Effective date: February 20, 2020
What Information does Nightfall Collect?
Information You Provide to Us
We may communicate with you if you’ve provided us the means to do so. For example, if you’ve given us your email address, we may email you about your use of the Services or send you marketing emails if you have selected to receive them. Also, we may receive a confirmation when you open an email from us. This confirmation helps us make our communications with you more interesting and improve our services. You may select not to receive communications from us at the time you provide your information or anytime by emailing us at firstname.lastname@example.org.
Information Collected Automatically
Whenever you interact with our Services, we automatically receive and record information on our server logs from your browser or device, which may include your IP address, geolocation data, device identification, “cookie” information, the type of browser and/or device you’re using to access our Services, and the page or feature you requested. “Cookies” are identifiers we transfer to your browser or device that allow us to recognize your browser or device and tell us how and when pages and features in our Services are visited and by how many people. You may be able to change the preferences on your browser or device to prevent or limit your device’s acceptance of cookies, but this may prevent you from taking advantage of some of our features.
We may use this data to customize content for you that we think you might like, based on your usage patterns. We may also use it to improve the Services – for example, this data can tell us how often users use a particular feature of the Services, and we can use that knowledge to make the Services interesting to as many users as possible.
Will Nightfall Share Any of the Personal Information it Receives?
We do not rent or sell your Personally Information in personally identifiable form to anyone. However, we may aggregate and share de-identified Personal Information with third parties as described in this section:
Information that’s been de-identified. We may provide de-identified data to our partners in aggregate to help them understand how often and in what ways people use our Services, so they can optimize their integrated services. However, we never disclose aggregate usage or de-identified information to a partner (or allow a partner to collect such information) in a manner that would identify you as an individual person.
Agents: We employ other companies and people to perform tasks on our behalf and need to share your information with them to provide products or services to you. For example, we may use a payment processing company to receive and process your credit card transactions for us. Unless we tell you differently, our agents do not have any right to use the Personal Information we share with them beyond what is necessary to assist us. Note that an “agent” may also be considered a “partner” in certain circumstances, and would be subject to the terms of the “Information that’s been de-identified” section in that regard.
Business Transfers: We may choose to buy or sell assets, and may share and/or transfer customer information in connection with the evaluation of and entry into such transactions. Also, if we (or our assets) are acquired, or if we go out of business, enter bankruptcy, or go through some other change of control, Personal Information could be one of the assets transferred to or acquired by a third party.
Is Personal Information about me secure?
Your account is protected by a password for your privacy and security. If you access your account via a third-party site or service, you may have additional or different sign-on protections via that third-party site or service. You must prevent unauthorized access to your account and Personal Information by selecting and protecting your password and/or other sign-on mechanism appropriately and limiting access to your computer or device and browser by signing off after you have finished accessing your account.
We endeavor to protect the privacy of your account and other Personal Information we hold in our records, but unfortunately, we cannot guarantee complete security. Unauthorized entry or use, hardware or software failure, and other factors, may compromise the security of user information at any time.
What Personal Information can I access?
Through your account settings, you may access, and, in some cases, edit or delete the following information you’ve provided to us:
- name and password
- email address
- profile information, including information you have uploaded to the site
The information you can view, update, and delete may change as the Services change. If you have any questions about viewing or updating information we have on file about you, please contact us at email@example.com.
Under California Civil Code Sections 1798.83-1798.84, California residents are entitled to contact us to prevent disclosure of Personal Information to third parties for such third parties’ direct marketing purposes; in order to submit such a request, please contact us at firstname.lastname@example.org.
Additionally, California residents may request to know, twice in any 12-month period, what Personal Information we maintain about you, how this information was attained, and our business purpose for maintaining it. We will honor all valid requests for your access to or deletion of your personal data. However, you may be required to verify your identity before we are able to respond to your request.
What choices do I have?
You can always opt not to disclose information to us, but keep in mind some information may be needed to register with us or to take advantage of some of our features.
You may be able to add, update, or delete information as explained above. Some non-personal information may remain in our records after your deletion of personal information from your account. We may use any aggregated data derived from or incorporating your Personal Information after you update or delete it, but not in a manner that would identify you personally.
Where is my information stored?
We, and our third-party service providers, process and store your Personal Information in the United States. This means it may be transferred to – and maintained on – computers located outside of your state, province, country or other governmental jurisdiction where the data protection laws may differ from those in your jurisdiction.
What if I have questions about this policy?
“It just works. We look forward to extending our use of Nightfall.”
“Nightfall has it all – easy to stand up and deploy and with the right feature set to do what we need.”
“Nightfall has allowed us to automate the detection and response of DLP.”
“Nightfall has given me a better handle on sensitive information.”
“Nightfall’s ease of setup and accuracy of identified data are both on point.”
“We had our Nightfall Enterprise DLP up and running in less than 321 seconds.”
“Working with Nightfall gives our customers confidence that we take data protection very seriously.”
Nightfall integrates directly with all your
SaaS, APIs, and data infrastructure.
Latest from the Blog
E-discovery or DLP: Which one is right for you?
DLP and e-discovery may look similar on the surface, but these aren’t interchangeable tools. Read our breakdown of what each can & can’t do, plus how to choose the proper tool for your business.Read now
A Chat with Infosec Innovator and Investor Stuart McClure
Stuart McClure, CEO and founder of Cylance as well a Nightfall Investor talks about his what sparked his interest in information security as well as how he built prominent security companies like Foundstone and Cylance, the latter of which was acquired by Blackberry for $1.4 billion last year. Stuart shared his thoughts on the importance of AI in cloud security as well as what it takes to innovate in the infosec space.Read Now
Insider Threats in 2020: Discussing a Persistent Part of the Threat Landscape
Insider threats remain a persistent security risk, so make sure you understand them inside and out with our overview on this topic.Read Now
Join us on LinkedIn to Discuss Information Security in the Era of COVID-19
Learn about Nightfall's Linkedin group "Information Security in the Era of COVID-19" and join us to discuss new and emerging information security strategies in response to the ongoing pandemic.Read Now
Nightfall’s Commitment to Teams During the COVID-19 Outbreak
Read more about our commitment to organizations and teams amid the COVID-19 pandemic and what we're planning to do to help.Read Now
Playing to win in tech investing: Kelvin Beachum, Jr. shares his lessons on and off the football field
Kelvin Beachum, Jr. shares his insights on investing in tech companies like Nightfall, which skills can translate from football to business, and the value of investing back into his community.Read now
How to Ensure Confidential Zoom Meeting Invitations are Secure on Slack
With Zoom and Slack being used together, there's increased likelihood for Zoom invitations to be shared internally with Slack members who are not authorized to attend these meetings. Learn how Nightfall is addressing the issue.Read Now
Key information security terms to know: Start with the basics
Information security and cloud security terms can be hard to follow — especially with all those acronyms like DLP, SAML, and more.Read now
A Conversation with VC and Cybersecurity Veteran Enrique Salem
Enrique Salem, Partner at Bain Capital Ventures & Nightfall board member, shares his thoughts on the COVID-19 pandemic's impact on information security programs as well as advice that's gotten him through his long and distinguished career in the industry.Read Now
4 Best Practices for Healthcare teams using Slack
Healthcare teams using Slack must be aware of best practices that will aid them in ensuring they maintain HIPAA compliance while using the platform. Here are four important practices to be aware of.Read Now
Confluence permissions best practices to secure your spaces
Securing Confluence spaces within Atlassian organizations requires the right permissions. Read about the best practices for creating the appropriate permissions within ConfluenceRead Now