Onward Technologies

Privacy Policy

Privacy Policy

Last Updated: August 19, 2025

Introduction

Onward Technologies, Inc is committed to AICPA SOC 2 standards, respects your privacy and is committed to protecting it through compliance with this Privacy Policy.

 

Scope

This Privacy Policy applies to all information we collect, use, or disclose about you, whether through our websites or mobile applications.

 

Information We Collect

To deliver managed IT and security services effectively and to maintain our website, we collect the following categories of information:

 

1. Client Account & Service Information

    1. Contact details (name, job title, business email address, phone number).
    2. Company information (organization name, billing address, service entitlements).
    3. Authentication data (usernames, hashed passwords, MFA tokens, access credentials).

 

2. Systems, Network & Security Data

    1. Device and system identifiers (hostnames, IP addresses, MAC addresses).
    2. Network traffic logs and telemetry
    3. Security alerts, audit logs, and endpoint event
    4. Configuration files, firewall rules, and other technical information necessary for monitoring and defense.

 

3. Support & Communication Records

    1. Service tickets, emails, and call logs related to support
    2. Notes and correspondence from technical teams assisting with incidents or
    3. Recordings of training sessions or consulting

 

4. Website & Online Interactive Data

    1. Website usage data (IP address, browser type, device information, operating system).
    2. Pages visited, time spent on site, and referring/exit
    3. Cookies and similar tracking technologies used for analytics and site
    4. Information voluntarily submitted through online forms (e.g., inquiries, demo requests, newsletter sign-ups).

Interaction with embedded content (e.g., videos, articles) may result in data collection by third parties.

 

5. Security & Monitoring Data

    1. Website and network traffic patterns analyzed for security
    2. Logs of suspicious or potentially malicious activity (e.g., intrusion attempts, denial-of- service attacks).
    3. Metadata and forensic artifacts collected to investigate

 

How We Use Your Information

1. Service Delivery: We collect and process information to ensure the effective delivery of our Managed Services Provider (MSP) and Managed Security Services Provider (MSSP) This includes using customer data to:

    1. Account Management & Authentication: Verify identities, provision accounts, manage user access, and provide secure login to our platforms and services.
    2. Service Operations: Monitor, maintain, and troubleshoot client systems, networks, and security infrastructure to deliver agreed-upon support and ensure uptime, availability, and security.
    3. Threat Detection & Response: Analyze system logs, network activity, and endpoint telemetry to identify, investigate, and respond to potential security threats or
    4. Compliance & Reporting: Generate reports and dashboards to help clients meet regulatory, contractual, or audit requirements.
    5. Customer Support: Use relevant information to respond to service requests, incidents, or inquiries submitted through help desk tickets, phone calls, or emails.
    6. System Improvements: Aggregate and analyze service usage patterns to improve performance, reliability, and the overall security posture of the services we

 

2. Website Traffic: In addition to client service delivery, we may also collect limited information when you visit our website. This includes:

    1. Log Data: IP addresses, browser type, operating system, and referring/exit pages to monitor performance, security, and usage trends.
    2. Cookies & Tracking Technologies: Session cookies and analytics tools to improve user experience, measure website effectiveness, and tailor content based on user
    3. Security Monitoring: Network and website traffic may be analyzed to detect malicious activity (e.g., denial-of-service attempts, intrusion scans, or abnormal patterns).
    4. Forms & Submissions: Information voluntarily provided through contact forms, resource downloads, or newsletter subscriptions is used only for the intended business purpose (e.g., responding to inquiries, delivering requested resources, or providing updates).

 

3. Communication: To send you newsletters, service updates, security alerts, and other relevant

Data Security Measures

We have implemented rigorous security measures in compliance with AICPA SOC 2 standards to protect your personal data.

 

Data Retention

Your data will be retained as long as necessary for the provision of services, and to meet our legal and regulatory obligations.

    1. Comments and Meta Data: Retained
    2. Registration Data: Retained as long as your account remains

 

Sharing Your Data

We will not share your data with third parties unless explicitly consented by you or required by law.

 

Your Rights

    1. Access: You have the right to request a copy of your personal
    2. Correction: You have the right to correct any inaccurate or incomplete
    3. Deletion: Under certain conditions, you may request the deletion of your

 

Compliance

We strive to maintain compliance with AICPA SOC 2 and any other relevant regulations and standards.

Changes to This Policy

We may update this policy to comply with changing legal requirements or for other reasons. Any updates will be posted on this page and, where appropriate, notified to you by email.

 

Contact Information

For any queries or concerns about this Privacy Policy, please contact us at: Slava Ruderman

Privacy@onwardtek.com