{"id":3,"date":"2024-01-03T09:59:36","date_gmt":"2024-01-03T09:59:36","guid":{"rendered":"https:\/\/shelinfosec.com\/?page_id=3"},"modified":"2025-11-09T10:23:49","modified_gmt":"2025-11-09T10:23:49","slug":"privacy-policy","status":"publish","type":"page","link":"https:\/\/shelinfosec.com\/index.php\/privacy-policy\/","title":{"rendered":"Privacy Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3\" class=\"elementor elementor-3\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f682b40 e-flex e-con-boxed e-con e-parent\" data-id=\"f682b40\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b8285a elementor-widget elementor-widget-text-editor\" data-id=\"8b8285a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\" style=\"text-align: center;\"><span style=\"color: #333399;\"><strong>Privacy Policy<\/strong><\/span><\/h1><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Effective Date: 01\/01\/2025<\/strong><\/p><p>\u00a0<\/p><h4 class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>1. Introduction<\/strong><\/h4><p>\u00a0<\/p><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Welcome to SHEL INFOSEC. Your privacy and security are core to our mission. This Privacy Policy explains how we collect, use, protect, and share your information when you visit\u00a0<a class=\"reset interactable cursor-pointer decoration-1 underline-offset-1 text-super hover:underline font-semibold\" href=\"http:\/\/www.shelinfosec.com\/\" target=\"_blank\" rel=\"nofollow noopener\"><span class=\"text-box-trim-both\">www.shelinfosec.com<\/span><\/a>\u00a0and use our cybersecurity solutions, including SILENT EDGE.<br \/>By using our services, you agree to this policy. If you have questions, contact us at\u00a0<a class=\"reset interactable cursor-pointer decoration-1 underline-offset-1 text-super hover:underline font-semibold\" href=\"mailto:accounts@shelinfosec.com\" target=\"_blank\" rel=\"nofollow noopener\"><span class=\"text-box-trim-both\">accounts@shelinfosec.com<\/span><\/a>.<\/p><p>\u00a0<\/p><h4 class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>2. Information We Collect<\/strong><\/h4><h6 class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><br \/>A.\u00a0<strong>Information You Provide<\/strong><\/h6><ul class=\"marker:text-quiet list-disc\"><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Account: Name, email, phone number, company, and billing info.<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Support: Information you share for customer, threat, or account support.<\/p><\/li><\/ul><p>\u00a0<\/p><h6 class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">B.\u00a0<strong>Information Collected Automatically<\/strong><\/h6><ul class=\"marker:text-quiet list-disc\"><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Device Data: IP address, browser type, device ID, OS, geolocation.<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Usage Logs: Timestamps, security events, activity analytics.<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Cookies: Standard tracking for login security and service improvement (can be disabled).<\/p><\/li><\/ul><p>\u00a0<\/p><h4 class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>3. How We Use Your Information<\/strong><\/h4><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><br \/>We process your data legally and transparently to:<\/p><ul class=\"marker:text-quiet list-disc\"><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Deliver, secure, and maintain MSP\/RMM services (including advanced threat detection).<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Process payments and manage subscription billing.<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Prevent fraud, enforce security policies, and comply with data protection regulations (GDPR, CCPA, HIPAA, PCI DSS, etc.).<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Inform improvements, marketing, and service analytics (opt-out available).<\/p><\/li><\/ul><p>\u00a0<\/p><h4 class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>4. Payment Provider Data Sharing<\/strong><\/h4><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><br \/>To process your payments, we share personal and transactional information (name, contact details, IP, device, billing info) with our payment providers and their payment partners.<\/p><ul class=\"marker:text-quiet list-disc\"><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">This sharing allows payment authorization, fraud prevention, regulatory checks, and chargeback handling.<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Data is only transmitted for legitimate processing\u2014not for resale or unrelated third-party marketing.<\/p><\/li><\/ul><p>\u00a0<\/p><h4 class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>5. Data Security &amp; Retention<\/strong><\/h4><p>\u00a0<\/p><ul class=\"marker:text-quiet list-disc\"><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">We use\u00a0<strong>multilayer encryption, strong authentication, zero-trust architecture, firewalls, and strict access controls<\/strong>\u00a0to protect data.<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Personal data is only kept as long as needed for service delivery, compliance, dispute resolution, and legal obligations.<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">If a security breach occurs, we will notify affected users within 72 hours with actionable information.<\/p><\/li><\/ul><p>\u00a0<\/p><h4 class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>6. Lawful Requests &amp; Data Protection<\/strong><\/h4><p>\u00a0<\/p><ul class=\"marker:text-quiet list-disc\"><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Data may be disclosed to government or legal authorities only when strictly required by enforceable law, regulation, valid subpoena, or court order.<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">We challenge and resist any\u00a0<strong>unwarranted, excessive, or corrupt requests<\/strong>\u00a0for customer information and will protect data to the maximum extent permitted by law in your and our jurisdiction.<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">We do not share data in response to unsupported or extrajudicial demands, including suspected nation-state extortion, without necessary due process.<\/p><\/li><\/ul><p>\u00a0<\/p><h4 class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>7. Customer Rights &amp; Choices<\/strong><\/h4><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><br \/>Depending on your country and relevant laws, you may:<\/p><ul class=\"marker:text-quiet list-disc\"><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Access or correct your data at any time.<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Request deletion of your information (subject to regulatory, billing, and technical requirements).<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Opt out of marketing and non-essential analytics at any time.<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Restrict certain processing where allowed.<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">To exercise rights, contact\u00a0<a class=\"reset interactable cursor-pointer decoration-1 underline-offset-1 text-super hover:underline font-semibold\" href=\"mailto:accounts@shelinfosec.com\" target=\"_blank\" rel=\"nofollow noopener\"><span class=\"text-box-trim-both\">accounts@shelinfosec.com<\/span><\/a>. We will respond within 30 days.<\/p><\/li><\/ul><p>\u00a0<\/p><h4 class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>8. International Transfers<\/strong><\/h4><p>\u00a0<\/p><ul class=\"marker:text-quiet list-disc\"><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Data may be securely transferred and processed in other countries with lawful protections, including the EU GDPR, UK Data Protection Act, South African POPIA, US CCPA, and international payment regulations.<\/p><\/li><\/ul><p>\u00a0<\/p><h4 class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>9. Third Party and Payment<\/strong><strong> Partners<\/strong><\/h4><p>\u00a0<\/p><ul class=\"marker:text-quiet list-disc\"><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Payment, hosting, security, and threat intelligence partners may process your data to enable secure service.<\/p><\/li><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Such partners must meet our compliance, confidentiality, and safeguarding standards.<\/p><\/li><\/ul><p>\u00a0<\/p><h4 class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>10. Policy Updates<\/strong><\/h4><p>\u00a0<\/p><ul class=\"marker:text-quiet list-disc\"><li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\"><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">We may revise this Privacy Policy as laws or payment partners change. The latest version will always be posted here, with prominent notice for substantial updates.<\/p><\/li><\/ul><p>\u00a0<\/p><h4 class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>11. Contact<\/strong><\/h4><p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><br \/>Questions or requests? Email\u00a0<a class=\"reset interactable cursor-pointer decoration-1 underline-offset-1 text-super hover:underline font-semibold\" href=\"mailto:accounts@shelinfosec.com\" target=\"_blank\" rel=\"nofollow noopener\"><span class=\"text-box-trim-both\">accounts@shelinfosec.com<\/span><\/a>\u00a0or visit\u00a0<a class=\"reset interactable cursor-pointer decoration-1 underline-offset-1 text-super hover:underline font-semibold\" href=\"http:\/\/www.shelinfosec.com\/\" target=\"_blank\" rel=\"nofollow noopener\"><span class=\"text-box-trim-both\">www.shelinfosec.com<\/span><\/a>\u00a0for support.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d1f2c8b e-flex e-con-boxed e-con e-parent\" data-id=\"d1f2c8b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Privacy Policy Effective Date: 01\/01\/2025 \u00a0 1. Introduction \u00a0 Welcome to SHEL INFOSEC. Your privacy and security are core to our mission. This Privacy Policy explains how we collect, use, protect, and share your information when you visit\u00a0www.shelinfosec.com\u00a0and use our cybersecurity solutions, including SILENT EDGE.By using our services, you agree to this policy. If you [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-3","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privacy Policy | Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/shelinfosec.com\/index.php\/privacy-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy Policy | Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec\" \/>\n<meta property=\"og:description\" content=\"Privacy Policy Effective Date: 01\/01\/2025 \u00a0 1. Introduction \u00a0 Welcome to SHEL INFOSEC. Your privacy and security are core to our mission. This Privacy Policy explains how we collect, use, protect, and share your information when you visit\u00a0www.shelinfosec.com\u00a0and use our cybersecurity solutions, including SILENT EDGE.By using our services, you agree to this policy. If you [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/shelinfosec.com\/index.php\/privacy-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-09T10:23:49+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/index.php\\\/privacy-policy\\\/\",\"url\":\"https:\\\/\\\/shelinfosec.com\\\/index.php\\\/privacy-policy\\\/\",\"name\":\"Privacy Policy | Managed Cybersecurity Services Cape Town | 24\\\/7 SOC | SHEL infosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/#website\"},\"datePublished\":\"2024-01-03T09:59:36+00:00\",\"dateModified\":\"2025-11-09T10:23:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/index.php\\\/privacy-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/shelinfosec.com\\\/index.php\\\/privacy-policy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/index.php\\\/privacy-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/shelinfosec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/#website\",\"url\":\"https:\\\/\\\/shelinfosec.com\\\/\",\"name\":\"Managed Cybersecurity Services Cape Town | 24\\\/7 SOC | SHEL infosec\",\"description\":\"Premium managed cybersecurity services in Cape Town. 24\\\/7 SOC monitoring, dedicated security analysts, transparent pricing. SILENT EDGE managed security from $45\\\/month.\",\"publisher\":{\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/#organization\"},\"alternateName\":\"SILENT EDGE RMM\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/shelinfosec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/#organization\",\"name\":\"SHEL infosec\",\"url\":\"https:\\\/\\\/shelinfosec.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shelinfosec.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/SHEL-INFOSEC-e1704278793512.jpg\",\"contentUrl\":\"https:\\\/\\\/shelinfosec.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/SHEL-INFOSEC-e1704278793512.jpg\",\"width\":200,\"height\":200,\"caption\":\"SHEL infosec\"},\"image\":{\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy Policy | Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/shelinfosec.com\/index.php\/privacy-policy\/","og_locale":"en_US","og_type":"article","og_title":"Privacy Policy | Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec","og_description":"Privacy Policy Effective Date: 01\/01\/2025 \u00a0 1. Introduction \u00a0 Welcome to SHEL INFOSEC. Your privacy and security are core to our mission. This Privacy Policy explains how we collect, use, protect, and share your information when you visit\u00a0www.shelinfosec.com\u00a0and use our cybersecurity solutions, including SILENT EDGE.By using our services, you agree to this policy. If you [&hellip;]","og_url":"https:\/\/shelinfosec.com\/index.php\/privacy-policy\/","og_site_name":"Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec","article_modified_time":"2025-11-09T10:23:49+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/shelinfosec.com\/index.php\/privacy-policy\/","url":"https:\/\/shelinfosec.com\/index.php\/privacy-policy\/","name":"Privacy Policy | Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec","isPartOf":{"@id":"https:\/\/shelinfosec.com\/#website"},"datePublished":"2024-01-03T09:59:36+00:00","dateModified":"2025-11-09T10:23:49+00:00","breadcrumb":{"@id":"https:\/\/shelinfosec.com\/index.php\/privacy-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/shelinfosec.com\/index.php\/privacy-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/shelinfosec.com\/index.php\/privacy-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/shelinfosec.com\/"},{"@type":"ListItem","position":2,"name":"Privacy Policy"}]},{"@type":"WebSite","@id":"https:\/\/shelinfosec.com\/#website","url":"https:\/\/shelinfosec.com\/","name":"Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec","description":"Premium managed cybersecurity services in Cape Town. 24\/7 SOC monitoring, dedicated security analysts, transparent pricing. SILENT EDGE managed security from $45\/month.","publisher":{"@id":"https:\/\/shelinfosec.com\/#organization"},"alternateName":"SILENT EDGE RMM","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/shelinfosec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/shelinfosec.com\/#organization","name":"SHEL infosec","url":"https:\/\/shelinfosec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shelinfosec.com\/#\/schema\/logo\/image\/","url":"https:\/\/shelinfosec.com\/wp-content\/uploads\/2024\/01\/SHEL-INFOSEC-e1704278793512.jpg","contentUrl":"https:\/\/shelinfosec.com\/wp-content\/uploads\/2024\/01\/SHEL-INFOSEC-e1704278793512.jpg","width":200,"height":200,"caption":"SHEL infosec"},"image":{"@id":"https:\/\/shelinfosec.com\/#\/schema\/logo\/image\/"}}]}},"_hostinger_reach_plugin_has_subscription_block":false,"_hostinger_reach_plugin_is_elementor":false,"_links":{"self":[{"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/pages\/3","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/comments?post=3"}],"version-history":[{"count":22,"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/pages\/3\/revisions"}],"predecessor-version":[{"id":3489,"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/pages\/3\/revisions\/3489"}],"wp:attachment":[{"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/media?parent=3"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}