{"id":3,"date":"2025-09-04T09:59:18","date_gmt":"2025-09-04T09:59:18","guid":{"rendered":"http:\/\/cloudure.io\/?page_id=3"},"modified":"2025-10-08T16:17:36","modified_gmt":"2025-10-08T16:17:36","slug":"privacy-policy","status":"publish","type":"page","link":"https:\/\/cloudure.io\/?page_id=3","title":{"rendered":"Privacy Policy"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Effective Date: 01\/10\/2025<br>Last Updated: 01\/09\/2025<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who We Are<\/h2>\n\n\n\n<p>Cloudure.io delivers comprehensive cloud security management services, helping organizations<br>secure, monitor, and scale their cloud infrastructure responsibly. We&#8217;re committed to protecting your<br>privacy and maintaining the highest standards of data security.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Information We Collect<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Information You Provide to Us<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Account Information:<\/strong> Name, email address, company name, password, and profile details<\/li>\n\n\n\n<li><strong>Contact Data:<\/strong> Information provided through contact forms, support requests, and communications<\/li>\n\n\n\n<li><strong>Configuration Data:<\/strong> Cloud infrastructure settings, security configurations, and monitoring preferences<\/li>\n\n\n\n<li><strong>Business Information:<\/strong> Company size, industry sector, cloud providers used, and compliance requirements<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Information We Collect Automatically<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Platform Usage:<\/strong> Features accessed, time spent, configuration changes, and system interactions<\/li>\n\n\n\n<li><strong>Technical Information:<\/strong> IP addresses, browser types, device information, and operating systems<\/li>\n\n\n\n<li><strong>Security Monitoring Data:<\/strong> Logs, alerts, threat intelligence, and security event information<\/li>\n\n\n\n<li><strong>Performance Data:<\/strong> System performance metrics, response times, and service availability<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Information from Third Parties<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cloud Provider APIs: <\/strong>Security configurations, resource inventories, and activity logs from your cloud accounts<\/li>\n\n\n\n<li><strong>Threat Intelligence:<\/strong> Security threat data from external sources to enhance protection<\/li>\n\n\n\n<li><strong>Integration Data:<\/strong> Information from connected security tools and services<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How We Use Your Information<\/h2>\n\n\n\n<p>We process your data to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Deliver Security Services:<\/strong> Monitor cloud infrastructure, detect threats, and provide security recommendations<\/li>\n\n\n\n<li><strong>Manage Your Account:<\/strong> Process registrations, handle billing, and provide customer support<\/li>\n\n\n\n<li><strong>Security Analysis:<\/strong> Analyze threats, generate security reports, and improve detection capabilities<\/li>\n\n\n\n<li><strong>Platform Enhancement:<\/strong> Develop new features, optimize performance, and enhance user experience<\/li>\n\n\n\n<li><strong>Communication:<\/strong> Send service updates, security alerts, and respond to inquiries<\/li>\n\n\n\n<li><strong>Compliance Support: <\/strong>Help meet regulatory requirements and industry standards<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Legal Basis for Processing (GDPR)<\/h2>\n\n\n\n<p>Under GDPR, we process your data based on:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Contract Performance: <\/strong>Providing cloud security monitoring and management services<\/li>\n\n\n\n<li><strong>Legitimate Interests: <\/strong>Improving security capabilities, platform optimization, and fraud prevention<\/li>\n\n\n\n<li><strong>Consent: <\/strong>Marketing communications and optional features (where applicable)<\/li>\n\n\n\n<li><strong>Legal Compliance: <\/strong>Meeting security regulations and responding to lawful requests<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Information Sharing and Disclosure<\/h2>\n\n\n\n<p>We do not sell your personal information. We may share data with:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cloud Security Partners:<\/strong> Trusted security vendors who enhance our threat detection capabilities<\/li>\n\n\n\n<li><strong>Service Providers:<\/strong> Infrastructure providers, payment processors, and support services<\/li>\n\n\n\n<li><strong>Legal Obligations:<\/strong> When required by law, court orders, or regulatory investigations<\/li>\n\n\n\n<li><strong>Security Incidents:<\/strong> With relevant authorities during security investigations (anonymized when possible)<\/li>\n\n\n\n<li><strong>Business Transfers:<\/strong> In connection with mergers, acquisitions, or business restructuring<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Data Security and Protection<\/h2>\n\n\n\n<p>We implement enterprise-grade security measures:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Encryption:<\/strong> Advanced encryption for data in transit and at rest<\/li>\n\n\n\n<li><strong>Access Controls:<\/strong> Multi-factor authentication, role-based access, and the principle of least privilege<\/li>\n\n\n\n<li><strong>Infrastructure Security:<\/strong> Secure cloud hosting, network segmentation, and intrusion detection<\/li>\n\n\n\n<li><strong>Security Monitoring:<\/strong> Continuous monitoring, threat detection, and incident response<\/li>\n\n\n\n<li><strong>Regular Audits:<\/strong> Security assessments, penetration testing, and compliance reviews<\/li>\n\n\n\n<li><strong>Incident Response:<\/strong> Comprehensive procedures for security event management<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Your Rights Under GDPR<\/h2>\n\n\n\n<p>You have the right to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Access:<\/strong> Obtain copies of your personal data and information about processing<\/li>\n\n\n\n<li><strong>Rectification:<\/strong> Correct inaccurate or incomplete personal information<\/li>\n\n\n\n<li><strong>Erasure:<\/strong> Request deletion of your data (subject to security and legal requirements)<\/li>\n\n\n\n<li><strong>Data Portability:<\/strong> Receive your data in a structured, machine-readable format<\/li>\n\n\n\n<li><strong>Processing Restriction:<\/strong> Limit how we process your information<\/li>\n\n\n\n<li><strong>Object to Processing:<\/strong> Object to processing based on legitimate interests<\/li>\n\n\n\n<li><strong>Withdraw Consent:<\/strong> Revoke consent for marketing or optional features<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>Contact us at info@cloudure.io to exercise these rights.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Data Retention<\/h2>\n\n\n\n<p>We retain information as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Account Data:<\/strong> Duration of service plus 7 years for security and legal purposes<\/li>\n\n\n\n<li><strong>Security Logs:<\/strong> Up to 5 years for threat analysis and incident investigation<\/li>\n\n\n\n<li><strong>Communication Records:<\/strong> 7 years for business and compliance purposes<\/li>\n\n\n\n<li><strong>Anonymized Analytics:<\/strong> Indefinitely for security research and service improvement<\/li>\n\n\n\n<li><strong>Legal Requirements:<\/strong> As required by applicable security and data protection regulations<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">International Data Transfers<\/h2>\n\n\n\n<p>When transferring data outside the EU, we ensure protection through:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Adequacy Decisions:<\/strong> Countries with EU-approved data protection standards<\/li>\n\n\n\n<li><strong>Standard Contractual Clauses:<\/strong> EU-approved contractual safeguards<\/li>\n\n\n\n<li><strong>Security Certifications:<\/strong> SOC 2, ISO 27001, and other recognized security standards<\/li>\n\n\n\n<li><strong>Your Explicit Consent:<\/strong> For specific transfers where required<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Third-Party Cloud Providers<\/h2>\n\n\n\n<p>Our service integrates with major cloud providers (AWS, Azure, GCP):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>API Access:<\/strong> We access your cloud configurations through secure APIs you authorize<\/li>\n\n\n\n<li><strong>Data Processing:<\/strong> Cloud provider data is processed solely for security monitoring<\/li>\n\n\n\n<li><strong>Separate Policies:<\/strong> Each cloud provider has their own privacy policies<\/li>\n\n\n\n<li><strong>Limited Scope:<\/strong> We only access data necessary for security services<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cookies and Tracking<\/h2>\n\n\n\n<p>We use cookies and similar technologies for:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Essential Operations: <\/strong>Authentication, security, and core platform functionality<\/li>\n\n\n\n<li><strong>Performance Monitoring:<\/strong> Platform performance, error tracking, and user experience<\/li>\n\n\n\n<li><strong>Security Analysis:<\/strong> Threat detection, anomaly identification, and fraud prevention<\/li>\n\n\n\n<li><strong>Analytics:<\/strong> Understanding platform usage and optimizing features <\/li>\n<\/ul>\n\n\n\n<p>Manage cookie preferences through your browser or account settings.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security Incident Notification<\/h2>\n\n\n\n<p>In case of security incidents affecting personal data:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Notification Timing:<\/strong> We&#8217;ll notify relevant authorities within 72 hours when required<\/li>\n\n\n\n<li><strong>User Communication:<\/strong> We&#8217;ll inform affected users without undue delay<\/li>\n\n\n\n<li><strong>Incident Details:<\/strong> We&#8217;ll provide clear information about the incident and our response<\/li>\n\n\n\n<li><strong>Remediation Steps:<\/strong> We&#8217;ll explain measures taken to address the incident<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Changes to This Policy<\/h2>\n\n\n\n<p>We may update this policy for legal, operational, or security reasons:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Advance Notice:<\/strong> Significant changes will be communicated via email or platform notifications<\/li>\n\n\n\n<li><strong>Effective Date:<\/strong> Changes take effect on the date specified in the updated policy<\/li>\n\n\n\n<li><strong>Review Opportunity:<\/strong> You&#8217;ll have time to review changes before they become effective<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Regulatory Contact<\/h2>\n\n\n\n<p>For GDPR-related concerns, you may contact: <strong>EU Representative:<\/strong> <\/p>\n\n\n\n<p><strong>Supervisory Authority: <\/strong> Contact your local data protection authority<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-YKOMmx\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Secure data practices for secure cloud infrastructure.<\/h3>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Contact Us<\/h2>\n\n\n\n<p>For privacy-related inquiries or to exercise your right:<\/p>\n\n\n\n<p>Email: info@cloudure.com<br>Security Contact: security@cloudure.io<br>Address: Antalya Tower, 5th Floor, Nador, Morocco<br>Data Protection Officer: info@cloudure.com<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Effective Date: 01\/10\/2025Last Updated: 01\/09\/2025 Who We Are Cloudure.io delivers comprehensive cloud security management services, helping organizationssecure, monitor, and scale their cloud infrastructure responsibly. We&#8217;re committed to protecting yourprivacy and maintaining the highest standards of data security. Information We Collect Information You Provide to Us Information We Collect Automatically Information from Third Parties How We [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":85,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-3","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/cloudure.io\/index.php?rest_route=\/wp\/v2\/pages\/3","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudure.io\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cloudure.io\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cloudure.io\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudure.io\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3"}],"version-history":[{"count":4,"href":"https:\/\/cloudure.io\/index.php?rest_route=\/wp\/v2\/pages\/3\/revisions"}],"predecessor-version":[{"id":134,"href":"https:\/\/cloudure.io\/index.php?rest_route=\/wp\/v2\/pages\/3\/revisions\/134"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudure.io\/index.php?rest_route=\/wp\/v2\/media\/85"}],"wp:attachment":[{"href":"https:\/\/cloudure.io\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}