.

When using our URL blocker extension only the URL is transmitted to us, the URL is only stored if a match is found against malicious, mature or sensitive URLs. Only URL’s that match are stored, no other information is stored.

How do we collect your data?

You directly provide ThreatPoint with the data we collect. We collect data and process data when you:

  • Voluntarily complete a customer survey or provide feedback on any of our message boards or via email.
  • Use or view our website via your browser’s cookies.
  • Subscribe to our newsletter
  • Use our verification services via a browser and click the verify button
  • Use our extensions (URL Blocker)
  • Use our API’s – IP reputation, Content Checker, Email Validation, Device Verification, Dark Web Monitoring

How will we use your data?

ThreatPoint collects your data so that we can:

  • Email you with information on services we think you might like.
  • Use it as part of our email or ip consortium databases
  • Use device information as part of our device consortium database
  • Provide real time feedback through our verification services
  • Provide frequency and velocity checks against the captured data (URLS, IP’s)

How do we store your data?

ThreatPoint securely stores your data at within its own infrastructure, hosted on secure servers.Our Company will keep your PII for five years. Once this time period has expired, we will delete your data by purging records over that age.

Marketing

ThreatPoint would like to send you information about products and services of ours that we think you might like.
If you have agreed to receive marketing, you may always opt out at a later date.You have the right at any time to stop ThreatPoint from contacting you for marketing purposes.

What are your data protection rights?

ThreatPoint would like to make sure you are fully aware of all of your data protection rights. Every user is entitled to the following:The right to access – You have the right to request ThreatPoint for copies of your personal data. We may charge you a small fee for this service.The right to rectification – You have the right to request that ThreatPoint correct any information you believe is inaccurate. You also have the right to request ThreatPoint to complete the information you believe is incomplete.The right to erasure – You have the right to request that ThreatPoint erase your personal data, under certain conditions.The right to restrict processing – You have the right to request that ThreatPoint restrict the processing of your personal data, under certain conditions.The right to object to processing – You have the right to object to ThreatPoints processing of your personal data, under certain conditions.The right to data portability – You have the right to request that ThreatPoint transfer the data that we have collected to another organisation, or directly to you, under certain conditions.If you make a request, we have one month to respond to you.

If you would like to exercise any of these rights, please contact us at our email: info@threatpoint.co.uk

Call us at: +44 (0)1253 67 0205