www.entrust.com
Open in
urlscan Pro
2606:4700::6812:fd6
Public Scan
Submitted URL: https://www.entrust.com/legal-compliance/privacy/privacy-statement?utm_campaign=23q1_ssl_global_flexiblelicensingprogram...
Effective URL: https://www.entrust.com/legal-compliance/data-privacy/privacy-statement?utm_campaign=23q1_ssl_global_flexiblelicensingpr...
Submission: On November 14 via api from US — Scanned from DE
Effective URL: https://www.entrust.com/legal-compliance/data-privacy/privacy-statement?utm_campaign=23q1_ssl_global_flexiblelicensingpr...
Submission: On November 14 via api from US — Scanned from DE
Form analysis
2 forms found in the DOM/search
<form _lpchecked="1" action="/search">
<div class="search">
<label for="main-search-field" class="sr-only">Search:</label>
<input name="searchTerm" class="mega-control" type="text" placeholder="Search" aria-label="Search" id="main-search-field">
</div>
<button href="#" class="" type="submit">
<img alt="Submit search query" data-src="/images/search-solid.svg" class="lazyload">
</button>
</form>
POST
<form id="fileUploadForm" enctype="multipart/form-data" method="post" target="fileUploadIframe"><input type="file" id="fileSelector" name="file" style="display: none;"><input name="filename" type="hidden"></form>
Text Content
Skip to main content * * Solutions * Products * Partners * Support & Services * Resources * About * * * Contact Sales * Contact an Expert * Get Support * * * * Solutions * Strong Identities 1. Identity Verification Enable high assurance identities that empower citizens. 2. ID Issuance Issue safe, secure digital and physical IDs in high volumes or instantly. 3. User Identity Elevate trust by protecting identities with a broad range of authenticators. 4. Machine Identity Issue and manage strong machine identities to enable secure IoT and digital transformation. 5. Digital Signature Use secure, verifiable signatures and seals for digital documents. * Secure Payments 1. Financial Issuance Issue digital and physical financial identities and credentials instantly or at scale. 2. Digital Card Solution Issue digital payment credentials directly to cardholders from your bank's mobile app. * Digital Infrastructure 1. Database Security Secure databases with encryption, key management, and strong policy and access control. 2. Multi-cloud Security Keys, data, and workload protection and compliance across hybrid and multi-cloud environments. * Industry * 1. Financial 2. Government 3. Education * 1. Enterprise 2. Healthcare 3. Retail * Compliance * 1. PSD2 2. HIPAA 3. GDPR 4. SWIFT * 1. CMMC 2. eIDAS 3. NITES * * Featured Products * As a Service Products 1. Identity Verification as a Service Citizen verification for immigration, border management, or eGov service delivery. 2. Identity as a Service (IDaaS) Cloud-based Identity and Access Management solution. 3. Digital Signing as a Service Cloud-based digital signing solutions. 4. Instant ID as a Service Issue physical and mobile IDs with one secure platform. * 1. Digital Card Solution Instantly provision digital payment credentials directly to cardholder’s mobile wallet. 2. PKI as a Service A highly secure PKI that’s quick to deploy, scales on-demand, and runs where you do business. 3. nShield as a Service Subscription-based access to dedicated nShield HSMs for cloud-based cryptographic services. 4. Seamless Travel as a Service Remote identity verification, digital travel credentials, and touchless border processes. * 1. Instant Financial Issuance In-branch and self-service kiosk issuance of debit and credit cards. 2. Central Financial Issuance High volume financial card issuance with delivery and insertion options. 3. Instant ID Issuance Secure issuance of employee badges, student IDs, membership cards and more. 4. Central ID Issuance Passports, national IDs and driver licenses. 5. nShield HSMs Securely generate encryption and signing keys, create digital signatures, encrypting data and more. * 1. Cloud Security, Encryption and Key Management Powerful encryption, policy, and access control for virtual and public, private, and hybrid cloud environments. 2. Digital Certificates TLS/SSL, digital signing, and qualified certificates plus services and tools for certificate lifecycle management. 3. Identity and Access Management (IAM) One Identity portfolio for all your users — workforce, consumers, and citizens. 4. Machine Identity Management Centralized visibility, control, and management of machine identities. 5. Post-Quantum Learn what steps to take to migrate to quantum-resistant cryptography. * Enterprise ID & Issuance * Instant ID as a Service Issue physical and mobile IDs with one secure platform. Learn More * Instant Issuance 1. Sigma Direct-to-Card System 2. Artista Retransfer System 3. System Software Personalization, encoding and activation. 4. Supplies 5. Services * Financial ID & Issuance * Digital Card Solution Instantly provision digital payment credentials directly to cardholder’s mobile wallet. Learn More * Digital Banking 1. Digital Account Opening 2. Digital Card Solution * Instant Issuance 1. Sigma Direct-to-Card System 2. Artista Retransfer System 3. System Software Personalization, encoding and activation. 4. Supplies 5. Services * Central Issuance 1. Card Issuance Systems 2. Inline Card Delivery Systems 3. Inline Envelope Insertion Systems 4. Standalone Card Affixing/Envelope Insertion Systems 5. Standalone Envelope Insertion Systems 6. System Software Personalization, encoding, delivery and analytics. 7. Supplies 8. Services * Government ID & Issuance * Digital Citizen 1. eGovernment service delivery 2. Identity Verification as a Service 3. Seamless Travel as a Service 4. ePassport as a Service * Central Issuance 1. Passports, national IDs and driver licenses. 2. Passport Issuance Systems 3. National ID and Driver License Systems 4. Inline Delivery & Insertion 5. Standalone Delivery & Insertion 6. System Software ID Personalization, encoding and delivery. 7. Supplies 8. Services * Instant Issuance 1. Other citizen IDs and licenses. 2. Sigma Direct-to-Card System 3. Artista Retransfer System 4. System Software Personalization, encoding, delivery and analytics. 5. Supplies 6. Services * Identity Verification as a Service Our IDVaaS solution allows remote verification of an individual’s claimed identity for immigration, border management, or digital services delivery. Learn More * Cloud Security Posture Management * 1. CloudControl Enterprise for AWS Secure and ensure compliance for AWS configurations across multiple accounts, regions and availability zones. 2. CloudControl Enterprise for Containers Security compliance and environmental hardening solution for contains and Kubernetes using VMware Tanzu and RedHat OpenShift platforms. 3. CloudControl Enterprise for vSphere and NSX Comprehensive compliance, multi-factor authentication, secondary approval, RBAC for VMware vSphere NSX-T and VCF. 4. CloudControl Foundation for vSphere Comprehensive compliance for VMware vSphere, NSX-T and SDDC and associated workload and management domains * CloudControl 30-Day Free Trial Entrust CloudControl offers comprehensive security and automated compliance across virtualization, public cloud, and container platforms while increasing visibility and decreasing risks that can lead to unintended downtime or security exposure. Start Free Trial * Key Management and Encryption * 1. KeyControl for KMIP and Secrets Manage all your secrets and encryption keys, including how often you rotate and share them, securely at scale. 2. KeyControl BYOK Create and manage encryption keys on premises and in the cloud. Manage your key lifecycle while keeping control of your cryptographic keys. 3. KeyControl for Database Encryption Integrates with your database for secure lifecycle management of your TDE encryption keys. 4. KeyControl for Backup and Recovery Integrates with your backup and recovery solution for secure lifecycle management of your encryption keys. * 1. DataControl for Azure Data encryption, multi-cloud key management, and workload security for Azure. 2. DataControl for AWS Data encryption, multi-cloud key management, and workload security for AWS. 3. DataControl for IBM Cloud Data encryption, multi-cloud key management, and workload security for IBM Cloud. * KeyControl 30-Day Free Trial VMware vSphere and vSAN encryption require an external key manager, and KeyControl is VMware Ready certified and recommended. KeyControl enables enterprises to easily manage all their encryption keys at scale, including how often keys are rotated, and how they are shared securely. Start Free Trial * Hardware Security Modules (HSM) * nShield as a Service 1. Subscription-based access to dedicated nShield Cloud HSMs. * nShield HSMs 1. nShield Connect Networked appliances that deliver cryptographic key services to distributed applications. 2. nShield Solo PCI-Express card-based HSMs. 3. nShield Edge Personal, USB-connected desktop HSMs. * Management and Monitoring 1. nShield Monitor 2. nShield Remote Administration * CodeSafe 1. SDK for securing sensitive code within a FIPS 140-2 Level 3 certified nShield HSM. 2. Post-Quantum SDK * Software Option Packs 1. Web Services 2. Container Deployment 3. Database Security 4. Signature Activation Module 5. Cloud Integration (BYOK) 6. Double Key Encryption for Microsoft 7. Time Stamping * Compliance and Certification 1. FIPS 140-2/140-3 2. Common Criteria 3. eIDAS 4. NIST 800-53 5. GDPR 6. PSD2 7. HIPAA 8. PCI-DSS 9. NITES * Why you need an HSM 1. Learn about all the details related to what hardware security modules offer you in security and cost savings... 2. Learn More * Use Cases 1. eIDAS QSCD 2. PKI and Credentialing 3. Data Security and Encryption 4. Cloud Security 5. Payments 6. View All Use Cases * TLS/SSL Certificates * BUY NOW 1. Buy Certificates 2. Renew Certificates * TLS/SSL Certificates 1. Buy Now 2. Standard OV 3. Advantage OV 4. Multi-Domain OV 5. Multi-Domain EV 6. Wildcard OV 7. Private * Qualified Certificates 1. Request a Quote 2. QWAC eIDAS Certificates 3. QWAC PSD2 Certificates * Sales and Services 1. Platinum Services 2. Entrust Certificate Services 3. Subscription Plans 4. Knowledge Base and Support * Identity and Access Management (IAM) * Products 1. Identity as a Service Cloud-Based IAM 2. Identity Enterprise On-prem IAM 3. Identity Essentials On-prem MFA solution for Windows users 4. APIs and SDKs * Integrations * Testimonials * Workforce 1. Single Sign-On 2. Adaptive Authentication 3. Multi-Factor Authentication (MFA) 4. Passwordless 5. Network and VPN Access Control 6. Self-Service Password Reset 7. PIV-Compliant Government Mobility 8. View All * Consumer and Citizen 1. Identity Orchestration and Management 2. Digital Onboarding 3. Adaptive Authentication 4. Multi-Factor Authentication (MFA) 5. Passwordless 6. API Protection and Role-Based Access Control 7. Single Sign-On * Get Entrust Identity as a Service Free for 60 Days Explore the Identity as a Service platform that gives you access to best-in-class MFA, SSO, adaptive risk-based authentication, and a multitude of advanced features that not only keep users secure, but also contribute to an optimal experience. Start Free Trial * Electronic and Digital Signing * EU Qualified Trust Services In addition to our long-standing Adobe Approved Trust List (AATL) membership, we are a European Qualified Trust Service Provider for the issuance of eIDAS qualified certificates for qualified signatures and advanced seals, for PSD2 certificates and for QWACs Learn More * Cloud-Based Signing Portal 1. Signhost is a high-assurance, identity-verified electronic signature service. 2. Get Started for Free * 1. Signhost 2. ID Proof 3. ID Connect * Digital Signing as a Service 1. Signing Automation Service 2. Remote Signing Service 3. Partners and Integrations * Digital Signing Certificates 1. Buy Now 2. Document Signing 3. PSD2 Qualified Certificates 4. Secure Email (S/MIME) 5. Code Signing * Digital Signing Infrastructure 1. Remote Signing Engine 2. Signing Automation Engine 3. Timestamping Authority 4. Signature Activation Module * Public Trust Certificates * Verified Mark Certificate (VMC) for BIMI Show your official logo on email communications. Download our white paper to learn all you need to know about VMCs and the BIMI standard. Learn More * Buy and Renew TLS/SSL Certificates 1. Buy Certificates 2. Renew Certificates * Signing Certificates 1. Document Signing 2. Secure Email (S/MIME) 3. Code Signing * Qualified Certificates 1. PSD2 Qualified Electronic Seal Certificates * Sales and Services 1. Platinum Services 2. Entrust Certificate Services 3. Subscription Plans 4. Knowledge Base and Support * Public Key Infrastructure (PKI) * PKI as a Service 1. Use Cases 2. Post-Quantum PKIaaS * PKI Products 1. Certificate Authority 2. Entelligence Security Provider 3. ePassport 4. Validation Authority 5. Key Recovery Server * Managed Services 1. Entrust Managed PKI 2. Managed Offline Root CA 3. Managed Microsoft PKI 4. nShield HSM as a Service * Certificate Lifecycle Management 1. Certificate Hub 2. Certificate Enrollment Gateway 3. CA Gateway * Cryptographic Center of Excellence 1. PKI Health Check 2. Cryptographic Health Check * Try Post-Quantum PKI as a Service Now Get PQ Ready. PKIaaS PQ provides customers with composite and pure quantum Certificate Authority hierarchies. Try Now * Internet of Things (IoT) Security * Credentialing and Provisioning 1. IoT Security 2. PKI as a Service 3. Code Signing * Machine Identity Management 1. Certificate Hub 2. Key Management 3. Certificate Enrollment Gateway 4. CA Gateway * Global PKI IoT Trends Study Find out how organizations are using PKI and if they’re prepared for the possibilities of a more secure, connected world. Learn More * Machine Identity Management * Lifecycle Management 1. Certificate Hub 2. Key Management 3. Certificate Enrollment Gateway 4. CA Gateway * Credentialing and Provisioning 1. IoT Security 2. PKI as a Service 3. Code Signing * The State of Machine Identity Management A recent survey by IDG uncovered the complexities around machine identities and the capabilities that IT leaders are seeking from a management solution. Get the White Paper * Post-Quantum * Issuance and Provisioning 1. PKI as a Service PQ 2. PQ Standards and Research * Cryptographic Center of Excellence 1. Crypto Health Check 2. PKI Health Check * Prepare for a Post-Quantum World Find out what steps to take to migrate to quantum-resistant cryptography that will help protect your organization's data from quantum computers. Learn More * * Partners * Become an Entrust Partner Our partner programs can help you differentiate your business from the competition, increase revenues, and drive customer loyalty. Consider joining one or more of our Entrust partner programs and strategically position your company and brand in front of as many potential customers as possible. Learn More * Partner Directory Search for partners based on location, offerings, channel or technology alliance partners. Search for a Partner * Programs 1. PartnerPlus Channel 2. Technology Alliance 3. nFinity HSM Technology Program 4. IAM Managed Solution Provider 5. Instant Issuance and Digital Issuance Managed Solution Provider * Partner Logins 1. Partner Central 2. Entrust Certificate Services Partner Portal 3. Entrust Certificate Services Portal 4. TrustedCare * * Support & Services * Contact Support * TrustedCare Product downloads, technical support, marketing development funds. Learn More * Digital Security Knowledge Base Guides, white papers, installation help, FAQs and certificate services tools. Learn More * Issuance Systems Knowledge Base Technotes, product bulletins, user guides, product registration, error codes and more. Learn More * PKI Professional Services * Cryptographic Center of Excellence Construct best practices and define strategies that work across your unique IT environment. Learn More * Custom Cryptographic Solutions 1. Code Signing 2. HSM Application Integration * Product Deployment Services 1. nShield Deployment Health Check 2. nShield Remote Administration Deployment 3. Rapid Deployment * Packaged Services 1. Code Signing Gateway 2. Double Key Encryption Integration 3. Tokenization Solution * Training 1. nShield Certified Solution Developer Training 2. nShield Certified System Engineer Course 3. Public Key Infrastructure Basic Training * * Resources * Issuance Systems Knowledge Base Technotes, product bulletins, user guides, product registration, error codes and more. Learn More * Digital Security Knowledge Base Guides, white papers, installation help, FAQs and certificate services tools. Learn More * 1. Central Card Issuance 2. Central Passport Issuance 3. Instant Financial Card Issuance 4. Instant ID Issuance 5. Issuance Software * 1. Certificate Solutions 2. PKI and IoT 3. Identity and Access Management 4. Hardware Security Modules (HSM) 5. Cloud Security, Encryption and Key Management * 1. Documentation Library 2. Training 3. Legal and Compliance 4. Covid 19 Updates 5. Russia-Ukraine Conflict * * About Entrust * Securing a World in Motion Since 1969 We’ve established secure connections across the planet and even into outer space. We’ve enabled reliable debit and credit card purchases with our card printing and issuance technologies. Protected international travel with our border control solutions. Created secure experiences on the internet with our SSL technologies. And safeguarded networks and devices with our suite of authentication products. Explore Our History * 1. Leadership 2. Blog 3. Careers 4. Events 5. Webinars 6. Podcasts 7. News Articles 8. Press Releases 9. 10. * 1. Contact Sales 2. Contact Support 3. Locations 4. * Cybersecurity Institute Get critical insights and education on security concepts from our Trust Matters newsletter, explainer videos, and the Cybersecurity Institute Podcast. Learn More * * Shop * Entrust Certificate Services Portal Existing Entrust Certificate Services customers can login to issue and manage certificates or buy additional services. Learn More * Entrust Certificate Services Retail Shop for new single certificate purchases. Learn More * Entrust Certificate Services Partner Portal Existing partners can provision new customers and manage inventory. Learn More * Instant Financial Card Issuance Supplies 1. Registered Customer Login 2. Request Access * * Search Entrust * Search: 1. Home 2. ••• * Privacy * Legal and Compliance 3. Privacy Statement Privacy PRIVACY STATEMENT * Click to select... Introduction INTRODUCTION Last Updated November 19, 2020 Entrust Corporation (“Entrust”) values and respects your privacy. This Privacy Statement together with the ‘Terms of Use’ of our websites and any other documents referenced here set forth Entrust’s personal data practices. Personal data is information that identifies you, either alone or in combination with other information available to Entrust (e.g., your name or email address). More detail about the types of personal data Entrust collects is set forth below. What Personal Data Does Entrust Collect? WHAT PERSONAL DATA DOES ENTRUST COLLECT? Information you provide to us We collect personal data you provide to us when you visit our websites. This includes information you provide when you register to use our websites, purchase products or services from our websites, subscribe to our services, search for products, participate in discussion boards or other social media functions on our websites, enter competitions, promotions or surveys, or when you report a problem with our websites. We also collect personal data you provide when you contact us via email or telephone, or during business-related events, trade shows, sales or marketing activities hosted by Entrust or by third parties. The information you provide may include your location, name, phone number, email address, mailing address, job title, place of employment, financial and credit card information. Information we collect When you visit our websites, we may use cookies and similar technologies to collect information related to your visit. This information typically includes your location, IP address, the identity of your Internet Service Provider, the name and version of your operating system, the name and version of your browser, the date and time of your visit, and the pages you visit. For more information, please see our Cookie Policy. We collect information relating to the access, usage and performance of our websites. This information is collected and stored in electronic records called logs. These logs may record the names, usernames, manner of access, time of access and location of access of those who have visited our websites. Information third parties provide to us On occasion, we receive or obtain personal data from third parties. For example, if you attend a meeting or event, the organizer of the event may share your personal data with us. We may combine this information with information you provide to us and information we collect about you. We will use this information and the combined information for the purposes set out below (depending on the types of information we receive). How Do We Use the Information We Collect? HOW DO WE USE THE INFORMATION WE COLLECT? We only process personal data where we have a legal basis to do so (e.g., necessary for the performance of a contract, to comply with a legal obligation, to pursue our legitimate interests or where we have consent). Here is a list of the most common uses for which we process personal data: * To set up your user account and validate your license to access our websites, online products and services; * To process and complete online transactions and send related information, including transaction confirmations and invoices; * To provide, maintain or troubleshoot access to our websites, online products, and services; * To improve the content, functionality and usability of our websites, online products and services; * To investigate and prevent fraudulent activity or unauthorized access to our websites, online products or services; * To provide you with effective customer service; * To conduct internal research and development; * To comply with applicable laws or regulations; * To contact you with special offers and other information we believe may be of interest to you and for advertising and marketing purposes; * To invite you to participate in surveys and provide feedback to us; * To better understand your needs and interests; * To measure or understand the effectiveness of advertising we serve to you and others, and to deliver relevant advertising to you; * To ensure that content from our site is presented in the most effective manner for you and for your device. Does Entrust Share and Disclose Personal Data? DOES ENTRUST SHARE AND DISCLOSE PERSONAL DATA? We may share and disclose your personal data, but only under the following circumstances: * We may disclose or transfer your personal data to Entrust subsidiaries or affiliates. * We may disclose or transfer your personal data as part of a potential or actual company merger, acquisition, sale of a portion of Entrust or our assets or as part of a bankruptcy proceeding or a business reorganization. * We may disclose your personal data to Entrust partners selling Entrust products and services that may be of interest to you. * We may share your personal data with third parties who provide services to us. Examples of third-party service providers include payment processing providers, credit reference agencies, website analytics and advertising companies, and service providers who operate, maintain and support our websites, products and services. * We may disclose personal data in aggregate form to others, including strategic partners, advertisers, investors, and customers. * We may disclose personal data to protect, enforce or defend our rights or those of others, or where we believe the disclosure is required by law. * We may disclose personal data to prevent or investigate a possible crime, such as fraud or identity theft, or to protect the security of our websites, products and services. Digital Advertising and Analytics DIGITAL ADVERTISING AND ANALYTICS We may partner with ad networks and other ad serving providers (“Advertising Providers”) that serve ads on behalf of us and others on non-affiliated platforms. Some of those ads may be personalized, meaning they are intended to be relevant to you based on information Advertising Providers collect about your use of our website and other sites or apps over time, including information about relationships among different browsers and devices. This type of advertising is known as interest-based advertising. Entrust adheres to the Digital Advertising Alliance (“DAA”) Self-Regulatory Principles in connection with this interest-based advertising activity. You may visit the DAA Webchoices tool at www.aboutads.info to learn more about this type of advertising and how to opt out of this advertising on websites by companies participating in the DAA self-regulatory program. If you delete your cookies or use a different browser, you may need to renew your opt-out choices exercised through the DAA Webchoices tool. Note that electing to opt out will not stop advertising from appearing in your browser or applications. It may make the ads you see less relevant to your interests. Additionally, your browser may offer tools to limit the use of cookies or to delete cookies; however, if you use these tools, our website may not function as intended. We may also work with third parties that collect data about your use of our website and other sites or apps over time for non-advertising purposes. Entrust uses Google Analytics and other third-party services to improve the performance of the website and for analytics or marketing purposes. For more information about how Google Analytics collects and uses data when you use the website, visit www.google.com/policies/privacy/partners, and to opt out of Google Analytics, visit tools.google.com/dlpage/gaoptout. How Long Do We Retain Personal Data? HOW LONG DO WE RETAIN PERSONAL DATA? We only retain personal data for as long as necessary for the purpose in which it was collected. For example, where your personal data is needed to provide you with access to our websites, online products or services, we retain your personal data for the period in which we are providing that access unless we are required by law to dispose of it earlier or to keep it longer. We also retain personal data as necessary to comply with our legal obligations, resolve disputes, pursue legitimate business interests, conduct audits, and protect or enforce our rights. Where Do We Keep Your Personal Data and How Do We Protect it? WHERE DO WE KEEP YOUR PERSONAL DATA AND HOW DO WE PROTECT IT? We use appropriate technical, organizational and administrative security measures to protect your personal data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. These security measures are designed to provide a level of security appropriate to the risk of processing your personal data. For example, payment transactions are encrypted using SSL technology or have appropriate safeguards in place to ensure the security and integrity of your personal data where stored on third party servers. Where we have given you (or where you have chosen) a password which enables you to access certain parts of our websites, you are responsible for keeping this password confidential. We ask you not to share your password with anyone. Unfortunately, the transmission of information via the internet is not completely secure. Although we will do our best to protect your personal data, we cannot guarantee the security of your data transmitted to our websites; any transmission is at your own risk. Once we receive your information, we use strict procedures and security features to try to prevent unauthorized access. International Data Transfers INTERNATIONAL DATA TRANSFERS The personal data that we collect from you may be transferred to and/or stored at a destination on our servers or our third party servers that is different from the location where it was collected. It may also be processed by staff who work for us or for one of our suppliers in a location different from where the data was collected. We will only transfer your personal data as permitted by law. Certain privacy and data protection laws require data controllers to put in place safeguards to protect personal data transferred across borders. To comply with this requirement, Entrust has put in place agreements that include the standard contractual clauses recommended by the European Commission to provide adequate safeguards for personal data. Who is the Data Controller? WHO IS THE DATA CONTROLLER? The data controller of any personal data we hold about you is Entrust Corporation. What Rights Do You Have With Respect to Your Personal Data? WHAT RIGHTS DO YOU HAVE WITH RESPECT TO YOUR PERSONAL DATA? Depending upon the applicable data protection law in your country of residency, you may have the right to ask us for information relating to personal data about you we control and process; to correct, delete, or restrict any active processing of your personal data; and to obtain a copy of your personal data in a structured, machine readable format. Additionally, you can object to the processing of your personal data in some circumstances (e.g., where we don’t have to process the information to meet a legitimate interest, contractual or other legal requirement). Your right to object to processing of your personal data may be limited in certain circumstances (e.g., where fulfilling your request would reveal personal data about another person or where you ask us to delete information which we are required by law to keep or have other compelling legitimate interests to keep such as for purposes of fraud prevention). We may need to request additional information from you to verify your identity or understand the scope of your request, although you will not be required to create an account with us to submit a request or have it fulfilled. If we have collected and processed your personal data with your consent, then you can withdraw your consent at any time by contacting privacy@entrust.com. Withdrawing your consent will not affect the lawfulness of any processing we conducted prior to your withdrawal, nor will it affect processing of your personal data on lawful processing grounds other than consent. We may also send you direct marketing without requiring your consent; for example, where our marketing is not based on other lawful grounds. Note: This will not apply to electronic marketing to Canadian residents where consent is required. To opt out of receiving marketing communications from Entrust, please click here. Children’s Privacy CHILDREN’S PRIVACY We do not knowingly collect personal data on individuals under 18 years of age. Our websites, products and services are not intended for users under 18 years of age. External Website EXTERNAL WEBSITE Our websites may contain links to third party websites. We do not control, and are not responsible for, the content or privacy practices of these other websites. Our provision of such links does not constitute our endorsement of these other websites, their content, their owners, or their practices. This Privacy Statement does not apply to third party websites. Amendments to This Privacy Statement AMENDMENTS TO THIS PRIVACY STATEMENT We reserve the right to amend this Privacy Statement from time to time as our business, laws, regulations and industry standards evolve. Any changes are effective immediately following the posting of such changes on www.entrust.com. We encourage you to review this statement from time to time to stay informed. Contact Us CONTACT US If you have questions or concerns about this Privacy Statement or our handling of your personal data, please contact us at privacy@entrust.com. To submit a Data Subject Access Request, please use our online form. You may also make this request by calling us toll-free at 1-888-563-9240. We will do our best to answer your questions and address your concerns. We will not discriminate against you for exercising any of your rights as a data subject. If you are still not satisfied, you may lodge a complaint with your national data protection supervisory authority. The European Data Protection Board authorities can be found here. The Office of the Privacy Commissioner of Canada can be found here. Download DOWNLOAD Privacy Statement Privacy Statement (Spanish) Privacy Statement (French) Privacy Statement (German) Contact * Contact Sales * Contact Support * Find a Location Company * About * Careers * Events * Webinars Newsroom * Blog * Press Releases * News Product Resources * Entrust Store * Resources * Library * Training * Legal and Compliance * Covid 19 Updates Social * Twitter * Facebook * Instagram * LinkedIn * YouTube -------------------------------------------------------------------------------- * English * 中文 * Português * Français * Deutsch * Русский * 한국어 * Español * Italiano * 日本語 * Legal * Privacy Statement * Internet Based Ads * Terms of Service * Terms of Use * Company Policies * Cookie Policy ©2022 Entrust Corporation. All rights reserved. × 👋 Hello, if you have any questions, I'm ready to chat. This website uses necessary cookies to make our site work. We’d also like to set optional targeting, functional, and performance cookies to help us improve our website by collecting and reporting information on how you use it. Using this tool will set a cookie on your device to remember your preferences. To read more about how we use cookies, see our Cookie Policy. Reject All Accept All Cookies Settings PRIVACY PREFERENCE CENTER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * TARGETING COOKIES * FUNCTIONAL COOKIES * PERFORMANCE COOKIES YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually set in response to actions taken by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. TARGETING COOKIES Targeting Cookies Inactive These cookies may be set through our site by our advertising partners. They may be used to build a profile of your interests and show you relevant adverts on other sites. If you do not allow these cookies, you will experience less targeted advertising. FUNCTIONAL COOKIES Functional Cookies Inactive These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. PERFORMANCE COOKIES Performance Cookies Inactive These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They may be set by us or by third-party providers whose services we have added to our pages. Functional Cookies help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Back Button BACK Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Reject All Allow All Live chat:Chat with an Expert