top of page
Email Signature Logo.png

PRIVACY POLICY

LAST UPDATED: June 18, 2025. This Privacy Policy describes how the Company collects, uses and discloses information and data relating to your access and use of the Company’s Website or Services and what rights you have with respect to such information and data. The Privacy Policy forms part of the Company’s Terms of Use accessible at http://www.ninpo.com/terms. Any capitalized terms used but not defined in the Privacy Policy have the meaning ascribed in the Terms of Use.

ninpo-star.png

 

By using our Website or Services, you indicate your acceptance of the Terms of Use and Privacy Policy. If you do not accept the Terms of Use and Privacy Policy, then do not use our Website or Services.


The Company reserves the right to update and change the Privacy Policy from time to time by posting updates and changes to the Website. By continuing to use the Website after such changes are posted, you agree to such changes.
 

1. Information Collected & Generated


If you use our Website or Services, you will end up submitting information to the Company. Like most internet companies, we receive other information that relates to you automatically or through third parties.

In the course of your accessing and using our Website or Services, the Company may collect and/or generate the following types of information (collectively “User Information”):

(a) “Personal Information”, which means information that could be used by itself to identify you, such as your name, address, email and phone number;

(b) “Service Information”, which means information generated by your use of the Website, including the following:

(i) Website Metadata. When you interact with the Website, metadata may be generated that provides additional context about the way you engage the Website. For example, the Company logs the type of activity engaged to better understand which features and tools are most used or in need of improvement;

(ii) Log Data. As with most websites and technology services delivered over the internet, the Company servers may automatically collect and record information when the Website is accessed. This log data may include the Internet Protocol (IP) address, the address of the web page visited before using the Website, browser type and settings, the date and time the Website was used, information about browser configuration and plugins, language preferences and cookie data. This information is used to optimize the delivery of the Website;

(iii) Device Information. The Company may collect information about devices used to access the Website, including the type of device, what operating system is used, device settings, application IDs, unique device identifiers and crash data. Whether the Company collects some or all of this information often depends on the type of device used and its settings. This information is used to optimize the delivery of the Website;

(iv) Location Information. The Company may collect information to determine your approximate location, such as business address, IP address or any other location information from devices in accordance with the consent process provided by the device;

(v) Cookie Information. The Company may use cookies and similar technologies through the Website that help collect information about your engagement with the Website. The Website may also include cookies and similar tracking technologies of third parties. If you do not wish to accept cookies, you have the option of blocking or disabling cookies. Your computer provides you with the ability to clear all cookies that have been stored onto your hard drive, should you wish to do so. However, please be aware that you may be unable to access certain parts of the Website if you block or disable the Company cookies. You may also visit www.allaboutcookies.org for details on how to delete or reject cookies or for further information on cookies generally. By using our Website without deleting or rejecting some or all cookies, you agree that we can place and use those cookies that you have not deleted or rejected on your device;

(vi) Analytics. We process the information collected through such technologies to help operate certain features of the Site, to enhance your experience through personalization, and to help us better understand the features of the Site that you and other users are most interested in. To assist us with analyzing our Website traffic through cookies and similar technologies, we may use third party analytics services.

(vii) Third Party Website. The Company may receive data about organizations, industries, Website visitors, marketing campaigns and other matters related to the Website from parent corporation(s), affiliates and subsidiaries, Company partners or others that the Company uses to make the Service Information more useful. This data may be combined with other Service Information and might include aggregate level data, such as which IP addresses correspond to zip codes or countries; and

(viii) Additional Information Provided to Company. The Company may receive other information from you through Website submissions or if you participate in a service contract, activity or event, request support, or otherwise communicate with or through the Company.

 

(c) Cybersecurity Services Data. When engaging the Company’s cybersecurity services—including but not limited to threat monitoring, incident response, forensics, compliance assessments, and managed detection—the Company may collect and analyze technical data such as system logs, network telemetry, firewall and endpoint alerts, authentication records, forensic snapshots, and metadata related to digital security posture. Some of this data may be collected automatically through integrations (e.g., SIEM agents or logging infrastructure), or provided manually by the Client. Where appropriate, the Company uses technical and operational safeguards to minimize or anonymize data and only retains information needed to fulfill the contracted service. The Company may securely share limited data with trusted third parties (e.g., malware analysis sandboxes, threat intelligence providers, government agencies such as the Canadian Centre for Cyber Security) for the purpose of investigating or mitigating active security threats, provided such disclosures are done responsibly and without compromising Client confidentiality.

Generally, you are not under a statutory or contractual obligation to provide any information or data to the Company. However, certain information and data is collected automatically when accessing and using the Website, and blocking such collections may result in the Company’s inability to provide you with access and use to any part or whole of the Website.

We do not respond to Do Not Track (“DNT”) signals sent to us by your browser at this time. To learn more about how DNT works, please visit http://allaboutdnt.com/.

​

2. Information Use


User Information will be used by the Company to provide the Website or Services to you in accordance with the Terms of Use and as required by applicable law, legal process or regulation. Without limiting the foregoing, User Information may be used by the Company for the following purposes:

(a) to provide, update, maintain and protect the Website;

(b) to communicate with you by responding to your requests, comments and questions;

(c) to develop and provide additional features;

(d) to send you service, technical and other administrative emails, messages and other types of communications. This may include communications relating to changes in the Website, changes to the Services, and important Website-related notices, such as security notices. These communications are considered part of the Website and you may not opt out of them;

(e) to send you marketing and promotional emails, messages and other types of communications. This may include communications relating to new product features. You may opt out of these communications;

(f) for billing, account management and other administrative matters. The Company may need to contact you for invoicing, account management and similar reasons and the Company uses account data to administer accounts and keep track of billing and payments; and

(g) to investigate and help prevent security issues and abuse.

​

3. Information Retention


The Company will generally continue to store archived copies of your User Information for legitimate business purposes and to comply with applicable law, except when the Company receives a valid erasure request, or, if your User Information is purged pursuant to the Company’s standard purge process.

​

4. Information Sharing


This section describes how the Company may share and disclose User Information.

(a) Customer’s Instructions. The Company will only share and disclose User Information in accordance with the Terms of Use, your instructions from time to time, and as required by applicable law. Your consent to the Company’s sharing and disclosing of certain User Information may be reasonably determined by your action through the Website.

(b) Third Party Service Providers and Partners. The Company may engage third party companies or individuals as service providers or business partners to process User Information and support the Company business. These third parties may, for example, provide virtual computing and storage for the Website. Any tracking of User Information by a third party depends on the privacy policy of that third party.

(c) Corporate Affiliates. The Company may share User Information with its corporate affiliates, parents and/or subsidiaries.

(d) During a Change to Company’s Business. If the Company engages in a merger, acquisition, bankruptcy, dissolution, reorganization, sale of some or all of the Company’s assets or stock, financing, public offering of securities, acquisition of all or a portion of the Company business, a similar transaction or proceeding, or steps in contemplation of such activities (e.g. due diligence), some or all User Information may be shared or transferred.

(e) Aggregated or De-identified Data. The Company may disclose or use aggregated or de-identified User Information for any purpose. For example, the Company may share aggregated or de-identified User Information with prospects or partners for business or research purposes.

(f) To Comply with Laws. If the Company receives a request for information, the Company may disclose User Information if the Company reasonably believes disclosure is in accordance with or required by any applicable law, regulation or legal process. The Company is released of any liability associated with any such disclosures made in good faith.

(g) To Enforce Rights, Prevent Fraud, and for Safety. The Company may disclose or use User Information to protect and defend the rights, property or safety of the Company or third parties, including enforcing contracts or policies, or in connection with investigating and preventing fraud or security issues.

(h) With Consent. The Company may otherwise share User Information with third parties when the Company has your consent to do so.

​

(i) Cybersecurity Incident Response and Threat Sharing. In the course of providing cybersecurity services, the Company may share technical information—including, where necessary, identifiable or client-specific data—with trusted third parties for the purposes of analyzing threats, detecting malicious behavior, containing active or suspected incidents, and assisting in response or recovery efforts. These third parties may include malware sandboxing platforms, digital forensic specialists, managed service providers, infrastructure or cloud partners, threat intelligence networks, and recognized cybersecurity authorities such as the Canadian Centre for Cyber Security. The Company reviews such disclosures carefully and shares only what is reasonably required for the intended purpose. When possible, data is anonymized or minimized to reduce unnecessary exposure, and disclosures are made in accordance with applicable laws, confidentiality obligations, and internal review procedures.

​

5. Security

 

The Company takes the protection of User Information seriously and implements industry-recognized cybersecurity best practices to safeguard it. This includes the use of secure access controls, password managers, endpoint protection, network monitoring, and encryption where appropriate. Internal systems and data are accessed on a need-to-know basis, and staff are trained in security awareness and responsible data handling.

​

While the Company maintains strong technical and organizational measures, no system is entirely immune to risk. Accordingly, the Company cannot guarantee absolute security and disclaims liability for unauthorized access or disclosure beyond its reasonable control. Certain User Information may be processed or stored on infrastructure operated by trusted third-party providers, potentially located outside your jurisdiction.

​

6. Contact

 

If you have any questions about this Privacy Policy, our data practices, or wish to request access to, correction of, or deletion of your Personal Information, you may contact us during our regular business hours (Monday to Friday, 8:00 AM – 6:00 PM EST) using the details below:

 

Email: privacy@ninpo.com
Mailing Address:
Ninpo Inc.
70 Bongard Avenue
Ottawa, ON K2E 7Z9
Canada

Follow

  • Black Facebook Icon
  • Black LinkedIn Icon
  • Black RSS Icon
  • Whatsapp

©2018 - 2024 by Ninpo Inc. All Rights Reserved.

bottom of page