{"id":4934,"date":"2024-01-13T07:45:51","date_gmt":"2024-01-13T07:45:51","guid":{"rendered":"https:\/\/shreshtait.com\/blog\/?page_id=4934"},"modified":"2024-01-13T07:45:52","modified_gmt":"2024-01-13T07:45:52","slug":"privacy-policy","status":"publish","type":"page","link":"https:\/\/shreshtait.com\/blog\/privacy-policy\/","title":{"rendered":"Privacy Policy"},"content":{"rendered":"\n<p>Last updated: 13th January 2024<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-who-we-are\">Who we are<\/h2>\n\n\n\n<p>Shreshta IT Technologies Pvt. Ltd. is a cyber threat intelligence company based out of Belagavi, Karnataka, India. <\/p>\n\n\n\n<p>[Shreshta IT Technologies Pvt. Ltd.] (&#8220;us&#8221;, &#8220;we&#8221;, or &#8220;our&#8221;) operates the website\/blog at https:\/\/shreshtait.com\/blog (the &#8220;Service&#8221;).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-information-collection-and-usage\">Information Collection and Usage<\/h2>\n\n\n\n<p>We do not actively collect personal information from users of our Service. The only information that is logged is the web server access logs. These logs include the IP address, user agent string, and request URI. These logs are used solely for monitoring and maintaining the functionality and security of the Service. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-web-server-access-logs\">Web Server Access Logs<\/h2>\n\n\n\n<p>Access logs are standard in most web hosting environments and are used to record requests made to the server. This information is used for debugging, security, and statistical purposes. <\/p>\n\n\n\n<p>The information logged includes: &#8211; <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IP Address: The IP address of the device making the request. <\/li>\n\n\n\n<li>User Agent String: Information about the browser or client making the request. <\/li>\n\n\n\n<li>Request URI: The specific resource or URL being requested.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-embedded-content-from-other-websites\">Embedded content from other websites<\/h2>\n\n\n\n<p>Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.<\/p>\n\n\n\n<p>These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-long-we-retain-your-data\">How long we retain your data<\/h2>\n\n\n\n<p>We retain web server access logs for 180 days, in accordance <a href=\"https:\/\/www.cert-in.org.in\/PDF\/CERT-In_Directions_70B_28.04.2022.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">CERT-In mandate for storing logs<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-security-of-data\">Security of Data<\/h2>\n\n\n\n<p>We employ appropriate technical and organizational measures to protect the security of the web server access logs. However, no method of electronic storage is 100% secure, and we cannot guarantee absolute security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-changes-to-this-privacy-policy\">Changes to This Privacy Policy<\/h2>\n\n\n\n<p>We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page. You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-contact-us\">Contact Us<\/h2>\n\n\n\n<p>If you have any questions about this Privacy Policy, please get in touch with us: <a href=\"mailto:support@shreshtait.com\">support@shreshtait.com <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last updated: 13th January 2024 Who we are Shreshta IT Technologies Pvt. Ltd. is a cyber threat intelligence company based out of Belagavi, Karnataka, India. [Shreshta IT Technologies Pvt. Ltd.] (&#8220;us&#8221;, &#8220;we&#8221;, or &#8220;our&#8221;) operates the website\/blog at https:\/\/shreshtait.com\/blog (the &#8220;Service&#8221;). Information Collection and Usage We do not actively collect personal information from users of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-4934","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Privacy Policy | DNS Security &amp; Threat Intelligence Blog | Shreshta<\/title>\n<meta name=\"description\" content=\"Privacy Policy page.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/shreshtait.com\/blog\/privacy-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy Policy\" \/>\n<meta property=\"og:description\" content=\"Privacy Policy page.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/shreshtait.com\/blog\/privacy-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"DNS Security &amp; Threat Intelligence Blog | Shreshta\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-13T07:45:52+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/privacy-policy\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/privacy-policy\\\/\",\"name\":\"Privacy Policy | DNS Security &amp; Threat Intelligence Blog | Shreshta\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\"},\"datePublished\":\"2024-01-13T07:45:51+00:00\",\"dateModified\":\"2024-01-13T07:45:52+00:00\",\"description\":\"Privacy Policy page.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/privacy-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/shreshtait.com\\\/blog\\\/privacy-policy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/privacy-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"name\":\"DNS Security &amp; Threat Intelligence Blog | Shreshta\",\"description\":\"DNS Security &amp; Threat Intelligence\",\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\",\"name\":\"Shreshta IT Technologies Pvt. Ltd.\",\"alternateName\":\"Shreshta\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"width\":330,\"height\":76,\"caption\":\"Shreshta IT Technologies Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/shreshtait\",\"https:\\\/\\\/infosec.exchange\\\/@shreshta\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/shreshta\\\/\"],\"description\":\"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.\",\"email\":\"sales@shreshtait.com\",\"legalName\":\"Shreshta IT Technologies Pvt. Ltd.\",\"foundingDate\":\"2014-01-22\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"},\"publishingPrinciples\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Privacy Policy | DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"Privacy Policy page.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/shreshtait.com\/blog\/privacy-policy\/","og_locale":"en_US","og_type":"article","og_title":"Privacy Policy","og_description":"Privacy Policy page.","og_url":"https:\/\/shreshtait.com\/blog\/privacy-policy\/","og_site_name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","article_modified_time":"2024-01-13T07:45:52+00:00","twitter_card":"summary_large_image","twitter_site":"@shreshtait","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/shreshtait.com\/blog\/privacy-policy\/","url":"https:\/\/shreshtait.com\/blog\/privacy-policy\/","name":"Privacy Policy | DNS Security &amp; Threat Intelligence Blog | Shreshta","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/#website"},"datePublished":"2024-01-13T07:45:51+00:00","dateModified":"2024-01-13T07:45:52+00:00","description":"Privacy Policy page.","breadcrumb":{"@id":"https:\/\/shreshtait.com\/blog\/privacy-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/shreshtait.com\/blog\/privacy-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/shreshtait.com\/blog\/privacy-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/shreshtait.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Privacy Policy"}]},{"@type":"WebSite","@id":"https:\/\/shreshtait.com\/blog\/#website","url":"https:\/\/shreshtait.com\/blog\/","name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"DNS Security &amp; Threat Intelligence","publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/shreshtait.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/shreshtait.com\/blog\/#organization","name":"Shreshta IT Technologies Pvt. Ltd.","alternateName":"Shreshta","url":"https:\/\/shreshtait.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","width":330,"height":76,"caption":"Shreshta IT Technologies Pvt. Ltd."},"image":{"@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/shreshtait","https:\/\/infosec.exchange\/@shreshta","https:\/\/www.linkedin.com\/company\/shreshta\/"],"description":"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.","email":"sales@shreshtait.com","legalName":"Shreshta IT Technologies Pvt. Ltd.","foundingDate":"2014-01-22","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"},"publishingPrinciples":"https:\/\/shreshtait.com\/blog\/blog\/"}]}},"_links":{"self":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/pages\/4934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/comments?post=4934"}],"version-history":[{"count":26,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/pages\/4934\/revisions"}],"predecessor-version":[{"id":4960,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/pages\/4934\/revisions\/4960"}],"wp:attachment":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media?parent=4934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}