• Home
  • About Us
  • Contact
  • More
    • Home
    • About Us
    • Contact
  • Home
  • About Us
  • Contact

Privacy Policy

 

Threat Based Research – Privacy Policy

Last updated: 13 January 2026


At Threat Based Research (“we,” “our,” or “us”), we are committed to protecting the privacy and security of individuals who use our websites and related services (collectively, the “Services”). This Privacy Policy explains how we collect, use, disclose, and safeguard personal information. By accessing or using our Services, you acknowledge and agree to the practices described in this Policy.


1. Information We Collect: We collect personal information from various sources to provide, improve, and secure our Services.


1.1 Information You Provide:


Registration Information: When you create an account, subscribe to updates, or request access to our Services, we may collect your name, email address, phone number, mailing address, and other relevant contact details.


Communications: If you contact us directly, we may collect your name, contact information, and the content of your message or attachments.


Events: If you register for an in‑person or virtual event, we may collect your name, title, company, email address, and other information necessary to manage your participation.


User Content: If you submit posts, comments, or other content through our Services, this information may be publicly visible unless otherwise stated.


2. Information We Collect Automatically: When you use our Services, we may automatically collect:

  • Device information (browser type, operating system, IP address)
  • Usage data (pages viewed, time spent, referring URLs)
  • Cookies and tracking technologies to improve functionality and analytics

You can manage cookie preferences through your browser settings.


3. How We Use Your Information: We use personal information for the following purposes:

  • To provide, maintain, and improve our Services
  • To communicate with you, including responding to inquiries
  • To send updates, security alerts, and administrative messages
  • To analyze usage and enhance user experience
  • To support event registration and participation
  • To protect the security and integrity of our Services
  • To comply with legal obligations

We only process personal information when we have a lawful basis, such as your consent, legitimate interest, or contractual necessity.


4. How We Share Information: We do not sell personal information. We may share information in the following limited circumstances:


4.1 Service Providers: We may share information with trusted vendors who assist with hosting, analytics, communications, or security. These providers are contractually obligated to protect your information.


4.2 Legal Requirements: We may disclose information if required to comply with applicable laws, regulations, legal processes, or government requests.


4.3 Business Transfers: If we undergo a merger, acquisition, or asset transfer, personal information may be transferred as part of that transaction.


4.4 With Your Consent: We may share information for any other purpose disclosed at the time of collection with your explicit consent.


5. Data Security: We implement administrative, technical, and physical safeguards designed to protect personal information from unauthorized access, loss, misuse, or alteration. While no system is completely secure, we continuously evaluate and enhance our security measures.


6. Data Retention: We retain personal information only as long as necessary to fulfill the purposes described in this Policy, comply with legal obligations, resolve disputes, and enforce agreements.


7. Your Rights and Choices: Depending on your location, you may have the following rights:

  • Access – Request a copy of your personal information
  • Correction – Request updates or corrections to inaccurate data
  • Deletion – Request that we delete your personal information
  • Objection – Object to certain types of processing
  • Restriction – Request limits on how your data is used
  • Portability – Request a copy of your data in a structured format

To exercise these rights, contact us using the information below. We may need to verify your identity before processing your request.


8. International Data Transfers: If you access our Services from outside the country where our servers are located, your information may be transferred across borders. We take steps to ensure appropriate safeguards are in place for international transfers.


9. Children’s Privacy: Our Services are not directed to individuals under the age of 16, and we do not knowingly collect personal information from children. If we learn that we have collected such information, we will delete it promptly.


10. Third‑Party Links

Our Services may contain links to third‑party websites. We are not responsible for the privacy practices or content of those sites. We encourage you to review their privacy policies.


11. Changes to This Privacy Policy: We may update this Privacy Policy from time to time. Any changes will be posted on this page with an updated “Last Updated” date. Continued use of our Services after changes are posted constitutes acceptance of the revised Policy.


12. Contact Us: If you have questions about this Privacy Policy or wish to exercise your privacy rights, you may contact us at:


Threat Based Research
Email: info@threatbasedresearch.com


Copyright © 2026 Threat Based Research - All Rights Reserved.

Powered by

  • Privacy Policy
  • Use of Our Products

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept