Helium Security
Privacy Policy
Helium Security is intended for security professionals working for organizations with professional interests.
PT Global Inovasi Siber Indonesia is the provider of Helium Security services that respects your privacy and is committed to protecting it through compliance with this policy.
PT Global Inovasi Siber Indonesia ("We," "Helium Security," or the "Company") will adhere to the following policies to protect your privacy:
This policy describes the types of information we may collect from you ("Customer","Client",”Subscriber”,"User" or "You") or that you may provide when using our SaaS services (Software as a Service) or the Company’s website ("Website"), which may include materials such as software, text, graphics, images, sound recordings, audiovisual works, and other materials provided by or on behalf of the Company and/or other related services including the use of Helium Security (collectively referred to as the "Software").
This policy applies to information we collect from online registration that you may have completed when subscribing to the Software ("Registration"), or when using the Software and regarding the computing environment you use to access the Software.
Please read this policy carefully to understand our policies and practices regarding your information and how we will treat it. If you do not agree with our policies and practices, your choice is not to use our Software. By accessing our website or using the Software, you agree to this privacy policy.
This policy may change from time to time as more fully described below. Your continued access to our website or use of our Software after we make changes in the Software is deemed to be acceptance of those changes, and you are hereby responsible for checking this policy periodically for updates.
In the event of a conflict between this Privacy Policy and the Terms of Service ("ToS"), the provisions of the ToS will prevail.
You hereby acknowledge and confirm that this policy will apply to you as well as to any organization or company that accesses or uses the Software through you (each, a "Client").
1. Authorized Clients
Helium Security may only be used and accessed by Clients who have completed the Registration process, accepted the Helium Security ToS, and been approved for access after Helium Security's review of the information entered by the Client during the Registration process.
2. Information We Collect About Clients and How We Collect It
We collect information from and about Clients, their affiliates, employees, and Customers, including the following information:
- Information that allows for the personal identification of each Client's affiliates, employees, and Customers, such as names and email addresses or other information entered as part of the Registration process or which the Software collects during the Client's use of the Software that may be defined as personal or personally identifiable information under applicable law.
- Information regarding the Client's use of the Software, including statistics and logins, search queries and open ports, and the Client's last IP address.
- Information provided by the Client when registering for the purpose of using the Software.
- Records and copies of the Client's correspondence (including email addresses) with us.
- Statistics, logins, logs, notifications, browser, and its last IP address.
- Information collected when a Client reports a problem or difficulty while using our Software.
- Information collected when a Client interacts with Helium Security personnel for any purpose, including reporting a problem or difficulty in using our Software.
The collection of information is done directly from the Client when it is provided during the Registration process or through other means. Furthermore, the collection and processing of the collected information are done automatically when the Client accesses the Website or uses the Software (including usage details, IP addresses, and other information obtained through tracking technologies).
You hereby acknowledge and confirm that any Personally Identifiable Information ("PII") that has been provided by you (or anyone on your behalf including your Clients) to Helium Security, will be used in accordance with Helium Security's sole discretion, and that you are the owner of such PII or you have obtained the consent for use (including in accordance with this policy) from the owner of such PII.
3. How We Use Client Information
We use information collected about Clients or provided by Clients or any third parties, including personal information, to:
- Provide information to the Client that may be requested from time to time;
- Provide information related to the management of the Client's account;
- Create our own internal statistics for internal analysis purposes;
- Collect and store it as part of registration and monitor your use of the Software;
- Contact you to ensure that the information we have on our records is accurate or when additional information is required to complete your profile;
- Prevent activities we consider to be potentially illegal;
- Enforce this Privacy Policy and/or our ToS or for any other purpose mentioned herein.
4. Cookies
When you visit or access our website, we use cookies. Cookies allow us to collect visitor information such as:
- Online or offline status, browser type, regional settings, and language,
- Visitor network information such as IP addresses, ISP information,
- Information on the device you are using to access, such as a computer, tablet, or mobile phone,
- Information on user online behavior, usage trends, and interests.
These cookies are used to improve our website's performance, conduct analysis, and customize your experience. We may combine data we collect within the Website, including data collected through tracking technologies and data provided by third parties, which may become PII.
Most web browsers allow you to view what cookies are stored on your device, delete all of them or individual sites, and turn off third-party cookies.
5. Data Security
We have implemented reasonable measures to secure your PII. All PII you provide to us is stored on our secure servers behind firewalls. Any payment transactions, submission of login credentials, or other sensitive data will be encrypted using TLS/SSL protocols.
Your PII may be processed, stored, or transferred outside of your state or country, where privacy laws may not be as strict as in your jurisdiction. You are responsible for the security and safety of your PII; you are responsible for keeping all usernames and passwords required to access the Software confidential. You agree that the transmission of information via the internet is not completely secure. Any transmission of PII is at your own risk.
6. Payment processing
In case of Services requiring payment, you may need to provide your credit card details or other payment account information, which will be used solely for processing payments. We use third-party payment processors (“Payment Processors”) to assist us in processing your payment information securely.
We will share payment data with the Payment Processors only to the extent necessary for the purposes of processing your payments, refunding such payments, and dealing with complaints and queries related to such payments and refunds. Please note that the Payment Processors may collect some Personal Information from you, which allows them to process your payments (e.g., your email address, address, credit card details, and bank account number) and handle all the steps in the payment process through their systems, including data collection and data processing. The Payment Processors’ use of your Personal Information is governed by their respective privacy policies which may or may not contain privacy protections as protective as this Policy. We suggest that you review their respective privacy policies.
6. Ethical Pledge for Use
Vulnerability Assessment and Pentest Tools are tools used to test the security of a system or application, and their results consist of vulnerabilities and confidential information about the system or application.
Please note that users who perform security testing or scanning without permission may be subject to legal sanctions.
Before using Helium Security products, users must make a pledge as shown below. Users have the right to refuse this pledge, but if they do not, their use of the service may be restricted.
- Not to use data obtained using Helium Security illegally.
- Not to share or use data obtained using Helium Security for unauthorized gain.
- Not to disclose information obtained through Helium Security without authorization.
- In case of a violation of the above, I accept responsibility and risk, and I release Helium Security from liability for such violations.
8. Acceptance of this policy
You acknowledge that you have read this Policy and agree to all its terms and conditions. By accessing and using the Website and Services and submitting your information you agree to be bound by this Policy. If you do not agree to abide by the terms of this Policy, you are not authorized to access or use the Website and Services.
9. Changes to Helium Security Privacy Policy
Helium Security will post any changes to this page. You agree to review this page before each use.
Contact Information
If you have questions about this privacy policy, please contact us.