Vulnerabilities Be Gone
  • Home
  • Services
  • Process
  • Contact
← Back to Home

Privacy Policy

Last Updated: October 2025

1. Introduction

Vulnerabilities Be Gone ("we," "our," or "us") is committed to protecting your privacy. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you visit our website vulnsbegone.com and use our services.

Please read this Privacy Policy carefully. By accessing or using our website, you acknowledge that you have read, understood, and agree to be bound by all the terms of this Privacy Policy. If you do not agree with the terms of this Privacy Policy, please do not access the site.

2. Information We Collect

2.1 Information You Provide to Us

We collect information that you voluntarily provide to us when you:

  • Contact Us: When you fill out our contact form, we collect your name, company name, email address, and message content.
  • Engage Our Services: When you become a client, we may collect additional business information, technical details about your infrastructure, and other information necessary to provide our cybersecurity consulting services.
  • Communicate With Us: Any information you provide in emails, phone calls, or other communications.

2.2 Automatically Collected Information

When you visit our website, certain information is automatically collected, including:

  • Log Data: IP address, browser type, operating system, referring URLs, pages viewed, and timestamps.
  • Cookies and Tracking: We may use cookies and similar tracking technologies to enhance your experience. You can control cookie preferences through your browser settings.
  • Analytics Data: We may use analytics services to understand how visitors interact with our website.

2.3 Information We Do NOT Collect

We do not:

  • Collect sensitive personal information (such as social security numbers, financial account information, or health information) through our website.
  • Knowingly collect information from children under 18 years of age.
  • Sell, rent, or trade your personal information to third parties for marketing purposes.

3. How We Use Your Information

We use the information we collect for the following purposes:

  • Service Delivery: To respond to your inquiries, provide cybersecurity consulting services, and communicate with you about our services.
  • Business Operations: To manage our business operations, maintain records, and fulfill contractual obligations.
  • Website Improvement: To analyze website usage, improve our services, and enhance user experience.
  • Security: To protect against fraud, unauthorized access, and other security threats.
  • Legal Compliance: To comply with applicable laws, regulations, and legal processes.
  • Communication: To send you service-related updates, security alerts, and respond to your requests.

4. How We Share Your Information

We do not sell your personal information. We may share your information in the following circumstances:

4.1 Service Providers

We use third-party service providers to facilitate our services, including:

  • Formspree: For form submission handling and email delivery.
  • Hosting Providers: For website hosting and infrastructure.
  • Analytics Services: For website analytics (if enabled).

These service providers have access to your information only to perform tasks on our behalf and are obligated to protect your information.

4.2 Legal Requirements

We may disclose your information if required by law, court order, or government regulation, or if we believe disclosure is necessary to:

  • Comply with legal obligations
  • Protect our rights, property, or safety
  • Prevent fraud or illegal activity
  • Protect the rights and safety of others

4.3 Business Transfers

If we are involved in a merger, acquisition, or sale of assets, your information may be transferred as part of that transaction. We will notify you of any such change in ownership.

5. Data Security

We implement appropriate technical and organizational security measures to protect your information against unauthorized access, alteration, disclosure, or destruction. These measures include:

  • Secure HTTPS encryption for data transmission
  • Content Security Policy (CSP) headers
  • Input validation and sanitization
  • Regular security assessments and updates
  • Limited access to personal information by employees and contractors

However, no method of transmission over the internet or electronic storage is 100% secure. While we strive to protect your information, we cannot guarantee absolute security.

6. Your Privacy Rights

Depending on your location, you may have certain rights regarding your personal information:

  • Access: The right to request a copy of the personal information we hold about you.
  • Correction: The right to request correction of inaccurate or incomplete information.
  • Deletion: The right to request deletion of your personal information, subject to legal obligations.
  • Objection: The right to object to certain processing of your information.
  • Data Portability: The right to receive your information in a structured, machine-readable format.
  • Withdraw Consent: If we process your information based on consent, you may withdraw consent at any time.

To exercise these rights, please contact us using the information provided below.

7. Data Retention

We retain your personal information only for as long as necessary to fulfill the purposes outlined in this Privacy Policy, unless a longer retention period is required or permitted by law. Contact form submissions are typically retained for business correspondence purposes and may be deleted upon request.

Client engagement data is retained for the duration of the business relationship and for a reasonable period thereafter to comply with legal obligations and resolve disputes.

8. Third-Party Websites

Our website may contain links to third-party websites. We are not responsible for the privacy practices or content of these external sites. We encourage you to review the privacy policies of any third-party sites you visit.

9. California Privacy Rights

If you are a California resident, you have additional rights under the California Consumer Privacy Act (CCPA), including:

  • The right to know what personal information we collect, use, and disclose
  • The right to request deletion of your personal information
  • The right to opt-out of the sale of personal information (we do not sell personal information)
  • The right to non-discrimination for exercising your CCPA rights

To exercise your CCPA rights, please contact us at the information provided below.

10. International Data Transfers

Your information may be transferred to and processed in countries other than your country of residence. These countries may have data protection laws that differ from those of your country. By using our services, you consent to such transfers.

11. Updates to This Privacy Policy

We may update this Privacy Policy from time to time to reflect changes in our practices or legal requirements. The "Last Updated" date at the top of this page indicates when the Privacy Policy was last revised. We encourage you to review this Privacy Policy periodically.

Material changes will be communicated by posting a notice on our website or by other appropriate means.

12. Contact Us

If you have questions about this Privacy Policy or wish to exercise your privacy rights, please contact us:

Vulnerabilities Be Gone
Email: privacy@vulnsbegone.com
Website: https://vulnsbegone.com

We will respond to your inquiry within a reasonable timeframe, typically within 30 days.

This Privacy Policy was last updated in October 2025 and applies to all users of our website and services.

Home Privacy Policy Terms of Service Contact

© 2025 Vulnerabilities Be Gone. Independent cybersecurity consulting for small and medium businesses.