Privacy Policy
This policy explains what Bliss Cyber collects and how it is used.
1. Scope
This Privacy Policy applies to information collected through blisscyber.com, direct communications with prospective clients, and information handled during client engagements unless a separate agreement says otherwise.
Client agreements may add more specific terms.
2. Information Collected Through the Website
Contact Form Information
- ▸Full name
- ▸Organization name
- ▸Email address
- ▸Selected service interest
- ▸Selected primary concern
- ▸Selected timeline
- ▸Message content you choose to submit
Technical and Security Information
- ▸IP address or proxy-provided client IP information used for abuse prevention and rate limiting
- ▸Browser, device, and request metadata
- ▸Submission timing and related anti-spam or anti-abuse indicators
3. Information That May Be Collected During an Engagement
If Bliss Cyber is engaged for services, the information handled may expand based on the scope of work.
- ▸System, tenant, network, or asset inventory information
- ▸User and role information, directory structure, or identity configuration details
- ▸Security policies, procedures, standards, diagrams, or audit documentation
- ▸Cloud configuration data, scoped log samples, vulnerability findings, or implementation notes
- ▸Project contacts, stakeholder lists, ticket references, and implementation notes
We aim to limit information and access to what is needed for the engagement.
4. How Information Is Used
- ▸Respond to inquiries and evaluate fit
- ▸Communicate about proposals, scope, scheduling, and service delivery
- ▸Deliver advisory, implementation support, managed services, or training
- ▸Protect the website, contact process, systems, and business operations
- ▸Maintain internal records and meet contractual or legal obligations
5. How Information May Be Shared
Bliss Cyber does not sell personal information. Information may be shared only as needed for operations, service delivery, or legal compliance.
Service Providers
We may use service providers for hosting, email delivery, infrastructure, rate limiting, document storage, or similar support.
Client-Directed or Engagement-Required Sharing
During an engagement, information may be shared with authorized client personnel, approved vendors, auditors, or other parties identified in scope.
Legal Requirements
We may disclose information when required by law or reasonably needed to protect rights, safety, systems, or contractual interests.
6. Security and Retention
Security
Bliss Cyber uses reasonable administrative, technical, and operational safeguards. No system or transmission method can be guaranteed completely secure.
Retention
- ▸Respond to inquiries and maintain business correspondence
- ▸Perform services and support follow-up work
- ▸Document project history, billing, legal, or contractual requirements
- ▸Preserve security, audit, or dispute-related records where appropriate
When information is no longer needed, Bliss Cyber may delete, archive, anonymize, or restrict access to it as appropriate.
7. Rights and Choices
Depending on your location and applicable law, you may have rights to access, correct, delete, or limit certain personal information.
If the information belongs to a client or is processed under a client engagement, the request may need to be handled through that client or under the controlling agreement.
8. International and Third-Party Considerations
Bliss Cyber operates from the United States. Information may be stored or processed in the United States or in other jurisdictions where approved service providers operate.
Third-party tools, links, and platforms are governed by their own policies.
9. Policy Changes
Bliss Cyber may update this Privacy Policy from time to time. Updates will be posted on this page.
Contact Us
Questions about this Privacy Policy or Bliss Cyber's data handling practices can be sent to contact@blisscyber.com.