Privacy policy

1. General provisions

The purpose of this Privacy Policy is to explain important information related to the activities undertaken as part of the processing of your personal data, which are collected via the website, contact form, or e-mail correspondence.

2. The administrator of personal data

The administrator of personal data collected via the website https://prebytes.com is PREBYTES sp. z o.o. sp.k., headquarters address: Sandomierska 6 Street, 37-300 Leżajsk, entered in the register of entrepreneurs under the KRS number: 0000731964, NIP: 8161706689; REGON: 380233646.
If you have any questions or concerns regarding the privacy policy, please contact the Administrator via:

  • sending an e-mail to the following address: hello@prebytes.com
  • sending correspondence to the following address: PREBYTES sp. z o.o. sp.k. Sandomierska 6 Street, 37-300 Leżajsk

3. Processed data

The administrator processes the following data:

  • First name and last name
  • E-mail address
  • Phone number
  • User’s IP addresses

The data mentioned above is provided during product inquiries, purchasing products/services and as part of our website's functionality, e.g., contact forms and chats and the possibility of providing services by PREBYTES sp.z o.o. sp.k.

The User's personal data may be transferred to service providers used by the Administrator when running a website. The entities mentioned above process data based on contracts concluded with the Administrator and only at his request.

4. Purpose of data processing

The User’s personal data is processed for the purpose of:

5. How the data is used

Users' data may be collected automatically by the server or provided via the contact form, subscription to the newsletter.

No information is sold or rent to third-parties.
No information is shared with advertising companies.
No information is mined and harvested for personal and behavioral trends.

6. Data storage period

Personal data is stored for the period necessary to perform obligations and after that time for a period resulting from the provisions of generally applicable law.

7. Rights including the GDPR related to the processing of personal data

Under the GDPR (General Data Protection Regulation of April 27, 2016), each User has the rights listed below:

In order to exercise the rights referred to in point 7, you can send appropriate an e-mail to the following address: hello ( a t ) prebytes.com.

8. Cookies

The website uses cookies:

a.
Cookies store the necessary data for the proper display and functioning the website. They also provide opportunity to adjust, optimize the content to the preferences and individual needs of the User. Cookies enable traffic analysis and the development od website visit statistics.
b.
The website uses the follwoing types of “cookies”: session and permanent
  • “Session” cookies are temporary files that are stored on the User’s device until logging out, turning off the web browser or leaving the website.
  • “Permament” cookies are permament files that collected for defined time determined by the parameter in the “cookie” file or until they are manually deleted by the user.
c.
The administrator uses his own cookies in order to better understand how the user interacts with the content of the website. The files collect information as follows:
  • how the user uses the website
  • the type of page from which the user was redirected
  • the number of visits
  • the duration of the user’s visit to the website.
  • IP address
Information above does not record specific personal data of the user, but it is used to compile statistics on the use of the website. We collect the stats using our own software which is storing only website details, screen resolution, IP address and time of visit only to detect bots and web crawlers.
d.
The website also uses the following types of cookies:
  • Necessary cookies (Essential cookies)
  • Secure cookies
  • Perfomance cookies (Essential cookies)
  • Functional and marketing cookies deployed only as a part of live chat service (Google privacy policy https://policies.google.com/privacy?hl=en-US )
e.
The user can manage cookies by editing the software (web browser) settings. The user has the right to opt-out of storing cookies on his device or permanently deleting saved files.
f.
The website owner informs that the website contains links to other websites. The website owner recommends to read the privacy policies in force there, as he is not responsible for them.
g.
Third party tools which might have been used:
  • Google - font and CSS files hosting
  • Google Analytics and Google TagManager - analytics of website visitors for marketing purposes
Google’s privacy policy can be found at: https://policies.google.com/privacy?hl=en-US
  • OVH and Webflow - this website and additional files
We do not use any third parties to collect or process visitors data unless you agree on them. We always use our own statistics collector to log visitors in our internal purpose only.
h.
More detailed information on our partners, processors and recipients of personal data can be obtained at hello ( at ) prebytes.com

9. Privacy Policy changes

In the event of a change in the current privacy policy, appropriate modifications will be made to the content of the privacy policy.

Close window
Get STARTED

Get all of the things today!

Free, no obligation consultation. You can either give us a call, or complete the form if you prefer email.

Via phone
Give us a call and ask, we won’t hassle.

+44 7915-525-434

Not now, close window

Let us know how we can reach you

More about a privacy policy can be found here.
Thank you!

Your submission has been received! We will contact you shortly.
Close window
Oops! Something went wrong while submitting the form.
What else can you do to protect your business?

BrowserWall DNS

Protect network and block access to dangerous websites.

See more

Website Protection

Ensure business continuity and defend your online assets.

See more

MPShield

Prevent Account Takeover, stop fraud and money laundering.

See more

DynaProfile

Device digital fingerprint and Strong User Authentication (SCA)

See more

Remote Desktop Detection

Prevent remote access scam and remote desktop takeover.

See more

Mobile Application Security

Protect your application against emulators, malware, and takeover.

See more

Cyber Threat Intelligence

Real-time access to online threats for your IDS/IPS, MISP, SIEM, and incident response team.

See more

Dark Web Investigation

Investigate the internet for harmful content for your organization.

See more

Anti-Malware

Protect your business against malware attacks.

See more

Cyber Threat Intelligence

Real-time access to online threats for your IDS/IPS, MISP, SIEM, and incident response team.

See more

Threat Analysis

Professional cyberthreats analysis

See more

Incident Handling

Professional cyberthreats mitigation

See more

BrowserWall DNS

Protect network and block access to dangerous websites.

See more

Dark Web Investigation

Investigate the internet for harmful content for your organization.

See more

Anti-phishing

Protect your brand against phishing attacks.

See more

SIRT News

Cybersecurity awareness newsletter to keep your organization up to date.

See more
What else can you do to protect your business?

Remote Desktop Detection

Prevent remote access scam and remote desktop takeover.

See more

DynaProfile

Device digital fingerprint and Strong User Authentication (SCA)

See more

Website Protection

Ensure business continuity and defend your online assets.

See more

MPShield

Prevent Account Takeover, stop fraud and money laundering.

See more

DynaProfile

Device digital fingerprint and Strong User Authentication (SCA)

See more

BrowserWall DNS

Protect network and block access to dangerous websites.                

See more

Mobile Application Security

Protect your application against emulators, malware, and takeover.

See more

Cyber Threat Intelligence

Real-time access to online threats for your IDS/IPS, MISP, SIEM, and incident response team.

See more

Dark Web Investigation

Investigate the internet for harmful content for your organization.

See more

Anti-Malware

Protect your business against malware attacks.

See more

Incident Handling

Professional cyberthreats mitigation.

See more