Privacy Policy
Last updated: April 14, 2026
Transaction Science, Inc. operates CyberSecurityOS. This policy describes how we handle security telemetry.
1. Security Telemetry
CyberSecurityOS processes log events, network flow records, endpoint telemetry, identity signals, and configuration snapshots. This data is processed strictly for detection, investigation, and response within the customer tenant.
2. Tenant Isolation
Every customer operates in its own tenant with tenant-scoped keys, storage, and indices. Cross-tenant data access is not possible without explicit federated threat-intel sharing configured by the customer.
3. Threat Intel Sharing
If a customer opts into federated threat-intel sharing, only anonymized indicators (IoCs, TTPs) are shared — never raw telemetry, never PII. Differential privacy applied where statistical.
4. Retention
Default retention is 400 days for standard telemetry and 7 years for case files and forensic artifacts. Customers may configure retention per data class to meet jurisdiction-specific requirements.
5. Contact
Privacy inquiries: [email protected]