privacy_tip Privacy Policy
Protecting your data and operational security
Information Collection and Use
DENDAT.SECURE is committed to protecting the privacy and security of our users' information. We collect and process information necessary to provide elite tactical security services while maintaining the highest standards of operational security.
Types of Information Collected
- Account Information: Username, encrypted credentials, organization affiliation
- Operational Data: Stream metadata, telemetry data, mission logs
- Technical Information: Device identifiers, IP addresses, connection logs
- Security Metrics: Access patterns, authentication events, security assessments
Data Protection and Encryption
All data processed by DENDAT.SECURE is protected using military-grade encryption standards:
AES-256 Encryption
All data encrypted in transit and at rest
Zero-Trust Architecture
Continuous verification and access control
FIPS 140-2 Compliance
Government-grade security standards
Data Sharing and Disclosure
DENDAT.SECURE operates under strict data sharing policies designed for tactical operations:
Authorized Sharing
- Within your authorized organization or command structure
- With explicitly designated mission partners
- For emergency response and officer safety purposes
Legal Compliance
We may disclose information when required by law, court order, or to protect national security interests, consistent with applicable legal frameworks and operational requirements.
Data Retention
Operational data is retained according to tactical requirements and legal obligations:
Your Rights and Controls
As a DENDAT.SECURE user, you have specific rights regarding your personal data:
Access
Request access to your personal data
Correction
Request correction of inaccurate data
Deletion
Request deletion subject to operational requirements
Processing Limitation
Request to limit data processing
International Operations
DENDAT.SECURE operates globally with data processing centers in multiple jurisdictions. We comply with international data protection laws including GDPR, CCPA, and other applicable regulations while maintaining operational security requirements.
Security Measures
We implement comprehensive security measures to protect your information:
- Multi-factor authentication and biometric verification
- Network segmentation and air-gapped systems for classified operations
- Regular security audits and penetration testing
- Employee background checks and security clearance verification
- Incident response and forensic capabilities
Contact Information
For privacy-related questions or requests, contact our Data Protection Office: