SOC as a Service Honduras | Centro de Operaciones de Seguridad | GLADiiUM

SOC as a Service Honduras - Protección 24/7

El único Centro de Operaciones de Seguridad con presencia física en San Pedro Sula y Tegucigalpa – monitoreo continuo, respuesta activa y cumplimiento CNBS para bancos, manufactura y gobierno hondureño.

Honduras enfrenta un panorama de amenazas cibernéticas que se intensifica cada año. Ransomware dirigido a instituciones financieras, fraude de correo electrónico empresarial (BEC) contra empresas del Valle de Sula, ataques a infraestructura gubernamental en Tegucigalpa, y amenazas persistentes avanzadas que comprometen redes de manufactura durante semanas antes de ser detectadas. Frente a este escenario, el modelo tradicional de seguridad reactiva – esperar a que algo falle y entonces responder – ya no es suficiente.

Un Centro de Operaciones de Seguridad (SOC) es la respuesta: un equipo de analistas especializados que monitorea tu infraestructura las 24 horas del día, los 7 días de la semana, los 365 días del año, con la tecnología y los procesos para detectar amenazas en minutos y contenerlas antes de que causen daño. SOC as a Service te da acceso a esta capacidad como servicio administrado – sin la inversión de construir un SOC interno, sin el desafío de reclutar y retener analistas certificados en Honduras, y con la garantíaa de un equipo que ya conoce el contexto regulatorio, las amenazas locales y los sectores económicos del país.

GLADiiUM Technology Partners opera el NSOC (Network & Security Operations Center) más avanzado con presencia física en Honduras u2014 con oficinas activas en San Pedro Sula y Tegucigalpa, atendiendo a clientes del sector financiero, manufactura, maquilas, telecomunicaciones y gobierno desde hace más de 20 años.

¿Qué es un SOC y por qué Honduras lo necesita ahora?

Un Security Operations Center (SOC) – o Centro de Operaciones de Seguridad en español – es una unidad centralizada que combina tecnología, procesos y personas para detectar, analizar y responder a incidentes de ciberseguridad en tiempo real. A diferencia de un antivirus o un firewall que operan de forma autónoma, el SOC pone inteligencia humana sobre la telemetría de toda tu infraestructura: endpoints, servidores, aplicaciones, redes, correo electrónico y entornos cloud.

Honduras tiene razones específicas y urgentes para priorizar esta capacidad en 2025:

  • La Resolución CNBS GRD No.793/16-12-2022 obliga a todas las instituciones supervisadas – bancos, aseguradoras, cooperativas, casas de cambio – a implementar monitoreo continuo de seguridad, gestión de incidentes y planes de continuidad que requieren exactamente las capacidades que provee un SOC.
  • El sector manufactura y maquila del Valle de Sula representa el mayor polo industrial de Centroamérica y es objetivo prioritario de grupos de ransomware que buscan interrumpir cadenas de suministro de clientes internacionales para maximizar presión de pago.
  • La escasez de talento local en ciberseguridad hace prácticamente imposible para la mayoría de organizaciones hondureñas construir y mantener un equipo SOC interno competente. El modelo de SOC as a Service resuelve este problema de raíz.
Analista de ciberseguridad SOC monitoreando alertas en tiempo real — GLADiiUM NSOC Honduras
Analista SOC de GLADiiUM monitoreando amenazas en tiempo real desde el NSOC Honduras

Monitoreo 24/7/365

Vigilancia continua sin turnos ni brechas u2014 analistas GLADiiUM activos en todo momento desde nuestras instalaciones en San Pedro Sula y Tegucigalpa.

Detección en minutos

SIEM correlaciona miles de eventos por segundo. Alertas validadas por analistas humanos en menos de 15 minutos para amenazas de alta severidad.

Respuesta activa

Con playbooks preautorizados, aislamos endpoints comprometidos, bloqueamos comunicaciones C2 y contenemos incidentes antes de que se propaguen.

Threat hunting proactivo

Bu00fasqueda activa de atacantes que ya estu00e1n dentro de tu red pero no han activado alertas todavu00eda u2014 detectamos lo que las herramientas automatizadas no ven.

Cumplimiento CNBS 793/2022

Generamos toda la evidencia de auditoru00eda que la Resoluciu00f3n CNBS GRD 793/2022 exige u2014 logs, reportes de incidentes, mu00e9tricas de monitoreo y dashboards ejecutivos.

Operaciones bilingüe

Todo nuestro equipo opera en espau00f1ol. Reportes, alertas, llamadas de incidente y comunicaciones ejecutivas en el idioma de tu organizaciu00f3n.

Dashboard de SIEM y monitoreo de seguridad 24/7 — GLADiiUM SOC as a Service Honduras
Dashboard SIEM y cumplimiento CNBS 793/2022 u2014 GLADiiUM SOC as a Service Honduras

La Resoluciu00f3n CNBS 793/2022 y el SOC u2014 Lo que tu Banco o Aseguradora Debe Saber

La Resoluciu00f3n GRD No.793 del 16 de diciembre de 2022 de la Comisiu00f3n Nacional de Bancos y Seguros actualizu00f3 las Normas para la Gestiu00f3n de las Tecnologu00edas de la Informaciu00f3n, Ciberseguridad y Continuidad del Negocio para todas las instituciones supervisadas en Honduras. Esta normativa establece obligaciones concretas que van mucho mu00e1s allu00e1 de tener un antivirus instalado:

  • Monitoreo continuo de todos los sistemas que acceden a informaciu00f3n financiera sensible u2014 requiere SIEM operando 24/7
  • Gestiu00f3n de incidentes documentada con tiempos de detecciu00f3n, contenciu00f3n y erradicaciu00f3n medibles
  • Anu00e1lisis de vulnerabilidades periu00f3dico con evidencia de remediaciu00f3n
  • Plan de continuidad del negocio probado y actualizado con componente de ciberseguridad
  • Reportes de incidentes a la CNBS en plazos definidos cuando ocurren brechas

GLADiiUM entiende la Resoluciu00f3n 793/2022 mejor que cualquier otro proveedor en Honduras porque llevamos mu00e1s de 20 au00f1os trabajando con el sector financiero hondureu00f1o. Nuestro SOC as a Service fue diseu00f1ado para generar automu00e1ticamente la documentaciu00f3n y evidencia que los auditores de la CNBS requieren durante las inspecciones.

Sectores que Atendemos en Honduras

Sector Financiero y Cooperativas

Bancos comerciales, cooperativas de ahorro y cru00e9dito, aseguradoras, casas de cambio y financieras supervisadas por la CNBS. Nuestro SOC genera toda la evidencia de cumplimiento requerida por la Resoluciu00f3n 793/2022 y los lineamientos de gestiu00f3n de riesgos de TI de la CNBS. Conocemos los sistemas core banking mu00e1s utilizados en Honduras y configuramos alertas especu00edficas para detectar fraude en tiempo real.

Manufactura y Maquilas u2014 Valle de Sula

San Pedro Sula es el corazu00f3n industrial de Honduras y Centroamu00e9rica. Las maquilas textiles, empresas de manufactura y parques industriales del Valle de Sula son objetivos prioritarios de ransomware industrial que busca interrumpir u00f3rdenes de producciu00f3n internacionales. GLADiiUM tiene presencia fu00edsica en SPS y analistas que entienden la arquitectura IT/OT de estos entornos.

Gobierno y Sector Pu00fablico

Ministerios, secretaru00edas, municipalidades e instituciones autu00f3nomas que procesan datos ciudadanos y operan infraestructura cru00edtica del Estado hondureu00f1o. GLADiiUM trabaja con entidades del sector pu00fablico con los mu00e1s altos estu00e1ndares de confidencialidad y cumplimiento normativo local.

Telecomunicaciones y Tecnologu00eda

Operadores de telecomunicaciones, proveedores de servicios de internet, empresas de tecnologu00eda y desarrolladoras de software que requieren protecciu00f3n de su infraestructura cru00edtica y la de sus clientes.

Salud y Universidades

Hospitales privados, clu00ednicas especializadas y universidades que manejan datos de pacientes y estudiantes bajo obligaciones crecientes de privacidad y protecciu00f3n de datos en Honduras.

SOC Interno vs SOC as a Service u2014 La Decisiu00f3n Correcta para Honduras

Muchas organizaciones hondureu00f1as consideran en algu00fan momento construir su propio SOC interno. La realidad del mercado local hace que esta opciu00f3n sea impru00e1cticable para la inmensa mayoru00eda:

Un SOC interno maduro requiere entre 6 y 8 analistas certificados (CISSP, GCIA, GCIH, OSCP) trabajando en turnos rotativos, una plataforma SIEM con licencias empresariales, inteligencia de amenazas actualizada, herramientas de respuesta a incidentes, y un programa de capacitaciu00f3n continua. El costo operativo anual de esta capacidad en Honduras u2014 asumiendo que puedas reclutar y retener el talento, lo cual es el mayor desafu00edo u2014 oscila entre $800,000 y $1.2 millones de du00f3lares anuales.

GLADiiUM’s SOC as a Service entrega capacidad equivalente o superior como servicio mensual, sin inversiu00f3n inicial en infraestructura, sin riesgo de rotaciu00f3n de talento, y con la ventaja adicional de analistas que ya conocen las amenazas especu00edficas que afectan al mercado hondureu00f1o.

Solicita una Evaluación Gratuita de tu Postura de Seguridad en Honduras

Nuestro equipo en San Pedro Sula y Tegucigalpa evaluaru00e1 tu infraestructura actual, identificaru00e1 las brechas mu00e1s cru00edticas frente a la Resoluciu00f3n CNBS 793/2022, y te presentaru00e1 un diseu00f1o de SOC as a Service adaptado a tu organizaciu00f3n u2014 sin costo ni compromiso.

Preguntas Frecuentes u2014 SOC as a Service Honduras

u00bfQuu00e9 es un SOC as a Service en Honduras?

Un SOC as a Service (Security Operations Center como Servicio) en Honduras es un modelo en el que una empresa especializada como GLADiiUM provee las capacidades de monitoreo de seguridad, detecciu00f3n de amenazas y respuesta a incidentes como servicio administrado, sin que la organizaciu00f3n cliente necesite construir su propio centro de operaciones. El cliente recibe protecciu00f3n 24/7 de analistas certificados que monitorean su infraestructura en tiempo real, generan alertas validadas y responden a incidentes segu00fan playbooks preacordados.

u00bfCuu00e1l es la diferencia entre un SOC y un NOC en Honduras?

Un NOC (Network Operations Center) monitorea la disponibilidad y rendimiento de la infraestructura de red u2014 servidores, conectividad, aplicaciones u2014 y actu00faa cuando algo deja de funcionar. Un SOC (Security Operations Center) monitorea especu00edficamente amenazas de seguridad cibernu00e9tica u2014 intrusiones, malware, comportamiento anu00f3malo, intentos de robo de datos u2014 y actu00faa para contener ataques. GLADiiUM opera un NSOC (Network and Security Operations Center) que combina ambas capacidades bajo un mismo techo, ofreciendo visibilidad total sobre disponibilidad y seguridad desde nuestras instalaciones en Honduras.

u00bfCumple el SOC as a Service de GLADiiUM con la Resoluciu00f3n CNBS 793/2022?

Su00ed. El servicio SOC as a Service de GLADiiUM fue diseu00f1ado especu00edficamente para generar la evidencia de auditoru00eda que la Resoluciu00f3n CNBS GRD No.793/16-12-2022 requiere de las instituciones supervisadas en Honduras. Esto incluye logs de monitoreo continuo, reportes de incidentes con tiempos de detecciu00f3n y contenciu00f3n documentados, evidencia de anu00e1lisis de vulnerabilidades, y dashboards ejecutivos que demuestran la madurez del programa de seguridad ante inspectores de la CNBS.

u00bfGLADiiUM tiene presencia fu00edsica en Honduras para el SOC?

Su00ed. A diferencia de proveedores regionales o internacionales que ofrecen SOC desde fuera del pau00eds, GLADiiUM tiene oficinas operativas en San Pedro Sula (Valle de Sula) y Tegucigalpa (Francisco Morazu00e1n). Nuestros analistas de seguridad conocen el mercado hondureu00f1o, hablan espau00f1ol como idioma principal, entienden la regulaciu00f3n local y estu00e1n disponibles para visitas presenciales, evaluaciones on-site y respuesta a incidentes en persona cuando la situaciu00f3n lo requiere.

u00bfCuu00e1nto cuesta el SOC as a Service de GLADiiUM en Honduras?

El costo del SOC as a Service varu00eda segu00fan el tamau00f1o de la organizaciu00f3n, el nu00famero de endpoints y activos monitoreados, el nivel de cobertura requerido y los servicios adicionales incluidos (threat hunting, pentest, gestiu00f3n de vulnerabilidades). GLADiiUM ofrece una evaluaciu00f3n gratuita de la postura de seguridad que permite dimensionar el servicio correctamente antes de cualquier propuesta econu00f3mica. Contu00e1ctanos a travu00e9s de [email protected] o al +504-2544-0147 para coordinar la evaluaciu00f3n.

u00bfQuu00e9 sectores en Honduras se benefician mu00e1s del SOC as a Service?

Los sectores con mayor necesidad de SOC en Honduras son: (1) Sector financiero supervisado por la CNBS u2014 bancos, cooperativas, aseguradoras y casas de cambio que deben cumplir la Resoluciu00f3n 793/2022; (2) Manufactura y maquilas del Valle de Sula, objetivo frecuente de ransomware industrial; (3) Telecomunicaciones e ISPs; (4) Gobierno central y municipal; (5) Hospitales y centros de salud privados; (6) Universidades y centros educativos. GLADiiUM tiene experiencia documentada en todos estos sectores en Honduras.

u00bfCu00f3mo funciona la respuesta a incidentes desde el SOC de GLADiiUM en Honduras?

Cuando nuestro SIEM detecta una amenaza confirmada de alta severidad, el analista de turno en el NSOC ejecuta el playbook de respuesta preacordado: au00edsla el endpoint comprometido de la red, bloquea la comunicaciu00f3n con el servidor de comando y control del atacante, notifica al contacto de seguridad del cliente segu00fan el protocolo de escalaciu00f3n, preserva evidencia forense, y documenta cada acciu00f3n con timestamp para el registro de incidente. Para clientes en San Pedro Sula o Tegucigalpa, el equipo puede coordinar respuesta presencial en horas cuando el incidente lo requiere.

You might be interested...

PRIVACY NOTICE

 
Last updated October 27, 2022
 
 
 
This privacy notice for GLADiiUM Technology Partners, Inc (“Company,” “we,” “us,” or “our), describes how and why we might collect, store, use, and/or share (“process“) your information when you use our services (“Services“), such as when you:
 
  • Engage with us in other related ways, including any sales, marketing, or events
Questions or concerns? Reading this privacy notice will help you understand your privacy rights and choices. If you do not agree with our policies and practices, please do not use our Services. If you still have any questions or concerns, please contact us at [email protected].
 
 
SUMMARY OF KEY POINTS
 
This summary provides key points from our privacy notice, but you can find out more details about any of these topics by clicking the link following each key point or by using our table of contents below to find the section you are looking for. You can also click here to go directly to our table of contents.
 
What personal information do we process? When you visit, use, or navigate our Services, we may process personal information depending on how you interact with GLADiiUM Technology Partners, Inc and the Services, the choices you make, and the products and features you use. Click here to learn more.
 
Do we process any sensitive personal information? We do not process sensitive personal information.
 
Do we receive any information from third parties? We do not receive any information from third parties.
 
How do we process your information? We process your information to provide, improve, and administer our Services, communicate with you, for security and fraud prevention, and to comply with law. We may also process your information for other purposes with your consent. We process your information only when we have a valid legal reason to do so. Click here to learn more.
 
In what situations and with which parties do we share personal information? We may share information in specific situations and with specific third parties. Click here to learn more.
 
How do we keep your information safe? We have organizational and technical processes and procedures in place to protect your personal information. However, no electronic transmission over the internet or information storage technology can be guaranteed to be 100% secure, so we cannot promise or guarantee that hackers, cybercriminals, or other unauthorized third parties will not be able to defeat our security and improperly collect, access, steal, or modify your information. Click here to learn more.
 
What are your rights? Depending on where you are located geographically, the applicable privacy law may mean you have certain rights regarding your personal information. Click here to learn more.
 
How do you exercise your rights? The easiest way to exercise your rights is by filling out our data subject request form available here, or by contacting us. We will consider and act upon any request in accordance with applicable data protection laws.
 
Want to learn more about what GLADiiUM Technology Partners, Inc does with any information we collect? Click here to review the notice in full.
 
 
TABLE OF CONTENTS
 
 
1. WHAT INFORMATION DO WE COLLECT?
 
Personal information you disclose to us
 
In Short: We collect personal information that you provide to us.
 
We collect personal information that you voluntarily provide to us when you express an interest in obtaining information about us or our products and Services, when you participate in activities on the Services, or otherwise when you contact us.
 
 
Personal Information Provided by You. The personal information that we collect depends on the context of your interactions with us and the Services, the choices you make, and the products and features you use. The personal information we collect may include the following:
  • names
 
  • phone numbers
 
  • email addresses
 
  • mailing addresses
 
Sensitive Information. We do not process sensitive information.
 
 
All personal information that you provide to us must be true, complete, and accurate, and you must notify us of any changes to such personal information.
 
 
2. HOW DO WE PROCESS YOUR INFORMATION?
 
In Short: We process your information to provide, improve, and administer our Services, communicate with you, for security and fraud prevention, and to comply with law. We may also process your information for other purposes with your consent.
 

We process your personal information for a variety of reasons, depending on how you interact with our Services, including:

 
  • To deliver and facilitate delivery of services to the user. We may process your information to provide you with the requested service.
 
  • To respond to user inquiries/offer support to users. We may process your information to respond to your inquiries and solve any potential issues you might have with the requested service.
 
  • To send administrative information to you. We may process your information to send you details about our products and services, changes to our terms and policies, and other similar information.
  • To enable user-to-user communications. We may process your information if you choose to use any of our offerings that allow for communication with another user.
 
  • To save or protect an individual’s vital interest. We may process your information when necessary to save or protect an individual’s vital interest, such as to prevent harm.
 
 
3. WHAT LEGAL BASES DO WE RELY ON TO PROCESS YOUR INFORMATION?
 
In Short: We only process your personal information when we believe it is necessary and we have a valid legal reason (i.e., legal basis) to do so under applicable law, like with your consent, to comply with laws, to provide you with services to enter into or fulfill our contractual obligations, to protect your rights, or to fulfill our legitimate business interests.
 
If you are located in the EU or UK, this section applies to you.
 
The General Data Protection Regulation (GDPR) and UK GDPR require us to explain the valid legal bases we rely on in order to process your personal information. As such, we may rely on the following legal bases to process your personal information:
  • Consent. We may process your information if you have given us permission (i.e., consent) to use your personal information for a specific purpose. You can withdraw your consent at any time. Click here to learn more.
 
  • Performance of a Contract. We may process your personal information when we believe it is necessary to fulfill our contractual obligations to you, including providing our Services or at your request prior to entering into a contract with you.
 
  • Legal Obligations. We may process your information where we believe it is necessary for compliance with our legal obligations, such as to cooperate with a law enforcement body or regulatory agency, exercise or defend our legal rights, or disclose your information as evidence in litigation in which we are involved.
 
  • Vital Interests. We may process your information where we believe it is necessary to protect your vital interests or the vital interests of a third party, such as situations involving potential threats to the safety of any person.
 
 
If you are located in Canada, this section applies to you.
 
We may process your information if you have given us specific permission (i.e., express consent) to use your personal information for a specific purpose, or in situations where your permission can be inferred (i.e., implied consent). You can withdraw your consent at any time. Click here to learn more.
 
In some exceptional cases, we may be legally permitted under applicable law to process your information without your consent, including, for example:
  • If collection is clearly in the interests of an individual and consent cannot be obtained in a timely way
 
  • For investigations and fraud detection and prevention
 
  • For business transactions provided certain conditions are met
 
  • If it is contained in a witness statement and the collection is necessary to assess, process, or settle an insurance claim
 
  • For identifying injured, ill, or deceased persons and communicating with next of kin
 
  • If we have reasonable grounds to believe an individual has been, is, or may be victim of financial abuse
 
  • If it is reasonable to expect collection and use with consent would compromise the availability or the accuracy of the information and the collection is reasonable for purposes related to investigating a breach of an agreement or a contravention of the laws of Canada or a province
 
  • If disclosure is required to comply with a subpoena, warrant, court order, or rules of the court relating to the production of records
 
  • If it was produced by an individual in the course of their employment, business, or profession and the collection is consistent with the purposes for which the information was produced
 
  • If the collection is solely for journalistic, artistic, or literary purposes
 
  • If the information is publicly available and is specified by the regulations
 
 
4. WHEN AND WITH WHOM DO WE SHARE YOUR PERSONAL INFORMATION?
 
In Short: We may share information in specific situations described in this section and/or with the following third parties.
 
 
We may need to share your personal information in the following situations:
  • Business Transfers. We may share or transfer your information in connection with, or during negotiations of, any merger, sale of company assets, financing, or acquisition of all or a portion of our business to another company.
 
  • Affiliates. We may share your information with our affiliates, in which case we will require those affiliates to honor this privacy notice. Affiliates include our parent company and any subsidiaries, joint venture partners, or other companies that we control or that are under common control with us.
 
 
5. DO WE USE COOKIES AND OTHER TRACKING TECHNOLOGIES?
 
In Short: We may use cookies and other tracking technologies to collect and store your information.
 
We may use cookies and similar tracking technologies (like web beacons and pixels) to access or store information. Specific information about how we use such technologies and how you can refuse certain cookies is set out in our Cookie Notice: https://gladiium.com/.
 
6. HOW LONG DO WE KEEP YOUR INFORMATION?
 
In Short: We keep your information for as long as necessary to fulfill the purposes outlined in this privacy notice unless otherwise required by law.
 
We will only keep your personal information for as long as it is necessary for the purposes set out in this privacy notice, unless a longer retention period is required or permitted by law (such as tax, accounting, or other legal requirements).
 
When we have no ongoing legitimate business need to process your personal information, we will either delete or anonymize such information, or, if this is not possible (for example, because your personal information has been stored in backup archives), then we will securely store your personal information and isolate it from any further processing until deletion is possible.
 
7. HOW DO WE KEEP YOUR INFORMATION SAFE?
 
In Short: We aim to protect your personal information through a system of organizational and technical security measures.
 
We have implemented appropriate and reasonable technical and organizational security measures designed to protect the security of any personal information we process. However, despite our safeguards and efforts to secure your information, no electronic transmission over the Internet or information storage technology can be guaranteed to be 100% secure, so we cannot promise or guarantee that hackers, cybercriminals, or other unauthorized third parties will not be able to defeat our security and improperly collect, access, steal, or modify your information. Although we will do our best to protect your personal information, transmission of personal information to and from our Services is at your own risk. You should only access the Services within a secure environment.
 
8. DO WE COLLECT INFORMATION FROM MINORS?
 
In Short: We do not knowingly collect data from or market to children under 18 years of age.
 
We do not knowingly solicit data from or market to children under 18 years of age. By using the Services, you represent that you are at least 18 or that you are the parent or guardian of such a minor and consent to such minor dependent’s use of the Services. If we learn that personal information from users less than 18 years of age has been collected, we will deactivate the account and take reasonable measures to promptly delete such data from our records. If you become aware of any data we may have collected from children under age 18, please contact us at [email protected].
 
9. WHAT ARE YOUR PRIVACY RIGHTS?
 
In Short: In some regions, such as the European Economic Area (EEA), United Kingdom (UK), and Canada, you have rights that allow you greater access to and control over your personal information. You may review, change, or terminate your account at any time.
 
In some regions (like the EEA, UK, and Canada), you have certain rights under applicable data protection laws. These may include the right (i) to request access and obtain a copy of your personal information, (ii) to request rectification or erasure; (iii) to restrict the processing of your personal information; and (iv) if applicable, to data portability. In certain circumstances, you may also have the right to object to the processing of your personal information. You can make such a request by contacting us by using the contact details provided in the section “HOW CAN YOU CONTACT US ABOUT THIS NOTICE?” below.
 
We will consider and act upon any request in accordance with applicable data protection laws.
 
If you are located in the EEA or UK and you believe we are unlawfully processing your personal information, you also have the right to complain to your local data protection supervisory authority. You can find their contact details here: https://ec.europa.eu/justice/data-protection/bodies/authorities/index_en.htm.
 
If you are located in Switzerland, the contact details for the data protection authorities are available here: https://www.edoeb.admin.ch/edoeb/en/home.html.
 
Withdrawing your consent: If we are relying on your consent to process your personal information, which may be express and/or implied consent depending on the applicable law, you have the right to withdraw your consent at any time. You can withdraw your consent at any time by contacting us by using the contact details provided in the section “HOW CAN YOU CONTACT US ABOUT THIS NOTICE?” below.
 
However, please note that this will not affect the lawfulness of the processing before its withdrawal nor, when applicable law allows, will it affect the processing of your personal information conducted in reliance on lawful processing grounds other than consent.
 
Opting out of marketing and promotional communications: You can unsubscribe from our marketing and promotional communications at any time by clicking on the unsubscribe link in the emails that we send, or by contacting us using the details provided in the section “HOW CAN YOU CONTACT US ABOUT THIS NOTICE?” below. You will then be removed from the marketing lists. However, we may still communicate with you — for example, to send you service-related messages that are necessary for the administration and use of your account, to respond to service requests, or for other non-marketing purposes.
 
Cookies and similar technologies: Most Web browsers are set to accept cookies by default. If you prefer, you can usually choose to set your browser to remove cookies and to reject cookies. If you choose to remove cookies or reject cookies, this could affect certain features or services of our Services. To opt out of interest-based advertising by advertisers on our Services visit http://www.aboutads.info/choices/. For further information, please see our Cookie Notice: https://gladiium.com/.
 
If you have questions or comments about your privacy rights, you may email us at [email protected].
 
10. CONTROLS FOR DO-NOT-TRACK FEATURES
 
Most web browsers and some mobile operating systems and mobile applications include a Do-Not-Track (“DNT”) feature or setting you can activate to signal your privacy preference not to have data about your online browsing activities monitored and collected. At this stage no uniform technology standard for recognizing and implementing DNT signals has been finalized. As such, we do not currently respond to DNT browser signals or any other mechanism that automatically communicates your choice not to be tracked online. If a standard for online tracking is adopted that we must follow in the future, we will inform you about that practice in a revised version of this privacy notice.
 
11. DO CALIFORNIA RESIDENTS HAVE SPECIFIC PRIVACY RIGHTS?
 
In Short: Yes, if you are a resident of California, you are granted specific rights regarding access to your personal information.
 
California Civil Code Section 1798.83, also known as the “Shine The Light” law, permits our users who are California residents to request and obtain from us, once a year and free of charge, information about categories of personal information (if any) we disclosed to third parties for direct marketing purposes and the names and addresses of all third parties with which we shared personal information in the immediately preceding calendar year. If you are a California resident and would like to make such a request, please submit your request in writing to us using the contact information provided below.
 
If you are under 18 years of age, reside in California, and have a registered account with Services, you have the right to request removal of unwanted data that you publicly post on the Services. To request removal of such data, please contact us using the contact information provided below and include the email address associated with your account and a statement that you reside in California. We will make sure the data is not publicly displayed on the Services, but please be aware that the data may not be completely or comprehensively removed from all our systems (e.g., backups, etc.).
 
CCPA Privacy Notice
 
The California Code of Regulations defines a “resident” as:
 
(1) every individual who is in the State of California for other than a temporary or transitory purpose and
(2) every individual who is domiciled in the State of California who is outside the State of California for a temporary or transitory purpose
 
All other individuals are defined as “non-residents.”
 
If this definition of “resident” applies to you, we must adhere to certain rights and obligations regarding your personal information.
 
What categories of personal information do we collect?
 
We have collected the following categories of personal information in the past twelve (12) months:
 
CategoryExamplesCollected
A. Identifiers
Contact details, such as real name, alias, postal address, telephone or mobile contact number, unique personal identifier, online identifier, Internet Protocol address, email address, and account name
 
NO
 
B. Personal information categories listed in the California Customer Records statute
Name, contact information, education, employment, employment history, and financial information
 
NO
 
C. Protected classification characteristics under California or federal law
Gender and date of birth
 
NO
 
D. Commercial information
Transaction information, purchase history, financial details, and payment information
 
NO
 
E. Biometric information
Fingerprints and voiceprints
 
NO
 
F. Internet or other similar network activity
Browsing history, search history, online behavior, interest data, and interactions with our and other websites, applications, systems, and advertisements
 
NO
 
G. Geolocation data
Device location
 
NO
 
H. Audio, electronic, visual, thermal, olfactory, or similar information
Images and audio, video or call recordings created in connection with our business activities
 
NO
 
I. Professional or employment-related information
Business contact details in order to provide you our Services at a business level or job title, work history, and professional qualifications if you apply for a job with us
 
YES
 
J. Education Information
Student records and directory information
 
NO
 
K. Inferences drawn from other personal information
Inferences drawn from any of the collected personal information listed above to create a profile or summary about, for example, an individual’s preferences and characteristics
 
NO
 
 
 
We may also collect other personal information outside of these categories through instances where you interact with us in person, online, or by phone or mail in the context of:
  • Receiving help through our customer support channels;
 
  • Participation in customer surveys or contests; and
 
  • Facilitation in the delivery of our Services and to respond to your inquiries.
How do we use and share your personal information?
 
More information about our data collection and sharing practices can be found in this privacy notice and our Cookie Notice: https://gladiium.com/.
 
You may contact us by email at [email protected], or by referring to the contact details at the bottom of this document.
 
If you are using an authorized agent to exercise your right to opt out we may deny a request if the authorized agent does not submit proof that they have been validly authorized to act on your behalf.
 
Will your information be shared with anyone else?
 
We may disclose your personal information with our service providers pursuant to a written contract between us and each service provider. Each service provider is a for-profit entity that processes the information on our behalf.
 
We may use your personal information for our own business purposes, such as for undertaking internal research for technological development and demonstration. This is not considered to be “selling” of your personal information.
 
GLADiiUM Technology Partners, Inc has not disclosed or sold any personal information to third parties for a business or commercial purpose in the preceding twelve (12) months. GLADiiUM Technology Partners, Inc will not sell personal information in the future belonging to website visitors, users, and other consumers.
 
Your rights with respect to your personal data
 
Right to request deletion of the data — Request to delete
 
You can ask for the deletion of your personal information. If you ask us to delete your personal information, we will respect your request and delete your personal information, subject to certain exceptions provided by law, such as (but not limited to) the exercise by another consumer of his or her right to free speech, our compliance requirements resulting from a legal obligation, or any processing that may be required to protect against illegal activities.
 
Right to be informed — Request to know
 
Depending on the circumstances, you have a right to know:
  • whether we collect and use your personal information;
 
  • the categories of personal information that we collect;
 
  • the purposes for which the collected personal information is used;
 
  • whether we sell your personal information to third parties;
 
  • the categories of personal information that we sold or disclosed for a business purpose;
 
  • the categories of third parties to whom the personal information was sold or disclosed for a business purpose; and
 
  • the business or commercial purpose for collecting or selling personal information.
In accordance with applicable law, we are not obligated to provide or delete consumer information that is de-identified in response to a consumer request or to re-identify individual data to verify a consumer request.
 
Right to Non-Discrimination for the Exercise of a Consumer’s Privacy Rights
 
We will not discriminate against you if you exercise your privacy rights.
 
Verification process
 
Upon receiving your request, we will need to verify your identity to determine you are the same person about whom we have the information in our system. These verification efforts require us to ask you to provide information so that we can match it with information you have previously provided us. For instance, depending on the type of request you submit, we may ask you to provide certain information so that we can match the information you provide with the information we already have on file, or we may contact you through a communication method (e.g., phone or email) that you have previously provided to us. We may also use other verification methods as the circumstances dictate.
 
We will only use personal information provided in your request to verify your identity or authority to make the request. To the extent possible, we will avoid requesting additional information from you for the purposes of verification. However, if we cannot verify your identity from the information already maintained by us, we may request that you provide additional information for the purposes of verifying your identity and for security or fraud-prevention purposes. We will delete such additionally provided information as soon as we finish verifying you.
 
Other privacy rights
 
  • You may object to the processing of your personal information.
 
  • You may request correction of your personal data if it is incorrect or no longer relevant, or ask to restrict the processing of the information.
 
  • You can designate an authorized agent to make a request under the CCPA on your behalf. We may deny a request from an authorized agent that does not submit proof that they have been validly authorized to act on your behalf in accordance with the CCPA.
 
  • You may request to opt out from future selling of your personal information to third parties. Upon receiving an opt-out request, we will act upon the request as soon as feasibly possible, but no later than fifteen (15) days from the date of the request submission.
To exercise these rights, you can contact us by email at [email protected], or by referring to the contact details at the bottom of this document. If you have a complaint about how we handle your data, we would like to hear from you.
 
12. DO WE MAKE UPDATES TO THIS NOTICE?
 
In Short: Yes, we will update this notice as necessary to stay compliant with relevant laws.
 
We may update this privacy notice from time to time. The updated version will be indicated by an updated “Revised” date and the updated version will be effective as soon as it is accessible. If we make material changes to this privacy notice, we may notify you either by prominently posting a notice of such changes or by directly sending you a notification. We encourage you to review this privacy notice frequently to be informed of how we are protecting your information.
 
13. HOW CAN YOU CONTACT US ABOUT THIS NOTICE?
 
If you have questions or comments about this notice, you may email us at [email protected] or by post to:
 
GLADiiUM Technology Partners, Inc
95 Merrick Way, 3rd Floor
Coral Gables, FL 33134
United States
 
14. HOW CAN YOU REVIEW, UPDATE, OR DELETE THE DATA WE COLLECT FROM YOU?
 
You have the right to request access to the personal information we collect from you, change that information, or delete it. To request to review, update, or delete your personal information, please submit a request form by clicking here.
This privacy policy was created using Termly’s Privacy Policy Generator.