Legal

Data Governance Protocols

Operational transparency regarding data collection, processing, and storage methodologies.

CONFIDENTIAL
Document ID
CG-PRIV-2026-A1
Classification
PUBLIC // UNCLASSIFIED

01. Data Collection Vectors

Cyber Guardian Webservices ("The Entity") minimizes data intake. We collect only what is strictly necessary for operational continuity:

  • Voluntary Input: Name, email, and inquiry details provided via encrypted transmission channels (Contact Forms).
  • Telemetry: Anonymized traffic logs (IP address, browser user-agent) for security auditing and threat detection.

02. Encryption Standards

All data in transit is secured via TLS 1.3. Data at rest is encrypted using AES-256 standards. Our infrastructure enforces a Zero Trust Architecture, meaning no internal access is granted without explicit authentication.

03. Third-Party Processors

We utilize the following vetted sub-processors for infrastructure:

Vercel Inc.
Hosting & Edge Network
Formspree
Form Submission Gateway
Google Firebase
Database & Auth
// END OF FILE
Last Audit: Jan 2026