Contact Us
Company

Privacy Policy

How Rabinnson collects, uses, protects, and governs personal and business information.

Policy details

Read by section

Use quick links to jump between sections. Expand each section for full details.

1. Scope and applicability

This policy applies to website visitors, inquiry submissions, clients, vendor representatives, and job applicants interacting with Rabinnson channels.

  • Covers data submitted through website forms, email, and client onboarding workflows.
  • Applies to all advisory domains including IT services, legal operations, and compliance consulting.
  • For signed client engagements, contractual data-processing clauses supersede this general website policy where required.
2. Information we collect

We collect only information required to assess requests, provide services, and satisfy legal obligations.

  • Contact data: name, email, phone, company, and inquiry details.
  • Engagement data: documents, compliance artifacts, contracts, and implementation notes provided during delivery.
  • Technical data: basic analytics, device/browser metadata, and security logs for platform reliability and abuse prevention.
3. How we use your information

Collected information is used to communicate, deliver services, secure operations, and improve service quality.

  • Respond to inquiries, provide proposals, and coordinate project communication.
  • Deliver advisory services, maintain records, and create evidence trails for compliance outcomes.
  • Protect systems, investigate misuse, and maintain service continuity.
  • Comply with applicable laws, audits, and regulatory disclosure requirements.
4. Data sharing and disclosures

We do not sell personal data. Limited sharing occurs only for service delivery, legal compliance, or security requirements.

  • Authorized service providers (for example email, infrastructure, and document tools) acting under confidentiality obligations.
  • Professional advisors and auditors, where required for contracted services or legal obligations.
  • Regulators or law-enforcement authorities only when legally required.
5. Security controls

We implement administrative, technical, and process controls designed for confidentiality, integrity, and availability.

  • Role-based access control, least-privilege principles, and controlled data sharing workflows.
  • Encryption in transit and secure access controls on managed systems.
  • Periodic review of retention, access, and incident response readiness.
6. Your rights and requests

Subject to applicable law, you may request access, correction, deletion, or objection to processing.

  • Submit privacy requests by email with identity and request details.
  • We may ask for verification before processing rights requests.
  • Where legal obligations apply, we may retain minimum required records.