kapalya.com Open in urlscan Pro
54.183.20.169  Public Scan

Submitted URL: http://kapalya.com/
Effective URL: https://kapalya.com/
Submission: On November 19 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST forms/contactphpemail.php

<form id="contact_us" action="forms/contactphpemail.php" method="post" role="form" class="php-email-form">
  <div class="form-row">
    <div class="form-group col-md-6">
      <label for="name">Your Name</label>
      <input type="text" name="name" class="form-control" id="name" data-rule="minlen:4" data-msg="Please enter at least 4 chars">
      <div class="validate"></div>
    </div>
    <div class="form-group col-md-6">
      <label for="name">Your Email</label>
      <input type="email" class="form-control" name="email" id="email" data-rule="email" data-msg="Please enter a valid email">
      <div class="validate"></div>
    </div>
  </div>
  <div class="form-group">
    <label for="name">Subject</label>
    <input type="text" class="form-control" name="subject" id="subject" data-rule="minlen:4" data-msg="Please enter at least 8 chars of subject">
    <div class="validate"></div>
  </div>
  <div class="form-group">
    <label for="name">Message</label>
    <textarea class="form-control" name="message" rows="10" data-rule="required" data-msg="Please write something for us"></textarea>
    <div class="validate"></div>
  </div>
  <div class="form-group">
    <div class="g-recaptcha" data-sitekey="6Ld359caAAAAAGcM23g0yDY2HeJjZ-7gN-1EL4O1">
      <div style="width: 304px; height: 78px;">
        <div><iframe title="reCAPTCHA"
            src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6Ld359caAAAAAGcM23g0yDY2HeJjZ-7gN-1EL4O1&amp;co=aHR0cHM6Ly9rYXBhbHlhLmNvbTo0NDM.&amp;hl=de&amp;v=Km9gKuG06He-isPsP6saG8cn&amp;size=normal&amp;cb=w34vbjkvvjm2" width="304"
            height="78" role="presentation" name="a-kx035p4agxc8" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div>
        <textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
      </div><iframe style="display: none;"></iframe>
    </div>
  </div>
  <div class="mb-3">
    <div class="loading">Loading</div>
    <div class="error-message"></div>
    <div class="sent-message">Your message has been sent. Thank you!</div>
  </div>
  <div class="text-center">
    <button type="submit">Send Message</button>
  </div>
</form>

Text Content

x


AI/ML
BASED RANSOMWARE
INOCULATION &
DATA ENCRYPTION


Learn More
00
0
0
00
0
0
00
0
0
00
0
0
00
0
0
00
0
0
00
0
0
00
0
0


Kapalya's crowdfunding campaign is live. Find out how you can join the fight.

Learn More
 * Home
 * About Us
 * Solution
   * Government
   * Enterprise
   * SMB
 * Who We Are
 * Press Release
 * Blog
 * Partners
 * Resources
   * Sales Sheet
   * Data Sheet
   * User Guide
 * Contact Us


ENCRYPTION MANAGEMENT PLATFORM


CONFIDENTIAL FILES, ALWAYS ENCRYPTED. MANAGE YOUR OWN KEYS, ENCRYPT, STORE AND
SHARE SENSITIVE DATA ACROSS ENDPOINTS (WINDOWS, MAC, IOS & ANDROID), PUBLIC
CLOUDS (BOX, AWS, GOOGLE & AZURE) AND PRIVATE CLOUD.

Watch Video

For US State and Federal Government Agencies

DUNS # 080041915; CAGE # 7HLM3


ABOUT US

KAPALYA empowers businesses and their employees to securely store sensitive
files at-rest and in-transit across multiple platforms through a user-friendly
desktop and mobile application. This ubiquitous encryption solution protects all
your corporate data by seamlessly encrypting files on:

 * End-points computers/mobile devices.
 * Corporate servers and public cloud providers.
 * With KAPALYA, users have the ability to share encrypted files across multiple
   cloud platforms.
 * Integerated with Box, Amazon S3, Google and Microsoft Azure.


KAPALYA SOLUTION FOR GOVERNMENT

 * 01 End-point Security
   
      The encryption management platform creates a secure vault on user
      endpoints where:
      
      
    * A data classification engine scans the endpoint for sensitive files and
      prompts users to encrypt.
    * All data within the vault is encrypted.
    * Each file and folder is assigned a unique encryption key.
    * No additional disk or storage space is taken up on the endpoint.
   
   

 * 02 Public Cloud Security
   
      The problem with using the encryption offered by public cloud vendors:
    * Vendors will encrypt files at-rest on their cloud, however, files sitting
      on a user’s endpoint are left unencrypted and vulnerable to attacks.
    * The cloud provider won’t protect your files on endpoints or private
      clouds.
    * Most cloud providers control the encryption keys, making data visible to
      their cloud administrators.
    * Some cloud providers allow customers to bring and manage their own keys.
      However, integrating with a cloud provider’s key management system
      requires programming which could result in time consuming efforts and if
      not configured properly, could expose the customer’s data.
    * The Encryption Management Platform is cloud agnostic and uses client-side
      encryption so files and folders are encrypted before leaving the endpoint.
      While in-transit, files are double encrypted as they move through an SSL
      tunnel. Since the user controls the keys, your files are protected from
      eavesdropping by any third-party, including your cloud storage provider.
    * A unique encryption key per file allows users to share protected files
      across cloud storage platforms and to other Encryption Management Platform
      users.
   
   

 * 03 Private Cloud Security
   
      KAPALYA creates a secure vault for each user on your private cloud as
      well, to allow file and folder protection within your network.
    * Your internal corporate administrators do not have privileges to view
      end-user data.
    * User’s credentials are not tied to the enterprise’s active directory.
   
   

 * 04 Encryption Key Management
   
      Key management done differently:
    * One unique key for each file and folder Keys are served in real-time.
    * Keys are never stored on endpoints, public clouds or private clouds. Once
      the function is complete, the keys are destroyed.
    * This approach allows for encrypted file sharing within and outside your
      network.
    * When file sharing, only the unique key for that file is shared, not the
      keys to all your files.
   
   

 * 05Data Classification
   
    * KAPALYA’s data classification engine scans 250+ file types for social
      security numbers, credit card numbers, state I.D.s and driver's’ license
      numbers. The engine is customizable to identify the sensitive data your
      organization handles.
    * If confidential data is found sitting on endpoints, the platform will
      prompt users with a list of files, and options to preview, encrypt or
      delete. The frequency of scans can be on-demand or programmed to run at
      certain times or intervals and can be configured based on business needs.
   
   

 


KAPALYA SOLUTION FOR ENTERPRISE

 * 01 End-point Security
   
      The encryption management platform creates a secure vault on user
      endpoints where:
      
      
    * A data classification engine scans the endpoint for sensitive files and
      prompts users to encrypt.
    * All data within the vault is encrypted.
    * Each file and folder is assigned a unique encryption key.
    * No additional disk or storage space is taken up on the endpoint.
   
   

 * 02 Public Cloud Security
   
      The problem with using the encryption offered by public cloud vendors:
    * Vendors will encrypt files at-rest on their cloud, however, files sitting
      on a user’s endpoint are left unencrypted and vulnerable to attacks.
    * The cloud provider won’t protect your files on endpoints or private
      clouds.
    * Most cloud providers control the encryption keys, making data visible to
      their cloud administrators.
    * Some cloud providers allow customers to bring and manage their own keys.
      However, integrating with a cloud provider’s key management system
      requires programming which could result in time consuming efforts and if
      not configured properly, could expose the customer’s data.
    * The Encryption Management Platform is cloud agnostic and uses client-side
      encryption so files and folders are encrypted before leaving the endpoint.
      While in-transit, files are double encrypted as they move through an SSL
      tunnel. Since the user controls the keys, your files are protected from
      eavesdropping by any third-party, including your cloud storage provider.
    * A unique encryption key per file allows users to share protected files
      across cloud storage platforms and to other Encryption Management Platform
      users.
   
   

 * 03 Private Cloud Security
   
      KAPALYA creates a secure vault for each user on your private cloud as
      well, to allow file and folder protection within your network.
    * Your internal corporate administrators do not have privileges to view
      end-user data.
    * User’s credentials are not tied to the enterprise’s active directory.
   
   

 * 04 Encryption Key Management
   
      Key management done differently:
    * One unique key for each file and folder Keys are served in real-time.
    * Keys are never stored on endpoints, public clouds or private clouds. Once
      the function is complete, the keys are destroyed.
    * This approach allows for encrypted file sharing within and outside your
      network.
    * When file sharing, only the unique key for that file is shared, not the
      keys to all your files.
   
   

 * 05Data Classification
   
    * KAPALYA’s data classification engine scans 250+ file types for social
      security numbers, credit card numbers, state I.D.s and driver's’ license
      numbers. The engine is customizable to identify the sensitive data your
      organization handles.
    * If confidential data is found sitting on endpoints, the platform will
      prompt users with a list of files, and options to preview, encrypt or
      delete. The frequency of scans can be on-demand or programmed to run at
      certain times or intervals and can be configured based on business needs.
   
   

 


KAPALYA SOLUTION FOR SMB

 * 01 End-point Security
   
      The encryption management platform creates a secure vault on user
      endpoints where:
      
      
    * A data classification engine scans the endpoint for sensitive files and
      prompts users to encrypt.
    * All data within the vault is encrypted.
    * Each file and folder is assigned a unique encryption key.
    * No additional disk or storage space is taken up on the endpoint.
   
   

 * 02 Public Cloud Security
   
      The problem with using the encryption offered by public cloud vendors:
    * Vendors will encrypt files at-rest on their cloud, however, files sitting
      on a user’s endpoint are left unencrypted and vulnerable to attacks.
    * The cloud provider won’t protect your files on endpoints or private
      clouds.
    * Most cloud providers control the encryption keys, making data visible to
      their cloud administrators.
    * Some cloud providers allow customers to bring and manage their own keys.
      However, integrating with a cloud provider’s key management system
      requires programming which could result in time consuming efforts and if
      not configured properly, could expose the customer’s data.
    * The Encryption Management Platform is cloud agnostic and uses client-side
      encryption so files and folders are encrypted before leaving the endpoint.
      While in-transit, files are double encrypted as they move through an SSL
      tunnel. Since the user controls the keys, your files are protected from
      eavesdropping by any third-party, including your cloud storage provider.
    * A unique encryption key per file allows users to share protected files
      across cloud storage platforms and to other Encryption Management Platform
      users.
   
   

 * 03 Private Cloud Security
   
      KAPALYA creates a secure vault for each user on your private cloud as
      well, to allow file and folder protection within your network.
    * Your internal corporate administrators do not have privileges to view
      end-user data.
    * User’s credentials are not tied to the enterprise’s active directory.
   
   

 * 04 Encryption Key Management
   
      Key management done differently:
    * One unique key for each file and folder Keys are served in real-time.
    * Keys are never stored on endpoints, public clouds or private clouds. Once
      the function is complete, the keys are destroyed.
    * This approach allows for encrypted file sharing within and outside your
      network.
    * When file sharing, only the unique key for that file is shared, not the
      keys to all your files.
   
   

 * 05Data Classification
   
    * KAPALYA’s data classification engine scans 250+ file types for social
      security numbers, credit card numbers, state I.D.s and driver's’ license
      numbers. The engine is customizable to identify the sensitive data your
      organization handles.
    * If confidential data is found sitting on endpoints, the platform will
      prompt users with a list of files, and options to preview, encrypt or
      delete. The frequency of scans can be on-demand or programmed to run at
      certain times or intervals and can be configured based on business needs.
   
   

 


FEATURES

Encrypt

Data is encrypted in-transit and at-rest on endpoints, corporate servers and
public clouds.

Auto-Protect

Out-of-the-box data classification engine scans over 250 file types for
sensitive data.

Hidden

Zero-knowledge encryption masks cloud and corporate admins visibility into your
data and encryption keys.

Keys

A unique key for each file and folder provides ultimate data security.

Share

Allows end-to-end encrypted file sharing across multiple public cloud platforms.

Save Time & Money

Eliminates the need of managing multiple vendors to secure your data at
different points.


HOW IT WORKS ?

Launch the app on your Windows or Mac computer and the Encryption Management
System automatically scans for sensitive data.


Upload and encrypt any confidential data on endpoints (computers/mobile
devices), corporate servers and/or public cloud providers.


Securely share your encrypted files, photos and videos through a public cloud
provider.


Encryption is based on NSA Suite B Cryptography Standards using a FIPS 140-2
certified virtual key manager (vHSM).

Your browser did not support HTML5 video. Thisis a link to download the video.


SERVICE OFFERINGS


MANAGED PLATFORM

SERVICES MANAGED AND HOSTED BY KAPALYA

 * Configure Encryption Management System on multiple devices per user (PC, Mac,
   iOS & Android).
 * Encrypted file sharing across multiple cloud providers
   (AWS/Box/Google/Microsoft).
 * Dashboard to view all user activities and registered devices.
 * Unlimited unique encryption keys for each file and folder.
 * Auto-detection and encryption of 250+ sensitive file types.
 * Encryption support on private cloud storage (Windows, Linux).
 * Biometric, pin and user ID/password authentication.
 * Ability to provision users.
 * 60-day file recovery.
 * Version control.
 * Multi-tenanted management and encryption key servers.
 * Email/Live Chat Support.
 * Service delivered from AWS.

Request Demo


CUSTOMER OWNED PLATFORM

SERVICES MANAGED AND HOSTED BY CUSTOMER

 * Configure Encryption Management System on multiple devices per user (PC, Mac,
   iOS & Android).
 * Encrypted file sharing across multiple cloud providers
   (AWS/Box/Google/Microsoft).
 * Dashboard to view all user activities and registered devices.
 * Unlimited unique encryption keys for each file and folder.
 * Auto-detection and encryption of 250+ sensitive file types.
 * Encryption support on private cloud storage (Windows, Linux).
 * Biometric, pin and user ID/password authentication.
 * Ability to provision users.
 * 60-day file recovery.
 * Version control.
 * Dedicated management and encryption key servers.
 * 24/7 Tech support (Email, live chat and phone).
 * Servers hosted either on AWS or on-prem inside customers data center.
 * Masked public and private cloud admin visibility.
 * Integration with your existing Active Directory forest.
 * Point-to-Point IPsec VPN tunnel from customer prem to AWS.
 * Professional services to assist in setup of dedicated instance on AWS or your
   private cloud.
 * End-user and admin training.
 * Batch end-user creation.

Request Demo


KAPALYA'S DIFFERENTIATORS

CLOUD KEY MANAGEMENT

KAPALYA’s Approach:
Manage your own encryption keys.
Other Vendor's:
Use cloud provider’s encryption keys.

FILE & FOLDER ENCRYPTION

KAPALYA’s Approach:
Unique key served per file and folder.
Other Vendor's:
One key served per user for all their files.

KEY STORAGE

KAPALYA’s Approach:
Keys are served in real-time and destroyed after encrypting.
Other Vendor's:
Keys could be stored on endpoints or public clouds.


SSL TUNNEL

KAPALYA’s Approach:
Files are sent encrypted and through an SSL tunnel.
Other Vendor's:
Files are sent in clear-text via an SSL tunnel.


ENCRYPTION

KAPALYA’s Approach:
Client-side - Files are encrypted on the endpoint before upload.
Other Vendor's:
Server-side - Files are encrypted after data is uploaded.

PROXY-BASED

KAPALYA’s Approach:
Files are encrypted on the end-point, before upload.
Other Vendor's:
Files are in clear text on endpoints and encrypted only when leaving the
corporate perimeter.

ROLE-BASED POLICIES

KAPALYA’s Approach:
Privileged users never have visibility into end-user data.
Other Vendor's:
Access to end user data is defined using role-based policies.

PRIVILEGED CLOUD ADMINS

KAPALYA’s Approach:
Cloud admins are masked from viewing all data.
Other Vendor's:
Admins at public cloud providers have visibility into your corporate data.


WHO WE ARE

Executive Management

SUDESH KUMAR

Founder &
CEO


SAEED KHOSRAVI

Co-founder & CTO


MOHAMED MENAKBI

VP of Sales & Marketing | EMEA

Sales/Marketing/Business Developer

EMANUELE CERRONI

Managing Director
Engineering

NANCIROSA PIAZZA

Data Scientist

Advisors

RAMESH IYER

Senior Cyber Security Leader


DEREK TUMULAK

Chief Product Officer


SANTHANA KRISHNASAMY

Product Leader | Startup Advisor



GREG CARTER

Global Licenses Advisor


N JAYANTHA PRABHU

Technicial Advisor


RABEA CHAUDHARY

Brand & Marketing Advisor



MICHAEL TURNER

Technicial Advisor


JAGDISH AMIN

Business Development Advisor

Board of Directors

SUDESH KUMAR



SAEED KHOSRAVI


Administration

THANH NGUYEN

Administrative Assistant

Investors

CALTROP HOLDINGS LLC

PRIVATE INVESTORS




PRESS RELEASE

Kapalya Awarded Competitive Grant from the National Science Foundation
CoCre8 Technology Solutions are extremely excited to announce a distribution
agreement with Caltrop for KAPALYA
Cybersecurity Startup KAPALYA Closes Seed Funding Round Led by Caltrop Holdings
LLC
KAPALYA wins the best Cybersecurity startup company in North America award
KAPALYA Accepted in Platinum-Ranked Accelerator for Enterprise Startups
KAPALYA Partners with Thales to Provide Centralized Key Management
KAPALYA Partners with Gemalto to Leverage Their Latest Key Management Solution
KAPALYA Launches Intelligent End-to-End Encryption Software
KAPALYA partners with NSA to securing Data from Send to Receive




FROM THE NEWS

Kapalaya joins Berkeley Startup Cluster for a historic Berkeley-wide pitch
competition at the intersection of innovation and equity
KAPALYA distribution rights awarded to CoCre8 Technology Solutions
Store Sensitive Business Files Through Multiple Platforms with KAPALYA
KAPALYA in Berkeley Startup Cluster
Protect your Data, wherever it Resides
Cybersecurity Startup KAPALYA Is Making Remote Work Companies Safer
Encryption is Non-negotiable
Navigating the cybersecurity challenges of the new normal, with Omar Ben
Hamadou, KAPALYA's EMEA Sales Manager
Why you should worry about ransomware breaches during COVID-19
In conversation with Sudesh Kumar of KAPALYA, an ICE71 Accelerate 4 startup
KAPALYA Live Webcast - Safeguarding Elections: Protecting Citizen PII Data
Founder and CEO of KAPALYA, Sudesh Kumar speaking at the 2019 Alchemist
Accelerator Demo Day
KAPALYA Live Webcast - Protect and Manage Your Unstructured Data with KAPALYA
KAPALYA Partners with Gemalto to Leverage Their Latest Key Management Solution
Gemalto boosts cloud security with scalable virtual key management
Sudesh Kumar keeps the key safe
Honolulu-based data encryption app Kapalya call NSA patent a game changer
The Hawaii Venture Capital Association selects Sudesh Kumar as one of the three
finalists of the Tech Entrepreneur of the Year
Weekly Rotary Meeting-Sudesh Kumar-CEO of KAPALYA Inc
Entrepreneurial competition won by mobile app developer




PARTNERS

THALES/GEMALTO

Gold OEM Partner

HYTRUST

Integration Partner





DISTRIBUTORS

CARAHSOFT

US Federal & State Government

CALTROP MIDDLE EAST

Europe/Middle East/Africa





CONTACT US

Contact Us For More Informations

LOCATION:

CALIFORNIA

1935A Addison St
Berkeley, CA 94704



HAWAII

Entrepreneurs Sandbox
643 Ilalo St, Suite 102
Honolulu, HI 96813



EMAIL:

info@kapalya.com

CALL:

+1 (310) 400-6139

Your Name

Your Email

Subject

Message


Loading

Your message has been sent. Thank you!
Send Message


FREQUENTLY ASKED QUESTIONS

 * How is KAPALYA different from a file sharing/storage service?
   
   We provide encrypted file sharing across multiple clouds and is
   cloud-agnostic. Individual file-sharing companies only allow file sharing on
   their own service. You have the choice to do encrypted file sharing across
   multiple cloud providers.

 * How is KAPALYA different from a cloud collaboration service?
   
   KAPALYA is cloud-agnostic so you have the choice to encrypt and share files
   across multiple clouds. Individual public cloud providers only allow file
   sharing within their own platform. KAPALYA complements and enhances your
   cloud provider(s) by providing the ability to share files across platforms in
   a secure manner.

 * Where does KAPALYA encrypt my files?
   
   KAPALYA uses client-side encryption, therefore all encryption happens on the
   endpoint.

 * How are keys managed?
   
   Keys are served in real-time from a FIPS 140-2 key manager and never stored
   on any endpoint, public cloud, or private cloud storage.

 * Can I do encrypted file sharing?
   
   Yes, you can share encrypted files across multiple public clouds, private
   clouds and file storage platforms.

 * How do you ensure my keys will not get compromised?
   
   Each user gets assigned unique keys for each encrypted file and/or folder.
   The keys reside in a FIPS 140-2 key manager and are never stored on
   endpoints, cloud storage or private clouds. Keys are destroyed after the
   encrypt or decrypt function is performed.

 * How do I know which files contain sensitive data?
   
   The data classification engine scans for sensitive data of 250+ file types
   including; credit card numbers, social security numbers, driver’s licenses
   and more. KAPALYA’s Encryption Management System then shows users a list of
   sensitive files sitting on their endpoints and prompts users with the option
   to encrypt some or all detected files.

 * Which public clouds do you support?
   
   Currently, KAPALYA supports Amazon S3, Box, and OneDrive. We are in
   development to release integrations with Google Drive and Dropbox in the near
   future.

 * Which end-points do you support?
   
      KAPALYA supports the following endpoints:
    * Windows versions: 7, 8, 8.1, 10.
    * Mac OS versions: Yosemite, Sierra, High Sierra, Mojave, Catalina and Big
      Sur.
    * iOS devices: Any smartphone/tablet with versions 10 and higher.
    * Android devices: Any smartphone/tablet with versions 6.0 and higher.
   
   

 * Which private clouds do you support?
   
   Currently, KAPALYA supports Windows’ private cloud. We are in development to
   release an integration with Linux in the near future.

 * Does this replace existing encryption services provided by public cloud
   vendors?
   
   No, KAPALYA does not replace the encryption provided by your current public
   cloud provider. It complements and enhances the public cloud by providing an
   additional layer of security by protecting data at rest and in transit and
   allowing for secure file sharing across multiple platforms. With KAPALYA, you
   manage your keys, subsequently masking your cloud provider’s admins from
   viewing your sensitive data.

 * Can I share my encrypted files with people outside my enterprise?
   
   Yes, provided the recipient of the file is also using the KAPALYA Encryption
   Management System.

 * Do you support version control?
   
   Yes, but only on public clouds.

 * How do you ensure no local, cloud or enterprise administrators can view my
   files?
   
   Each user is assigned a new set of keys and credentials which administrators
   do not have access to. The new set of user credentials are assigned their own
   set of keys for every file or folder. KAPALYA creates an account for each
   user, upon initial login, the user must change their password and enter a
   pin. On mobile endpoints, in addition to these credentials, a 6-digit pin is
   also used to authenticate a user before allowing access to the file.

 * Do you support single sign-on?
   
   Yes, through biometrics and facial recognition. But you have the option to
   enable multi-factor authentication.

 * Do you support multi-factor authentication on mobile end-points?
   
   Yes.

 * Can I encrypt and upload entire folders?
   
   Yes.

 * Do you support VDI environments?
   
   Yes. KAPALYA has been tested successfully on VMware VDI environments.

 * Can I use my existing HSM (Hardware Services Module) or software based key
   managers to integrate with KAPALYA’s solution?
   
   Yes, custom configurations can be deployed for KAPALYA to support third party
   HSMs provided they are KMIP compliant.

 * Is it hosted in the cloud or do you have an on-prem version?
   
   Both; hosted on AWS and Azure, and on-prem on a VMware environment.

 * How do I size the key managers to be used (Enterprise customers only)?
   
   This will depend on your number of users, number of devices and average
   number of anticipated files and folders.

 * Do you provide automatic synchronization of files and folders from end-points
   to any public cloud?
   
   Currently we do not automate this process but it is in the works. However,
   all files and folders from any endpoint can be easily moved to the cloud.

 * How are existing cloud security policies managed?
   
   KAPALYA integrates with the existing cloud vendor’s security policies.

 * How are users provisioned on the system?
   
   Users are provisioned through KAPALYA’s provisioning server. Users can be
   provisioned one-at-a-time or in batches (with enterprise edition.)

 * Do you have existing integration into enterprise Active Directory servers?
   
   KAPALYA can integrate with existing Active Directory, however, we recommend
   against this as an added protective layer in the event the Active Directory
   gets compromised.

 * How are keys rotated for users?
   
   Keys do not need to be rotated because each file and folder gets assigned a
   unique key.

 * How do I recover files for employees that have left the company?
   
   An administrator needs to reset the user’s credentials and use the new
   credentials to recover files.

 * How are mobile devices registered with the solution?
   
   Mobile devices are registered using their UDID, ESN and IMEI to ensure
   uniqueness of the device.

 * Can you revoke access to individual devices belonging to a user?
   
   Yes, administrators have the ability to revoke access to any device
   registered to any user.

 * If I lose my mobile device, can a third party run forensics and read the data
   on my mobile device?
   
   No, because they will not be able to get to the encryption keys because they
   are not stored on the device.

 * How do you protect data-in-transit?
   
   Through a VPN tunnel, IPSec or SSL.

 * What kinds of VPN do you support?
   
   KAPALYA supports IPSec or SSL VPN tunnels.

TERMS & CONDITIONS

Read Details

TERMS & CONDITIONS

×

KAPALYA respects your privacy and is committed to maintaining the privacy and
confidentiality of personal data we collect. The purpose of our Privacy Policy
is to demonstrate our firm commitment to the privacy and protection of all
persons who provide personal data to KAPALYA and its affiliates. This Privacy
Policy describes the ways we collect information from and about you, and what we
do with the information, so that you may decide whether or not to provide
information to us.

By visiting KAPALYA websites or otherwise providing your personal information to
KAPALYA through any other means, you accept and consent to the practices
described in this Privacy Policy.

For purposes of this Privacy Policy, the term “visitor” includes visitors to our
websites who are not yet customers, those who become customers, as well as those
who do not become customers; whether you upload information to our websites or
services, download information, or are merely viewing our websites and services.
You can choose not to provide certain information when using our websites and/or
services but this may result in you not being able to take advantage of their
features.

 1. What do we collect and where?

The information we collect may include your personal information, such as your
name, contact information, financial account numbers, IP addresses, Live Chat
Messages, Telephone conversations, product and service selections and orders or
other things that identify you individually. Generally, we may collect
information about you in multiple manners which include without limitation:

 1. * You may provide your personal information to us via chat, email or other
      written or electronic.
    * We use automated technical means to collect information about all website
      visitors (for example, using cookies);
    * Via third party providers;
    * Website visit; and/or
    * Through our services or software.

You may visit our Websites or utilize our services in different ways including
without limitation:

 1. * By using your browser to navigate to our Websites including, but not
      limited to, KAPALYA.com and _______________.com and their sub-domains.
    * By viewing an advertisement displayed on a third party website that is
      served content by our web server;
    * By viewing an email that is served content by our or a third party web
      server.
    * By utilizing a software client of ours
    * By utilizing a service or software of a 3rd party that accesses our
      service or software.

When you visit our Website, our server logs your IP address (unique network
addresses), the time and duration of your visit, and the time and duration of
the pages on our website you view. If you arrive at our website by clicking a
paid advertisement (including a paid search engine result) or a link in an
email, then we will capture information that tracks your visit from that link.
If you arrive at our Website by clicking a non-paid source, such as link in a
non-paid search engine result or an unsponsored link on another website, we may
capture information that tracks your visit from that source, to the extent we
are able to do so. We may also capture information about your computer system,
such as your browser type and operating system.

We may place a cookie on your storage device during the web visit. A cookie is a
unique alphanumeric identifier that we use to help us identify the number of
unique visitors to our Website, whether or not those visitors are repeat
visitors, and the source of the visits. To our knowledge cookies cannot be
executed as code or used to deliver a virus. Similarly we understand that other
servers cannot read them and personal information cannot be gathered from them.
They are simply an identifier shared between you and us to allow us to improve
the services we offer to you through our Website. If you do not wish cookies to
be placed on your computer, then they can be disabled in your web browser. The
option to do so is normally found in your browser’s “security settings” section.
However, please note, permanently disabling cookies in your browser may hinder
your use of our Website as well as other websites and interactive services.

We reserve the right to use a web beacon, also known as a web bug, which is a
small graphic (usually 1 pixel x 1 pixel), that is embedded in a web
advertisement, email, or page on our web site. When you view a page on our web
site, an email or an advertisement your web browser will request the web beacon
from a web server, which in turn will set a cookie in your web browser
containing a unique identifier. This unique identifier will be linked to log
information that is used to track your movements on our web site in order to
determine the effectiveness of content and advertising campaigns.

We do not collect personal information about you as part of a web visit, but web
visit information may be tied to other information (including personal
information) we collect from you via chat, web forms, and the other means we
describe in this Privacy Policy.

Our service providers may also use web beacons, cookies, and other means to
track your activity on our website. Our service providers maintain their own
privacy policies, and you should also review those as they are not covered by
this Privacy Policy.

Links to non-KAPALYA Websites

We may provide links to third-party websites for your convenience and
information. The privacy practices of those sites may differ from KAPALYA
practices and are not controlled by KAPALYA and are not covered by this Privacy
Policy. We do not make any representations about third-party websites. We
encourage you to review their privacy policies before submitting your personal
data.

Sensitive Information

We will not intentionally collect or maintain, and do not want you to provide,
any information regarding your medical or health condition, race or ethnic
origin, political opinions, religious or philosophical beliefs and other
sensitive information.

Children’s Online Privacy Protection

Our services are not designed for or directed to children under the age of 13,
and we will not intentionally collect or maintain information about anyone under
the age of 13.

 1. What do we use this information for?

Personal Information

We may use your information to process your service requests, handle orders,
deliver products and services, process payments, communicate with you about
orders, provide access to secure areas of the Website, recommend merchandise and
services that might be of interest to you, to personalize your visit to our
Website, and to enable us to review develop and continually improve the products
services and offers we provide online. We also use this information to prevent
or detect fraud or abuses of our Website and to enable third parties to carry
out technical, logistical or other functions on our behalf.

Contact Information

We use visitor information to send information about our company to visitors and
to get in touch with them when necessary. We also use the information we collect
to improve the content of our websites and as training aides for our employees.
Visitors are given the choice at the point when we request their information.

Financial Information and payment card details

We may ask visitors to enter credit card or account information in order to
process orders for services placed with KAPALYA or its affiliates. Financial
information provided via our website or via the KAPALYA portal is transferred
over a secure connection. We collect this information on a transaction
by-transaction basis and will not authorize the release of the information with
anyone not directly involved in processing the transaction. This information may
be encrypted and stored for logging purposes in accordance with applicable
regulatory requirements.

Credit card numbers are used only for processing payments and are not used for
any other purposes. When we use third party service providers for credit card
processing services we will enter into a written agreement with such third party
ensuring appropriate security and confidentiality measures are in place in
safeguarding your personal data.

We use web visit information to measure interest in and develop our web pages
and marketing plans, customize the content you view on your web visits based on
your activity on past visits, and administer our Website.

 1. * We may use the visitors’ IP address to help diagnose problems with our
      servers, and to administer our Websites.
    * We may use cookies to help us recognize visitors as unique visitors (just
      a number) when they return to our websites. For example, if there are
      1,000 visits to our website on a certain day, we can use cookies to
      discover how many of those visits were made via the same browser (same
      visitor). We may also use the cookie to discover whether a certain visitor
      has visited our site more than once, and the source for each visit. We
      also use cookies to: allow us to tailor content or advertisements to match
      your preferred interest; avoid showing visitors the same advertisements
      repeatedly; compile anonymous, aggregated statistics that allow us to
      understand how users use our site and to help us improve the structure of
      our Website (we cannot identify visitors personally in this way); count
      the number of anonymous users of our sites.
    * When electing to use them, we use web beacons to count the number of times
      that our advertisements and web-based email content are viewed. We combine
      web beacon information with cookies to track activity on our website
      originating from advertisements and web-based email content.
    * We use information you provide to us via telephone calls, chat, email, web
      forms and other communications to correspond with you about services you
      may be interested in purchasing. If you elect to purchase a service online
      using a web form, we will use the information to establish your account.
      Information you submit in writing, such as chat, email, and web form
      information may be archived and may be tied to information that we collect
      about your web visits. Your telephone call may be recorded for training
      purposes and we may enter information you provide via telephone into our
      systems to use for the purposes described in this paragraph.
 2. Disclosure of Personal Information

Personal information we gather is for internal use only and we will not
authorize the release of this information to anyone outside KAPALYA (except to
third party service providers to KAPALYA who perform functions on our behalf but
in such event personal information will only be shared to the extent reasonably
necessary to perform their functions.

Should you breach our terms and conditions or website terms, or if we are under
a duty to disclose or share your personal data in order to comply with a legal
obligation, we may disclose your information to a relevant authority without
notification to you. This may include exchanging information with other
companies and organizations for the purposes of fraud protection and credit risk
reduction. In particular, we may release the information we collect to third
parties when we believe it is appropriate to comply with the law, to enforce our
legal rights, to protect the rights and safety of others, or to assist with
industry efforts to control fraud, spam or other undesirable conduct.

We may release the information we collect to third parties, where the
information is provided to enable such third party to provide services to us,
provided that the third party has agreed to use at least the same level of
privacy protections described in this Privacy Policy, and is permitted to use
the information only for the purpose of providing services to us.

 1. Opting out of communications

KAPALYA provides you an opportunity to opt-out of personal data being disclosed
to third parties (except for meeting applicable legal requirements, required for
the provision of services, or permitting third party service providers who
perform functions on our behalf as described in section 3 of this Privacy
Policy), including your opting out of receiving future marketing mailings. We
will not use your contact information to correspond with you about our services
if you ask us not to. Please send your request to info@KAPALYA.com. Please note
that it may take up to ten days to remove your contact information from our
marketing communications lists, so you may receive correspondence from us for a
short time after you make your request.

 1. Security of your information

KAPALYA is committed to industry best practices approaches concerning security
measures to prevent the loss, misuse and alteration of the information in our
possession. We use various security measures to protect the information we
collect, as appropriate to the type of information, including encryption,
firewalls, and access controls. We store information you provide to us on a
computer system located in a controlled facility with a limited access. Visitor
textual information is encrypted during transmission, our company databases are
accessible only by KAPALYA employees, contractors and agents on a need to know
basis and who have entered into and are bound by a confidentiality and
nondisclosure agreement with KAPALYA.

 1. Data Integrity

Personal data we collect is relevant for the purposes for which it is to be
used. KAPALYA takes reasonable steps to ensure that data is reliable for its
intended use, accurate, complete, and current.

 1. Right to access your personal information

If you believe that any personal information we have about you is incorrect, or
is, has been, or might be used inappropriately, please contact us immediately at
info@KAPALYA.com, and we will take steps to correct or delete the information,
or restrict its use, as set forth above upon reasonable verification of
identity.

 1. Verification

KAPALYA utilizes the self-assessment approach to assure its compliance with its
Privacy Policy. KAPALYA regularly verifies that the Privacy Policy is accurate,
comprehensive, prominently displayed, completely implemented and in conformity
with the Safe Harbor Principles and conducts its self-assessment on an annual
basis to ensure that all relevant privacy practices are being followed.
Appropriate employee training is in place and internal procedures for
periodically conducting objective reviews of compliance are in place. A
statement verifying this self-assessment is completed by a corporate officer or
other authorized representative annually.

 1. Inquiries or complaints

If you have a question or complaint about this Privacy Policy or our information
collection practices, please contact us at info@KAPALYA.com. We will investigate
the matter and are committed to resolve any reasonable and legitimate privacy
concerns.

 1. Changes

Our business changes constantly and our Privacy Policy may also change from time
to time. You should check our website frequently to see recent changes, however,
we will never materially change our policies and practices to make them less
protective of personal information collected in the past without providing
significant advanced and conspicuous warning.

This Privacy Policy was last updated on May 3, 2018.


KAPALYA ACCEPTABLE USE POLICY

Updated May 3, 2018

This Acceptable Use Policy (this “Policy”) describes prohibited uses of the
services offered by KAPALYA and its affiliates (the “Services”) and the websites
located at the domains (and sub-domains) located at KAPALYA.com (collectively
the “KAPALYA Sites”). The examples described in this Policy are not exhaustive
and apply to you and any other entities you or your affiliates enable to utilize
the services (collectively “You”). This Policy may be modified at any time by
posting a revised version on the KAPALYA Sites. By utilizing the Services or
accessing the KAPALYA Sites, following such modification, You agree to abide and
be bound by the then-current version of this Policy. Should You violate the
Policy, or authorize or otherwise assist others to do so, we may, at our sole
and unlimited discretion, immediately suspend or terminate part or all of Your
use of the Services.

No Illegal, Harmful, or Offensive Use or Content

You may not use or encourage, facilitate or otherwise enable others to use the
Services or KAPALYA Sites for any illegal, harmful, or offensive use, or to
transmit, store, display, distribute or otherwise make available content that is
illegal, harmful, or offensive. Prohibited activities or content include:

 1. Illegal Activities. Any illegal activities, including advertising,
    transmitting, or otherwise making available gambling sites or services or
    disseminating, promoting or facilitating child pornography.
 2. Harmful or Fraudulent Activities. Activities that may be harmful to KAPALYA’
    users, operations, or reputation, including offering or disseminating
    fraudulent goods, services, schemes, or promotions (e.g., phishing,
    make-money-fast schemes, ponzi and/or pyramid schemes, or pharming), or
    engaging in other unfair or deceptive practices.
 3. Infringing Content. Content that infringes or misappropriates the
    intellectual property or proprietary rights of others.<l/i>
 4. Offensive Content. Content that is defamatory, obscene, abusive, invasive of
    privacy, or otherwise objectionable, including content that constitutes
    child pornography, relates to bestiality, or depicts non-consensual sex
    acts.
 5. Harmful Content. Content or other computer technology that may damage,
    interfere with, surreptitiously intercept, or expropriate any system,
    program, or data, including viruses, Trojan horses, worms, time bombs, or
    cancelbots.

No Security Violations

You may not use the Services to violate or to facilitate the violation of the
security or integrity of any network, computer or communications system,
software application, or network or computing device (each, a “System”).
Prohibited activities include:

 1. Unauthorized Access. Accessing or using any System without permission,
    including attempting to probe, scan, or test the vulnerability of a System
    or to breach any security or authentication measures used by a System.
 2. Interception. Monitoring of data or traffic on a System without permission.
 3. Falsification of Origin. Forging TCP-IP packet headers, e-mail headers, or
    any part of a message describing its origin or route. This prohibition does
    not include the use of aliases or anonymous remailers.

No Network Abuse

You may not make network connections to any users, hosts, or networks without
permission to communicate with them. Prohibited activities include:

 1. Monitoring or Crawling. Unauthorized monitoring or crawling of a System that
    impairs, disrupts, or otherwise improperly accesses the System being
    monitored or crawled.
 2. Denial of Service (DoS). Inundating a target with communications requests so
    the target either cannot respond to legitimate traffic or responds so slowly
    that it becomes ineffective.
 3. Intentional Interference. Interfering with the proper functioning of any
    System, including any deliberate attempt to overload a system by mail
    bombing, news bombing, broadcast attacks, or flooding techniques.
 4. Operation of Certain Network Services. Operating network services like open
    proxies, open mail relays, or open recursive domain name servers.
 5. Avoiding System Restrictions. Using manual or electronic means to avoid any
    use limitations place on a System, such as access and storage restrictions.

No E-Mail Abuse

You will not distribute, publish, send, or facilitate unsolicited mass
e-mailings, promotions, advertising, or solicitations (e.g., “spam emails”),
including commercial advertising and informational announcements. You will not
alter or obscure mail headers or assume a sender’s identity without the
sender’s explicit permission. You will not collect replies to messages sent from
another Internet service provider if those messages violate this Policy or the
acceptable use policy of that provider.

Our Monitoring and Enforcement

We reserve the right, but do not assume the obligation, to investigate any
violation of this Policy or misuse of the Services or KAPALYA Sites. We may, in
our sole and unlimited discretion:

 1. Investigate violations of this Policy or misuse of the Services or KAPALYA
    Sites; or remove, disable access to, or modify any content or resource that
    violates this Policy or any other agreement we have with You for use of the
    Services or the KAPALYA Sites;
 2. Report any activity that we suspect violates any law or regulation to
    appropriate law enforcement officials, regulators, or other appropriate
    third parties. Our reporting may include disclosing appropriate customer
    information. We also may cooperate with appropriate law enforcement
    agencies, regulators, or other appropriate third parties to help with the
    investigation and prosecution of illegal conduct by providing network and
    systems information related to alleged violations of this Policy.

Reporting of Violations of this Policy

If you become aware of any violation of this Policy, you will immediately notify
us and provide us with assistance, as requested, to stop or remedy the
violation. To report any violation of this Policy, please inform us via email at
info@KAPALYA.com.



Close


KAPALYA

CALIFORNIA

1935A Addison St
Berkeley, CA 94704



HAWAII

Entrepreneurs Sandbox
643 Ilalo St, Suite 102
Honolulu, HI 96813

Phone: +1 (310) 400-6139

Email: info@kapalya.com


USEFUL LINKS

 * Home
 * About Us
 * Solution
 * Features
 * Who We Are
 * Press Release
 * Contact Us
 * FAQs
 * Privacy Policy

   PRIVACY POLICY
   
   ×
   
   Kapalya respects your privacy and is committed to maintaining the privacy and
   confidentiality of personal data we collect. The purpose of our Privacy
   Policy is to demonstrate our firm commitment to the privacy and protection of
   all persons who provide personal data to Kapalya and its affiliates. This
   Privacy Policy describes the ways we collect information from and about you,
   and what we do with the information, so that you may decide whether or not to
   provide information to us.
   
   By visiting Kapalya websites or otherwise providing your personal information
   to Kapalya through any other means, you accept and consent to the practices
   described in this Privacy Policy.
   
   For purposes of this Privacy Policy, the term “visitor” includes visitors to
   our websites who are not yet customers, those who become customers, as well
   as those who do not become customers; whether you upload information to our
   websites or services, download information, or are merely viewing our
   websites and services. You can choose not to provide certain information when
   using our websites and/or services but this may result in you not being able
   to take advantage of their features.
   
    1.  What do we collect and where?
   
        The information we collect may include your personal information, such
        as your name, contact information, financial account numbers, IP
        addresses, Live Chat Messages, Telephone conversations, product and
        service selections and orders or other things that identify you
        individually. Generally, we may collect information about you in
        multiple manners which include without limitation:
   
         * You may provide your personal information to us via chat, email or
           other written or electronic
         * We use automated technical means to collect information about all
           website visitors (for example, using cookies);
         * Via third party providers;
         * Website visit; and/or
         * Through our services or software
   
        You may visit our Websites or utilize our services in different ways
        including without limitation:
   
         * By using your browser to navigate to our Websites including, but not
           limited to, kapalya.com and _______________.com and their
           sub-domains.
         * By viewing an advertisement displayed on a third party website that
           is served content by our web server;
         * By viewing an email that is served content by our or a third party
           web server
         * By utilizing a software client of ours
         * By utilizing a service or software of a 3rd party that accesses our
           service or software.
   
        When you visit our Website, our server logs your IP address (unique
        network addresses), the time and duration of your visit, and the time
        and duration of the pages on our website you view. If you arrive at our
        website by clicking a paid advertisement (including a paid search engine
        result) or a link in an email, then we will capture information that
        tracks your visit from that link. If you arrive at our Website by
        clicking a non-paid source, such as link in a non-paid search engine
        result or an unsponsored link on another website, we may capture
        information that tracks your visit from that source, to the extent we
        are able to do so. We may also capture information about your computer
        system, such as your browser type and operating system.
   
        We may place a cookie on your storage device during the web visit. A
        cookie is a unique alphanumeric identifier that we use to help us
        identify the number of unique visitors to our Website, whether or not
        those visitors are repeat visitors, and the source of the visits. To our
        knowledge cookies cannot be executed as code or used to deliver a virus.
        Similarly we understand that other servers cannot read them and personal
        information cannot be gathered from them. They are simply an identifier
        shared between you and us to allow us to improve the services we offer
        to you through our Website. If you do not wish cookies to be placed on
        your computer, then they can be disabled in your web browser. The option
        to do so is normally found in your browser’s “security settings”
        section. However, please note, permanently disabling cookies in your
        browser may hinder your use of our Website as well as other websites and
        interactive services.
   
        We reserve the right to use a web beacon, also known as a web bug, which
        is a small graphic (usually 1 pixel x 1 pixel), that is embedded in a
        web advertisement, email, or page on our web site. When you view a page
        on our web site, an email or an advertisement your web browser will
        request the web beacon from a web server, which in turn will set a
        cookie in your web browser containing a unique identifier. This unique
        identifier will be linked to log information that is used to track your
        movements on our web site in order to determine the effectiveness of
        content and advertising campaigns.
   
        We do not collect personal information about you as part of a web visit,
        but web visit information may be tied to other information (including
        personal information) we collect from you via chat, web forms, and the
        other means we describe in this Privacy Policy.
   
        Our service providers may also use web beacons, cookies, and other means
        to track your activity on our website. Our service providers maintain
        their own privacy policies, and you should also review those as they are
        not covered by this Privacy Policy.
   
        Links to non-Kapalya Websites
   
        We may provide links to third-party websites for your convenience and
        information. The privacy practices of those sites may differ from
        Kapalya practices and are not controlled by Kapalya and are not covered
        by this Privacy Policy. We do not make any representations about
        third-party websites. We encourage you to review their privacy policies
        before submitting your personal data.
   
        Sensitive Information
   
        We will not intentionally collect or maintain, and do not want you to
        provide, any information regarding your medical or health condition,
        race or ethnic origin, political opinions, religious or philosophical
        beliefs and other sensitive information.
   
        Children’s Online Privacy Protection
   
        Our services are not designed for or directed to children under the age
        of 13, and we will not intentionally collect or maintain information
        about anyone under the age of 13.
   
    2.  What do we use this information for?
   
        Personal Information
   
        We may use your information to process your service requests, handle
        orders, deliver products and services, process payments, communicate
        with you about orders, provide access to secure areas of the Website,
        recommend merchandise and services that might be of interest to you, to
        personalize your visit to our Website, and to enable us to review
        develop and continually improve the products services and offers we
        provide online. We also use this information to prevent or detect fraud
        or abuses of our Website and to enable third parties to carry out
        technical, logistical or other functions on our behalf.
   
        Contact Information
   
        We use visitor information to send information about our company to
        visitors and to get in touch with them when necessary. We also use the
        information we collect to improve the content of our websites and as
        training aides for our employees. Visitors are given the choice at the
        point when we request their information.
   
        Financial Information and payment card details
   
        We may ask visitors to enter credit card or account information in order
        to process orders for services placed with Kapalya or its affiliates.
        Financial information provided via our website or via the Kapalya portal
        is transferred over a secure connection. We collect this information on
        a transaction by-transaction basis and will not authorize the release of
        the information with anyone not directly involved in processing the
        transaction. This information may be encrypted and stored for logging
        purposes in accordance with applicable regulatory requirements.
   
        Credit card numbers are used only for processing payments and are not
        used for any other purposes. When we use third party service providers
        for credit card processing services we will enter into a written
        agreement with such third party ensuring appropriate security and
        confidentiality measures are in place in safeguarding your personal
        data.
   
        We use web visit information to measure interest in and develop our web
        pages and marketing plans, customize the content you view on your web
        visits based on your activity on past visits, and administer our
        Website.
   
         * We may use the visitors’ IP address to help diagnose problems with
           our servers, and to administer our Websites.
         * We may use cookies to help us recognize visitors as unique visitors
           (just a number) when they return to our websites. For example, if
           there are 1,000 visits to our website on a certain day, we can use
           cookies to discover how many of those visits were made via the same
           browser (same visitor). We may also use the cookie to discover
           whether a certain visitor has visited our site more than once, and
           the source for each visit. We also use cookies to: allow us to tailor
           content or advertisements to match your preferred interest; avoid
           showing visitors the same advertisements repeatedly; compile
           anonymous, aggregated statistics that allow us to understand how
           users use our site and to help us improve the structure of our
           Website (we cannot identify visitors personally in this way); count
           the number of anonymous users of our sites.
         * When electing to use them, we use web beacons to count the number of
           times that our advertisements and web-based email content are viewed.
           We combine web beacon information with cookies to track activity on
           our website originating from advertisements and web-based email
           content.
         * We use information you provide to us via telephone calls, chat,
           email, web forms and other communications to correspond with you
           about services you may be interested in purchasing. If you elect to
           purchase a service online using a web form, we will use the
           information to establish your account. Information you submit in
           writing, such as chat, email, and web form information may be
           archived and may be tied to information that we collect about your
           web visits. Your telephone call may be recorded for training purposes
           and we may enter information you provide via telephone into our
           systems to use for the purposes described in this paragraph.
   
    3.  Disclosure of Personal Information
   
        Personal information we gather is for internal use only and we will not
        authorize the release of this information to anyone outside Kapalya
        (except to third party service providers to Kapalya who perform
        functions on our behalf but in such event personal information will only
        be shared to the extent reasonably necessary to perform their functions.
   
        Should you breach our terms and conditions or website terms, or if we
        are under a duty to disclose or share your personal data in order to
        comply with a legal obligation, we may disclose your information to a
        relevant authority without notification to you. This may include
        exchanging information with other companies and organizations for the
        purposes of fraud protection and credit risk reduction. In particular,
        we may release the information we collect to third parties when we
        believe it is appropriate to comply with the law, to enforce our legal
        rights, to protect the rights and safety of others, or to assist with
        industry efforts to control fraud, spam or other undesirable conduct.
   
        We may release the information we collect to third parties, where the
        information is provided to enable such third party to provide services
        to us, provided that the third party has agreed to use at least the same
        level of privacy protections described in this Privacy Policy, and is
        permitted to use the information only for the purpose of providing
        services to us.
   
    4.  Opting out of communications
   
        Kapalya provides you an opportunity to opt-out of personal data being
        disclosed to third parties (except for meeting applicable legal
        requirements, required for the provision of services, or permitting
        third party service providers who perform functions on our behalf as
        described in section 3 of this Privacy Policy), including your opting
        out of receiving future marketing mailings. We will not use your contact
        information to correspond with you about our services if you ask us not
        to. Please send your request to info@Kapalya.com. Please note that it
        may take up to ten days to remove your contact information from our
        marketing communications lists, so you may receive correspondence from
        us for a short time after you make your request.
   
    5.  Security of your information
   
        Kapalya is committed to industry best practices approaches concerning
        security measures to prevent the loss, misuse and alteration of the
        information in our possession. We use various security measures to
        protect the information we collect, as appropriate to the type of
        information, including encryption, firewalls, and access controls. We
        store information you provide to us on a computer system located in a
        controlled facility with a limited access. Visitor textual information
        is encrypted during transmission, our company databases are accessible
        only by Kapalya employees, contractors and agents on a need to know
        basis and who have entered into and are bound by a confidentiality and
        nondisclosure agreement with Kapalya.
   
    6.  Data Integrity
   
        Personal data we collect is relevant for the purposes for which it is to
        be used. Kapalya takes reasonable steps to ensure that data is reliable
        for its intended use, accurate, complete, and current.
   
    7.  Right to access your personal information
   
        If you believe that any personal information we have about you is
        incorrect, or is, has been, or might be used inappropriately, please
        contact us immediately at info@Kapalya.com, and we will take steps to
        correct or delete the information, or restrict its use, as set forth
        above upon reasonable verification of identity.
   
    8.  Verification
   
        Kapalya utilizes the self-assessment approach to assure its compliance
        with its Privacy Policy. Kapalya regularly verifies that the Privacy
        Policy is accurate, comprehensive, prominently displayed, completely
        implemented and in conformity with the Safe Harbor Principles and
        conducts its self-assessment on an annual basis to ensure that all
        relevant privacy practices are being followed. Appropriate employee
        training is in place and internal procedures for periodically conducting
        objective reviews of compliance are in place. A statement verifying this
        self-assessment is completed by a corporate officer or other authorized
        representative annually.
   
    9.  Inquiries or complaints
   
        If you have a question or complaint about this Privacy Policy or our
        information collection practices, please contact us at info@Kapalya.com.
        We will investigate the matter and are committed to resolve any
        reasonable and legitimate privacy concerns.
   
    10. Changes
   
        Our business changes constantly and our Privacy Policy may also change
        from time to time. You should check our website frequently to see recent
        changes, however, we will never materially change our policies and
        practices to make them less protective of personal information collected
        in the past without providing significant advanced and conspicuous
        warning.
   
        This Privacy Policy was last updated on May 3, 2018.
   
   
   KAPALYA ACCEPTABLE USE POLICY
   
   Updated May 3, 2018
   
   This Acceptable Use Policy (this “Policy”) describes prohibited uses of the
   services offered by Kapalya and its affiliates (the “Services”) and the
   websites located at the domains (and sub-domains) located at Kapalya.com
   (collectively the “Kapalya Sites”). The examples described in this Policy are
   not exhaustive and apply to you and any other entities you or your affiliates
   enable to utilize the services (collectively “You”). This Policy may be
   modified at any time by posting a revised version on the Kapalya Sites. By
   utilizing the Services or accessing the Kapalya Sites, following such
   modification, You agree to abide and be bound by the then-current version of
   this Policy. Should You violate the Policy, or authorize or otherwise assist
   others to do so, we may, at our sole and unlimited discretion, immediately
   suspend or terminate part or all of Your use of the Services.
   
   No Illegal, Harmful, or Offensive Use or Content
   
   You may not use or encourage, facilitate or otherwise enable others to use
   the Services or Kapalya Sites for any illegal, harmful, or offensive use, or
   to transmit, store, display, distribute or otherwise make available content
   that is illegal, harmful, or offensive. Prohibited activities or content
   include:
   
    1. Illegal Activities. Any illegal activities, including advertising,
       transmitting, or otherwise making available gambling sites or services or
       disseminating, promoting or facilitating child pornography.
    2. 
    3. Harmful or Fraudulent Activities. Activities that may be harmful to
       Kapalya’ users, operations, or reputation, including offering or
       disseminating fraudulent goods, services, schemes, or promotions (e.g.,
       phishing, make-money-fast schemes, ponzi and/or pyramid schemes, or
       pharming), or engaging in other unfair or deceptive practices.
    4. Infringing Content. Content that infringes or misappropriates the
       intellectual property or proprietary rights of others.
    5. Offensive Content. Content that is defamatory, obscene, abusive, invasive
       of privacy, or otherwise objectionable, including content that
       constitutes child pornography, relates to bestiality, or depicts
       non-consensual sex acts.
    6. Harmful Content. Content or other computer technology that may damage,
       interfere with, surreptitiously intercept, or expropriate any system,
       program, or data, including viruses, Trojan horses, worms, time bombs, or
       cancelbots.
   
   No Security Violations
   
   You may not use the Services to violate or to facilitate the violation of the
   security or integrity of any network, computer or communications system,
   software application, or network or computing device (each, a “System”).
   Prohibited activities include:
   
    1. Unauthorized Access. Accessing or using any System without permission,
       including attempting to probe, scan, or test the vulnerability of a
       System or to breach any security or authentication measures used by a
       System.
    2. Interception. Monitoring of data or traffic on a System without
       permission.
    3. Falsification of Origin. Forging TCP-IP packet headers, e-mail headers,
       or any part of a message describing its origin or route. This prohibition
       does not include the use of aliases or anonymous remailers.
   
   No Network Abuse
   
   You may not make network connections to any users, hosts, or networks without
   permission to communicate with them. Prohibited activities include:
   
    1. Monitoring or Crawling. Unauthorized monitoring or crawling of a System
       that impairs, disrupts, or otherwise improperly accesses the System being
       monitored or crawled.
    2. Denial of Service (DoS). Inundating a target with communications requests
       so the target either cannot respond to legitimate traffic or responds so
       slowly that it becomes ineffective.
    3. Intentional Interference. Interfering with the proper functioning of any
       System, including any deliberate attempt to overload a system by mail
       bombing, news bombing, broadcast attacks, or flooding techniques.
    4. Operation of Certain Network Services. Operating network services like
       open proxies, open mail relays, or open recursive domain name servers.
    5. Avoiding System Restrictions. Using manual or electronic means to avoid
       any use limitations place on a System, such as access and storage
       restrictions.
   
   No E-Mail Abuse
   
   You will not distribute, publish, send, or facilitate unsolicited mass
   e-mailings, promotions, advertising, or solicitations (e.g., “spam emails”),
   including commercial advertising and informational announcements. You will
   not alter or obscure mail headers or assume a sender’s identity without the
   sender’s explicit permission. You will not collect replies to messages sent
   from another Internet service provider if those messages violate this Policy
   or the acceptable use policy of that provider.
   
   Our Monitoring and Enforcement
   
   We reserve the right, but do not assume the obligation, to investigate any
   violation of this Policy or misuse of the Services or Kapalya Sites. We may,
   in our sole and unlimited discretion:
   
    1. Investigate violations of this Policy or misuse of the Services or
       Kapalya Sites; or remove, disable access to, or modify any content or
       resource that violates this Policy or any other agreement we have with
       You for use of the Services or the Kapalya Sites;
    2. Report any activity that we suspect violates any law or regulation to
       appropriate law enforcement officials, regulators, or other appropriate
       third parties. Our reporting may include disclosing appropriate customer
       information. We also may cooperate with appropriate law enforcement
       agencies, regulators, or other appropriate third parties to help with the
       investigation and prosecution of illegal conduct by providing network and
       systems information related to alleged violations of this Policy.
   
   Reporting of Violations of this Policy
   
   If you become aware of any violation of this Policy, you will immediately
   notify us and provide us with assistance, as requested, to stop or remedy the
   violation. To report any violation of this Policy, please inform us via email
   at info@Kapalya.com.
   
   Close
 * Terms & Conditions

OUR SERVICES

 * Cloud Key Management
 * File & Folder Encryption
 * Key Storage
 * SSL Tunnel
 * Encryption

OUR SOCIAL NETWORKS

Follow KAPALYA


Copyright © 2021 KAPALYA. All Rights Reserved
 * Home
 * About Us
 * Solution
   * Government
   * Enterprise
   * SMB
 * Who We Are
 * Press Release
 * Blog
 * Partners
 * Resources
   * Sales Sheet
   * Data Sheet
   * User Guide
 * Contact Us