Legal
Data Governance Protocols
Operational transparency regarding data collection, processing, and storage methodologies.
CONFIDENTIAL
Document ID
CG-PRIV-2026-A1
Classification
PUBLIC // UNCLASSIFIED
01. Data Collection Vectors
Cyber Guardian Webservices ("The Entity") minimizes data intake. We collect only what is strictly necessary for operational continuity:
- Voluntary Input: Name, email, and inquiry details provided via encrypted transmission channels (Contact Forms).
- Telemetry: Anonymized traffic logs (IP address, browser user-agent) for security auditing and threat detection.
02. Encryption Standards
All data in transit is secured via TLS 1.3. Data at rest is encrypted using AES-256 standards. Our infrastructure enforces a Zero Trust Architecture, meaning no internal access is granted without explicit authentication.
03. Third-Party Processors
We utilize the following vetted sub-processors for infrastructure:
Vercel Inc.
Hosting & Edge Network
Formspree
Form Submission Gateway
Google Firebase
Database & Auth
// END OF FILE
Last Audit: Jan 2026