Privacy Policy

Dragnet

Effective Date: July 2025


At Dragnet, your privacy and data security are fundamental to our mission of providing defense-grade cybersecurity solutions. As cybersecurity professionals who help organizations protect their most sensitive information, we understand the critical importance of safeguarding your personal data. We are committed to maintaining the highest standards of privacy protection and transparency in all our interactions with you.

This Privacy Policy explains how we collect, use, protect, and share information when you visit our website, use our services, or interact with us. We are always ready to address your questions and concerns regarding our privacy practices. Please feel free to contact us at any time.

Contact Information

Dragnet
Email: info@dragnetsecure.com
Phone: (804) 496-1129


Information We Collect

Personal Information

When you engage with our cybersecurity services, request consultations, or interact with our website, we may collect:

  • Contact Information: Name, email address, phone number, company name, and job title
  • Business Information: Industry sector, company size, current cybersecurity challenges, and compliance requirements
  • Service Information: Details about your cybersecurity needs, CMMC requirements, NIST compliance status, and security assessment requests
  • Communication Records: Records of our communications with you, including emails, phone calls, and meeting notes related to your cybersecurity needs

Technical Information

We automatically collect certain technical information when you visit our website:

  • Website Usage Data: Pages visited, time spent on pages, browser type, device information, and IP address
  • Cookies and Tracking Technologies: Information collected through cookies and similar technologies to improve your website experience
  • Security Logs: Access logs and security monitoring data to protect our systems and yours

How We Use Your Information

Service Delivery and Support

We use your information to:

  • Provide Cybersecurity Services: Deliver penetration testing, CMMC assessments, gap analyses, and other security services
  • Compliance Support: Assist with NIST 800-171, CMMC certification, and other regulatory compliance requirements
  • Incident Response: Provide incident response planning and support services
  • Ongoing Support: Maintain our cybersecurity services and provide technical support

Business Operations

  • Communication: Respond to your inquiries, provide service updates, and deliver cybersecurity insights and alerts
  • Service Improvement: Analyze usage patterns to enhance our cybersecurity services and develop new security solutions
  • Compliance and Legal: Meet our legal obligations and maintain compliance with applicable regulations

Marketing and Education

  • Cybersecurity Education: Provide valuable cybersecurity content, CMMC guidance, and industry insights
  • Service Information: Inform you about our cybersecurity services that may benefit your organization
  • Industry Updates: Share relevant cybersecurity news, regulatory changes, and threat intelligence

Data Security and Protection

As a cybersecurity company specializing in defense-grade security solutions, we implement robust security measures to protect your information:

Technical Safeguards

  • Encryption: All sensitive data is encrypted both in transit and at rest using industry-standard encryption protocols
  • Access Controls: Strict access controls ensure only authorized personnel can access your information
  • Security Monitoring: Continuous monitoring and threat detection to protect against unauthorized access
  • Secure Infrastructure: Our systems are designed and maintained according to NIST cybersecurity frameworks

Operational Safeguards

  • Employee Training: All team members receive comprehensive cybersecurity and privacy training
  • Background Checks: Personnel handling sensitive information undergo thorough background verification
  • Incident Response: We maintain robust incident response procedures to address any potential security events
  • Regular Audits: Periodic security assessments and audits to ensure ongoing protection

Information Sharing and Disclosure

We respect your privacy and limit information sharing to necessary business purposes:

Service Providers

We may share information with trusted third-party service providers who assist us in delivering our cybersecurity services, subject to strict confidentiality agreements and security requirements.

Legal Requirements

We may disclose information when required by law, court order, or to comply with legal processes, including:

  • Responding to lawful government requests
  • Protecting our legal rights and interests
  • Preventing fraud or security threats
  • Complying with CMMC, NIST, or other regulatory requirements

Business Transfers

In the event of a merger, acquisition, or sale of assets, your information may be transferred, subject to the same privacy protections outlined in this policy.

No Unauthorized Sharing

We never sell, rent, or share your personal information with third parties for their marketing purposes without your explicit consent.

Cookies and Website Technologies

What Are Cookies

Our website uses cookies—small files stored on your device—to enhance your browsing experience and provide better cybersecurity resources. These help us understand how you interact with our content and improve our services.

Types of Cookies We Use

Essential Cookies: Required for basic website functionality and security features

Analytics Cookies: Help us understand website usage through services like Google Analytics, allowing us to improve our cybersecurity content and resources

Preference Cookies: Remember your settings and preferences for a better user experience

Security Cookies: Monitor for suspicious activity and protect against cyber threats

Managing Cookies

You can control cookie settings through your browser preferences. However, disabling certain cookies may limit website functionality and your ability to access some cybersecurity resources.

Third-Party Services

We use trusted third-party services including:

  • Google Analytics: To understand website usage and improve our cybersecurity content
  • Social Media Integration: To connect with professional networks and share cybersecurity insights
  • Security Services: To protect our website and detect potential threats

Data Retention

We retain your information only as long as necessary to:

  • Provide ongoing cybersecurity services
  • Meet legal and compliance requirements
  • Maintain security monitoring and incident response capabilities
  • Fulfill legitimate business purposes

When information is no longer needed, we securely delete or anonymize it according to our data retention policies and industry best practices.

Your Privacy Rights

Depending on your location, you may have certain rights regarding your personal information:

Access and Correction

  • Request access to your personal information
  • Correct inaccurate or incomplete information
  • Update your contact preferences

Data Control

  • Opt-out of marketing communications
  • Request deletion of your information (subject to legal and business requirements)
  • Request data portability where applicable

Communication Preferences

You can unsubscribe from our cybersecurity newsletters and marketing communications at any time using the unsubscribe link in our emails or by contacting us directly.

International Data Transfers

If you are located outside the United States, please be aware that your information may be transferred to and processed in the United States, where our servers are located and our cybersecurity operations are conducted. We ensure appropriate safeguards are in place for such transfers.

Children's Privacy

Our cybersecurity services are designed for businesses and organizations. We do not knowingly collect personal information from children under 13 years of age.

Changes to This Privacy Policy

We may update this Privacy Policy periodically to reflect changes in our cybersecurity practices, legal requirements, or business operations. We will notify you of significant changes by posting the updated policy on our website and updating the effective date.

Compliance and Certifications

As a cybersecurity company serving defense contractors and other regulated industries, we maintain compliance with relevant standards, including:

  • NIST Cybersecurity Framework
  • CMMC requirements
  • SOC 2 Type II (if applicable)
  • Industry-specific compliance standards

Contact Us

For questions about this Privacy Policy, our privacy practices, or to exercise your privacy rights, please contact us:

Dragnet, LLC

Email: info@dragnetsecure.com
Phone: (804) 496-1129

We are committed to addressing your privacy concerns promptly and transparently. As cybersecurity professionals, we understand the importance of trust and will work diligently to maintain your confidence in our privacy practices.


This Privacy Policy demonstrates our commitment to protecting your information with the same defense-grade security standards we bring to all our cybersecurity services.