ilminate logo
  • Home
  • Services
  • Cyber News
  • Contact
  • APEX

Privacy Policy

Effective date: October 21, 2025

ilminate, LLC ("ilminate," "we," "our," or "us") respects your privacy. This policy explains how we collect, use, and protect personal information when you visit our website or use our cybersecurity services.

Information We Collect

From Website Visitors

  • Contact information: name, email address, company name, phone number (via contact forms and audit requests)
  • Email domain information for audit purposes
  • Website usage data (pages visited, time on site) via standard analytics

From Email Security Service Clients

  • Email metadata (headers, sender information, recipient information, timestamps)
  • Domain DNS records (SPF, DKIM, DMARC configurations)
  • Email authentication results and pass/fail data
  • Mailbox access via Microsoft Graph API (read only for threat analysis)
  • Threat intelligence data and security event logs

From Endpoint Protection (Wazuh EDR) Clients

  • Endpoint device information (hostname, IP address, OS version)
  • Security event logs and alerts
  • File hashes and process information
  • Network connection data
  • User activity logs on monitored endpoints

How We Use Information

  • To deliver requested cybersecurity services, audits, and threat analysis
  • To detect, prevent, and respond to security threats
  • To maintain and improve our APEX threat intelligence platform
  • To respond to inquiries and provide customer support
  • To comply with legal obligations and enforce agreements

Data Storage and Processing

We process and store data using the following infrastructure:

  • Amazon Web Services (AWS) for cloud infrastructure (Lambda, DynamoDB, S3)
  • Microsoft Azure/365 for Graph API integration
  • Wazuh open source platform for endpoint security monitoring

Data is encrypted in transit (TLS 1.2+) and at rest (AES-256).

Data Retention

  • Email audit results: 90 days (standard)
  • Threat intelligence data: Duration of active service
  • Security event logs: 30 to 90 days depending on service tier
  • Contact and account information: Duration of business relationship plus legally required retention period

Data Security

As a cybersecurity services provider, we implement industry appropriate security measures including:

  • Encryption of data in transit and at rest
  • Role based access control and multi factor authentication
  • Regular security audits and vulnerability scanning
  • Incident response procedures and monitoring

However, no security method is perfect. While we work diligently to protect your data, we cannot guarantee absolute security and are not liable for unauthorized access or data breaches resulting from factors beyond our reasonable control.

Data Sharing

We do not sell personal information. We may share data with:

  • Trusted service providers who help operate our infrastructure (AWS, Microsoft) under contract and only as necessary
  • Law enforcement or regulators when required by law
  • Professional advisors (lawyers, accountants) under confidentiality obligations

Third Party Services

Our services rely on third party platforms including AWS, Microsoft Graph API, and Wazuh. We are not responsible for the privacy practices, security, or availability of these third party services.

Cookies and Tracking Technologies

We use cookies and similar tracking technologies to enhance your experience on our website and analyze site usage.

What Are Cookies?

Cookies are small text files that are placed on your device when you visit a website. They are widely used to make websites work more efficiently and provide information to website owners.

Types of Cookies We Use

  • Essential Cookies: These cookies are necessary for the website to function properly. They enable core functionality such as security, network management, and accessibility. These cookies cannot be disabled.
  • Analytics Cookies: These cookies help us understand how visitors interact with our website by collecting and reporting information anonymously. This includes pages visited, time spent on pages, and general navigation patterns.

Purposes for Cookie Use

  • To ensure website functionality and security
  • To analyze website traffic and user behavior
  • To improve website performance and user experience
  • To understand which content is most valuable to visitors

Third-Party Cookie Providers

We may use third-party analytics services that place cookies on your device. These services help us understand website usage patterns. Currently, we use standard web analytics tools. Any third-party providers will be listed here and are subject to their own privacy policies.

Managing Your Cookie Preferences

You can manage your cookie preferences at any time:

  • Use the cookie banner that appears when you first visit our site to accept or reject non-essential cookies
  • Click "Preferences" in the cookie banner to customize which types of cookies you allow
  • Most web browsers allow you to control cookies through their settings. You can set your browser to refuse cookies or alert you when cookies are being sent
  • Note that disabling certain cookies may impact your experience on our website

To opt out of analytics cookies, you can use the cookie preferences tool or contact us at hello@ilminate.com.

Your Rights and Choices

You may contact us at hello@ilminate.com to:

  • Access your personal information
  • Request corrections to inaccurate data
  • Request deletion of your information (subject to legal and contractual limitations)
  • Opt out of marketing communications

Regulated Industries

If you operate in a regulated industry (healthcare, finance, etc.), additional terms may apply. Healthcare clients subject to HIPAA will require a separate Business Associate Agreement (BAA).

Children's Privacy

Our services are intended for business use and not directed to children under 13. We do not knowingly collect information from children.

Changes to This Policy

We may update this policy from time to time. The "Effective date" at the top reflects the latest version. Continued use of our services after changes constitutes acceptance.

Contact

ilminate, LLC
Wilmington, NC
Email: hello@ilminate.com
Website: www.ilminate.com

ilminate Logo

Services

  • Email Security
  • Endpoint Protection
  • Security Training
  • Ransomware Defense

Company

  • Why ilminate Exists
  • Contact
  • APEX
  • Integration Guide

Legal

  • Privacy Policy
  • Terms of Service
  • Legal Disclaimer
  • Cookie Preferences
ilminate Logo

© 2025 ilminate, LLC — Wilmington, NC