Skip to main content

Privacy Policy

Last updated: April 14, 2026

Transaction Science, Inc. operates CyberSecurityOS. This policy describes how we handle security telemetry.

1. Security Telemetry

CyberSecurityOS processes log events, network flow records, endpoint telemetry, identity signals, and configuration snapshots. This data is processed strictly for detection, investigation, and response within the customer tenant.

2. Tenant Isolation

Every customer operates in its own tenant with tenant-scoped keys, storage, and indices. Cross-tenant data access is not possible without explicit federated threat-intel sharing configured by the customer.

3. Threat Intel Sharing

If a customer opts into federated threat-intel sharing, only anonymized indicators (IoCs, TTPs) are shared — never raw telemetry, never PII. Differential privacy applied where statistical.

4. Retention

Default retention is 400 days for standard telemetry and 7 years for case files and forensic artifacts. Customers may configure retention per data class to meet jurisdiction-specific requirements.

5. Contact

Privacy inquiries: [email protected]