Principles of data protection

This Privacy Policy covers information we collect from users and visitors of www.cloudsecuretech.com and our related research and review services (collectively, the “Services”).  By using the Services or otherwise agreeing to this Privacy Policy, you are consenting to the collection, use, disclosure and other handling of your information as described below.

If you have any concern about providing information to us or having such information displayed on the Services or otherwise used in any manner permitted in this Privacy Policy, you should not use the Services.

1. The Information We Collect

Cloud Secure Tech collects information about you in a variety of ways, including:

In other words:

Cloud Secure Tech uses this information to provide you with a better user experience, to match you with the right cloud security vendors, and to improve its services.

2. Third-Party Data Collection and Usage

Social media accounts

When you sign in to Cloud Secure Tech with your social media account information, Cloud Secure Tech may collect the information that you choose to make available to them through the social media interface. This could include information that you have made public in connection with your social media account, information that the social media service shares with Cloud Secure Tech, or information that is disclosed as being shared during the sign-in process.

User-generated content

Cloud Secure Tech may also collect information about you if it is contained in user-generated content that other users post to or on the Cloud Secure Tech website. For example, a user could include information about you in a review they post.

Cloud Secure Tech uses this information to provide you with a better user experience and to improve its services.

In other words:

Cloud Secure Tech and third-party services may collect information about you, your computer or other device, and your use of the Services using automated means, such as cookies, Web server logs, Web beacons, and JavaScript.

Cookies are small files that are stored on your computer or device when you visit a website. They allow websites to remember you and your settings, and to track your activity on the website.

Web server logs record information about your device and your activity on the website, such as the pages you visit and the links you click on.

Web beacons are small images or pieces of code that are embedded in web pages and emails. They can be used to track when you open an email or view a web page.

JavaScript is a programming language that can be used to create interactive web pages and web applications. It can also be used to collect information about your device and your activity on the website.

Cloud Secure Tech uses this information to improve your user experience, to provide you with relevant advertising, and to measure the use of the Services.

In other words:

If you do not want Cloud Secure Tech or other websites and services to collect information about you using automated means, you can disable cookies and other tracking technologies in your browser settings. You can also opt out of targeted advertising from some advertising networks.

Purposes of Information Usage

The legal basis for Cloud Secure Tech to process your personal data includes:

Cloud Secure Tech may use advertising technology providers to collect data about your activities on the Services. This data may be used to deliver online advertising tailored to your individual characteristics, activities, interests, and other factors. You may opt out of receiving tailored advertising based on your Internet browsing activities from companies that participate in the Network Advertising Initiative’s Consumer Opt-Out page or the Digital Advertising Alliance’s Consumer Opt-Out page.

Cloud Secure Tech does not recognize or respond to browser-initiated Do Not Track (“DNT”) signals.

In other words, Cloud Secure Tech may use third-party advertising companies to show you ads that are relevant to you. These companies may track your online activity across different websites in order to build a profile of your interests and show you ads that are more likely to be of interest to you.

You can opt out of receiving these targeted ads by visiting the Network Advertising Initiative’s Consumer Opt-Out page or the Digital Advertising Alliance’s Consumer Opt-Out page. However, you may still see ads, even after you opt out, but they will not be targeted to your interests.

Cloud Secure Tech does not recognize or respond to Do Not Track signals, which are browser settings that allow you to tell websites that you do not want your online activity to be tracked.

3. Information Access, Correction, and Deletion Options

You have the right to access, modify, correct, or delete certain aspects of your information regarding your user profile, and to close your user account. You can also contact Cloud Secure Tech regarding any account information which is not on your profile or readily accessible to you. If you close your account, your information may be removed or unpublished from the Services within a reasonable amount of time.

Once you submit a review and the review has been approved for posting, it cannot be edited or removed. However, you can submit a revision to appear below your original posting and to revise your star ratings.

Keep in mind that information that others have copied may remain visible and you may not be able to access, correct, or eliminate any information about you that others copied or exported out of Cloud Secure Tech. This is because this information may not be in Cloud Secure Tech’s control. Your information may also be displayed in search engine results until the search engine refreshes its cache.

 

Cloud Secure Tech has implemented various security measures to protect your information, including:

4. Security

The specific security measures that Cloud Secure Tech uses vary depending on the sensitivity of the information at issue. For example, Cloud Secure Tech may use more stringent security measures to protect sensitive financial information than it uses to protect general contact information.

Cloud Secure Tech is committed to protecting your information and takes all reasonable steps to do so. However, no security measure is perfect, and Cloud Secure Tech cannot guarantee that your information will be completely secure from unauthorized access, use, or disclosure.

Updates and Revisions to this Policy

Cloud Secure Tech may change this Privacy Policy from time to time. If they do, they will provide notice of the change and include the effective date of the update. If you disagree with the updated Privacy Policy, you must stop using the Service. If you continue to use Cloud Secure Tech after they publish or communicate a notice about any changes to this Privacy Policy, you are consenting to such changes.

In other words:

Cloud Secure Tech may update this Privacy Policy at any time. If they do, they will let you know and tell you when the changes will take effect. You can review the changes and if you don’t agree with them, you must stop using Cloud Secure Tech. If you keep using Cloud Secure Tech after they’ve updated the Privacy Policy, you’re agreeing to the changes.

It’s important to review the Privacy Policy regularly so that you’re aware of any changes that may have been made.

5. Children’s Privacy

Cloud Secure Tech’s Services are not meant for children under the age of 13. They do not knowingly collect (or knowingly allow any third party to collect) personal information from children under the age of 13. If they become aware that personal information has been collected from a child under the age of 13, they will delete the information and terminate the child’s account as quickly as possible.

6. International Users

Cloud Secure Tech’s Services are hosted in the United States and are governed by United States law. If you are using the Services from outside the United States, your information may be transferred to, stored, and processed in the United States or Canada. The data protection and other laws of the United States and Canada may not be as comprehensive as those in your country. By using the Services, you consent to your information being transferred to Cloud Secure Tech and to the third parties with whom they share it as described in their Privacy Policy.

In other words:

Cloud Secure Tech’s Services are stored on computers in the United States and are subject to US law. If you use the Services from outside the US, your information may be sent to and stored on computers in the US or Canada, which may have weaker data protection laws than your country. By using the Services, you agree to your information being sent to Cloud Secure Tech and to the third parties with whom they share it as described in their Privacy Policy.

If you are concerned about your privacy, you should carefully review Cloud Secure Tech’s Privacy Policy to understand how they collect, use, and share your information. You should also consider using a VPN to encrypt your traffic when using the Services.

6. Your California Privacy Rights

Cloud Secure Tech does not share your personal information with third parties for their own direct marketing purposes without your consent. If you have any questions about this policy or would like to change your preferences, you can contact them.

In other words:

Cloud Secure Tech will not sell your personal information to other companies for their own marketing purposes without your permission. If you have any questions about this policy or want to change your preferences, you can contact them.

This is a good privacy policy, as it respects your right to control your personal information.

8. Your Rights within the EU

The following rights apply to your user account whenever you use Cloud Secure Tech’s services from within the EU:

If you wish to exercise any of the above rights, please contact Cloud Secure Tech using the contact details set out below. For the protection of your privacy and security, Cloud Secure Tech’s Data Protection team will take every reasonable step to ensure that your identity is verified before granting access, rectification, or deletion.

Search