Last Updated: October 1, 2019
Information We Collect and Receive
Location Information: We collect location-based information exclusively for the purpose of security monitoring on the system.
Service Data (including Session and Usage data): When you use the Subscription Service, we automatically collect information about your computer hardware and software. This information can include your IP address, browser type, domain names, internet service provider (ISP), the files viewed on our site (e.g., HTML pages, graphics, etc.), operating system, clickstream data, access times and referring website addresses. This information is fully anonymized and used by ThreatSwitch for the operation of the Subscription Service and to maintain quality of the Subscription Service.
Data Managed by Customers
ThreatSwitch does not control the content of customer accounts or the data that customers may choose to collect or manage using the Subscription Service. ThreatSwitch stores our customers' information as they direct and in accordance with our agreements with our customers, and we store it on our servers. For more information, please see our terms and conditions.
The data you enter into ThreatSwitch as part of your use of the Subscription Service is retained according to the relevant agreements between you and ThreatSwitch. Customer Data is retained for as long as you remain an active customer. Your data is deleted upon an account administrator’s written request or after an established period following the termination of all customer agreements, typically two months.
In general, Customer Data is deleted after your paid Subscription ends and your system becomes inactive. Due to regulations in data retention set by the federal government in the industrial security space, individual end-users may not request data deletion of ThreatSwitch, only appointed account administrators. Data deletion conducted by ThreatSwitch is completed for an entire company, not individual users.