www.menlosecurity.com Open in urlscan Pro
141.193.213.20  Public Scan

Submitted URL: https://pages.menlosecurity.com/MjgxLU9XVi04OTkAAAGFZ8_hHRWefUYQafEOsioYZibb-CZyP1pf-DCvWuGopOumwzNI4JUo7NAyY_8z3BZ6_sj71gM=
Effective URL: https://www.menlosecurity.com/privacy-policy/
Submission: On July 04 via api from FR — Scanned from FR

Form analysis 3 forms found in the DOM

GET https://www.menlosecurity.com/

<form action="https://www.menlosecurity.com/" class="search-form" method="get" role="search"> <label> <span class="screen-reader-text">Search for:</span> <input type="text" title="Search for:" name="s" value="" id="s" placeholder="Search …"
      class="search__field" autocomplete="off"> </label> <button type="submit" class="search__btn"> Search <i class="fas fa-search"></i> </button></form>

GET https://www.menlosecurity.com/

<form action="https://www.menlosecurity.com/" class="search-form" method="get" role="search"> <label> <span class="screen-reader-text">Search for:</span> <input type="text" title="Search for:" name="s" value="" id="s" placeholder="Search …"
      class="search__field" autocomplete="off"> </label> <button type="submit" class="search__btn"> Search <i class="fas fa-search"></i> </button></form>

POST /privacy-policy/

<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_1" id="gform_1" class="subscribe" action="/privacy-policy/" novalidate="">
  <div class="gform_body gform-body">
    <div id="gform_fields_1" class="gform_fields top_label form_sublabel_below description_below">
      <div id="field_1_1" class="gfield gfield_contains_required field_sublabel_below field_description_below hidden_label gfield_visibility_visible gfield--email gfield--large" data-field-class="gfield--email gfield--large"><label
          class="gfield_label" for="input_1_1">Email<span class="gfield_required"><span class="gfield_required gfield_required_text">(Required)</span></span></label>
        <div class="ginput_container ginput_container_email"> <input name="input_1" id="input_1_1" type="email" value="" class="large" tabindex="1" placeholder="Email" aria-required="true" aria-invalid="false"></div>
      </div>
      <div id="field_1_2" class="gfield gform_validation_container field_sublabel_below field_description_below gfield_visibility_visible gfield--honeypot gfield--" data-field-class="gfield--honeypot gfield--"><label class="gfield_label"
          for="input_1_2">Phone</label>
        <div class="ginput_container"><input name="input_2" id="input_1_2" type="text" value="" autocomplete="new-password"></div>
        <div class="gfield_description" id="gfield_description_1_2">This field is for validation purposes and should be left unchanged.</div>
      </div>
    </div>
  </div>
  <div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_1" class="gform_button button" value="Subscribe" tabindex="2"
      onclick="if(window[&quot;gf_submitting_1&quot;]){return false;}  if( !jQuery(&quot;#gform_1&quot;)[0].checkValidity || jQuery(&quot;#gform_1&quot;)[0].checkValidity()){window[&quot;gf_submitting_1&quot;]=true;}  "
      onkeypress="if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_1&quot;]){return false;} if( !jQuery(&quot;#gform_1&quot;)[0].checkValidity || jQuery(&quot;#gform_1&quot;)[0].checkValidity()){window[&quot;gf_submitting_1&quot;]=true;}  jQuery(&quot;#gform_1&quot;).trigger(&quot;submit&quot;,[true]); }">
    <input type="hidden" name="gform_ajax" value="form_id=1&amp;title=&amp;description=&amp;tabindex=1"> <input type="hidden" class="gform_hidden" name="is_submit_1" value="1"> <input type="hidden" class="gform_hidden" name="gform_submit" value="1">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value=""> <input type="hidden" class="gform_hidden" name="state_1" value="WyJbXSIsIjFlNGM1ZWU3MWRjMWEyYzRmZjZlY2YwYjIxZGNhZGQ0Il0="> <input type="hidden" class="gform_hidden"
      name="gform_target_page_number_1" id="gform_target_page_number_1" value="0"> <input type="hidden" class="gform_hidden" name="gform_source_page_number_1" id="gform_source_page_number_1" value="1"> <input type="hidden" name="gform_field_values"
      value=""></div>
</form>

Text Content

Learn how hybrid work is fueling ransomware attacks and what to do about it.

Learn more
Search for: Search

Most Searched

 * Secure Web Gateway (SWG) 101: Your primer to an isolation-based approach to
   cybersecurity
 * Hiding in plain sight: New Adwind jRAT Variant Uses normal Java commands to
   mask its behavior
 * U.S. Department of Defense (DoD) leads the industry with cloud-based internet
   isolation program
 * ISOMorph Infection: In-Depth Analysis of a New HTML Smuggling Campaign
 * Increase In Drive-by Attack: SocGholish Malware Downloads

 * Why Menlo
   Back
   Why Menlo
   
   
   WHY MENLO
   
   Traditional security approaches are flawed, costly, and overwhelming for
   security teams. Menlo Security is different. It’s the simplest, most
   definitive way to secure work—making online threats irrelevant to your users
   and your business.
   
   Why Menlo
   
   eBook
   
   The Ultimate Buyer's Guide: Secure Web Gateway
   
   MOVING TO THE CLOUD
   
    * Switch from Bluecoat
    * Switch from Forcepoint
   
   WARRANTY
   
    * Stop ransomware in its tracks

 * Products
   Back
   Products
   
   
   MEET THE CLOUD-NATIVE MENLO SECURITY PLATFORM
   
   Our platform invisibly protects users wherever they go online. So threats are
   history and the alert storm is over.
   
   Explore platform
   
   Data Sheet
   
   Cloud Security Platform powered by and Isolation Core™
   
   PRODUCTS
   
    * Products Overview
    * Secure Web Gateway
    * Remote Browser Isolation
    * Email Isolation
    * CASB
    * DLP
    * Menlo Private Access
    * Cloud Firewall
    * Isolation Security Operations Center
   
   PLATFORM
   
    * Platform Overview
   
   CUSTOMER SUCCESS
   
    * Customers
    * Customer Support
    * Training & Certification
    * Report a Vulnerability

 * Solutions
   Back
   Solutions
   
   
   NEED TO IMPLEMENT SASE, ASAP?
   
   Traditional network security wasn’t built to address today’s complex
   enterprise environments. SASE fixes that problem.
   
   Learn more
   
   Solution Brief
   
   Learn how to migrate on-premise proxy to SWG
   
   SOLUTIONS
   
    * Solutions Overview
    * Eliminate phishing & ransomware
    * Seamless ransomware prevention
    * Gain visibility & control over data loss
    * Control access to SaaS applications
    * Implement Secure Access Service Edge (SASE)
    * Secure access to private applications
    * Secure Microsoft 365 & Google Workspace
    * Secure remote work
    * Mobile malware prevention
    * Virtual network separation
    * Neutralize malicious document downloads
    * Migrate on-premise proxy to Cloud SWG
    * Zero Trust Overview
   
   INDUSTRIES
   
    * US Federal
    * Finance

 * Resources
   Back
   Resources
   
   
   THREAT INTELLIGENCE IS ON TAP AT MENLO LABS
   
   Menlo Labs provides insights, expertise, context and tools to aid customers
   on their journey to connect, communicate and collaborate securely without
   compromise. The collective is made up of elite security researchers that put
   a spotlight on the threats you know and don’t know about.
   
   Learn More
   
   Live Webinars
   
   Defining your journey to SASE.
   
   RESOURCE LIBRARY
   
    * All Resources
    * White Papers
    * Data Sheets
    * Solution Briefs
    * Case Studies / Customer Stories
    * eBooks
    * Reports
    * Videos
    * Infographics
   
   EVENTS & WEBINARS
   
    * BrightTALK Channel
   
   BLOG
   
    * Blog Home
   
   MENLO LABS
   
    * Menlo Labs
   
   DEMO
   
    * Product Demo

 * About
   Back
   About
   
   
   THREAT INTELLIGENCE IS ON TAP AT MENLO LABS
   
   Menlo Labs provides insights, expertise, context and tools to aid customers
   on their journey to connect, communicate and collaborate securely without
   compromise.
   
   Learn more
   
   COMPANY
   
    * About Us
    * Management Team
    * Board of Directors
    * Investors
    * Customers
    * Partners
    * Technology Partners
    * Contact Us
   
   NEWSROOM
   
    * News
    * Press Releases
    * Blogs
   
   CAREERS
   
    * Life at Menlo
    * Job Openings

 * Demo

EN日本語한국어
 * * Support Portal
   * Report a Vulnerability
   * Training & Certification
 * 

Search for: Search

Most Searched

 * Secure Web Gateway (SWG) 101: Your primer to an isolation-based approach to
   cybersecurity
 * Hiding in plain sight: New Adwind jRAT Variant Uses normal Java commands to
   mask its behavior
 * U.S. Department of Defense (DoD) leads the industry with cloud-based internet
   isolation program
 * ISOMorph Infection: In-Depth Analysis of a New HTML Smuggling Campaign
 * Increase In Drive-by Attack: SocGholish Malware Downloads


PRIVACY POLICY

Effective Date: May 18, 2021
 
 

Menlo Security, Inc., together with its affiliates (“Menlo Security”, “we”,
“our” or “us”), is committed to transparency in our collection and processing of
information.  This Privacy Policy describes how we collect, use, disclose and
protect information from and about you through our website www.menlosecurity.com
and any other website or mobile application that links to this Privacy Policy
(the “Site”), and any other interactions (e.g., customer service and other
communications) that you may have with Menlo Security (collectively, the
“Services”).PLEASE READ THIS PRIVACY POLICY CAREFULLY TO UNDERSTAND HOW WE
HANDLE YOUR INFORMATION. IF YOU DO NOT AGREE TO THIS PRIVACY POLICY, PLEASE DO
NOT USE THE SERVICES.

SCOPE OF THIS PRIVACY POLICY

For purposes of this Privacy Policy:

 * A “Customer” means an entity that has contracted with Menlo Security (such as
   through an applicable services agreement) to access our products, solutions
   or platforms (the “Menlo Security Technology”).
 * A “User” means an individual who accesses the Menlo Security Technology as or
   on behalf of a Customer, including Customer personnel.
 * A “Site Visitor” means an individual who visits our Site outside of the
   context of our Customers’ use of the Solutions.
 * A “Customer End User” means an individual whose information Menlo Security
   receives from Customer, or otherwise processes on Customer’s behalf, in
   connection with the Solutions provided by Menlo Security to Customer pursuant
   to an applicable services agreement.

This Privacy Policy applies to our handling of information about Site Visitors,
prospective Customers, and current Customers and Users (in relation to their
procurement of the Menlo Security Technology and management of their
relationship with Menlo Security).  We refer collectively to these categories of
individuals as “you” throughout this Privacy Policy.

However, this Privacy Policy does not cover information about Customer End Users
that Menlo Security receives from Customer, or otherwise processes on Customer’s
behalf, in connection with the Solutions provided by Menlo Security to Customer
pursuant to an applicable services agreement (including the content of messages,
files and attachments of Customer End Users (“End User Communications”)). Menlo
Security processes End User Communications and other information of Customer End
Users under the instructions of the relevant Customer as the “data controller”
or similar role as defined in applicable privacy laws, as described in the
applicable services agreement entered into by such Customer and Menlo Security. 
Menlo Security’s obligations as a “data processor” or “service provider” with
respect to such information are defined in such services agreement, and are not
made part of this Privacy Policy.

If you are a Customer End User and you have questions about how your information
is collected and processed through the Solutions, please contact the Customer
who has provided your information to us for more information.

THE INFORMATION WE COLLECT

We collect, store and use certain information from or about you for the purposes
described below.

 1.  INFORMATION YOU PROVIDE TO US

We collect a variety of information that you provide directly to us. For
example, we collect information from you through:

 * * When you register for an account with us
   * Your use of the Services
   * Requests or questions you submit to us via online forms, email, or
     otherwise
   * When we reach out to you by phone or email in our sales and marketing
     efforts
   * Your participation in surveys, sweepstakes, or contests
   * When you communicate with our customer service teams via email, phone, or
     chat
   * When you attend our conferences or events or interact with us at other
     conferences or events
   * When you use a blog or forum made available through the Services

The types of data we collect directly from you include:

 * * First and last name
   * Email address
   * Postal address
   * Telephone number
   * Your company or organization name
   * Your title
   * Any other information you choose to directly provide to us in connection
     with your use of the Services

We may also collect and store any data and related output created, derived or
generated by you through the use of the Services, as well as your Services
usage, and your usage of the Menlo Security Technology.

 2. INFORMATION WE COLLECT THROUGH AUTOMATED MEANS

When you use our Services, we and our service providers (who are third parties
that perform services on our behalf) automatically collect certain information
about your device and how you use the Services, including your IP address,
browser type, browser language, operating system, the state or country from
which you accessed the Services, software and hardware attributes (including
device IDs), referring and exit pages and URLs, platform type, the number of
clicks, files you download, domain names, landing pages, pages viewed and the
order of those pages, the amount of time spent on particular pages, the date and
time you used the Services, error logs, and other similar information. From your
IP address, we may be able to infer your general location (e.g., city/state or
postal code).

To collect this information, we and our service providers may also make use of
“cookies” or similar tools that track, measure, and analyze the behaviors and
usage patterns of our users. Cookies are small data files that can be stored on
your browser and device so we can recognize you when you return. We use cookies
for analytics purposes, to deliver certain features of the Services, to help us
understand how users engage with the Services, and to improve your experience.
You may set your web browser to notify you when you receive a cookie and to
accept or refuse certain cookies. However, if you elect not to accept cookies,
some functionality and areas of the Services may be restricted. To learn how to
manage your cookies, please follow the instructions from your specific browser,
or if accessing the Services via a mobile device, refer to the manufacturer’s
instructions.

For more details, please refer to the Menlo Security Cookie Policy.

 3. INFORMATION WE COLLECT FROM OTHERS

From time to time, we may collect information about you from other sources,
including marketing vendors, survey providers, data enhancement services, social
media, conferences, and other industry events or other purposes that we explain
to you at the time of collection, to the extent permitted by applicable law.  We
use this information to supplement the information that we collect directly from
you in order to derive your possible interests and provide more relevant
experiences for you and improve our Services, analytics, and advertising.

When you “like” or “follow” us on Facebook, LinkedIn, Twitter or other social
media sites, we may collect some information from you including your name, email
address, and any comments or content you post relevant to us.

HOW WE USE YOUR INFORMATION

We use your information for various purposes depending on the types of
information we have collected from and about you, in order to:

 * * Provide you with access to and to administer our Services
   * Respond to your requests for information and provide you with more
     effective and efficient customer service
   * Contact you by email, postal mail, or phone with news, updates,
     information, promotions, surveys or contests relating to the Menlo Security
     Technology or our Services or other services that may be of interest to
     you, in accordance with applicable legal requirements related to such
     communications (note you may update your may update your Menlo Security
     email subscriptions on the Menlo Security Subscription Center)
   * Customize the content you see on our Services
   * Engage in analysis and research regarding use of the Site and the Services,
     and improve the Menlo Security Technology and our Services
   * Secure our Services and resolve technical issues being reported
   * Comply with any procedures, laws, and regulations which apply to us where
     it is necessary for our legitimate interests or the legitimate interests of
     others
   * Establish, exercise, or defend our legal rights where it is necessary for
     our legitimate interests or the legitimate interests of others

Aggregate/De-Identified Information. We may aggregate and/or de-identify any
information collected through our Services so that such information can no
longer be linked to you or your device (“Aggregate/De-Identified Information”).
We may use such information for any purpose, including without limitation for
research and marketing purposes, and may also share such data with any third
parties, including advertisers, partners, and sponsors.

LEGAL BASES FOR USE OF YOUR INFORMATION

The legal bases for using your information as set out in this Privacy Policy are
as follows:

 * * Where we need to perform the contract we are about to enter into or have
     entered into with you for the Services
   * Where it is necessary for our legitimate interests (or those of a third
     party) and your interests and fundamental rights do not override those
     interests
   * Where we need to comply with a legal or regulatory obligation in the EU
   * Where we have your consent to process your information in a certain way

ONLINE ANALYTICS AND ADVERTISING

ANALYTICS. We may use third-party web analytics services (such as those of
Google Analytics) on our Services to collect and analyze usage information
through cookies and similar tools; engage in auditing, research, or reporting;
assist with fraud prevention; and provide certain features to you. To prevent
Google Analytics from using your information for analytics, you may install the
Google Analytics Opt-out Browser Add-on by clicking here.  If you receive email
from us, we may use certain analytics tools, such as clear GIFs to capture data
such as when you open our message or click on any links or banners our email
contains. This data allows us to gauge the effectiveness of our communications
and marketing campaigns.

ONLINE ADVERTISING. In using the Services, we allow select third party
advertising technology partners to place cookies or other tracking technologies
on the browser of your device to collect information about you as discussed
above. These third parties (e.g., ad networks and ad servers such as Google,
Facebook, and others) may use this information to serve relevant content and
advertising to you as you browse the Internet, and access their own cookies or
other tracking technologies on your browser to assist in this activity. If you
are interested in more information about these online advertising activities,
and how you can generally control cookies from being put on your computer to
deliver tailored advertising, you may visit the Network Advertising Initiative’s
Consumer Opt-Out link, the Digital Advertising Alliance’s Consumer Opt-Out link,
or Your Online Choices to opt-out of receiving tailored advertising from
companies that participate in those programs. We do not control these opt-out
links or whether any particular company chooses to participate in these opt-out
programs. We are not responsible for any choices you make using these mechanisms
or the continued availability or accuracy of these mechanisms. Please note that
if you use these mechanisms, you may still see advertising on our Services or
across the Internet, but it will not be tailored to you based on your online
behavior over time.

Do Not Track (“DNT”) is a privacy preference that users can set in certain web
browsers. We are committed to providing you with meaningful choices about the
information collected on our Services for third party purposes, and that is why
we provide the variety of opt-out mechanisms listed above. However, we do not
currently recognize or respond to browser-initiated DNT signals.

HOW WE SHARE AND DISCLOSE YOUR INFORMATION

We will share your information in the following ways:

 * * Service Providers. We provide access to or share your information with
     select third parties who help us deliver or improve our Services or perform
     services on our behalf, including billing and credit card verification,
     advertising and marketing, Services content and features, analytics,
     research, customer service, shipping and fulfillment, data storage,
     security, web hosting, fraud prevention, and legal services.
   * Affiliates and Subsidiaries. We may share the information we collect within
     the Menlo Security family of companies.
   * Your Company. If you are a User, we may provide your information to the
     company you are engaged or employed by in order to fulfill and enforce our
     services agreement with your company, and to inform your company regarding
     usage, support, or training needs.
   * Testimonials. We may display personal testimonials and endorsements of
     satisfied customers on the Services, and with your consent, will associate
     your name or your company’s name with such postings.
   * Protection of Menlo Security and Others. By using the Services, you
     acknowledge and agree that we may access, retain, and disclose the
     information we collect and maintain about you if required to do so by
     applicable law or in a good faith belief that such access, retention or
     disclosure is reasonably necessary to: (a) comply with legal process (e.g.
     a subpoena or court order); (b) enforce any contracts with you, including
     our End User License Agreement; (c) respond to claims that any content
     violates the rights of third parties; and/or (d) protect the rights,
     property or personal safety of Menlo Security, its agents and affiliates,
     its users and/or the public.
   * Business Transactions. In accordance with applicable legal obligations,
     your information may be provided to third parties in connection with a
     merger or acquisition (including transfers made as part of insolvency or
     bankruptcy proceedings) involving all or part of Menlo Security or our
     assets, or as part of a corporate reorganization or stock sale or other
     change in corporate control or fundamental business change, including for
     the purpose of determining whether to proceed or continue with such
     transaction or business relationship.
   * Aggregate/De-Identified Information. From time to time, we may share
     Aggregate/De-identified Information about use of the Services or our user
     base with partners and others, but such information will not identify you
     personally.
   * Otherwise with Your Consent or at Your Direction. In addition to the
     sharing described in this Privacy Policy, we may share information about
     you with third parties whenever you consent to or direct such sharing.

RETENTION OF YOUR INFORMATION

We keep your information for no longer than necessary for the purposes for which
it is processed. The length of time for which we retain information depends on
the purposes for which we collected and use it and/or as required to comply with
applicable laws.

YOUR RIGHTS AND YOUR CHOICES

You have certain rights with respect to your information as further described in
this section.

1.  YOUR LEGAL RIGHTS

If you would like further information in relation to your legal rights under
applicable law or would like to exercise any of them, please contact us using
the information in the “Contact Information” section below at any time. Your
local laws (e.g., if you are a citizen or resident of the European Economic Area
or California) may permit you to request that we:

 * * provide access to and/or a copy of certain information we hold about you
   * update information which is out of date or incorrect
   * delete certain information that we are holding about you
   * restrict the way that we process and disclose certain of your information

They may also permit you to revoke your consent for the processing of your
information.

We will consider all requests and provide our response within the time period
stated by applicable law and as otherwise required by applicable law. Please
note, however, that certain information may be exempt from such requests in some
circumstances, which may include if we need to keep processing your information
for our legitimate interests or to comply with a legal obligation. We may
request you provide us with information necessary to confirm your identity
before responding to your request. To submit a request, please contact us at
legal@menlosecurity.com.

If you are a Customer End User and your information has been collected by Menlo
Security as a result of our Customer’s use of the Menlo Security Technology
pursuant to a services agreement between Customer and Menlo Security, Menlo
Security collects and processes any information of yours under the directions of
the relevant Customer. If these circumstances apply to you and you wish to
access, edit, delete or exercise any rights you may have under applicable data
protection laws with respect to any information that we have collected about
you, please direct your query to the relevant Customer, as this may expedite the
completion of your request. We nevertheless provide reasonable assistance to our
Customers to give effect to data subject rights as appropriate and required by
applicable laws. Please note that End User Communications are collected only
temporarily by the Menlo Security Technology and the content does not persist in
our systems.

2. MARKETING COMMUNICATIONS

If, in accordance with applicable legal requirements, we send you marketing
communications regarding our Services, The Menlo Security Technology, or the
services of third parties that we believe will be interesting to you, you can
ask us to stop sending such communications at any time by contacting us using
the information in the “Contact Information” section below at any time. In our
marketing email messages, you can also opt out by following the instructions
located at the bottom of such emails. Please note that, regardless of your
request, we may still use and share certain information as permitted by this
Privacy Policy or as required by applicable law. For example, you may not opt
out of certain transactional emails from us, such as those confirming your
requests or providing you with updates regarding our Privacy Policy or other
terms.

THIRD PARTY LINKS AND FEATURES

 * Our Services may contain links to third-party websites.  If you choose to
   visit these sites and use their services, please note that we are not
   responsible for their content or privacy practices. The collection, use, and
   disclosure of your information will be subject to the privacy policies of the
   third-party websites, and not this Privacy Policy. We urge you to read the
   privacy policies of these third parties.

INTERNATIONAL USERS

 * Your information is maintained and processed by us and our third-party
   service providers in the United States, and may also be maintained,
   processed, and stored in other jurisdictions that may have different data
   protection laws than those in your country of residence. In the event that
   your information is transferred in these ways, please note that we comply
   with applicable legal requirements governing the transfer of information
   across borders. By using the Services, you agree to and acknowledge these
   transfers.

HOW WE PROTECT YOUR INFORMATION

 * Menlo Security takes a variety of technical and organizational security
   measures to protect the information provided to us from loss, misuse, and
   unauthorized access, disclosure, alteration, or destruction. However, no
   Internet or email transmission is ever fully secure or error free. Please
   keep this in mind when disclosing any information to us online.

PRIVACY INFORMATION FOR CALIFORNIA USERS

 * If you are a California resident, California law requires us to provide you
   with some additional information regarding how we collect, use, and share
   your “personal information” (as defined in the California Consumer Privacy
   Act (“CCPA”)).

Categories of Personal Information We Collect and How We Use Them. Throughout
this Privacy Policy, we discuss in detail the specific pieces of personal
information we collect from and about our users. Under the CCPA, we are also
required to provide you with the “categories” of personal information we collect
and how we use each category of personal information. The categories we collect
are:

 

 Category of Personal InformationHow We Use this Personal InformationContact
Information (such as your full name, phone number, address, email address)
 * * Provide the services and respond to your requests
   * Contact you with relevant information and offers
   * Customize content, and analyze use of and improve the services
   * Comply with law or defend our legal rights
   * Security/fraud prevention
   * Create aggregate/de-identified information

Login Information (such as your account name and password)
 * * Provide the services and respond to your requests
   * Comply with law or defend our legal rights
   * Security/fraud prevention
   * Create aggregate/de-identified information

Professional or Employment Information (such as the name and address of the
company you work for and your title)
 * * Provide the services and respond to your requests
   * Contact you with relevant information and offers
   * Customize content, and analyze use of and improve the services
   * Comply with law or defend our legal rights
   * Security/fraud prevention
   * Create aggregate/de-identified information

Device and Online Information (such as mobile device content, IP address,
browsing history, and usage information)
 * * Provide the services and respond to your requests
   * Contact you with relevant information and offers
   * Customize content, and analyze use of and improve the services
   * Comply with law or defend our legal rights
   * Security/fraud prevention
   * Create aggregate/de-identified information

Other information (any other information you choose to provide directly to us)
 * * Provide the services and respond to your requests
   * Contact you with relevant information and offers
   * Customize content, and analyze use of and improve the services
   * Comply with law or defend our legal rights
   * Security/fraud prevention
   * Create aggregate/de-identified information

 

Do Not Sell Rights. Please note that the CCPA sets forth certain obligations for
businesses that “sell” personal information to third parties. We do not engage
in such activity and have not engaged in such activity in the past twelve months
from the Effective Date of this Privacy Policy.

B. Your California Privacy Rights. The CCPA allows you to make certain requests
about your personal information. Specifically, the CCPA allows you to request us
to:

Inform you about the categories of personal information we collect or disclose
about you; the categories of sources of such information; the business or
commercial purpose for collecting your personal information; and the categories
of third parties with whom we share/disclose personal information.

Provide access to and/or a copy of certain personal information we hold about
you.

Delete certain personal information we have about you.

Provide you with information about the financial incentives that we offer to
you, if any.

The CCPA further provides you with the right not to be discriminated against (as
provided for in applicable law) for exercising your rights. Please note that
certain information may be exempt from such requests under California law. For
example, we need certain information in order to provide the Service to you. We
also will take reasonable steps to verify your identity before responding to a
request. In doing so, we may ask you for verification information so that we can
match at least two verification points with information we maintain in our files
about you. If we are unable to verify you through this method, we shall have the
right, but not the obligation, to request additional information from you.

If you would like further information regarding your legal rights under
California law or would like to exercise any of them, or if you are an
authorized agent making a request on a California consumer’s behalf, please
contact us using the contact information provided below. If you are a Customer
End User, please contact the Customer who has provided your information to us
for more information.

Shine the Light Disclosure:  The California “Shine the Light” law gives
residents of California the right under certain circumstances to request
information from us regarding the manner in which we share certain categories of
personal information (as defined in the Shine the Light law) with third parties
for their direct marketing purposes. We do not share your personal information
with third parties for their own direct marketing purposes.

NOTICE TO NEVADA RESIDENTS

Certain Nevada consumers may opt out of the sale of “personally identifiable
information” for monetary consideration (as such terms are defined under Nevada
law) to a person for that person to license or sell such information to
additional persons.  We do not engage in such activity; however, if you are a
Nevada resident who has purchased goods or services from us, you may submit a
request to opt out of any potential future sales under Nevada law by contacting
us using the methods outlined in the “Contact Information” section.  Please note
we may take reasonable steps to verify your identity and the authenticity of the
request.  Once verified, we will maintain your request in the event our
practices change.

CHANGES TO OUR PRIVACY POLICY

We reserve the right to amend this Privacy Policy at any time to reflect changes
in the law, our data collection and use practices, or advances in technology. We
will make the revised Privacy Policy accessible on the Services, so you should
review the Privacy Policy periodically. You can know if the Privacy Policy has
changed since the last time you reviewed it by checking the “Effective Date”
included at the beginning of the document. If we make a material change to the
Privacy Policy, you will be provided with appropriate notice in accordance with
legal requirements. By continuing to use the Services, you are confirming that
you have read and understood the latest version of this Privacy Policy.

CONTACT INFORMATION

Menlo Security welcomes your comments and questions regarding this Privacy
Policy and the collection and use of your information. If you have questions or
concerns, please email us at legal@menlosecurity.com or write to: Legal
Department, Menlo Security, Inc., 800 W. El Camino Real, Ste. 250, Mountain
View, CA 94040.


GET THREAT INTELLIGENCE INSIGHTS FROM MENLO.

Email(Required)

Phone

This field is for validation purposes and should be left unchanged.


By clicking the subscribe button, you are agreeing to our privacy policy.

POPULAR RESOURCES

 * Why Menlo
 * Menlo Security Platform
 * Products
 * Solutions
 * Menlo Labs
 * Resources
 * Blog

COMPANY

 * About Us
 * Leadership
 * Customers
 * Technology Partners
 * Life at Menlo
 * Careers
 * Contact

SUPPORT

 * Support Portal
 * Report a Vulnerability
 * Training & Certification

© 2022 Menlo Security. All rights reserved.

 * Privacy Policy
 * Compliance
 * EULA
 * ask@menlosecurity.com
 * (650) 695-0695

 * 
 * 
 * 
 * 

EN日本語한국어

Notifications





By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts.

Accept All Cookies

Cookies Settings


PRIVACY PREFERENCE CENTER




 * YOUR PRIVACY


 * FUNCTIONAL COOKIES


 * PERFORMANCE COOKIES


 * TARGETING COOKIES


 * STRICTLY NECESSARY COOKIES

YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

PERFORMANCE COOKIES

Performance Cookies


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

Back Button


BACK

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Confirm My Choices
Allow All