Privacy Policy

Last Updated: November 16, 2025

At Cyberno, we are committed to respecting the privacy of our users and website visitors and protecting their information with the highest level of data security and compliance with cybersecurity standards. This Privacy Policy explains what data we collect from you, how we use it, and what rights you have regarding your personal information.

 

Information We Collect

Depending on the type of services or products you use, we may collect the following categories of data:

  1. Personal Information:
    1. For individuals: Includes first name, last name, phone number, and email address.
    2. For legal entities: Includes company national ID, registration number, economic code, address, and contact information, if needed for issuing invoices or contracts.
  2. Technical and Usage Information: Such as IP address, device identifier, system logs, security scan data (e.g., scan results, hashes, and file metadata).
  3. Account and Payment Information: Such as username, subscription history, and payment records (bank card details are stored only by the secure payment gateway).
  4. User-Generated Data: Configuration and scan settings.
  5. Cookies and Similar Technologies: Used to analyze user behavior, improve performance, and enhance system security.
  6. Uploaded Files: None of the files uploaded by users are stored on Cyberno servers. These files are stored only in a temporary drive and are deleted immediately after the scanning process is completed.
    For each uploaded file, data such as the file hash value, metadata, uploader username, and scan result is stored. The purpose of storing this data is to improve the speed of scanning duplicate files. This information is accessible ONLY to Cyberno and is not shared with third parties.

 

How We Use Information

We use the collected data for the following purposes:

  1. Providing, maintaining, and improving cybersecurity services and company products (legal basis: contract performance and legitimate interests).
  2. Managing user accounts, technical support, and billing operations.
  3. Ensuring network security, preventing fraud, and analyzing security incidents.
  4. Sending notifications, updates, and security alerts related to user accounts.
  5. Conducting technical analyses to identify vulnerabilities and cyber threats to improve service quality.
  6. Targeted marketing (only with user consent and in compliance with applicable laws).

 

Sharing Information with Third Parties

User information may be shared with third parties ONLY under the following circumstances:

  1. Cloud service providers, data processors, and security infrastructure providers used for hosting or processing data.
  2. Legal or regulatory authorities when required by law.
  3. In specific situations such as mergers or asset transfers, information will be provided to the new party with prior notification.

 

Cookies and Similar Technologies

Cyberno uses cookies and user behavior analytics tools to improve user experience, enhance security, and personalize content.
Users may disable cookie storage through their browser settings; however, some site features may not function properly as a result.

 

Data Retention

Personal and account information is retained as long as your account remains active or as required for legal, financial, and security purposes. Technical data, logs, and security reports may be retained for longer periods for threat analysis, incident investigation, and system security improvement. Retention periods are determined based on the type of data and legal requirements.

 

Information Security

We implement a set of advanced technical and organizational measures to protect your data, including:

  1. Data encryption during transmission and storage (TLS / AES)
  2. Role-Based Access Control (RBAC) to prevent unauthorized access
  3. Continuous monitoring and auditing of security events
  4. Regular system updates and vulnerability management

Despite our efforts to maintain security, no system is entirely impervious to cyber threats. In the event of a security incident, notifications will be made to users and competent authorities as required by law.

 

User Rights

Depending on your place of residence or jurisdiction, you may have the following rights:

  1. Access to your personal data
  2. Correction or updating of inaccurate information
  3. Request deletion of your data (right to be forgotten)
  4. Restriction of data processing
  5. Objection to processing based on legitimate interests
  6. Data portability to another system or service

To apply any of these rights, you may contact Cyberno support.

 

Changes to the Privacy Policy

Cyberno may periodically update this policy to comply with legal changes or internal improvements.
The updated version will be available on the website, and the date of the latest revision will be listed at the top of this page.
Users are encouraged to review this section regularly to stay informed of the latest policies and security practices.

Can't find an answer? Are you looking for a specific article that is in the General Questions section? Just browse through the various related folders and categories and then you will find the article you are looking for.
Copyright © Cyberno Inc. All rights reserved.