Effective Date: March 25, 2026
At Circlebits, we are committed to protecting the privacy and security of our clients, partners, and website visitors. This Privacy Policy describes how we collect, use, disclose, and safeguard your information when you visit our website www.circlebits.com or use our cybersecurity consulting services.
Please read this privacy policy carefully. If you do not agree with the terms of this privacy policy, please do not access the site or use our services.
1. Information We Collect
We may collect information about you in a variety of ways. The information we may collect on the Site includes:
Personal Data: Personally identifiable information, such as your name, business email address, company name, and telephone number, that you voluntarily give to us when you fill out our contact forms or inquire about our services.
Technical and Usage Data: Information our servers automatically collect when you access the Site, such as your IP address, browser type, operating system, access times, and the pages you have viewed directly before and after accessing the Site.
Client Data: In the course of providing cybersecurity and AWS consulting services, we may process technical data regarding your IT infrastructure. This data is handled under strict confidentiality agreements (NDAs) separate from this website policy.
2. How We Use Your Information
Having accurate information about you allows us to provide you with a smooth, efficient, and customized experience. Specifically, we may use information collected about you via the Site to:
Respond to your inquiries, contact requests, and schedule consultations.
Provide, operate, and maintain our cybersecurity and cloud services.
Deliver newsletters, marketing emails, or updates regarding our services (you may opt-out at any time).
Compile anonymous statistical data and analysis for use internally or with third parties (like Google Analytics).
Prevent fraudulent transactions, monitor against theft, and protect against cybercriminals.
3. Disclosure of Your Information
We do not sell, rent, or trade your personal information. We may share information we have collected about you in certain situations:
By Law or to Protect Rights: If we believe the release of information about you is necessary to respond to legal processes, to investigate or remedy potential violations of our policies, or to protect the rights, property, and safety of others.
Third-Party Service Providers: We may share your information with third parties that perform services for us or on our behalf, such as website hosting (Google Sites), form processing (Google Forms), and analytics.
Business Transfers: If we reorganize or sell all or a portion of our assets, your information may be transferred to a successor entity.
4. Security of Your Information
As a cybersecurity firm, we take the security of your data seriously. We use administrative, technical, and physical security measures to help protect your personal information. While we have taken reasonable steps to secure the personal information you provide to us, please be aware that despite our efforts, no security measures are perfect or impenetrable, and no method of data transmission can be guaranteed against any interception or other type of misuse.
5. Your Privacy Rights
Depending on your location, you may have the right to:
Access the personal data we hold about you.
Request that we correct or delete your personal data.
Object to the processing of your data or request data portability.
To exercise these rights, please contact us using the information below.
6. Contact Us
If you have questions or comments about this Privacy Policy, please contact us.