www.checkpoint.com Open in urlscan Pro
13.249.91.60  Public Scan

Submitted URL: https://click.checkpoint.com/NzUwLURRSC01MjgAAAGW4779ocn-_nbNtquVO8NsQ7XI8hyLTnymxOgOdH93HkT8IMEXHj_WmVRqI_CSL2WkGQWNQ6E=
Effective URL: https://www.checkpoint.com/privacy/?mkt_tok=NzUwLURRSC01MjgAAAGW4779odFsJYO2DGJ6FMqL9mXdVFdxYqpDiH5Cr7jaD8fTo_K9ivw-PeZlUfc...
Submission: On November 21 via api from RU — Scanned from US

Form analysis 2 forms found in the DOM

<form id="search-form">
  <input type="image" src="/wp-content/themes/checkpoint-theme-v2/images/search-btn.png" value="Submit" alt="Search"><input type="text" id="stq" name="stq" class="st-search-input" placeholder="Enter your keywords..." x-webkit-speech=""
    x-webkit-grammar="builtin:search" autocomplete="off" aria-label="Search Term">
</form>

<form id="search-form1">
  <label style="display: none;">Search</label>
  <input type="image" src="/wp-content/themes/checkpoint-theme-v2/images/search-btn.png" value="Submit" alt="Search"><input type="text" id="stq1" name="stq1" class="st-search-input" placeholder="Enter your keywords..." x-webkit-speech=""
    x-webkit-grammar="builtin:search" autocomplete="off" aria-label="Search Term">
</form>

Text Content

Get a Demo Contact Us Support Log In
 * Search
   * 
 * Geo Menu
   * * Choose your language...
     * English (English)
     * Spanish (Español)
     * French (Français)
     * German (Deutsch)
     * Italian (Italiano)
     * Portuguese (Português)
     * Japanese (日本語)
     * Chinese (中文)
     * Korean (한국어)
     * Taiwan (繁體中文)

 * Solutions
   * * Use Cases
     * Industry
     * Organization Size
     
     * Hybrid Cloud
     * Hybrid Mesh Firewall
     * Generative AI
     * Zero Trust & Least Privilege
     * Developer Security & Operations
     * IoT Security Solutions
     * Anti-Ransomware
     * SD-WAN
     * Threat Hunting
     * Compliance
     * Collaboration Security
     * Email Security
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
     
     * Retail
     * Financial Services
     * Federal Government
     * State & Local Government
     * Healthcare
     * Telco Service Provider
     * Education
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
     
     * Enterprise
     * Small & Medium Business
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
 * Platform
   * * Infinity Platform
     * Secure the Network
     * Secure the Cloud
     * Secure the Workspace
     * Security Operations
     
     Explore Infinity
     * Platform OverviewIndustry leading AI-Powered and Cloud-Delivered cyber
       security platform
     * Infinity ServicesPrevention-first security operation, AI Copilot,
       ThreatCloud AI, and 24/7 managed security services, consulting, and
       training
     * Infinity PortalLearn about and sign into Check Point's unified security
       management platform
     * Infinity Platform AgreementPredictable cyber security environments
       through a platform agreement
     * See All Products >
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
     
     Explore Quantum
     * Next Generation Firewall (NGFW) Security GatewayIndustry leading
       AI-powered security gateways for modern enterprises
     * SD-WANSoftware-defined wide are network to converge security with
       networking
     * Security Policy and Threat ManagementManage firewall and security policy
       on a unified platform for on-premise and cloud networks
     * Internet of Things (IoT)Autonomous IoT threat prevention with zero trust
       profiling, virtual patching, and segmentation
     * Remote Access VPN Secure, seamless remote access to corporate networks
     * Industrial Control System Security Gateways Protect ICS, Operational
       Technology, and SCADA systems
     * See All Products >
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
     
     Explore CloudGuard
     * Cloud Network SecurityIndustry leading threat prevention with
       cloud-native firewalls
     * Cloud Native Application Protection PlatformCloud-native prevention-first
       security
     * Code SecurityDeveloper-centric code security
     * Web Application and API SecurityAutomated application and API security
     * See All Products >
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
     
     Explore Harmony
     * Email and Collaboration SecurityEmail security that includes office and
       collaboration applications
     * Endpoint SecurityComprehensive endpoint protection to prevent attacks and
       data compromise
     * Mobile SecurityComplete protection for the workforce across all mobile
       devices
     * SASEUnified security with optimized internet and network connectivity
     * SaaS SecurityThreat prevention management for SaaS
     * See All Products >
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
     
     Security Operations
     * External Risk ManagementProtect against threats like credential theft,
       fraud, and brand impersonation.
     * Extended Prevention & ResponseAI-powered, cloud-delivered security
       operations with Infinity XDR/XR
     * Secure Automation and CollaborationAutomate response playbooks with
       Infinity Playblocks
     * Unified Security Events and Logs as a ServiceInfinity events cloud-based
       analysis, monitoring, and reporting
     * AI Powered TeammateAutomated Security Admin & Incident Response with AI
       Copilot
     * ThreatCloud AIThe brain behind Check Point’s premier threat prevention
     * Managed Prevention & Response ServiceSOC operations-as-a-service with
       Infinity MDR/MPR
     * GenAI ProtectDiscover GenAI apps, assess their risk, and prevent data
       loss
     * See All Products >
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
 * Support & Services
   * * Strategy & Risk
     * Professional Services
     * Training Programs
     * Incident Response
     * Managed Security
     * Support
     
     Explore Strategy & Risk Services
     * External Risk ManagementOutsource specialized cybersecurity functions to
       Check Point security experts
     * Cyber Risk AssessmentAssess your cyber risks and plan actionable strategy
     * Attack Surface & Penetration TestingEvaluate security defenses against
       potential cyber attacks and threats
     * Security Controls Gap Analysis
       (NIST, CIS)Analyze technology gaps and plan solutions for improved
       security and ROI
     * Threat Intelligence & Brand ReputationAnalyzed data on cyber threats,
       aiding proactive security measures
     * See All Strategy & Risk Services >
     
     INFINITY GLOBAL SERVICES
     
     FIND THE RIGHT END-TO-END CYBERSECURITY SERVICE SOLUTIONS TAILORED TO MEET
     YOUR ORGANIZATION'S SPECIFIC NEEDS.
     
     Explore All Services
     
     
     Explore Professional Services
     * Security Deployment & OptimizationStrategic deployment and refinement of
       security for optimal protection
     * Advanced Technical Account ManagementProactive service delivered by
       highly skilled cyber security professionals
     * Lifecycle Management ServicesEffectively maintain the lifecycle of
       security products and services
     * See All Professional Services >
     
     INFINITY GLOBAL SERVICES
     
     FIND THE RIGHT END-TO-END CYBERSECURITY SERVICE SOLUTIONS TAILORED TO MEET
     YOUR ORGANIZATION'S SPECIFIC NEEDS.
     
     Explore All Services
     
     
     Explore Training Programs
     * Training & CertificationsComprehensive cyber security training and
       certification programs
     * CISO TrainingGlobally recognized training for Chief Information Security
       Officers
     * Security AwarenessEmpower employees with cyber security skills for work
       and home
     * Cyber Park - Cyber RangeSimulated gamification environment for security
       training
     * Mind Training HubCheck Point cyber security and awareness programs
       training hub
     * See All Training Programs >
     
     INFINITY GLOBAL SERVICES
     
     FIND THE RIGHT END-TO-END CYBERSECURITY SERVICE SOLUTIONS TAILORED TO MEET
     YOUR ORGANIZATION'S SPECIFIC NEEDS.
     
     Explore All Services
     
     
     Explore Incident Response Services
     * Incident ResponseManage and mitigate security incidents with systematic
       response services
     * Managed Detection and Response24/7 SOC Operations for Check Point + 3rd
       party solutions, 24/7 response
     * Digital ForensicsComprehensive investigation and analysis of cyber
       incidents and attacks
     * See All Incident Response Services >
     
     INFINITY GLOBAL SERVICES
     
     FIND THE RIGHT END-TO-END CYBERSECURITY SERVICE SOLUTIONS TAILORED TO MEET
     YOUR ORGANIZATION'S SPECIFIC NEEDS.
     
     Explore All Services
     
     
     Explore Managed Security Services
     * SOC-as-a-ServiceLeverage SOC expertise to monitor and manage the security
       solutions
     * Network Security and NOC-as-a-ServiceManagement of IT network and
       firewall infrastructure
     * Cloud & ITAccess to managed cloud and IT technologies, expertise, and
       resources
     * Managed Firewall as a ServiceSimplify data center workflow orchestration
       and scale up on demand
     * See All Managed Security Services >
     
     INFINITY GLOBAL SERVICES
     
     FIND THE RIGHT END-TO-END CYBERSECURITY SERVICE SOLUTIONS TAILORED TO MEET
     YOUR ORGANIZATION'S SPECIFIC NEEDS.
     
     Explore All Services
     
     
     Explore Support Services
     * Support ProgramsPrograms designed to help maximize security technology
       utilization
     * Check Point PROProactive monitoring of infrastructure program offerings
     * Contact Support
     
     OUR CUSTOMER SUPPORT TEAM IS ONLY A CLICK AWAY AND READY TO HELP YOU 24
     HOURS A DAY.
     
     Visit Support Center
     
   
 * Solutions
   * Use Cases
     * Hybrid Cloud
     * Hybrid Mesh Firewall
     * Generative AI
     * Zero Trust & Least Privilege
     * Developer Security & Operations
     * IoT Security Solutions
     * Anti-Ransomware
     * SD-WAN
     * Threat Hunting
     * Compliance
     * Collaboration Security
     * Email Security
   * Industry
     * Retail
     * Financial Services
     * Federal Government
     * State & Local Government
     * Healthcare
     * Telco Service Provider
     * Education
   * Organization Size
     * Enterprise
     * Small & Medium Business
   
   
 * Platform
   * Infinity Platform
     * Platform Overview
     * Infinity Services
     * Infinity Portal
     * Infinity Platform Agreement
   * Secure the Network
     * Next Generation Firewall (NGFW) Security Gateway
     * SD-WAN
     * Security Policy and Threat Management
     * Internet of Things (IoT)
     * Industrial Control System Security Gateways
     * Remote Access VPN
   * Secure the Cloud
     * Cloud Network Security
     * Cloud Native Application Protection Platform
     * Code Security
     * Web Application and API Security
   * Secure the Workspace
     * Email and Collaboration Security
     * Endpoint Security
     * Mobile Security
     * SASE
     * SaaS Security
   * Security Operations
     * External Risk Management
     * Extended Prevention & Response
     * Secure Automation and Collaboration
     * Unified Security Events and Logs as a Service
     * AI Powered Teammate
     * ThreatCloud AI
     * Managed Prevention & Response Service
     * GenAI Protect
     
   
   
 * Support & Services
   * Strategy & Risk
     * External Risk Management
     * Cyber Risk Assessment
     * Attack Surface & Penetration Testing
     * Security Controls Gap Analysis (NIST, CIS)
     * Threat Intelligence & Brand Reputation
   * Professional Services
     * Security Deployment & Optimization
     * Advanced Technical Account Management
     * Lifecycle Management Services
   * Training Programs
     * Training & Certifications
     * CISO Training
     * Security Awareness
     * Cyber Park - Cyber Range
     * Mind Training Hub
   * Incident Response
     * Incident Response
     * Managed Detection and Response
     * Digital Forensics
   * Managed Security
     * SOC-as-a-Service
     * Network Security and NOC-as-a-Service
     * Cloud & IT
     * Managed Firewall as a Service
   * Support
     * Support Programs
     * Check Point PRO
     * Contact Support
   
 * Partners
   * Check Point Partners
     * Find a Partner
     * Channel Partners
     * Technology Partners
     * MSSP Partners
     * AWS Cloud
     * Azure Cloud
   * Become a Partner
     * Overview
   * Enrolled Partners
     * Partner Portal
   
   * CHECK POINT IS 100% CHANNEL. GROW YOUR BUSINESS WITH US!
     
     Sign Up Now
 * More
   * Company
     * About Us
     * Leadership
     * Careers
     * Investor Relations
     * Newsroom
   * Learn
     * Resource Center
     * Customer Stories
     * Blog
     * Events & Webinars
     * Cyber Hub
   * Cyber Security Insights
     * Check Point Research
     * CheckMates Community
   
   * UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now

 * Search
   * Search
 * Geo Menu
   * Choose your language...
   * English (English)
   * Spanish (Español)
   * French (Français)
   * German (Deutsch)
   * Italian (Italiano)
   * Portuguese (Português)
   * Japanese (日本語)
   * Chinese (中文)
   * Korean (한국어)
   * Taiwan (繁體中文)

Toggle Navigation

Cookies Notice | Website Terms and Conditions


PRIVACY POLICY

Check Point Software Technologies Ltd, including all of its affiliates and
subsidiaries worldwide (collectively, “Check Point,” “we,” “us,” or “our”) value
the privacy of individuals who use or express interest in the Check Point
Websites (as defined below), and the Check Point products and services
(collectively, our “Services”). This privacy policy (the “Privacy Policy”)
explains how we collect, use, and disclose Personal Data and applies to all of
Check Point’s Services.


1. GENERAL INFORMATION

1.1 “Personal Data” means any data which relates to a living individual who can
be identified from that data or from that data and other information which is in
the possession of, or is likely to come into the possession of, Check Point (or
its representatives or service providers). In addition to factual information,
it includes any expression of opinion about an individual and any indication of
the intentions of Check Point or any other person in respect of an individual.

1.2 Beyond this Privacy Policy, your use of our Services is also subject to
applicable End-user License Agreement available at our website.

1.3 If you are a California resident, our California Resident Privacy Notice
provides more information about your California privacy rights and explains how
you can exercise those rights.

1.4. If you are using the Check Point ZoneAlarm services and products, please
refer to our ZoneAlarm Privacy Policy.


2. THE SOURCES OF THE INFORMATION WE COLLECT

This Privacy Policy concerns the following sources of information that we
collect in connection with our Service, which include:

 * Our websites (e.g. www.checkpoint.com) (“Check Point Websites”), emails,
   marketing communication;
 * Information we received through our business partners and vendors; and
 * Information we receive through and from all of our Services (as defined
   above).
 * Only for Cyberint/Infinity Platform ERM (External Risk Management) services,
   we collect data from third party sources as necessary to provide such
   security services.


3. THE TYPES OF PERSONAL DATA WE COLLECT

We may collect and receive a variety of information from you or about you or
your devices from various sources, as described below. If you do not provide
your Personal Data when requested, you may not be able to use our Services if
that information is necessary to provide you with our Services or if we are
legally required to collect it.

3.1 Information that you provide to Check Point. This includes Personal Data
about you that you provide to us. The nature of the Services you are requesting
or using will determine the kind of Personal Data we might ask for, though such
information may include (by way of a non-exhaustive list):

 * basic Personal Data (such as first name; family name; position in the company
   [title]; company name; company email address; business phone number; business
   address; city; postcode; country);
 * any information that you choose to share through our Services which may be
   considered Personal Data. (Please note that Check Point does not collate
   information included on Check Point internet forums together with Personal
   Data from your User Center account or profile);

3.2 Information that we collect or generate about you. This includes (by way of
non-exhaustive list):

 * File with your contact history to be used for enquiry purposes so that we may
   ensure that you are satisfied with our Services;
 * Through our cloud security services, traffic and security reports that
   include information on the internet usage of the organization’s computer
   users (e.g. what websites were visited by each user, any documents
   downloaded, security incidents, prevention measures taken by the gateway,
   etc.);
 * Activity data relating to the use of protected documents, such as altering a
   document’s permissions and information regarding the individual that
   performed the activity;
 * Information about you provided from third parties’ sources; and
 * Through our cloud Harmony Email & Office service, the files and email
   correspondence (included the content therein) found in your accounts
   connected to such service.
 * Through our mobile application, data about the installed and downloaded
   applications in your device, which is used for security analysis and
   detection and prevention of malicious acts.

3.3 Cookies. We and our third-party partners may collect Personal Data using
cookies, which are small files of letters and numbers that we store on your
browser or the hard drive of your computer. We may also use pixel tags and web
beacons on our Services. These are tiny graphic images placed on web pages or in
our emails that allow us to determine whether you have performed a specific
action. We use cookies, beacons, invisible tags, and similar technologies
(collectively “Cookies”) to collect information about your browsing activities
and to distinguish you from other users of our Services. This aids your
experience when you use our Services and allows us to improve the functionality
of our Services. Cookies can be used for performance management, collecting
information on how our Services are being used for analytics purposes. They can
also be used for functionality management, enabling us to make your visit more
efficient by, for example, remembering language preferences, passwords, and
log-in details. For more information on the types of Cookies we and third
parties may use in connection with our Services, please see our Check Point
Cookies Notice.

How to Block Cookies. You can block Cookies by setting your internet browser to
block some or all Cookies. However, if you use your browser settings to block
all Cookies (including essential Cookies) you may not be able to access all or
parts of our Services. By using our Services, you consent to our use of Cookies
and our processing of Personal Data collected through such Cookies, in
accordance with this Privacy Policy. You can withdraw your consent at any time
by deleting placed Cookies and disabling Cookies in your browser, or as
explained below. You can change your browser settings to block or notify you
when you receive a Cookie, delete Cookies, or browse our Services using your
browser’s anonymous usage setting. Please refer to your browser instructions or
help screen to learn more about how to adjust or modify your browser settings.
If you do not agree to our use of Cookies, you should change your browser
settings accordingly. You should understand that some features of our Services
may not function properly if you do not accept Cookies. Where required by
applicable law, you will be asked to consent to certain Cookies before we use or
install them on your computer or other device.

3.4 Anonymized data. In addition to the categories of Personal Data described
above, Check Point may also process further anonymized information or
de-identified and aggregated with other data that is not processed by reference
to a specific individual.

3.5 Careers. In order for us to consider your application for a position with us
it will be necessary for us to process certain personal data relating to you. We
process personal data in accordance with applicable legislation, while
considering and balancing the relevant interests of our applicants, ourselves,
and other stakeholders.


4. HOW WE USE YOUR INFORMATION

4.1 We may process your Personal Data for the following purposes (“Permitted
Purposes”):

 * for ongoing review and improvement of the information provided on Check Point
   Websites to ensure they are user friendly and to prevent any potential
   disruptions or cyberattacks;
 * to allow you to use and access the functionality provided by the Check Point
   Products and the Check Point Services;
 * to assess your application for Check Point Products and Check Point Services,
   where applicable;
 * to set up customers to use Check Point Products and Check Point Services;
 * to set up users to use the User Center;
 * to conduct analysis required to detect malicious data and understand how this
   may affect your IT system;
 * for statistical monitoring and analysis of current attacks on devices and
   systems and for the on-going adaptation of the solutions provided to secure
   devices and systems against current attacks;
 * to understand feedback on Check Point Products and Check Point Services and
   to help provide more information on the use of those products and services
   quickly and easily;
 * to communicate with you in order to provide you with: (i) our Services; (ii)
   information about us and our Services; or (iii) offers and marketing
   information;
 * to send you e-mail updates on the latest cyber security trends, news,
   upcoming events and other marketing or promotional materials;
 * for in-depth threat analysis;
 * to understand your needs and interests;
 * for the management and administration of our business;
 * for improvement of our products and services.
 * to comply with and to assess compliance with applicable laws, rules and
   regulations, and internal policies and procedures;
 * for the administration and maintenance of databases storing Personal Data to
   market Check Point’s products and services; or
 * for back-up and data loss prevention.

4.2 When we process Personal Data we verify the existence of a lawful ground for
such processing activity, including:

 * performing our contractual obligations;
 * a lawful consent has been obtained;
 * compliance with legal or regulatory obligation;
 * exercising or defending our rights;
 * legitimate business interests, such as:
    * effectively and efficiently manage and administer the operation of our
      business;
    * maintaining compliance with internal policies and procedures;
    * monitoring the use of our copyrighted materials;
    * enabling quick and easy access to information on our Services;
    * offering optimal, up-to-date security solutions;
    * sending you e-mail updates on our Services, the latest cyber security
      trends, news, upcoming events and other marketing or promotional
      materials; and
    * obtaining further knowledge of current threats to network security in
      order to update our security solutions and provide these to the market.

4.3 As part of our Services and/or Products, we may utilize artificial
intelligence (AI) technologies to enhance our capabilities and provide you with
a better experience.

4.4 We will take steps to ensure that your Personal Data is accessed only by
such individuals that have a need to do so for the purposes described in this
Privacy Policy.

4.5 We do not retain, use, sell or disclose Personal Data for any purpose other
than for the specific purpose of performing our Services or as otherwise
strictly permitted under this Privacy Policy.


5. DISCLOSURE OF INFORMATION TO THIRD PARTIES

We may share or otherwise disclose the Personal Data we collect from you as
described below or otherwise disclosed to you at the time of the collection.

 * Vendors and Service Providers. We may share any information we receive with
   vendors and service providers retained in connection with the provision and
   marketing of our Services or other relevant services.
 * Partners and Affiliates. We may share any information with our distributors,
   partners, corporate affiliates, parents, or subsidiaries for any purpose
   described in this Privacy Policy.
 * As Required by Law and Similar Disclosures. We may access, preserve, and
   disclose your Personal Data if we believe doing so is required or appropriate
   to: (i) comply with law enforcement requests and legal process, such as a
   court order or subpoena; (ii) respond to your requests; or (iii) protect
   your, our, or others’ rights, property, or safety.
 * Merger, Sale, or Other Asset Transfers. We may disclose and transfer your
   Personal Data to service providers, advisors, potential transactional
   partners, or other third parties in connection with the consideration,
   negotiation, or completion of a corporate transaction in which we are
   acquired by or merged with another company, or we sell, liquidate, or
   transfer all or a portion of our business or assets.
 * Consent. We may also disclose Personal Data from or about you or your devices
   with your permission.


6. INTERNATIONAL TRANSFERS OF PERSONAL DATA

6.1 Check Point is a global business. Our customers and our operations are
spread around the world. As a result, we collect and transfer Personal Data on a
global basis. That means that we may transfer your Personal Data to locations
outside of your country.

6.2 Europe. Where we transfer your Personal Data to another country outside the
European Economic Area (“EEA”) or the United Kingdom (“UK”), we will ensure that
it is protected and transferred in a manner consistent with legal requirements.
In relation to data being transferred outside of Europe or the UK, for example,
this may be done in one of the following ways:

 * the country that we send the data to, might be approved by the European
   Commission as offering an adequate level of protection for Personal Data (for
   example, Israel is an approved country);
 * the recipient might have signed a contract based on applicable “model
   contractual clauses” approved by the European Commission, obliging them to
   protect your Personal Data; or
 * in other circumstances the law may permit us to otherwise transfer your
   Personal Data outside the EEA or UK.

You can obtain more details of the protection given to your Personal Data when
it is transferred outside the EEA or the UK (including a copy of the standard
data protection clauses which we have entered into with recipients of your
Personal Data) by contacting us as described in paragraph 13 below.

6.3 China. For residents in the mainland of the People’s Republic of China
(“Mainland China”), we may transfer, access or store your Personal Data outside
of the Mainland China where we are satisfied that adequate levels of protection
are in place to protect the integrity and security of your Personal Data or
adequate security measures are adopted and in compliance with the applicable
laws, such as contractual arrangements. Where required by applicable laws, we
will put in place appropriate measures to ensure that all processing of your
Personal Data outside of the Mainland China is safeguarded by the equivalent
level of data protection in the Mainland China.


7. YOUR RIGHTS

7.1 Marketing Communications. You can unsubscribe from our promotional emails
via the link provided in the emails. Even if you opt out of receiving
promotional messages from us, you will continue to receive administrative
messages from us.

7.2 Do Not Track. There is no accepted standard on how to respond to Do Not
Track signals, and we do not respond to such signals.

If you choose not to provide us with the Personal Data we collect, some features
of our Services may not work as intended.

7.3 California Privacy Rights. If you are a California resident, you can review
our California Resident Privacy Notice for information about your privacy rights
and choices under California law.

7.4 Your European Privacy Rights. If you are located in the EEA or the UK, you
have additional rights described below.

 * You may request access the Personal Data we maintain about you, update and
   correct inaccuracies in your Personal Data, restrict or object to the
   processing of your Personal Data, have your Personal Data anonymized or
   deleted, as appropriate, or exercise your right to data portability to easily
   transfer your Personal Data to another company. In addition, you also have
   the right to lodge a complaint with a supervisory authority, including in
   your country of residence, place of work or
 * You may withdraw any consent you previously provided to us regarding the
   processing of your Personal Data at any time and free of charge. We will
   apply your preferences going forward and this will not affect the lawfulness
   of the processing before you withdrew your consent.

You may exercise these rights by contacting us via our online form available
here. Before fulfilling your request, we may ask you to provide reasonable
information to verify your identity. Please note that there are exceptions and
limitations to each of these rights, and that while any changes you make will be
reflected in active user databases instantly or within a reasonable period of
time, we may retain Personal Data for backups, archiving, prevention of fraud
and abuse, analytics, satisfaction of legal obligations, or where we otherwise
reasonably believe that we have a legitimate reason to do so.


8. EU/UK/SWISS-U.S. DATA PRIVACY FRAMEWORK

8.1. Introduction.
Check Point Software Technologies, Inc. and its subsidiaries, Zone Labs, LLC,
Avanan, Inc. and R&M Computer Consultants Inc. (“Check Point US”) complies with
the EU-U.S. Data Privacy Framework (EU-U.S. DPF), the UK Extension to the
EU-U.S. DPF, and the Swiss-U.S. Data Privacy Framework (Swiss-U.S. DPF) as set
forth by the U.S. Department of Commerce (collectively, the “DPF Principles”).
To learn more about the Swiss-U.S. DPF please visit here.

Check Point US has certified to the U.S. Department of Commerce that: (i) it
adheres to the EU-U.S. Data Privacy Framework Principles with regard to the
processing of Personal Information received from the European Union in reliance
on the EU-U.S. DPF; (ii) it adheres to the Data Privacy Framework Principles
with regard to the processing of Personal Information received from the United
Kingdom (and Gibraltar) in reliance on the UK Extension to the EU-U.S. DPF;
(iii) it adheres to the Swiss-U.S. Data Privacy Framework Principles (Swiss-U.S.
DPF Principles) with regard to the processing of Personal Information received
from Switzerland in reliance on the Swiss-U.S. DPF.

If there is any conflict between the terms in this Privacy Policy and the DPF
Principles, the DPF Principles shall govern.

To learn more about the Data Privacy Framework (DPF) program, and to view our
certification, please visit the U.S. Department of Commerce’s Data Privacy
Framework website available at https://www.dataprivacyframework.gov/.

8.2. Redressal Mechanisms.
If you have a question or complaint related to participation by Check Point US
in the DPF Frameworks, we encourage you to contact us. For any complaints
related to the DPF Frameworks that Check Point US cannot resolve directly, we
have chosen to cooperate with the relevant EU Data Protection Authority, or a
panel established by the European data protection authorities, for resolving
disputes with EU individuals, the UK Information Commissioner (for UK
individuals), and the Swiss Federal Data Protection and Information Commissioner
(FDPIC) for resolving disputes with Swiss individuals. Please contact us if
you’d like us to direct you to your data protection authority contacts. As
further explained in the DPF Principles, binding arbitration is available to
address residual complaints not resolved by other means. Check Point US is
subject to the investigatory and enforcement powers of the U.S. Federal Trade
Commission (FTC).

8.3. Onward Transfers.
Check Point US remains responsible for the processing of Personal Information it
receives and subsequently transfers to a third party acting on our behalf, in
accordance with the DPF Principles. Check Point US will remain liable under the
DPF Principles if such third-party processes such Personal Information in a
manner inconsistent with the DPF Principles (subject to the limits and
exclusions of liability), unless we prove that we are not responsible for the
event giving rise to the damage.

8.4. Additional Rights Under the DPF Principles.
Check Point US acknowledges the right of EU, EEA, U.K. (and Gibraltar), and
Swiss individuals to request access to their data while it is in the U.S. and to
correct, amend, and supplement inaccurate or incomplete data. Said individuals
also have the right to request erasure of personal information that has been
handled in violation of the DPF Principles.

In addition to the rights granted to you under applicable laws as set out under
section 7 above, and to the extent applicable, under the DPF Principles you also
have the Right to Opt-Out of Check Point US’s disclosure of Personal Information
to certain third parties and from the collection of Sensitive Personal
Information (i.e., personal Information specifying medical or health conditions,
racial or ethnic origin, political opinions, religious or philosophical beliefs,
trade union membership or information specifying the sex life of the
individual), although no Sensitive Personal Information is expected to be
collected by Check Point.

Accordingly, individuals to which those rights are applicable, may contact us
here and request: (i) To opt-out of the disclosure of relevant Personal
Information to third parties; (ii) To opt-out of our processing of Personal
Information for materially different purposes from those which it was originally
collected for.

Please note that these rights are not absolute and may be subject to regulatory
requirements or other law enforcement order.


9. HOW WE SAFEGUARD YOUR INFORMATION

9.1. We have extensive controls in place to maintain the security of our
information and information systems. Files are protected with safeguards
according to the sensitivity of the relevant information. Appropriate controls
(such as restricted access) are placed on our computer systems. Physical access
to areas where Personal Data is gathered, processed or stored is limited to
authorized employees. In addition, our Incident Response Team plays a critical
role in our commitment to safeguard your information, as they are responsible
for promptly and effectively responding to data security threats. If you have a
suspicion of any data breach, security incident or if you wish to report a
vulnerability, please contact our team here.

9.2 As a condition of employment, Check Point employees are required to follow
all applicable laws and regulations, including in relation to data protection
law. Access to sensitive Personal Data is limited to those employees who need it
to perform their roles. Unauthorized use or disclosure of confidential
information by a Check Point employee is prohibited and may result in
disciplinary measures.

9.3 Check Point requires its worldwide employees and contractors that have
access to its internal systems to complete annual trainings on data protection
and security. Such trainings are aimed to make sure that Check Point’s personnel
understand and follow Check Point’s privacy policies and guidelines when
handling Personal Data.

9.4 When you contact a Check Point representative, you may be asked for some
Personal Data. This type of safeguard is designed to ensure that only you, or
someone authorized by you, has access to your file.

9.5. For more information on the security measures taken by Check Point in order
to protect your Personal Data, please see our Security Measures Policy.


10. THIRD PARTIES

Our Services may contain links to other websites, products, or services that we
do not own or operate (“Third-Party Services”). We are not responsible for the
privacy practices, policies, or other content of these Third-Party Services.
Please be aware that this Privacy Policy does not apply to your activities on
these Third-Party Services or any information you disclose to these Third-Party
Services. If you have any questions about how these other sites use your
Personal Data, you should contact them directly. We encourage you to read their
privacy policies before providing any information to them.


11. HOW LONG WE KEEP YOUR PERSONAL DATA

Check Point retains Personal Data only for the duration necessary to fulfill the
Permitted Purposes for which it was collected. Subsequently, such data will
either be destroyed, deleted, anonymized, or removed from our systems. We take
measures to delete your Personal Data or keep it in a form that does not permit
identifying you when this information is no longer necessary for the purposes
for which we process it unless we are required by law to keep this information
for a longer period. When we process Personal Data for our own purposes, we
determine the retention period taking into account various criteria, such as the
type of services provided to you, the nature and length of our relationship with
you, possible re-enrollment with our Services, the impact on our Services we
provide to you if we delete some information from or about you, and mandatory
retention periods provided by law and the statute of limitations.


12. CHILDREN’S PRIVACY

We do not knowingly collect, maintain, or use Personal Data from children under
16 years of age (“Minors”), and no parts of our Services are directed at
children. If you learn that a Minor has provided us with Personal Data in
violation of this Privacy Policy, please alert us at
privacy_inquiries@checkpoint.com.


13. QUESTIONS, CONCERNS AND UPDATES

If you have any questions or concerns about Check Point’s handling of your
Personal Data, or about this Policy, please contact our Privacy Officer using
the following contact information:

Address:



Check Point Software Technologies Ltd.,
5 Shlomo Kaplan Street, Tel Aviv 67897, Israel
Attention: Legal Department



Address in the EU:



Check Point Software Technologies GmbH,
Oskar-Messter-Str. 13,
85737,
Ismaning
Germany



Adress in the US:



Check Point Software Technologies, Inc.
100 Oracle Parkway, Suite 800
Redwood City
CA 94065



Email Address:



privacy_inquiries@checkpoint.com

We are typically able to resolve privacy questions or concerns promptly and
effectively. If you are not satisfied with the response you receive from our
Privacy Officer, you may escalate concerns to the applicable privacy regulator
in your jurisdiction. Upon request, Check Point’s Data Protection Officer will
provide you with the contact information for that regulator.

We will post any adjustments to the Privacy Policy on this page, and the revised
version will be effective when it is posted.

You can view our Data Processing Agreement (DPA) online – Customers;
Distributors and Resellers. If you need a signed copy of the DPA, you can
download it, send a signed copy to privacy_inquiries@checkpoint.com and we will
provide you a countersigned copy.


Under
Attack?


ChatHello! How can I help you?
START CHAT

Contact
×
  Feedback

×Close


 * COMPANY
   * About Us
   * Careers
   * Leadership
   * Newsroom
   * Legal
   * Trust Center
   * Investor Relations
   * Merchandise Store
   * Contact Us
 * TECHNICAL RESOURCES
   * User Center Sign In
   * Advisories
   * Threat Map
   * Threat Wiki
   * URL Categorization
   * App Wiki
 * EXPAND & LEARN
   * Resource Center
   * Cyber Hub
   * Check Point Research
   * Check Point Blog
   * Customer Stories
 * SUPPORT & SERVICES
   * Support Center
   * Infinity Global Services
   * IGS Portal
 * * Contact Sales
     * North America:
     * +1-866-488-6691
     * International:
     * +44-125-333-5558
   * Contact Support
     * North America:
     * +1-888-361-5030
     * International:
     * +44-114-478-2845

--------------------------------------------------------------------------------

Follow Us
YOU DESERVE THE BEST SECURITY™ ©1994- 2024 Check Point Software Technologies
Ltd. All rights reserved.
Copyright | Privacy Policy | Cookie Settings | Get the Latest News
This website uses cookies for its functionality and for analytics and marketing
purposes. By continuing to use this website, you agree to the use of cookies.
For more information, please read our Cookies Notice.
OK

×







This website uses cookies in order to optimize your user experience as well as
for advertising and analytics.  For further information, please read our Privacy
Policy and ourCookie Notice.

DISMISS
Manage Preferences



When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices