Last Updated March 17, 2025
This Privacy Policy describes our policies and procedures on the collection, use, and disclosure of your information when you use our services and tells you about your privacy rights and how the law protects you.
We use Your Personal data to provide and improve the Service. By using the Service, You agree to the collection and use of information in accordance with this Privacy Policy.
Given the sensitive nature of our cybersecurity operations, we’ve created this detailed document to ensure complete transparency about how your data is handled throughout our service delivery process.
1. Who We Are
Porthas (“we,” “us,” or “our”), headquartered at 39b Alpha Park, Cleveland, OH 44143, provides specialized cybersecurity services, including ransomware recovery, Digital Forensics & Incident Response (DFIR), and Incident Response Retainer (IRR). This policy outlines how we collect, use, and protect your data. By using our services, you consent to the practices described below.
Our website address is https://porthas.com
2. Interpretation and Definitions
The following definitions shall have the same meaning regardless of whether they appear in the singular or in the plural.
Definitions
For the purposes of this Privacy Policy:
We, us, our means Porthas, including technicians and experts working within the company or under the company.
You means the customer, consumer, or client, being an individual, company, or other legal entity on behalf of which such individual is accessing or using the Service. Under GDPR (General Data Protection Regulation), you can be referred to as the Data Subject or as the User as you are the individual using the Service.
Account means a unique account created for you to access our Service or parts of our Service.
Business, for the purpose of the CCPA (California Consumer Privacy Act), refers to the Company as the legal entity that collects Consumers’ personal information and determines the purposes and means of the processing of Consumers’ personal information or on behalf of which such information is collected and that alone, or jointly with others, determines the purposes and means of the processing of consumers’ personal information, that does business in the State of California.
Company (referred to as either “the Company”, “We”, “Us” or “Our” in this Agreement) refers to Porthas.
For the purpose of the GDPR, the Company is the Data Controller.
Consumer, for the purpose of the CCPA (California Consumer Privacy Act), means a natural person who is a California resident. A resident, as defined in the law, includes (1) every individual who is in the USA for other than a temporary or transitory purpose, and (2) every individual who is domiciled in the USA who is outside the USA for a temporary or transitory purpose.
Cookies are small files that are placed on your computer, mobile device, or any other device by a website, containing the details of your browsing history on that website among its many uses.
Country refers to the United States of America.
Data Controller, for the purposes of the GDPR (General Data Protection Regulation), refers to the Company as the legal person that, alone or jointly with others, determines the purposes and means of the processing of Personal Data.
Device means any device that can access the Service, such as a computer, a cellphone, or a digital tablet.
Do Not Track (DNT) is a concept that has been promoted by US regulatory authorities, in particular the U.S. Federal Trade Commission (FTC), for the Internet industry to develop and implement a mechanism for allowing internet users to control the tracking of their online activities across websites.
Forensic Data refers to digital evidence collected during the investigation of security incidents, including but not limited to system logs, memory dumps, disk images, and network traffic captures.
Incident Response refers to the organized approach to addressing and managing the aftermath of a security breach or cyberattack.
Personal Data is any information that relates to an identified or identifiable individual.
For the purposes of GDPR, Personal Data means any information relating to you, such as a name, an identification number, location data, online identifier, or one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity.
For the purposes of the CCPA, Personal Data means any information that identifies, relates to, describes, or is capable of being associated with, or could reasonably be linked, directly or indirectly, with you.
Ransomware Recovery Data refers to files, systems, or information affected by ransomware that we process during recovery efforts.
Sale, for the purpose of the CCPA (California Consumer Privacy Act), means selling, renting, releasing, disclosing, disseminating, making available, transferring, or otherwise communicating orally, in writing, or by electronic or other means, a Consumer’s personal information to another business or a third party for monetary or other valuable consideration.
Service refers to our cybersecurity services, including the Website, Ransomware Recovery, DFIR, and IRR services.
Service Provider means any natural or legal person who processes the data on behalf of the Company. It refers to third-party companies or individuals employed by the Company to facilitate the Service, to provide the Service on behalf of the Company, to perform services related to the Service, or to assist the Company in analyzing how the Service is used. For the purpose of the GDPR, Service Providers are considered Data Processors.
Usage Data refers to data collected automatically, either generated by the use of the Service or from the Service infrastructure itself (for example, the duration of a page visit).
Website refers to Porthas’s official website, accessible from porthas.com
Case Data refers to data collected when you agree to receive an assessment for our services, including details about security incidents, affected systems, and recovery requirements.
3. Collecting and Using Your Personal Data
Types of data collected:
I. Personal Data
While using our Service, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you. Personally identifiable information may include, but is not limited to:
- Email address
- First name and last name
- Phone number
- Address, State, Province, ZIP/Postal code, City
- Usage Data
- Case Data
II. Cybersecurity Incident Data
In providing our ransomware recovery, DFIR, and IRR services, we may collect and process:
- System logs and audit trails
- Network traffic data
- File metadata
- Malware samples and indicators of compromise
- Email correspondence related to attacks
- Digital forensic images of affected systems
- Encryption artifacts and ransomware notes
- User access credentials (securely handled with strict access controls)
- Backup data for restoration purposes
This information is essential for investigating security incidents, recovering from attacks, and providing evidence, if needed, for legal proceedings.
III. Payment Information
When you pay for a product and/or a service via bank transfer or other payment methods, we may ask you to provide information to facilitate this transaction and to verify your identity. Such information may include, without limitation:
- Date of birth
- Passport or National ID card
- Bank account information in order to pay for products and/or services within the Service
- Bank card statement
- Other information linking you to an address
All payment information is processed through PCI-DSS-compliant payment processors with industry-standard encryption.
3.1. Usage Data
Usage Data is collected automatically when using the Service.
Usage Data may include information such as your Device’s Internet Protocol address (e.g., IP address), browser type, browser version, the pages of our Service that you visit, the time and date of your visit, the time spent on those pages, unique device identifiers, and other diagnostic data.
When you access the Service by or through a mobile device, we may collect certain information automatically, including, but not limited to, the type of mobile device you use, your mobile device’s unique ID, the IP address of your mobile device, your mobile operating system, the type of mobile Internet browser you use, unique device identifiers and other diagnostic data.
We may also collect information that your browser sends whenever you visit our Service or when you access the Service by or through a mobile device.
3.2. Tracking Technologies and Cookies
We use Cookies and similar tracking technologies to track the activity on our Service and store certain information. Tracking technologies used are beacons, tags, and scripts to collect and track information and to improve and analyze our Service. The technologies we use may include:
- Cookies or Browser Cookies: A cookie is a small file placed on your Device. You can instruct your browser to refuse all Cookies or to indicate when a Cookie is being sent. However, if you do not accept Cookies, you may not be able to use some parts of our Service. Unless you have adjusted your browser setting so that it will refuse Cookies, our Service may use Cookies.
- Flash Cookies: Certain features of our Service may use local stored objects (or Flash Cookies) to collect and store information about your preferences or your activity on our Service. Flash Cookies are not managed by the same browser settings as those used for Browser Cookies.
- Web Beacons: Certain sections of our Service and our emails may contain small electronic files known as web beacons (also referred to as clear gifs, pixel tags, and single-pixel gifs) that permit the Company, for example, to count users who have visited those pages or opened an email and for other related website statistics (for example, recording the popularity of a certain section and verifying system and server integrity).
Cookies can be “Persistent” or “Session” Cookies. Persistent Cookies remain on your personal computer or mobile device when you go offline, while Session Cookies are deleted as soon as you close your web browser.
We use both Session and Persistent Cookies for the purposes set out below:
- Necessary / Essential Cookies
- Type: Session Cookies
- Administered by: Us
- Purpose: These Cookies are essential to provide you with services available through the Website and to enable you to use some of its features. They help to authenticate users and prevent fraudulent use of user accounts. Without these Cookies, the services that you have asked for cannot be provided, and we only use these Cookies to provide you with those services.
- Cookies Policy / Notice Acceptance Cookies
- Type: Persistent Cookies
- Administered by: Us
- Purpose: These Cookies identify if users have accepted the use of cookies on the Website.
- Functionality Cookies
- Type: Persistent Cookies
- Administered by: Us
- Purpose: These Cookies allow us to remember choices you make when you use the Website, such as remembering your login details or language preference. The purpose of these Cookies is to provide you with a more personal experience and to avoid you having to re-enter your preferences every time you use the Website.
- Tracking and Performance Cookies
- Type: Persistent Cookies
- Administered by: Third-Parties
- Purpose: These Cookies are used to track information about traffic to the Website and how users use the Website. The information gathered via these Cookies may directly or indirectly identify you as an individual visitor. This is because the information collected is typically linked to a pseudonymous identifier associated with the device you use to access the Website. We may also use these Cookies to test new pages, features, or new functionality of the Website to see how our users react to them.
3.3. Use of Your Personal Data
The Company may use Personal Data for the following purposes:
- To provide and maintain our Service, including to monitor the usage of our Service.
- To manage your Account: to manage your registration as a user of the Service. The Personal Data you provide can give you access to different functionalities of the Service that are available to you as a registered user.
- For the performance of a contract: the development, compliance, and undertaking of the purchase contract for the products, items, or services you have purchased or of any other contract with us through the Service.
- To contact you: To contact you by email, telephone calls, SMS, or other equivalent forms of electronic communication, such as a mobile application’s push notifications regarding updates or informative communications related to the functionalities, products, or contracted services, including the security updates, when necessary or reasonable for their implementation.
- To provide you with news, special offers, and general information about other goods, services, and events that we offer that are similar to those that you have already purchased or enquired about unless you have opted not to receive such information.
- To manage your requests: To attend and manage your requests to us.
- For business transfers: We may use your information to evaluate or conduct a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of our assets, whether as a going concern or as part of bankruptcy, liquidation, or similar proceeding, in which Personal Data held by us about our Service users is among the assets transferred.
- For ransomware recovery operations: To analyze malware, develop decryption tools, and restore affected systems.
- Forensic investigations: To collect and analyze digital evidence in security incidents.
- For threat intelligence: To identify attacker tactics, techniques, and procedures to improve defensive measures.
- For legal compliance: To document incidents, preserve evidence, and comply with regulatory notification requirements.
- For other purposes: We may use your information for other purposes, such as data analysis, identifying usage trends, determining the effectiveness of our promotional campaigns, and evaluating and improving our Service, products, services, and marketing and your experience.
3.3.1. Specific Uses for Cybersecurity Services
Ransomware Recovery
- Analyzing encryption methods to develop decryption capabilities
- Recovering and restoring affected systems and data
- Documenting attack vectors for future prevention
Digital Forensics & Incident Response
- Investigating security breaches and unauthorized access
- Identifying compromised systems and data
- Documenting chain of custody for potential legal proceedings
- Developing remediation strategies
Incident Response Retainer
- Maintaining readiness for rapid response to security incidents
- Conducting proactive security assessments
- Developing customized incident response plans
- Training and tabletop exercises
3.4. Sharing Your Personal Data
We may share your personal information in the following situations:
- With Service Providers: We may share your personal information with Service Providers to monitor and analyze the use of our Service, for payment processing, to contact you, and to support our cybersecurity operations.
- For business transfers: We may share or transfer your personal information in connection with, or during negotiations of, any merger, sale of Company assets, financing, or acquisition of all or a portion of our business to another company.
- With Affiliates: We may share your information with our affiliates, in which case we will require those affiliates to honor this Privacy Policy. Affiliates include our parent company and any other subsidiaries, joint venture partners, or other companies that we control or that are under common control with us.
- With business partners: We may share your information with our business partners to offer you certain products, services, or promotions.
- With your consent: We may disclose your personal information for any other purpose with your consent.
- For legal obligations: We may disclose your information where required to do so by law or in response to valid requests by public authorities (e.g., a court or a government agency).
- With law enforcement: In rare cases involving criminal activity, we may be required to share certain information with law enforcement agencies under proper legal authority.
- With cybersecurity partners: For the purposes of threat intelligence and improving defensive capabilities, we may share anonymized malware samples and attack indicators with trusted cybersecurity partners and information-sharing communities.
3.5. Website Visitor Privacy
This section specifically addresses privacy practices for visitors to porthas.com who may not yet be using our cybersecurity services.
3.5.1. Website Visitor Information Collection
While using our website (porthas.com), we collect limited information about visitors. As a cybersecurity and data recovery service provider, we understand the importance of data minimization. Our website does not directly collect personally identifiable information (PII) from casual visitors. However, we do utilize Google Analytics to gather anonymous usage statistics that help us improve user experience.
The non-personally identifiable information collected may include:
- Browser type and version
- Operating system
- Referring website
- Time spent on pages
- Navigation patterns
- Approximate geographic location (country/city level only)
- Internet Service Provider information
3.5.2. Google Analytics Usage
Our website utilizes Google Analytics (GA4), a web analytics service provided by Google LLC. Google Analytics employs cookies—small text files stored on your device—to analyze how you interact with our website.
The information generated by these cookies about your website usage (including your IP address) is transmitted to and stored on Google’s servers, primarily in the United States. Google Analytics data retention is set to 14 months, after which the user-level and event-level data expires automatically.
We have enabled IP anonymization, meaning your IP address is truncated within EU member states before transmission. Only in exceptional cases is the full IP address transmitted to Google servers in the US and truncated there.
Google processes this information to evaluate website usage, compile analytical reports, and provide other services related to internet activity. Google may transfer this information to third parties where required by law or where such parties process data on Google’s behalf.
You can prevent cookie storage through your browser settings or opt out of Google Analytics tracking entirely by installing the Google Analytics Opt-out Browser Add-on (https://tools.google.com/dlpage/gaoptout).
3.5.3. Use of Website Analytics Information
The non-personally identifiable information collected through Google Analytics helps us understand how visitors interact with porthas.com and improve our digital presence in the following ways:
- Analyzing visitor flow to optimize navigation and content placement
- Identifying technical issues affecting user experience
- Understanding which cybersecurity services generate the most interest
- Evaluating the effectiveness of our content strategy
- Optimizing our website for different devices and browsers
This information is used solely for internal website improvement and is not combined with personal data collected through our service delivery processes. We do not use this data for remarketing, retargeting, or advertising purposes, nor do we share this analytical information with third parties except as aggregated statistical reports.
3.5.4. Website Security Measures
Protecting visitor information is paramount, given our role in the cybersecurity industry. We implement multiple layers of protection for website visitors:
- TLS/SSL encryption (HTTPS) across our entire website
- Regular security assessments and penetration testing
- Web application firewall to prevent malicious traffic
- Server-side security controls following OWASP best practices
- Regular security patches and updates
- Content Security Policy implementation to prevent cross-site scripting
While we employ industry-standard security measures, please note that no method of transmission over the internet or electronic storage is 100% secure. We continuously evaluate and enhance our security protocols in alignment with our SOC 2 Type II certification requirements and ISO 27001 compliance standards.
4. Security Measures for High-Risk Data
Given the sensitive nature of our cybersecurity services, we implement advanced security measures to protect your data:
4.1. Technical Safeguards
- End-to-end encryption for data in transit and at rest using AES-256 and other industry-standard protocols
- Multi-factor authentication for all access to client data
- Secure, isolated environments for malware analysis
- Air-gapped systems for highly sensitive recovery operations
- Regular security testing, including penetration testing and vulnerability scanning
- Real-time monitoring for unauthorized access attempts
4.2. Organizational Controls
- Background checks for all employees with access to client data
- Role-based access controls limiting data access to only those who require it
- Regular security awareness training for all staff
- Formal incident response procedures for potential data breaches
- Strict chain of custody documentation for all forensic evidence
4.3. Compliance and Certification
- SOC 2 Type II certification
- ISO 27001 compliance
- NIST Cybersecurity Framework implementation
- Regular third-party security audits
5. Data Retention and Deletion
The Company will retain your Personal Data only for as long as is necessary for the purposes set out in this Privacy Policy.
We will retain and use your Personal Data to the extent necessary to comply with our legal obligations (for example, if we are required to retain your data to comply with applicable laws), resolve disputes, and enforce our legal agreements and policies.
Specific retention periods include:
- Account information: Retained for the duration of your relationship with us plus 7 years following account closure
- Payment information: Retained for 7 years as required by tax regulations
- Security incident data: Retained for 7 years from incident closure to comply with legal and regulatory requirements
- Ransomware and malware samples: Retained indefinitely in secure environments for research purposes (anonymized)
- System backups: Retained for 30 days following successful recovery operations, then securely deleted
- Communication records: Retained for 3 years following the conclusion of services
5.1. Secure Deletion Methods
When data reaches the end of its retention period, we employ secure deletion methods, including:
- Cryptographic erasure
- Digital shredding technologies
- Physical destruction of media when appropriate
- Certified data destruction services with formal certification
6. Your Data Protection Rights
Depending on your location and applicable law, you may have the following rights regarding your personal data:
6.1. Under GDPR (European Users)
- Right to access: The right to request copies of your personal data.
- Right to rectification: The right to request the correction of inaccurate information or the completion of incomplete information.
- Right to erasure: The right to request deletion of your personal data under certain circumstances.
- Right to restrict processing: The right to request the restriction of the processing of your personal data.
- Right to data portability: The right to request the transfer of your data to another organization.
- Right to object: You have The right to object to the processing of your personal data for certain purposes.
- Rights related to automated decision-making: The right not to be subject to decisions based solely on automated processing.
6.2. Under CCPA (California Residents)
- Right to know: The right to know what personal information is collected, used, shared, or sold.
- Right to delete: The right to request deletion of personal information.
- Right to opt-out: You have The right to opt-out of the sale of your personal information.
- Right to non-discrimination: The right not to be discriminated against for exercising your CCPA rights.
7. International Data Transfers
Your information, including Personal Data, is processed at the Company’s operating offices and in any other places where the parties involved in the processing are located. This means that this information may be transferred to and maintained on computers located outside of your state, province, country or other governmental jurisdiction where the data protection laws may differ from those in your jurisdiction.
We ensure that any international transfers of personal data are subject to appropriate safeguards, including:
- EU-US Data Privacy Framework certification
- Standard Contractual Clauses approved by the European Commission
- Binding Corporate Rules for transfers within our corporate group
- Encryption and pseudonymization measures to protect data during the transfer
- Data processing agreements with all service providers requiring appropriate security measures
Your consent to this Privacy Policy, followed by your submission of such information, represents your agreement to such transfers.
8. Incident Response for Data Breaches
In the event of a data breach affecting your personal information, we will:
- Investigate the incident promptly to determine the nature and scope of the breach
- Implement immediate containment measures to limit the impact
- Notify affected individuals within 72 hours of discovery when feasible
- Provide clear information about what happened and what steps you should take
- Cooperate with regulatory authorities as required by law
- Document the incident and implement preventative measures to reduce future risk
9. Children’s Privacy
Our Service does not address anyone under the age of 16. We do not knowingly collect personally identifiable information from anyone under the age of 16. If you are a parent or guardian and you are aware that your child has provided us with Personal Data, please contact us. If we become aware that we have collected Personal Data from anyone under the age of 16 without verification of parental consent, we take steps to remove that information from our servers.
If we need to rely on consent as a legal basis for processing your information and your country requires consent from a parent, we may require your parent’s consent before we collect and use that information.
10. Changes to this Privacy Policy
We may update this Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page and updating the “Last updated” date at the top of this Privacy Policy. We will also notify you via email and/or a prominent notice on our Service prior to the change becoming effective and update the “Last updated” date at the top of this Privacy Policy.
You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.
Contact Us
If you have any questions about this Privacy Policy, you can contact us:
- By email: [email protected]
- By phone: +1 (844) 969-6683
- By mail: 39b Alpha Park, Cleveland, OH 44143