Privacy Policy

This policy explains what Bliss Cyber collects and how it is used.

1. Scope

This Privacy Policy applies to information collected through blisscyber.com, direct communications with prospective clients, and information handled during client engagements unless a separate agreement says otherwise.

Client agreements may add more specific terms.

2. Information Collected Through the Website

Contact Form Information

  • Full name
  • Organization name
  • Email address
  • Selected service interest
  • Selected primary concern
  • Selected timeline
  • Message content you choose to submit

Technical and Security Information

  • IP address or proxy-provided client IP information used for abuse prevention and rate limiting
  • Browser, device, and request metadata
  • Submission timing and related anti-spam or anti-abuse indicators

3. Information That May Be Collected During an Engagement

If Bliss Cyber is engaged for services, the information handled may expand based on the scope of work.

  • System, tenant, network, or asset inventory information
  • User and role information, directory structure, or identity configuration details
  • Security policies, procedures, standards, diagrams, or audit documentation
  • Cloud configuration data, scoped log samples, vulnerability findings, or implementation notes
  • Project contacts, stakeholder lists, ticket references, and implementation notes

We aim to limit information and access to what is needed for the engagement.

4. How Information Is Used

  • Respond to inquiries and evaluate fit
  • Communicate about proposals, scope, scheduling, and service delivery
  • Deliver advisory, implementation support, managed services, or training
  • Protect the website, contact process, systems, and business operations
  • Maintain internal records and meet contractual or legal obligations

5. How Information May Be Shared

Bliss Cyber does not sell personal information. Information may be shared only as needed for operations, service delivery, or legal compliance.

Service Providers

We may use service providers for hosting, email delivery, infrastructure, rate limiting, document storage, or similar support.

Client-Directed or Engagement-Required Sharing

During an engagement, information may be shared with authorized client personnel, approved vendors, auditors, or other parties identified in scope.

Legal Requirements

We may disclose information when required by law or reasonably needed to protect rights, safety, systems, or contractual interests.

6. Security and Retention

Security

Bliss Cyber uses reasonable administrative, technical, and operational safeguards. No system or transmission method can be guaranteed completely secure.

Retention

  • Respond to inquiries and maintain business correspondence
  • Perform services and support follow-up work
  • Document project history, billing, legal, or contractual requirements
  • Preserve security, audit, or dispute-related records where appropriate

When information is no longer needed, Bliss Cyber may delete, archive, anonymize, or restrict access to it as appropriate.

7. Rights and Choices

Depending on your location and applicable law, you may have rights to access, correct, delete, or limit certain personal information.

If the information belongs to a client or is processed under a client engagement, the request may need to be handled through that client or under the controlling agreement.

8. International and Third-Party Considerations

Bliss Cyber operates from the United States. Information may be stored or processed in the United States or in other jurisdictions where approved service providers operate.

Third-party tools, links, and platforms are governed by their own policies.

9. Policy Changes

Bliss Cyber may update this Privacy Policy from time to time. Updates will be posted on this page.

Contact Us

Questions about this Privacy Policy or Bliss Cyber's data handling practices can be sent to contact@blisscyber.com.