IASECURITY
Home About Services Contact

Privacy Policy

We've gone from exploiting data to protecting it

Last updated: January 1, 2025

Our Former Dark Side

We know what it's like to be on the other side. IASECURITY operators have extensive experience in data exfiltration, network infiltration, and social engineering. That's exactly why we understand the critical importance of protecting YOUR data.

Data We Collect (And Why We Need It)

Contact Intelligence

  • Personal Identifiers: Name, email, company - We need to know who we're talking to before we start breaking into your systems (with permission, of course)
  • Project Requirements: What you want us to hack, timeline, scope - The more we know about your attack surface, the better we can exploit it
  • Communication Logs: All emails, calls, and messages - We keep records like proper APT operators

Technical Reconnaissance

  • Device Fingerprinting: Browser, OS, IP location - Standard recon techniques for threat modeling
  • Network Intelligence: How you found us, referral sources - Understanding your digital footprint
  • Session Analytics: Time on site, pages viewed - Behavioral analysis for better targeting

How We Weaponize Your Data (Legally)

Operational Uses

  • Service Delivery: Conducting authorized penetration tests and security assessments
  • Client Communication: Updates, reports, and invoicing through secure channels
  • Threat Intelligence: Building better attack profiles to improve our methodologies

Data Sharing (With Allies Only)

  • Subcontractors: Specialized red team operators under strict NDAs
  • Legal Compliance: When courts or law enforcement demand disclosure
  • Emergency Response: If we discover active threats against you

Data Protection (Our Security Measures)

We protect your data like our own exploits - with military-grade encryption and paranoid security practices.

Technical Safeguards

  • Encryption: AES-256 encryption for data at rest, TLS 1.3 for data in transit
  • Access Control: Multi-factor authentication, role-based permissions, zero-trust architecture
  • Network Security: Segmented networks, IDS/IPS monitoring, regular penetration testing

Operational Security

  • Staff Training: All operators trained in data handling, OPSEC, and confidentiality
  • Incident Response: 24/7 monitoring with immediate breach response protocols
  • Data Retention: Automatic deletion of sensitive data after project completion

Your Rights (No Backdoors Here)

Unlike real attackers, we respect your rights and give you full control over your data.

  • Access Rights: Request copies of all data we have about you
  • Correction Rights: Update or fix any incorrect information
  • Deletion Rights: Request complete data deletion (secure wipe protocols)
  • Portability Rights: Get your data in machine-readable format
  • Objection Rights: Opt out of any data processing activities

Data Breaches (If We Get Pwned)

Even security companies can get compromised. Here's our incident response protocol:

  • Immediate Response: Contain the breach within 1 hour of detection
  • Client Notification: Contact affected clients within 24 hours
  • Regulatory Reporting: Notify authorities within 72 hours (GDPR compliance)
  • Post-Incident Analysis: Full forensic investigation and security improvements

Contact Our Security Team

Questions about this privacy policy or our data practices? Our security team is standing by.

Privacy Officer: privacy@ia-security.io

Security Team: security@ia-security.io

Emergency Line: +1 (856) 252-0558

Secure Address: IA SECURITY, LLC
131 Continental Dr, Suite 305
Newark, DE US

© 2025 IASECURITY. All rights reserved.

Privacy Policy | Terms of Service | Cookie Policy | Responsible Disclosure