Privacy Policy


Privacy Policy

This Privacy Statement applies to all Web sites owned by Cryptoforensics Technologies, Incorporated that display the Cryptoforensics Technologies logo, except for the sites referred to below and for Web sites hosted by third parties authorized to display the Cryptoforensics name and/or corporate logo.

Cryptoforensics Privacy Policy

Cryptoforensics Technologies has a global policy which serves as a foundation for the privacy of all Personal Information used by Cryptoforensics Technologies worldwide. The policy states Cryptoforensics Technologies' operational principles for managing privacy. This policy applies to all Personal Information collected by Cryptoforensics Technologies, electronically or manually. The requirements of the Policy are supplemented by business-specific privacy processes. The Policy applies to employees, officers, and directors of Cryptoforensics Technologies and its subsidiaries worldwide.

The Personal Information We Collect About You/How We Use It

You may choose to provide personal information through our web sites. Here are the ways in which you may provide the information and the types of information you may submit. We also provide below some information on how we may use the information.

  • E-mail or "Contact Us" If you communicate with us through an e-mail link or a "Contact Us" link or through the Request for RFP link on our web sites, we may ask you for information such as your name, email address and telephone number so we can respond to your questions and comments. We also may use the information you provide to evaluate the quality of our services.
  • Request Technical Support If you request technical support online, we will ask you for information necessary to complete the transaction, such as your name, address and information about your IT environment and the nature of the problem you are experiencing. Additionally, if required to facilitate support, we may with your permission conduct an interactive session in which a Cryptoforensics Technologies' technical support assumes control of your computer. No information is retained from such sessions beyond information to substantiate that such session(s) took place.
  • Marketing communications In addition to the purposes described above, we may also use your data to provide you with information about products and services which may be of interest to you. You have the right to ask us not to process your personal data for such marketing purposes. If you do not want us to use your data in this way, you can exercise your right to prevent such processing by checking/un-checking (as applicable) certain boxes on the web pages and/or forms on which we collect your data.

  • When you Subscribe to CryptoResearch or Receive Blog Posts You may wish to receive information about security alerts, services, newsletters, informative emails, and research on cybersecurity incidents and breaches, future product ideas or other issues relevant to our services. If so, you will be asked to provide your name and e-mail address. If there is any use beyond contacting you using such information, you will be advised of the intended uses at the point that you are being asked to provide such contact information.

  • Transactional Emails We may from time to time send you transactional emails such as confirmations or information on service-related issues. Because these emails are not promotional in nature, you are not able to unsubscribe from these transactional emails.

  • Soliciting your Opinion, Feedback or Test Software To assist us in providing services to meet your needs, we may solicit your opinions and feedback concerning our services and offerings; you may be asked to provide e-mail address information, as well as name, postal address, occupation and the name of your organization, if you have not already done so, as well as the opinions and feedback itself.

  • Careers You may be able to submit your resume and other information online to apply for a job with Cryptoforensics Technologies. The information you provide in connection with your job search will be used only in evaluating your interest in employment and to contact you regarding possible employment with the company.

  • Forms You are responsible for making the decision whether to proceed with any activity that requests personal information. If you do not wish to provide the requested information, however, you may not be able to complete the transaction or functionality on the site if the information is essential to complete the transaction or functionality.

About cookies and how we use them

Cookies are small text files that are placed on your computer by websites that you visit or certain emails you open. They are widely used in order to make websites work, or work more efficiently, as well as to provide business and marketing information to the owners of the site. Cookies also enable a web site to tailor information presented to you based on your browsing preferences, such as language and geographical region. For more detailed information about cookies visit http://www.allaboutcookies.orgFurther, Cryptoforensics Technologies may use cookies to:

  • Personalize web pages during your visit to our web sites; and/or remember you for easy navigation and access during your return visits.
  • Provide information about the previous link you clicked on. This is a session cookie and it expires when the browser is closed.
  • Track your visit to our web site, for example by logging IP addresses and session information, such as the duration of the visit to the site and the nature of the operating system and browser used, for the purpose of administering the web site and to compile aggregated statistics that we develop to assess the use of our sites and to improve them.


This information, which does not personally identify you, is used to determine what content to serve to you when you land on our pages and to provide you with the offers of Cryptoforensics Technologies services that are most relevant to you.

If you have or use an account on a Cryptoforensics Technologies web site, we will match the information gathered from our cookies with any information you have given us about yourself, or that is stored in the account, or that we have otherwise collected about you for the purposes explained in this Privacy Statement.

How to disable cookies

If you do not want Cryptoforensics Technologies to deploy cookies in your browser, you can set your browser to reject cookies or to notify you when a web site tries to put a cookie in your browser software. Rejecting cookies may affect your ability to use of some of the features of our Web sites.

Web Beacons

. Cryptoforensics Technologies may use Web Beacons (also known as single pixel or clear GIFs) on its web sites to analyze traffic patterns such as the frequency of use of particular parts of the site. The data collected helps us to better understand what information is of most interest to our clients and visitors and what offers they would most like to see. If you do not want to assist Cryptoforensics Technologies in improving its Web sites, you can "opt-out" of this web sites analysis by disabling JavaScript on your computer. However, if you disable JavaScript, some of the features on our web sites will not work.

Cryptoforensics Technologies may also use web beacons in promotional email messages to determine whether the message was opened and acted on. We may use this information on email response to develop future promotions you may enjoy. For these purposes, some of our Web beacons are tied to your e-mail address. Other than the email address you have previously provided, the information we collect does not identify you in any way.

Flash LSOs

While Cryptoforensics Technologies does not use Flash or Flash Local Shared Objects (LSOs) in our sites, third parties with whom we partner may use Flash LSOs to store your preferences for audio control. Flash cookies are different from browser cookies because of the amount of, type of, and how data is stored. Cookie management tools provided by your browser will not remove Flash cookies. To learn how to manage privacy and storage settings for Flash cookies click here:
http://www.macromedia.com/support/documentation/en/flashplayer/help/help09.html

Opt-in and Opt-out

In jurisdictions where your consent is required at the point of collection before any sharing of your information can take place, you will be given the option to opt-in before such information is being shared, and to opt-in to the transfer of your contact information to a third party.

In other jurisdictions, we may offer you these choices at the time you give us your information, or subsequently through 'opt-out' mechanisms.

Other Privacy Considerations

The information you submit in discussion groups or forums will be deemed public information and will not be kept as confidential. There is a risk in such communication venues that information can be collected and used by others. Please be careful and responsible when you are participating in such discussion groups or forums.

Legal Disclosures

Please be aware that in certain instances, it may be necessary for Cryptoforensics Technologies to disclose your personal information to government officials or otherwise as required by applicable law. However, no personal information will be disclosed to any law enforcement agency or governmental agency except in response to:

  • A subpoena, warrant or other process issued by a court of competent jurisdiction;
  • A legal process having the same consequence as a court-issued request for information, in that Cryptoforensics Technologies would be in breach of local law were it to refuse to provide such information, and it or its officers, executive or employees would be subject to liability for failing to honor such legal process, provided there is a legal basis to do so, or,
  • Where such disclosure is necessary for Cryptoforensics Technologies to enforce its legal rights pursuant to the laws of the jurisdiction from which such information was gathered, and there is a legal basis to do so.
Security of Personal Information

Cryptoforensics Technologies will always take appropriate security measures, consistent with international information practices, to protect your personal information. These measures include, on our web sites and Internet-enabled technologies, administrative, technical, physical and procedural steps to protect your data from misuse, unauthorized access or disclosure, loss, alteration, or destruction. These measures include:

  • Physical safeguards, such as locked doors and file cabinets, controlled access to our facilities, and secure destruction of media containing personal information;
  • Technology safeguards, such as use of anti-virus and endpoint protection software, encryption, and monitoring of our systems and data centers to ensure compliance with our security policies.
  • Organizational safeguards, through training and awareness programs on security and privacy, to ensure employees understand the importance and means by which they must protect personal information, as well as through privacy policies and standards that govern how Cryptoforensics Technologies treats personal information.
Non-Personal Information We Collect and How We Use It

Cryptoforensics Technologies will collect certain aggregate and non-personal information when users visit our web site. Aggregate and non-personal information does not relate to a single, identifiable visitor. It tells us information such as how many users visited our sites and the pages accessed. By collecting this information, we learn how to best tailor our web sites to our clients and visitors. We collect this information either through "cookie" technology or with "web beacons," as explained above.

Web Site Traffic

Through our various tracking methods discussed above and using log files, we may track domain names, IP addresses, and browser types from people who visit our site. We use this information to track aggregate traffic patterns throughout the Cryptoforensics Technologies Web sites. Such information is not correlated with any personal information.

IP Addresses

Cryptoforensics Technologies collects and retains, for a limited period of time, internet protocol (IP) address information, of its clients and visitors, for the following purposes:

  • Subscription and registration
  • Provide technical support
  • Obtain geolocation information
  • Secure our networks and systems


IP addresses collected by Cryptoforensics Technologies are primarily traffic data, which is not necessarily personal information. Cryptoforensics Technologies does not have the means to reasonably and authoritatively link an IP address to an identifiable individual.

Links to Business Partner and Co-branded Sites

At the Cryptoforensics Technologies Web sites, there may be a number of links to companies with whom we have a relationship. Cryptoforensics Technologies is not responsible for the privacy practices of our business partners. We thus encourage you to read their privacy statements, as they may differ from ours. We also may link to co-branded Web sites that are maintained by Cryptoforensics Technologies and one or more of our business partners who are collecting your information pursuant to their own policies and purposes. As always, we encourage you to read the privacy policies on any co-branded site to which you link for information on the privacy practices of that site.

Statement Changes

In the event there is a major change to Cryptoforensics Technologies' privacy practices, a prominent notice will be posted on our Web sites. If the change involves the use of your personally identifiable information, the notice will contain instructions on how you can opt-out of such use. Cryptoforensics Technologies Contact Information

If you have any questions or comments concerning this Statement, or if you would like to change your communication preferences, update or review the personal information we have about you, or withdraw your consent for the collection, use or disclosure of your personal information, please contact us at This email address is being protected from spambots. You need JavaScript enabled to view it. .

What's New?

Cyber Defense Diversification
Today, most enterprises try to deal with cybersecurity threats by focusing inwardly through conducting vulnerability assessments, making detailed network maps, and in some cases, deploying robust patch management processes to continuously monitor their networks and systems. While this approach provides some benefits, against many cyber threats it's ineffective. Most corporate networks are so large and complex that it's simply too difficult to identify all of their assets, or all of their vulnerabilities, and patch them fast enough. Today's cyber wrongdoers are sophisticated, well-funded, and patient—they use a wide range of techniques to penetrate even well-protected enterprises...

More...


logo1 logo2 logo3 logo4 logo5 logo6 logo7 logo8 logo9

The Cryptoforensic Technology Newsletter
Get the latest news from Cryptoforensic Technology