Privacy Policy for Seaforce Solutions
Welcome to Seaforce Solutions' Privacy Policy. This policy details how we handle your personal information collected through our website.
Information Collection, Use, and Sharing
Seaforce Solutions is the exclusive owner of any information collected through this website. We gather information you voluntarily provide via email or direct communication. We do not sell or rent this information to others.
We use your information solely to respond to your inquiries and fulfill your requests. We may need to share your information with trusted third parties only as necessary to complete your request, such as for processing orders. Otherwise, your information remains within our organization.
With your permission, we may contact you in the future via email to update you on new products, services, or changes to this Privacy Policy.
Data Security
Protecting your information is our top priority. We implement stringent measures to secure your data both online and offline.
When you submit sensitive information, it is encrypted and transmitted securely. You can verify this by looking for a closed lock icon in your browser or checking that the URL begins with "https."
In addition to online security, we ensure robust protection for your data offline. Access to personal information is limited to employees who need it for their job responsibilities (e.g., billing or customer service). Our servers and storage systems are maintained in a secure environment.
Policy Updates
We may update our Privacy Policy from time to time. Any changes will be posted on this page to keep you informed.
DFARS 252.204-7012 Compliance
Seaforce Solutions is committed to complying with DFARS 252.204-7012 and NIST SP 800-171 standards. We have established comprehensive security protocols to protect defense-related information and manage cyber incident reporting.
In the event of a security breach, we will:
Notify the prime contractor (or the next higher-tier subcontractor) when requesting an exception from NIST SP 800-171 security requirements, as outlined in paragraph (b)(2)(ii)(B) of the clause.
Provide the incident report number assigned by the Department of Defense to the prime contractor (or next higher-tier subcontractor) as soon as practicable when reporting a cyber incident to the DoD.
If you have any questions about our Privacy Policy or how we handle your information, please contact us.