Cyclops
BLOG ABOUT

Privacy Policy

Last updated: January 4, 2026

Introduction

This privacy policy ("Privacy Policy") governs how we, Cyclops Security Ltd. and its affiliates ("us", "we", or "our", "Cyclops Security") use, collect and store Personal Data we collect or receive from or about you ("you"). This Privacy Policy applies to the Cyclops Security's website https://www.cyclops.security/ (the "Website") and our services (the "Services").

Please read this Privacy Policy carefully, so you can understand our practices and your rights in relation to Personal Data. "Personal Data" means any information that can be used, alone or together with other data, to uniquely identify any living human being and any information deemed as Personally Identifiable Information by privacy laws. Please note that this is a master privacy policy and some of its provisions only apply to individuals in certain jurisdictions. Important note: Nothing in this Privacy Policy is intended to limit in any way your statutory right, including your rights to a remedy or means of enforcement.

Table of Contents

  • What Information We Collect, Why We Collect It, and How It Is Used
  • Data Protection Rights
  • Cookies & Similar Technologies
  • Transfer of Personal Data
  • How we Protect and Retain Your Personal Data
  • How we Share Your Personal Data
  • Children's Privacy
  • Interaction with Third Party Products
  • Changes and Updates to This Privacy Policy
  • How to Contact Us

This Privacy Policy can be updated from time to time and, therefore, we ask you to check back periodically for the latest version of this Privacy Policy. If we implement significant changes to the use of your Personal Data in a manner different from that stated at the time of collection, we will notify you by posting a notice on our Website or by other means.

1. What Information We Collect, Why We Collect It, and How It Is Used

The following table describes what data is being collected through the Website, in what manner, and for what purposes it may be processed:

Specific Personal Data we collect Why is the Personal Data collected and for what purposes? Legal basis (GDPR only, if applicable) Consequences of not providing the Personal Data
When you browse or visit our Website
  • Cookies, analytic tools and log files
  • For more information, please read our cookies policy
  • To enable the operation of the Website
  • To review or improve the usage and operations of our Website
  • To analyze trends
  • To administer the Website
  • To track users' movement and preferences around the Website for various purposes, including for marketing communications
  • Legitimate interest (e.g., essential cookies required for the operation of the Website)
  • Consent
Certain non-essential Website features may not be available
When you make use of, or interact with, our Website / When you contact us
  • Full name
  • Email address
  • Phone number
  • Message
  • Any other information that you decide to provide us with
  • To process and answer questions
  • To provide support (e.g., to solve problems, bugs or issues)
  • Processing is necessary for the performance of a contract to which the data subject is party or in order to take steps at the request of the data subject prior to entering into a contract
  • Legitimate interest (e.g. respond to your request)
  • Cannot process and answer questions
  • Cannot provide support (e.g., to solve problems, bugs or issues)
When applying for a position with Cyclops Security through the Website
  • Full name, phone number, and any file you choose to upload
  • Any free text that you choose to provide – please avoid using free text to provide Personal Data about you or others
  • To contact you with respect to a potential position in Cyclops Security
  • To the extent that you have submitted your CV through the Website to process your CV in our information systems
  • We may also forward your CV to third parties assisting us with candidates' evaluations
  • Processing is necessary for the performance of a contract to which the data subject is party or to take steps at the request of the data subject before entering into a contract
  • Legitimate interest (e.g. to assess you as a candidate)
Cannot assess you as a candidate
When you make use of, or interact with, the Services / When you create an account and when you log in
  • Full name
  • Email address
  • Phone number
  • To the extent that you register via your Google account, we receive the approved information from Google
  • Usage pattern
  • Any other information that you decide to provide us with
  • To be able to create an account
  • To be able to log in
  • To be able to enjoy features
  • To comply with legal obligations or protect the rights, privacy, and safety of our users, ours and/or third parties
  • Processing is necessary for the performance of a contract to which the data subject is party
  • Where necessary to comply with a legal obligation (e.g., to prevent fraud, illegal activity, or misuses of the Services)
  • Cannot create an account
  • Cannot log in
  • Cannot enjoy all the features
  • Cannot comply with legal obligations or protect the rights, privacy, and safety of our users, ours and/or third parties

Finally, please note that some of the abovementioned Personal Data will be used for detecting, taking steps to prevent, and prosecution of fraud or other illegal activity, to identify and repair errors, to conduct audits, and for security purposes. Personal Data may also be used to comply with applicable laws, with investigations performed by the relevant authorities, law enforcement purposes, and/or to exercise or defend legal claims. In certain cases, we may or will anonymize or de-identify your Personal Data and further use it for internal and external purposes, including, without limitation, to improve the services and for research purposes. "Anonymous Information" means information which does not enable identification of an individual user, such as aggregated information about the use of our services. We may use Anonymous Information and/or disclose it to third parties without restrictions (for example, in order to improve our services and enhance your experience with them).

2. Data Protection Rights

You are responsible for ensuring that all Personal Data submitted to Cyclops Security is correct. Cyclops Security would like to ensure you are fully aware of your data protection rights. Depending on your location and on the laws that apply to you may be entitled to some or all of the following rights:

  • The right to access: You have the right to access Personal Data about you. Your right of access may normally be exercised free of charge, however we reserve the right to charge you an administrative fee for this service where permitted under applicable laws;
  • The right to rectification: You have the right to request that Cyclops Security corrects any information you believe is inaccurate or misleading;
  • The right to erasure: You have the right to request that Cyclops Security erase/delete your data under certain conditions. Please note that there may be circumstances in which we are required to retain your Personal Data, for example for the establishment, exercise or defense of legal claims;
  • The right to restrict to the processing: You have the right to request that Cyclops Security restricts the processing of your Personal Data;
  • The right to object to processing: You have the right to object to the processing of your Personal Data;
  • The right to data portability: You have the right to data portability. This means that you may have the right to receive your Personal Data in a structured, commonly used and machine-readable format, and that you have the right to transmit that data to another controller;
  • You have the right to object to profiling; and/or
  • You have a right to lodge a complaint with your local data protection supervisory authority (i.e., your place of habitual residence, place or work or place of alleged infringement) at any time or before the relevant institutions in your place of residence. We ask that you please attempt to resolve any issues with us before you contact your local supervisory authority and/or relevant institution.

If allowed by applicable laws, you have the right to withdraw your consent at any time when Cyclops Security processes your data based on your support of any of these rights. However, withdrawal does not affect the legitimacy and effectiveness of processing your Personal Data based on your consent before the withdrawal is made; nor does it affect any data processing based on another lawful base other than your consent, in particular if the processing is required to meet our legal and regulatory obligations. You may exercise these rights to the extent these rights apply to you by emailing Cyclops Security at: [email protected] or using any of the contact information listed below. You may use an authorized agent to submit a request on your behalf if you provide the authorized agent written permission signed by you. We will undertake to respond to your request within the applicable time frame prescribed by applicable law. Although we will make reasonable efforts to accommodate your requests, in some circumstances, we may deem your request unfounded or not eligible under applicable law. In such instances we reserve the right to refuse your request. As a pre-requisite to fulfilling any request, we shall require verifying your identity, which we may do by asking you to provide certain information or identification to ensure that all data subjects' privacy is protected. We reserve the right to charge a fee where permitted by law, for instance if your request is manifestly unfounded or excessive. In the event that your request would adversely affect the rights and freedoms of others (for example, would impact the duty of confidentiality we owe to others) or if we are legally entitled to deal with your request in a different way than initial requested, we will address your request to the maximum extent possible, all in accordance with applicable law.

3. Cookies & Similar Technologies

A cookie is a small text file that is stored in the web browser that allows Cyclops Security or a third party (such as third-party service providers) to recognize you. Cookies can either be session cookies or persistent cookies. A session cookie expires automatically when you close your browser. A persistent cookie will remain until it expires, or you delete your cookies.

Cookies that we use can generally be categorized as follows:

  • Strictly Necessary Cookies: These cookies are necessary to load the website or to allow users to use Website's certain features.
  • Functionality Cookies: These first-party cookies store the Website preferences.
  • Performance Cookies: These cookies track information about how the Website is being used so that we can make improvements and report on our performance.
  • Marketing/Advertising Cookies: These are usually third-party cookies by advertising platforms or networks to: (i) deliver ads and track ad performance, and (ii) enable advertising networks to deliver ads that may be relevant based on your activities.

We use additional tracking technologies to help understand user activities and preferences. For example, we use web beacons (also known as clear gifs, pixel tags, or web bugs) to track user activities and communicate with cookies. You cannot opt out of web beacons used on web pages, but you can limit their use by opting out of the cookies they interact with. You can opt out of web beacons used in emails by setting your email client to render emails in text mode only.

We set cookies that monitor links to our website that we send to you (if you have consented to receive emails from us). These cookies are used to track visitors to our website sourced from these emails. To avoid these types of cookies, please follow the explanation below on how to change your browser cookies settings.

In addition, we use tracking technology (pixels) in emails to understand how often our customers open and click on our emails. If you do not wish this tracking to be affected, please change your email software or service (such as Outlook, Gmail, etc.) settings to not automatically download images (to the extent it is not already your default). In some instances, depending on your email or browser settings, cookies in an email may be automatically accepted (for example, when you have added an email address to your address book or safe senders list). Please refer to your email browser or device instructions for more information on this.

You can change your browser's settings to delete already set cookies and not accept new ones. To learn more about how to do this, visit your browser's help pages. Some useful information can also be found here: https://www.allaboutcookies.org/. Please note, however, that if you delete cookies or do not accept them, you might not be able to use all of the features we offer, you may not be able to store your preferences, and some of our pages might not display properly. You can also change your preferences in the cookie consent mechanism available on our website.

We reserve the right to remove or add new analytic tools.

We use the following cookies/analytical tools:

  • DataDog: The Website and the Services uses "DataDog" to collect information about your use of the Services for the purpose of monitoring and securing your use in the Services. DataDog collects information such as: browser name, browser language and browser version; device brand, device model, device type; continent, country, city, geo location; internet/domain provider; operation system's name and version User, email and internal user ID; session's actions, errors, events and session record; IP address. Further information is available at: https://www.datadoghq.com/legal/msa/ and https://www.datadoghq.com/legal/privacy/.
  • Pendo: We use a tool called "Pendo", which is an analysis service provided by Pendo.io Inc. that we use to evaluate the use of our Services, generate reports on activities, analyze behavioral metrics and improve the experience. The tool collects the username, email address, country, and region that occurs when using our Services. You can find more information in Pendo's privacy policy at www.pendo.io/legal/privacy-policy/.
  • Intercom: We use "Intercom" for customer support.

4. Transfer of Personal Data

  • Internal transfers: Transfers within the Cyclops Security group will be covered by an internal processing agreement entered into by members of the Cyclops Security group (an intra-group data processing agreement) which contractually obliges each member to ensure that Personal Data receives an adequate and consistent level of protection wherever it is transferred to.
  • External transfers: Where we transfer your Personal Data outside of EU/EEA (for example to third parties who provide us with services), we will generally obtain contractual commitments from them to protect your Personal Data.

5. How We Protect and Retain Your Personal Data

Security. Cyclops Security has implemented appropriate physical, management, and technical measures designed to protect your Personal Data. However, please note that we cannot guarantee that the information will not be compromised as a result of unauthorized penetration to our servers. As the security of information depends in part on the security of the computer, device or network you use to communicate with us and the security you use to protect your user IDs and passwords, please make sure to take appropriate measures to protect this information.

Data Retention. Your Personal Data will be stored until we delete the record and we proactively delete it or you send a valid deletion request. Please note that in some circumstances we may store your Personal Data for longer periods of time, for example (i) where we are required to do so in accordance with legal, regulatory, tax or accounting requirements, or (ii) for us to have an accurate record of your dealings with us in the event of any complaints or challenges, or (iii) if we reasonably believe there is a prospect of litigation relating to your Personal Data or dealings. We have an internal data retention policy to ensure that we do not retain your Personal Data perpetually. Regarding retention of cookies, you can read more in our cookie policy.

6. How We Share Your Personal Data

We may share your Personal Data as follows:

  • With our business partners with whom we jointly offer products or services. We may also share Personal Data with our affiliated companies.
  • We use third party service providers to process your Personal Data for the purposes outlined above, including, without limitation:
    • With cloud service providers for hosting purposes;
    • With websites and web content creation platforms in order to help us manage our Website and Services;
    • With email providers, marketing, CRM, other similar tool providers;
    • Log-in details on the Services;
    • With artificial intelligence tools and features; and
    • With analytic companies, in order to help us understand and analyze information we collect in accordance with this Privacy Policy.
  • To the extent necessary, with regulators, courts or competent authorities, to comply with applicable laws, regulations and rules (including, without limitation, federal, state or local laws), and requests of law enforcement, regulatory and other governmental agencies or if required to do so by court order. We may use or disclose the information we collect in order to ensure that our users are complying with all applicable aspects of our policies.
  • We may disclose information with our lawyers, accountants, auditors and other professional advisors where necessary to obtain legal or other advice or otherwise protect and manage our business interests.
  • We may use or disclose the Personal Data to investigate, prevent, or take action regarding illegal activities, suspected fraud, cybersecurity threats, situations involving potential threats to the physical safety of any person, violations of this Privacy Policy, or as otherwise required or allowed by law and regulations email service providers for email campaigns management.
  • If, in the future, we sell or transfer, or we consider selling or transferring, some or all of our business, shares or assets to a third party, we will disclose your Personal Data to such third party (whether actual or potential) in connection with the foregoing events.
  • In the event that we are acquired by, or merged with, a third party entity, or in the event of bankruptcy or a comparable event, we reserve the right to transfer, disclose or assign your Personal Data in connection with the foregoing events, including, in connection with, or during negotiations of, any merger, sale of company assets, consolidation or restructuring, financing, or acquisition of all or a portion of our business by or to another company; and/or
  • Where you have provided your consent to us sharing or transferring your Personal Data (e.g., where you provide us with marketing consents or opt-in to optional additional services or functionality).

If you want to receive the list of the current recipients of your Personal Data, please make your request by contacting us at [email protected].

7. Children's Privacy

We do not offer our products or services for use by children and therefore we do not knowingly collect personally identifiable information from anyone under the age of eighteen (18). If you are under the age of eighteen (18), please do not enter the Website or use the Services. For the purposes of the GDPR, we do not intend to offer information society services directly to children. If you are a parent or guardian and you are aware that your children have provided us with Personal Data, please contact us. If we become aware that we have collected Personal Data from children, we reserve the right to delete it.

8. Interaction with Third Party Products

We enable you to interact with third party websites, software applications and products or services that are not owned or controlled by us (each a "Third Party Service"). We are not responsible for the privacy practices or the content of such Third Party Services. Please be aware that Third Party Services can collect Personal Data from you. Accordingly, we encourage you to read the terms and conditions and privacy policies of each Third Party Service.

9. Changes and Updates to This Privacy Policy

This Privacy Policy can be updated from time to time and, therefore, we ask you to check back periodically for the latest version of this Privacy Policy. If we implement material changes in the way we use your Personal Data, in a manner that is different from that stated at the time of collection, we will notify you by posting a notice on our Website or by other means and take any additional steps as required by applicable law.

10. How to Contact Us

If you have any questions or suggestions, please contact us at [email protected]. To exercise any of your rights, or if you have any other questions or complaints about our use of your Personal Data and its privacy, please contact our data protection officer at [email protected].

[email protected]

2093 Philadelphia Pike
Claymont, Delaware

SOC 2 Type 2
Cyclops
GDPR Compliant
AWS Marketplace
LinkedIn
Terms of Use | Privacy Policy | Cookie Policy | Cookie Settings
© 2025 Cyclops Security. All rights reserved.

Our website uses cookies to distinguish you from other users, so we can improve your experience and our website. Visit Cookie Policy for more details.

Cookie Settings

We use cookies to enhance your browsing experience and analyze our traffic. You can choose which categories of cookies you want to allow. Please note that blocking some types of cookies may impact your experience on our website.

Strictly Necessary

Always Enabled

These cookies are essential for the operation of our website. They enable you to navigate around the site and use its features. These cookies do not require your consent as they are essential for the website to function properly.

Functionality

These cookies allow the website to remember choices you make and provide enhanced, more personalized features.

Performance

These cookies collect information about how visitors use our website, helping us improve our website and understand how users interact with it.

Marketing / Advertising

These cookies are used to deliver advertisements more relevant to you and your interests, and help measure the effectiveness of advertising campaigns.