Privacy Policy

Purpose & Scope

Effective Date: February 22, 2026

This privacy policy explains how Red Saki (“we”, “us”, “our”) collect, use, store, disclose, and protect personal information processed through the Red Saki products.

When any of Red Saki’s products are deployed by an organization, Red Saki acts as a Data Processor on behalf of your employer or service provider (the Data Controller). If you are using our products as part of your employment, please consult your organization’s internal privacy policy for details on their security monitoring practices.

Google Limited Use Compliance: Our use and transfer of information received from Google APIs to any other app will adhere to the Chrome Web Store Program Policies (https://developer.chrome.com/docs/webstore/program-policies/policies), including the Limited Use requirements.

Information We Collect

We only collect data that is strictly necessary to provide cybersecurity protection and threat detection.

CategoryExamples
Device & Browser DataOS Version, Device Model, Browser Version, Installed Extensions
Network & Traffic MetadataURL of visited pages, HTTP request / response headers, timestamps, referrer
Local Storage DataCached threat signatures, local event logs, configuration settings
Security Event DataThreat signatures, malware detections, blocked requests
User Provided DataEmail address (for administrative account logins)
Telemetry / Usage MetricsFeature usage (e.g. product features that are enabled or disabled), error codes
Location DataApproximate IP Based geolocation

How We Use the Information

We process your data only for the following “Limited Use” purposes:

  1. Provide & Improve Security: To block malicious domains, prevent data exfiltration, and update threat models.
  2. Operate the Platform: To verify license status and monitor system health.
  3. Critical Communication: To send security alerts or transactional messages regarding your account.
  4. Compliance: To comply with legal obligations or enforce our Terms of Service.

Note: We do not use your data to serve advertisements, build consumer profiles, or for any purpose unrelated to the security services provided.

How We Share Information

We apply a strict “Zero-Sale” policy. We do not sell, rent, or trade any data collected via our products to third parties.

RecipientReason for SharingSafeguards
AWSHosting our backend and security enginesEncrypted at rest (AES-256) and in transit (TLS 1.2+)
Threat Intel ProvidersTo check hashes against global malware databasesData is hashed / anonymized; no PII is transmitted
Sub ProcessorsLogging or infrastructure monitoringGoverned by strict Data Processing Agreements (DPAs)
Legal AuthoritiesOnly when required by a valid, binding legal orderWe disclose only the minimum information required

Retention

Data TypeRetention Period
Raw Event Logs90 days default (admin configurable)
Aggregated analyticsIndefinitely (anonymized)
User account dataUntil account deletion
Local browser logsDeleted upon product uninstall

Suggested text: Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Security

We implement an Enterprise-grade security stack to protect your data:

  • Vulnerability Management: We conduct regular penetration testing and quarterly security audits.
  • Principle of Least Privilege (PoLP): Access to user data is strictly limited to authorized personnel with a documented business need.
  • Encryption: All data is encrypted in transit (TLS 1.2+) and at rest (AES-256-GCM).
  • Local Data Safety: Data stored within the browser is protected by Chrome’s sandbox environment.

Your Rights (GDPR / CCPA / LGPD)

Depending on your location, you may have the following rights:

  • Right to Access/Portability: Request a copy of your data in a structured format.
  • Right to Erasure: Request that we delete your personal data.
  • Right to Object/Restrict: Limit how we process your data.
  • Right to Rectification: Correct inaccurate information.

To exercise these rights, please contact [email protected]. If you are an employee of a client organization, please contact your IT administrator or service provider first.

Changes to this policy

We may update this policy to reflect changes in our legal requirements. We will notify you of any material changes via a notification within the product and to administrators. Continued use after the “Effective Date” constitutes acceptance.

Contact

Privacy Team Email: [email protected]