Privacy Policy

Privacy Policy

1. Introduction

ABGRILO (“we,” “us,” or “our”) is committed to protecting your privacy. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our cybersecurity services and visit abgrilo.org. By accessing our services, you agree to this policy.


2. Information We Collect

We collect the following data to provide and improve our services:

A. Personal Information

  • Contact Details: Name, email, phone number, job title

  • Business Information: Company name, industry, size

  • Payment Data: Billing address, transaction history (processed securely via PCI-compliant gateways)

B. Technical Data

  • Device Information: IP address, browser type, operating system

  • Usage Data: Pages visited, time spent, security logs

  • Cookies: Essential (session management) and analytics (Google Analytics)

C. Security-Specific Data

  • Threat Intelligence: Anonymized attack patterns, malware signatures

  • Vulnerability Reports: Data from security assessments


3. How We Use Your Information

PurposeExamplesLegal Basis
Service DeliveryVulnerability scans, incident responseContractual necessity
Security MonitoringDetecting brute-force attacksLegitimate interest
CommunicationsSecurity alerts, newslettersConsent
ComplianceGDPR, HIPAA, NIS2 requirementsLegal obligation

4. Data Sharing & Disclosure

We never sell your data. Limited sharing occurs with:

  • Subprocessors: Cloud providers (AWS, Azure) with DPAs

  • Authorities: Only if legally compelled (e.g., court order)

  • Partners: Threat intelligence alliances (anonymized data only)


5. International Data Transfers

Data may be transferred globally under:

  • EU-US DPF and UK Adequacy Decisions

  • Standard Contractual Clauses (SCCs)


6. Your Rights

Under GDPR/CCPA, you may:

  • Access, correct, or delete your data

  • Opt out of marketing

  • Request portability

  • Restrict processing

To exercise rights: Email [privacy@abgrilo.org]


7. Data Retention

  • Active clients: Retained while services are active + 5 years

  • Prospects: 2 years from last contact

  • Security logs: 12 months (unless investigation requires longer)


8. Security Measures

We implement:

  • Encryption: AES-256 for data at rest, TLS 1.3 in transit

  • Access Controls: Role-based permissions, MFA

  • Audits: Annual penetration tests + SOC 2 Type II certification


9. Third-Party Links

Our site may link to external tools (e.g., CVE databases). We don’t control their privacy practices.


10. Policy Updates

We’ll notify users of material changes via email or dashboard alerts.

Scroll to Top