www.entrust.com Open in urlscan Pro
2606:4700::6812:fd6  Public Scan

Submitted URL: https://www.entrust.com/legal-compliance/privacy/privacy-statement?utm_campaign=23Q3_HYT_Global_Cloud%20Control%20Swift_...
Effective URL: https://www.entrust.com/legal-compliance/data-privacy/privacy-statement?utm_campaign=23Q3_HYT_Global_Cloud+Control+Swift...
Submission: On December 08 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

/search

<form _lpchecked="1" action="/search">
  <div class="search">
    <label for="main-search-field" class="sr-only">Search:</label>
    <input name="searchTerm" class="mega-control" type="text" placeholder="Search" aria-label="Search" id="main-search-field">
  </div>
  <button href="#" class="" type="submit">
    <img alt="Submit search query" data-src="/images/search-solid.svg" class="lazyload">
  </button>
</form>

POST

<form id="fileUploadForm" enctype="multipart/form-data" method="post" target="fileUploadIframe"><input type="file" id="fileSelector" name="file" style="display: none;"><input name="filename" type="hidden"></form>

Text Content

Skip to main content
 * 
 * Solutions
 * Products
 * Partners
 * Support & Services
 * Resources
 * About
 * 
 * 
 * Contact Sales
   * Contact an Expert
   * Get Support
   * 
   * 


 * * Solutions
     * Strong Identities
       1. Identity Verification
          Enable high assurance identities that empower citizens.
       2. ID Issuance
          Issue safe, secure digital and physical IDs in high volumes or
          instantly.
       3. User Identity
          Elevate trust by protecting identities with a broad range of
          authenticators.
       4. Machine Identity
          Issue and manage strong machine identities to enable secure IoT and
          digital transformation.
       5. Digital Signature
          Use secure, verifiable signatures and seals for digital documents.
     * Secure Payments
       1. Financial Issuance
          Issue digital and physical financial identities and credentials
          instantly or at scale.
       2. Digital Card Solution
          Issue digital payment credentials directly to cardholders from your
          bank's mobile app.
     * Digital Infrastructure
       1. Database Security
          Secure databases with encryption, key management, and strong policy
          and access control.
       2. Multi-cloud Security
          Keys, data, and workload protection and compliance across hybrid and
          multi-cloud environments.
   * Industry
     * 1. Financial
          
       2. Government
          
       3. Education
          
     * 1. Enterprise
          
       2. Healthcare
          
       3. Retail
          
   * Compliance
     * 1. PSD2
          
       2. HIPAA
          
       3. GDPR
          
       4. SWIFT
          
     * 1. CMMC
          
       2. eIDAS
          
       3. NITES
          
 * * Featured Products
     * As a Service Products
       1. Identity Verification as a Service
          Citizen verification for immigration, border management, or eGov
          service delivery.
       2. Identity as a Service (IDaaS)
          Cloud-based Identity and Access Management solution.
       3. Digital Signing as a Service
          Cloud-based digital signing solutions.
       4. Instant ID as a Service
          Issue physical and mobile IDs with one secure platform.
     * 1. Digital Card Solution
          Instantly provision digital payment credentials directly to
          cardholder’s mobile wallet.
       2. PKI as a Service
          A highly secure PKI that’s quick to deploy, scales on-demand, and runs
          where you do business.
       3. nShield as a Service
          Subscription-based access to dedicated nShield HSMs for cloud-based
          cryptographic services.
       4. Seamless Travel as a Service
          Remote identity verification, digital travel credentials, and
          touchless border processes.
     * 1. Instant Financial Issuance
          In-branch and self-service kiosk issuance of debit and credit cards.
       2. Central Financial Issuance
          High volume financial card issuance with delivery and insertion
          options.
       3. Instant ID Issuance
          Secure issuance of employee badges, student IDs, membership cards and
          more.
       4. Central ID Issuance
          Passports, national IDs and driver licenses.
       5. nShield HSMs
          Securely generate encryption and signing keys, create digital
          signatures, encrypting data and more.
     * 1. Cloud Security, Encryption and Key Management
          Powerful encryption, policy, and access control for virtual and
          public, private, and hybrid cloud environments.
       2. Digital Certificates
          TLS/SSL, digital signing, and qualified certificates plus services and
          tools for certificate lifecycle management.
       3. Identity and Access Management (IAM)
          One Identity portfolio for all your users — workforce, consumers, and
          citizens.
       4. Machine Identity Management
          Centralized visibility, control, and management of machine identities.
       5. Post-Quantum
          Learn what steps to take to migrate to quantum-resistant cryptography.
   * Enterprise ID & Issuance
     * Instant ID as a Service
       Issue physical and mobile IDs with one secure platform.
       Learn More
     * Instant Issuance
       1. Sigma Direct-to-Card System
          
       2. Artista Retransfer System
          
       3. System Software
          Personalization, encoding and activation.
       4. Supplies
          
       5. Services
          
   * Financial ID & Issuance
     * Digital Card Solution
       Instantly provision digital payment credentials directly to cardholder’s
       mobile wallet.
       Learn More
     * Digital Banking
       1. Digital Account Opening
          
       2. Digital Card Solution
          
     * Instant Issuance
       1. Sigma Direct-to-Card System
          
       2. Artista Retransfer System
          
       3. System Software
          Personalization, encoding and activation.
       4. Supplies
          
       5. Services
          
     * Central Issuance
       1. Card Issuance Systems
          
       2. Inline Card Delivery Systems
          
       3. Inline Envelope Insertion Systems
          
       4. Standalone Card Affixing/Envelope Insertion Systems
          
       5. Standalone Envelope Insertion Systems
          
       6. System Software
          Personalization, encoding, delivery and analytics.
       7. Supplies
          
       8. Services
          
   * Government ID & Issuance
     * Digital Citizen
       1. eGovernment service delivery
       2. Identity Verification as a Service
          
       3. Seamless Travel as a Service
          
       4. ePassport as a Service
          
     * Central Issuance
       1. Passports, national IDs and driver licenses.
       2. Passport Issuance Systems
          
       3. National ID and Driver License Systems
          
       4. Inline Delivery & Insertion
          
       5. Standalone Delivery & Insertion
          
       6. System Software
          ID Personalization, encoding and delivery.
       7. Supplies
          
       8. Services
          
     * Instant Issuance
       1. Other citizen IDs and licenses.
       2. Sigma Direct-to-Card System
          
       3. Artista Retransfer System
          
       4. System Software
          Personalization, encoding, delivery and analytics.
       5. Supplies
          
       6. Services
          
     * Identity Verification as a Service
       Our IDVaaS solution allows remote verification of an individual’s claimed
       identity for immigration, border management, or digital services
       delivery.
       Learn More
   * Cloud Security Posture Management
     * 1. CloudControl Enterprise for AWS
          Secure and ensure compliance for AWS configurations across multiple
          accounts, regions and availability zones.
       2. CloudControl Enterprise for Containers
          Security compliance and environmental hardening solution for contains
          and Kubernetes using VMware Tanzu and RedHat OpenShift platforms.
       3. CloudControl Enterprise for vSphere and NSX
          Comprehensive compliance, multi-factor authentication, secondary
          approval, RBAC for VMware vSphere NSX-T and VCF.
       4. CloudControl Foundation for vSphere
          Comprehensive compliance for VMware vSphere, NSX-T and SDDC and
          associated workload and management domains
     * CloudControl 30-Day Free Trial
       Entrust CloudControl offers comprehensive security and automated
       compliance across virtualization, public cloud, and container platforms
       while increasing visibility and decreasing risks that can lead to
       unintended downtime or security exposure.
       Start Free Trial
   * Key Management and Encryption
     * 1. KeyControl for KMIP and Secrets
          Manage all your secrets and encryption keys, including how often you
          rotate and share them, securely at scale.
       2. KeyControl BYOK
          Create and manage encryption keys on premises and in the cloud. Manage
          your key lifecycle while keeping control of your cryptographic keys.
       3. KeyControl for Database Encryption
          Integrates with your database for secure lifecycle management of your
          TDE encryption keys.
       4. KeyControl for Backup and Recovery
          Integrates with your backup and recovery solution for secure lifecycle
          management of your encryption keys.
     * 1. DataControl for Azure
          Data encryption, multi-cloud key management, and workload security for
          Azure.
       2. DataControl for AWS
          Data encryption, multi-cloud key management, and workload security for
          AWS.
       3. DataControl for IBM Cloud
          Data encryption, multi-cloud key management, and workload security for
          IBM Cloud.
     * KeyControl 30-Day Free Trial
       VMware vSphere and vSAN encryption require an external key manager, and
       KeyControl is VMware Ready certified and recommended. KeyControl enables
       enterprises to easily manage all their encryption keys at scale,
       including how often keys are rotated, and how they are shared securely.
       Start Free Trial
   * Hardware Security Modules (HSM)
     * nShield as a Service
       1. Subscription-based access to dedicated nShield Cloud HSMs.
     * nShield HSMs
       1. nShield Connect
          Networked appliances that deliver cryptographic key services to
          distributed applications.
       2. nShield Solo
          PCI-Express card-based HSMs.
       3. nShield Edge
          Personal, USB-connected desktop HSMs.
     * Management and Monitoring
       1. nShield Monitor
          
       2. nShield Remote Administration
          
     * CodeSafe
       1. SDK for securing sensitive code within a FIPS 140-2 Level 3 certified
          nShield HSM.
       2. Post-Quantum SDK
          
     * Software Option Packs
       1. Web Services
          
       2. Container Deployment
          
       3. Database Security
          
       4. Signature Activation Module
          
       5. Cloud Integration (BYOK)
          
       6. Double Key Encryption for Microsoft
          
       7. Time Stamping
          
     * Compliance and Certification
       1. FIPS 140-2/140-3
          
       2. Common Criteria
          
       3. eIDAS
          
       4. NIST 800-53
          
       5. GDPR
          
       6. PSD2
          
       7. HIPAA
          
       8. PCI-DSS
          
       9. NITES
          
     * Why you need an HSM
       1. Learn about all the details related to what hardware security modules
          offer you in security and cost savings...
       2. Learn More
          
     * Use Cases
       1. eIDAS QSCD
          
       2. PKI and Credentialing
          
       3. Data Security and Encryption
          
       4. Cloud Security
          
       5. Payments
          
       6. View All Use Cases
          
   * TLS/SSL Certificates
     * BUY NOW
       1. Buy Certificates
          
       2. Renew Certificates
          
     * TLS/SSL Certificates
       1. Buy Now
          
       2. Standard OV
          
       3. Advantage OV
          
       4. Multi-Domain OV
          
       5. Multi-Domain EV
          
       6. Wildcard OV
          
       7. Private
          
     * Qualified Certificates
       1. Request a Quote
          
       2. QWAC eIDAS Certificates
          
       3. QWAC PSD2 Certificates
          
     * Sales and Services
       1. Platinum Services
          
       2. Entrust Certificate Services
          
       3. Subscription Plans
          
       4. Knowledge Base and Support
          
   * Identity and Access Management (IAM)
     * Products
       1. Identity as a Service
          Cloud-Based IAM
       2. Identity Enterprise
          On-prem IAM
       3. Identity Essentials
          On-prem MFA solution for Windows users
       4. APIs and SDKs
          
     * Integrations
     * Testimonials
     * Workforce
       1. Single Sign-On
          
       2. Adaptive Authentication
          
       3. Multi-Factor Authentication (MFA)
          
       4. Passwordless
          
       5. Network and VPN Access Control
          
       6. Self-Service Password Reset
          
       7. PIV-Compliant Government Mobility
          
       8. View All
          
     * Consumer and Citizen
       1. Identity Orchestration and Management
          
       2. Digital Onboarding
          
       3. Adaptive Authentication
          
       4. Multi-Factor Authentication (MFA)
          
       5. Passwordless
          
       6. API Protection and Role-Based Access Control
          
       7. Single Sign-On
          
     * Get Entrust Identity as a Service Free for 60 Days
       Explore the Identity as a Service platform that gives you access to
       best-in-class MFA, SSO, adaptive risk-based authentication, and a
       multitude of advanced features that not only keep users secure, but also
       contribute to an optimal experience.
       Start Free Trial
   * Electronic and Digital Signing
     * EU Qualified Trust Services
       In addition to our long-standing Adobe Approved Trust List (AATL)
       membership, we are a European Qualified Trust Service Provider for the
       issuance of eIDAS qualified certificates for qualified signatures and
       advanced seals, for PSD2 certificates and for QWACs
       Learn More
     * Cloud-Based Signing Portal
       1. Signhost is a high-assurance, identity-verified electronic signature
          service.
       2. Get Started for Free
          
     * 1. Signhost
          
       2. ID Proof
          
       3. ID Connect
          
     * Digital Signing as a Service
       1. Signing Automation Service
          
       2. Remote Signing Service
          
       3. Partners and Integrations
          
     * Digital Signing Certificates
       1. Buy Now
          
       2. Document Signing
          
       3. PSD2 Qualified Certificates
          
       4. Secure Email (S/MIME)
          
       5. Code Signing
          
     * Digital Signing Infrastructure
       1. Remote Signing Engine
          
       2. Signing Automation Engine
          
       3. Timestamping Authority
          
       4. Signature Activation Module
          
   * Public Trust Certificates
     * Verified Mark Certificates (VMCs) for BIMI
       Show your official logo on email communications. Download our white paper
       to learn all you need to know about VMCs and the BIMI standard.
       Learn More
     * Buy and Renew TLS/SSL Certificates
       1. Buy Certificates
          
       2. Renew Certificates
          
     * Signing Certificates
       1. Document Signing
          
       2. Secure Email (S/MIME)
          
       3. Code Signing
          
     * Qualified Certificates
       1. PSD2 Qualified Electronic Seal Certificates
          
     * Sales and Services
       1. Platinum Services
          
       2. Entrust Certificate Services
          
       3. Subscription Plans
          
       4. Knowledge Base and Support
          
   * Public Key Infrastructure (PKI)
     * PKI as a Service
       1. Use Cases
          
       2. Post-Quantum PKIaaS
          
     * PKI Products
       1. Certificate Authority
          
       2. Entelligence Security Provider
          
       3. ePassport
          
       4. Validation Authority
          
       5. Key Recovery Server
          
     * Managed Services
       1. Entrust Managed PKI
          
       2. Managed Offline Root CA
          
       3. Managed Microsoft PKI
          
       4. nShield HSM as a Service
          
     * Certificate Lifecycle Management
       1. Certificate Hub
          
       2. Certificate Enrollment Gateway
          
       3. CA Gateway
          
     * Cryptographic Center of Excellence
       1. PKI Health Check
          
       2. Cryptographic Health Check
          
     * Try Post-Quantum PKI as a Service Now
       Get PQ Ready. PKIaaS PQ provides customers with composite and pure
       quantum Certificate Authority hierarchies.
       Try Now
   * Internet of Things (IoT) Security
     * Credentialing and Provisioning
       1. IoT Security
          
       2. PKI as a Service
          
       3. Code Signing
          
     * Machine Identity Management
       1. Certificate Hub
          
       2. Key Management
          
       3. Certificate Enrollment Gateway
          
       4. CA Gateway
          
     * Global PKI IoT Trends Study
       Find out how organizations are using PKI and if they’re prepared for the
       possibilities of a more secure, connected world.
       Learn More
   * Machine Identity Management
     * Lifecycle Management
       1. Certificate Hub
          
       2. Key Management
          
       3. Certificate Enrollment Gateway
          
       4. CA Gateway
          
     * Credentialing and Provisioning
       1. IoT Security
          
       2. PKI as a Service
          
       3. Code Signing
          
     * The State of Machine Identity Management
       A recent survey by IDG uncovered the complexities around machine
       identities and the capabilities that IT leaders are seeking from a
       management solution.
       Get the White Paper
   * Post-Quantum
     * Issuance and Provisioning
       1. PKI as a Service PQ
          
       2. PQ Standards and Research
          
     * Cryptographic Center of Excellence
       1. Crypto Health Check
          
       2. PKI Health Check
          
     * Prepare for a Post-Quantum World
       Find out what steps to take to migrate to quantum-resistant cryptography
       that will help protect your organization's data from quantum computers.
       Learn More
 * * Partners
     * Become an Entrust Partner
       Our partner programs can help you differentiate your business from the
       competition, increase revenues, and drive customer loyalty. Consider
       joining one or more of our Entrust partner programs and strategically
       position your company and brand in front of as many potential customers
       as possible.
       Learn More
     * Partner Directory
       Search for partners based on location, offerings, channel or technology
       alliance partners.
       Search for a Partner
     * Programs
       1. PartnerPlus Channel
          
       2. Technology Alliance
          
       3. nFinity HSM Technology Program
          
       4. IAM Managed Solution Provider
          
       5. Instant Issuance and Digital Issuance Managed Solution Provider
          
     * Partner Logins
       1. Partner Central
          
       2. Entrust Certificate Services Partner Portal
          
       3. Entrust Certificate Services Portal
          
       4. TrustedCare
          
 * * Support & Services
     * Contact Support
     * TrustedCare
       Product downloads, technical support, marketing development funds.
       Learn More
     * Digital Security Knowledge Base
       Guides, white papers, installation help, FAQs and certificate services
       tools.
       Learn More
     * Issuance Systems Knowledge Base
       Technotes, product bulletins, user guides, product registration, error
       codes and more.
       Learn More
     * PKI Professional Services
     * Cryptographic Center of Excellence
       Construct best practices and define strategies that work across your
       unique IT environment.
       Learn More
     * Custom Cryptographic Solutions
       1. Code Signing
          
       2. HSM Application Integration
          
     * Product Deployment Services
       1. nShield Deployment Health Check
          
       2. nShield Remote Administration Deployment
          
       3. Rapid Deployment
          
     * Packaged Services
       1. Code Signing Gateway
          
       2. Double Key Encryption Integration
          
       3. Tokenization Solution
          
     * Training
       1. nShield Certified Solution Developer Training
          
       2. nShield Certified System Engineer Course
          
       3. Public Key Infrastructure Basic Training
          
 * * Resources
     * Issuance Systems Knowledge Base
       Technotes, product bulletins, user guides, product registration, error
       codes and more.
       Learn More
     * Digital Security Knowledge Base
       Guides, white papers, installation help, FAQs and certificate services
       tools.
       Learn More
     * 1. Central Card Issuance
          
       2. Central Passport Issuance
          
       3. Instant Financial Card Issuance
          
       4. Instant ID Issuance
          
       5. Issuance Software
          
     * 1. Certificate Solutions
          
       2. PKI and IoT
          
       3. Identity and Access Management
          
       4. Hardware Security Modules (HSM)
          
       5. Cloud Security, Encryption and Key Management
          
     * 1. Documentation Library
          
       2. Training
          
       3. Legal and Compliance
          
       4. Covid 19 Updates
          
       5. Russia-Ukraine Conflict
          
 * * About Entrust
     * Securing a World in Motion Since 1969
       We’ve established secure connections across the planet and even into
       outer space. We’ve enabled reliable debit and credit card purchases with
       our card printing and issuance technologies. Protected international
       travel with our border control solutions. Created secure experiences on
       the internet with our SSL technologies. And safeguarded networks and
       devices with our suite of authentication products.
       Explore Our History
     * 1.  Leadership
           
       2.  Blog
           
       3.  Careers
           
       4.  Events
           
       5.  Webinars
           
       6.  Podcasts
           
       7.  News Articles
           
       8.  Press Releases
           
       9.  
       10. 
     * 1. Contact Sales
          
       2. Contact Support
          
       3. Locations
          
       4. 
     * Cybersecurity Institute
       Get critical insights and education on security concepts from our Trust
       Matters newsletter, explainer videos, and the Cybersecurity Institute
       Podcast.
       Learn More
 * * Shop
     * Entrust Certificate Services Portal
       Existing Entrust Certificate Services customers can login to issue and
       manage certificates or buy additional services.
       Learn More
     * Entrust Certificate Services Retail
       Shop for new single certificate purchases.
       Learn More
     * Entrust Certificate Services Partner Portal
       Existing partners can provision new customers and manage inventory.
       Learn More
     * Instant Financial Card Issuance Supplies
       1. Registered Customer Login
          
       2. Request Access
          
 * * Search Entrust
     * Search:


 1. Home
 2. •••
    * Privacy
    * Legal and Compliance
 3. Privacy Statement

Privacy


PRIVACY STATEMENT

 * Click to select...

Introduction


INTRODUCTION



Last Updated November 19, 2020

Entrust Corporation (“Entrust”) values and respects your privacy. This Privacy
Statement together with the ‘Terms of Use’ of our websites and any other
documents referenced here set forth Entrust’s personal data practices.

Personal data is information that identifies you, either alone or in combination
with other information available to Entrust (e.g., your name or email address).
More detail about the types of personal data Entrust collects is set forth
below.




What Personal Data Does Entrust Collect?


WHAT PERSONAL DATA DOES ENTRUST COLLECT?



Information you provide to us

We collect personal data you provide to us when you visit our websites. This
includes information you provide when you register to use our websites, purchase
products or services from our websites, subscribe to our services, search for
products, participate in discussion boards or other social media functions on
our websites, enter competitions, promotions or surveys, or when you report a
problem with our websites.

We also collect personal data you provide when you contact us via email or
telephone, or during business-related events, trade shows, sales or marketing
activities hosted by Entrust or by third parties. The information you provide
may include your location, name, phone number, email address, mailing address,
job title, place of employment, financial and credit card information.

Information we collect

When you visit our websites, we may use cookies and similar technologies to
collect information related to your visit. This information typically includes
your location, IP address, the identity of your Internet Service Provider, the
name and version of your operating system, the name and version of your browser,
the date and time of your visit, and the pages you visit. For more information,
please see our Cookie Policy.

We collect information relating to the access, usage and performance of our
websites. This information is collected and stored in electronic records called
logs. These logs may record the names, usernames, manner of access, time of
access and location of access of those who have visited our websites.

Information third parties provide to us

On occasion, we receive or obtain personal data from third parties. For example,
if you attend a meeting or event, the organizer of the event may share your
personal data with us. We may combine this information with information you
provide to us and information we collect about you. We will use this information
and the combined information for the purposes set out below (depending on the
types of information we receive).




How Do We Use the Information We Collect?


HOW DO WE USE THE INFORMATION WE COLLECT?



We only process personal data where we have a legal basis to do so (e.g.,
necessary for the performance of a contract, to comply with a legal obligation,
to pursue our legitimate interests or where we have consent).

Here is a list of the most common uses for which we process personal data:

 * To set up your user account and validate your license to access our websites,
   online products and services;
 * To process and complete online transactions and send related information,
   including transaction confirmations and invoices;
 * To provide, maintain or troubleshoot access to our websites, online products,
   and services;
 * To improve the content, functionality and usability of our websites, online
   products and services;
 * To investigate and prevent fraudulent activity or unauthorized access to our
   websites, online products or services;
 * To provide you with effective customer service;
 * To conduct internal research and development;
 * To comply with applicable laws or regulations;
 * To contact you with special offers and other information we believe may be of
   interest to you and for advertising and marketing purposes;
 * To invite you to participate in surveys and provide feedback to us;
 * To better understand your needs and interests;
 * To measure or understand the effectiveness of advertising we serve to you and
   others, and to deliver relevant advertising to you;
 * To ensure that content from our site is presented in the most effective
   manner for you and for your device.




Does Entrust Share and Disclose Personal Data?


DOES ENTRUST SHARE AND DISCLOSE PERSONAL DATA?



We may share and disclose your personal data, but only under the following
circumstances:

 * We may disclose or transfer your personal data to Entrust subsidiaries or
   affiliates.
 * We may disclose or transfer your personal data as part of a potential or
   actual company merger, acquisition, sale of a portion of Entrust or our
   assets or as part of a bankruptcy proceeding or a business reorganization.
 * We may disclose your personal data to Entrust partners selling Entrust
   products and services that may be of interest to you.
 * We may share your personal data with third parties who provide services to
   us. Examples of third-party service providers include payment processing
   providers, credit reference agencies, website analytics and advertising
   companies, and service providers who operate, maintain and support our
   websites, products and services.
 * We may disclose personal data in aggregate form to others, including
   strategic partners, advertisers, investors, and customers.
 * We may disclose personal data to protect, enforce or defend our rights or
   those of others, or where we believe the disclosure is required by law.
 * We may disclose personal data to prevent or investigate a possible crime,
   such as fraud or identity theft, or to protect the security of our websites,
   products and services.




Digital Advertising and Analytics


DIGITAL ADVERTISING AND ANALYTICS



We may partner with ad networks and other ad serving providers (“Advertising
Providers”) that serve ads on behalf of us and others on non-affiliated
platforms. Some of those ads may be personalized, meaning they are intended to
be relevant to you based on information Advertising Providers collect about your
use of our website and other sites or apps over time, including information
about relationships among different browsers and devices. This type of
advertising is known as interest-based advertising.

Entrust adheres to the Digital Advertising Alliance (“DAA”) Self-Regulatory
Principles in connection with this interest-based advertising activity. You may
visit the DAA Webchoices tool at www.aboutads.info to learn more about this type
of advertising and how to opt out of this advertising on websites by companies
participating in the DAA self-regulatory program. If you delete your cookies or
use a different browser, you may need to renew your opt-out choices exercised
through the DAA Webchoices tool. Note that electing to opt out will not stop
advertising from appearing in your browser or applications. It may make the ads
you see less relevant to your interests. Additionally, your browser may offer
tools to limit the use of cookies or to delete cookies; however, if you use
these tools, our website may not function as intended.

We may also work with third parties that collect data about your use of our
website and other sites or apps over time for non-advertising purposes. Entrust
uses Google Analytics and other third-party services to improve the performance
of the website and for analytics or marketing purposes. For more information
about how Google Analytics collects and uses data when you use the website,
visit www.google.com/policies/privacy/partners, and to opt out of Google
Analytics, visit tools.google.com/dlpage/gaoptout.




How Long Do We Retain Personal Data?


HOW LONG DO WE RETAIN PERSONAL DATA?



We only retain personal data for as long as necessary for the purpose in which
it was collected. For example, where your personal data is needed to provide you
with access to our websites, online products or services, we retain your
personal data for the period in which we are providing that access unless we are
required by law to dispose of it earlier or to keep it longer. We also retain
personal data as necessary to comply with our legal obligations, resolve
disputes, pursue legitimate business interests, conduct audits, and protect or
enforce our rights.




Where Do We Keep Your Personal Data and How Do We Protect it?


WHERE DO WE KEEP YOUR PERSONAL DATA AND HOW DO WE PROTECT IT?



We use appropriate technical, organizational and administrative security
measures to protect your personal data from loss, misuse, unauthorized access,
disclosure, alteration, and destruction. These security measures are designed to
provide a level of security appropriate to the risk of processing your personal
data. For example, payment transactions are encrypted using SSL technology or
have appropriate safeguards in place to ensure the security and integrity of
your personal data where stored on third party servers.

Where we have given you (or where you have chosen) a password which enables you
to access certain parts of our websites, you are responsible for keeping this
password confidential. We ask you not to share your password with anyone.

Unfortunately, the transmission of information via the internet is not
completely secure. Although we will do our best to protect your personal data,
we cannot guarantee the security of your data transmitted to our websites; any
transmission is at your own risk. Once we receive your information, we use
strict procedures and security features to try to prevent unauthorized access.




International Data Transfers


INTERNATIONAL DATA TRANSFERS



The personal data that we collect from you may be transferred to and/or stored
at a destination on our servers or our third party servers that is different
from the location where it was collected. It may also be processed by staff who
work for us or for one of our suppliers in a location different from where the
data was collected. We will only transfer your personal data as permitted by
law. Certain privacy and data protection laws require data controllers to put in
place safeguards to protect personal data transferred across borders. To comply
with this requirement, Entrust has put in place agreements that include the
standard contractual clauses recommended by the European Commission to provide
adequate safeguards for personal data.




Who is the Data Controller?


WHO IS THE DATA CONTROLLER?



The data controller of any personal data we hold about you is Entrust
Corporation.




What Rights Do You Have With Respect to Your Personal Data?


WHAT RIGHTS DO YOU HAVE WITH RESPECT TO YOUR PERSONAL DATA?



Depending upon the applicable data protection law in your country of residency,
you may have the right to ask us for information relating to personal data about
you we control and process; to correct, delete, or restrict any active
processing of your personal data; and to obtain a copy of your personal data in
a structured, machine readable format.

Additionally, you can object to the processing of your personal data in some
circumstances (e.g., where we don’t have to process the information to meet a
legitimate interest, contractual or other legal requirement). Your right to
object to processing of your personal data may be limited in certain
circumstances (e.g., where fulfilling your request would reveal personal data
about another person or where you ask us to delete information which we are
required by law to keep or have other compelling legitimate interests to keep
such as for purposes of fraud prevention).

We may need to request additional information from you to verify your identity
or understand the scope of your request, although you will not be required to
create an account with us to submit a request or have it fulfilled.

If we have collected and processed your personal data with your consent, then
you can withdraw your consent at any time by contacting privacy@entrust.com.
Withdrawing your consent will not affect the lawfulness of any processing we
conducted prior to your withdrawal, nor will it affect processing of your
personal data on lawful processing grounds other than consent.

We may also send you direct marketing without requiring your consent; for
example, where our marketing is not based on other lawful grounds. Note: This
will not apply to electronic marketing to Canadian residents where consent is
required.

To opt out of receiving marketing communications from Entrust, please click
here.




Children’s Privacy


CHILDREN’S PRIVACY



We do not knowingly collect personal data on individuals under 18 years of age.
Our websites, products and services are not intended for users under 18 years of
age.




External Website


EXTERNAL WEBSITE



Our websites may contain links to third party websites. We do not control, and
are not responsible for, the content or privacy practices of these other
websites. Our provision of such links does not constitute our endorsement of
these other websites, their content, their owners, or their practices. This
Privacy Statement does not apply to third party websites.




Amendments to This Privacy Statement


AMENDMENTS TO THIS PRIVACY STATEMENT



We reserve the right to amend this Privacy Statement from time to time as our
business, laws, regulations and industry standards evolve. Any changes are
effective immediately following the posting of such changes on www.entrust.com.
We encourage you to review this statement from time to time to stay informed.




Contact Us


CONTACT US



If you have questions or concerns about this Privacy Statement or our handling
of your personal data, please contact us at privacy@entrust.com. To submit a
Data Subject Access Request, please use our online form. You may also make this
request by calling us toll-free at 1-888-563-9240. We will do our best to answer
your questions and address your concerns. We will not discriminate against you
for exercising any of your rights as a data subject. If you are still not
satisfied, you may lodge a complaint with your national data protection
supervisory authority. The European Data Protection Board authorities can be
found here. The Office of the Privacy Commissioner of Canada can be found here.




Download


DOWNLOAD



Privacy Statement
Privacy Statement (Spanish)
Privacy Statement (French)
Privacy Statement (German)

Contact
 * Contact Sales
 * Contact Support
 * Find a Location

Company
 * About
 * Careers
 * Events
 * Webinars

Newsroom
 * Blog
 * Press Releases
 * News

Product Resources
 * Entrust Store
 * Resources
 * Library
 * Training
 * Legal and Compliance
 * Covid 19 Updates

Social
 * Twitter
 * Facebook
 * Instagram
 * LinkedIn
 * YouTube

--------------------------------------------------------------------------------

 * English
 * 中文
 * Português
 * Français
 * Deutsch
 * Русский
 * 한국어
 * Español
 * Italiano
 * 日本語

 * Legal
 * Privacy Statement
 * Internet Based Ads
 * Terms of Service
 * Terms of Use
 * Company Policies
 * Cookie Policy

©2022 Entrust Corporation. All rights reserved.

×

👋 Hello, if you have any
questions, I'm ready to chat.




This website uses necessary cookies to make our site work. We’d also like to set
optional targeting, functional, and performance cookies to help us improve our
website by collecting and reporting information on how you use it. Using this
tool will set a cookie on your device to remember your preferences. To read more
about how we use cookies, see our Cookie Policy.

Reject All Accept All
Cookies Settings



PRIVACY PREFERENCE CENTER




 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * TARGETING COOKIES


 * FUNCTIONAL COOKIES


 * PERFORMANCE COOKIES

YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually set in response to actions taken by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.

TARGETING COOKIES

Targeting Cookies Inactive


These cookies may be set through our site by our advertising partners. They may
be used to build a profile of your interests and show you relevant adverts on
other sites. If you do not allow these cookies, you will experience less
targeted advertising.

FUNCTIONAL COOKIES

Functional Cookies Inactive


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

PERFORMANCE COOKIES

Performance Cookies Inactive


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They may be set by us or by third-party
providers whose services we have added to our pages. Functional Cookies help us
to know which pages are the most and least popular and see how visitors move
around the site. All information these cookies collect is aggregated and
therefore anonymous. If you do not allow these cookies we will not know when you
have visited our site, and will not be able to monitor its performance.

Back Button


BACK

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Confirm My Choices
Reject All Allow All

Live chat:Chat with an Expert