Privacy Policy
Last Updated: 02/13/2025
At Cydra Intel (“we,” “us,” or “our”), we believe in putting data ownership in your hands while providing robust cybersecurity and threat intelligence services. This Privacy Policy outlines how we collect, store, use, and share information—including email and SMS submissions—when you use our platform.
Data Ownership & Confidentiality
- User Ownership
Any email or message (“Submission”) you send us for analysis remains your property. We never grant other users access to your Submissions. - Privacy by Design
We design our systems so personal data is protected at every step, restricting access to only authorized personnel.
Information We Collect
- Email and SMS Submissions
We gather the content of emails, messages, metadata, URLs, and any attachments you submit for analysis. - Threat Indicators
From these Submissions, we may extract potentially malicious artifacts (e.g., URLs, domains, file signatures, sender addresses) to enhance our threat intelligence database. - User Account Data
During sign-up, we collect basic details (e.g., email address, username) necessary to create and secure your account.
How We Use Your Data
- Threat Analysis
We utilize your Submissions to detect, investigate, and mitigate cyber threats on your behalf. - Threat Intelligence & Selling
- We may sell or share aggregated, non-personal threat data (e.g., malicious URLs, IP addresses, domains) as part of our commercial offerings.
- PII & Sensitive Information: We never sell personally identifiable information or use it for marketing unless you explicitly opt in.
- Service Improvements
Aggregated or anonymized data may be used to refine our analysis tools, algorithms, and overall user experience.
Marketing & Communications
- Opt-In Policy
We do not use your personal information for ads or marketing unless you choose to opt in. - Optional Updates
If you subscribe to updates, you can unsubscribe at any time.
Data Retention
- Long-Term Storage
We retain all Submissions indefinitely for ongoing cybersecurity research, historical trend analysis, and threat intelligence purposes—even if you close your account or request deletion. - Security Measures
Your data is stored in secure environments, protected with encryption, and accessible only to authorized team members.
Data Security
- Encryption in Transit & At Rest
We safeguard your data with industry-standard encryption protocols. - Limited Access
Only employees and contractors with a valid business purpose can access your data, subject to strict confidentiality agreements. - Monitoring & Auditing
We regularly monitor our systems and conduct audits to maintain robust security standards.
Data Sharing
- Internal Teams
Our in-house threat analysis team processes your Submissions for research and intelligence generation. - Anonymized Threat Intelligence
We may share or sell de-identified or aggregated threat indicators (e.g., malicious URLs, IP addresses) with partners, researchers, or clients. - Legal Requirements
We may disclose information if lawfully required (e.g., in response to a subpoena or court order), but only after confirming the request’s validity.
Your Rights & Choices
- Access
You can request a summary of your personal data that we have on file. - Account Closure
Although you may close your account at any time, your Submissions will not be deleted from our systems, as they are integral to our ongoing threat intelligence research. - Opt-Out
You can opt out of marketing communications by adjusting your preferences in your account settings or by contacting us directly.
Changes to This Policy
We may revise this Privacy Policy as our services evolve. Any significant changes will be posted on our website along with a new effective date. We encourage you to review this page periodically to stay informed about our practices.
Contact Us
For any questions about this Privacy Policy, your personal data, or our data practices, please get in touch:
By using our platform, you acknowledge that you’ve read and understood this Privacy Policy and agree to its terms. We remain dedicated to protecting your data and maintaining transparency in all our processes.