Privacy
Architecture.
This document outlines the data governance and operational privacy framework governing the deployment of autonomous threat agents.
Effective Date: March 2026
1. Introduction
ThreatBase ("we," "our," or "us") is committed to protecting your privacy and ensuring the security of your data. This Privacy Policy explains how we collect, use, and safeguard the information you provide when accessing our platform, website, and associated API services (collectively, the "Services").
By using ThreatBase, you consent to the practices described in this policy. Our Services are designed for enterprise and organizational use, and we process data strictly in accordance with our role as a service provider to our clients.
2. Information We Collect
A. Information You Provide
- Account Data: Name, email address, corporate credentials, and billing details necessary to establish and maintain your account.
- Configuration Data: Search parameters, keywords, target URLs, and agent directives you input into the platform to define your threat intelligence missions.
- Support Data: Information provided when reporting issues or communicating with our support teams.
B. Information Collected Automatically
- Usage Analytics: Logs pertaining to API requests, system interactions, mission frequencies, and platform performance metrics.
- Device & Connection Data: IP addresses, browser types, and authentication tokens utilized for security monitoring and abuse prevention.
3. How We Use Your Information
We process your data exclusively for the following purposes:
- To execute the autonomous threat intelligence missions you configure.
- To provide, maintain, and secure the ThreatBase platform.
- To process billing transactions and fulfill our contractual obligations.
- To detect, prevent, and mitigate fraudulent or unauthorized use of our infrastructure.
- To comply with applicable legal and regulatory requirements.
We do not sell, rent, or monetize your personal information or your proprietary configuration data to third parties.
4. Data Sharing and Subprocessors
We may share information with trusted third-party service providers (subprocessors) who assist us in operating our Services, such as cloud hosting providers and payment processors. All subprocessors are bound by strict confidentiality agreements and data processing addendums requiring them to maintain equivalent security standards.
We may also disclose data if required by law, court order, or governmental regulation, or if necessary to protect our physical and intellectual property rights.
5. Data Security and Isolation
ThreatBase employs enterprise-grade security architectures to protect your data. All data in transit and at rest is encrypted using industry-standard cryptographic protocols. Customer data environments are logically isolated to prevent cross-tenant contamination. We continuously monitor our infrastructure for vulnerabilities and conduct regular security audits to maintain the integrity of the platform.
6. Your Rights and Data Control
Depending on your jurisdiction, you may have the right to request access to, correction of, or deletion of your personal data. Because ThreatBase operates primarily as a B2B service processor, we will assist our enterprise clients in fulfilling these requests as mandated by applicable privacy frameworks (e.g., GDPR, CCPA).
7. Contact Information
For questions regarding this Privacy Policy or our data processing practices, please contact our privacy compliance team at:
privacy@threatbase.us