Privacy Policy
We are committed to protecting your personal information and being transparent about how we collect, use, and share data.
Last updated: March 1, 2024
Overview
This Privacy Policy describes how COBOLpro Inc. and its affiliates collect, use, disclose, and safeguard your information when you use our services, website, and applications. We are committed to protecting your privacy and maintaining the confidentiality of your personal information.
Information We Collect
Personal Information
Information that identifies you personally
- Name and contact information
- Email addresses and phone numbers
- Job title and company information
- Authentication credentials
- Payment and billing information
Technical Information
Information about your use of our services
- IP addresses and device identifiers
- Browser type and version
- Operating system information
- Usage patterns and preferences
- Log files and error reports
COBOL System Data
Information from your COBOL systems for analysis
- Source code structure (not content)
- System metadata and configurations
- Performance and usage metrics
- Dependency relationships
- Documentation artifacts
How We Use Your Information
Service Provision
To provide, maintain, and improve our COBOL analysis and documentation services
Communication
To communicate with you about our services, support, and important updates
Customization
To personalize your experience and provide relevant content and recommendations
Security
To protect our services and users from security threats and unauthorized access
Legal Compliance
To comply with applicable laws, regulations, and legal processes
Business Operations
To conduct our business operations, including analytics and service improvement
Information Sharing
We do not sell your personal information to third parties. We may share your information in the following circumstances:
Service Providers
With trusted third-party service providers who assist us in operating our business
Legal Requirements
When required by law, regulation, legal process, or governmental request
Business Transfers
In connection with mergers, acquisitions, or other business transactions
Consent
When you have given explicit consent for specific sharing purposes
Protection
To protect our rights, property, safety, or that of our users or others
Security Measures
We implement comprehensive security measures to protect your information
- End-to-end encryption for data in transit and at rest
- Multi-factor authentication and access controls
- Regular security audits and penetration testing
- SOC 2 Type II and ISO 27001 compliance
- Employee security training and background checks
- Incident response and breach notification procedures
Contact Us
If you have questions about this Privacy Policy or our privacy practices, please contact us: