{"id":318,"date":"2025-05-27T17:34:00","date_gmt":"2025-05-27T17:34:00","guid":{"rendered":"https:\/\/arestech.arestech.us\/?page_id=318"},"modified":"2025-06-20T17:07:34","modified_gmt":"2025-06-20T17:07:34","slug":"privacy-policy","status":"publish","type":"page","link":"https:\/\/arestech.us\/es\/privacy-policy\/","title":{"rendered":"Pol\u00edtica de privacidad"},"content":{"rendered":"<p><strong>1. OUR PRIVACY COMMITMENT<\/strong><\/p>\n\n\n\n<p>At Arestech, we&#8217;ve built our reputation on trust. When you&#8217;re dealing with cybersecurity and physical protection, privacy isn&#8217;t just legal compliance\u2014it&#8217;s the foundation of everything we do. This policy explains how we handle your personal information, because absolute security starts with transparency.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>2. INFORMATION WE COLLECT<\/strong><\/h2>\n\n\n\n<p>We handle several types of information to deliver world-class security services:<\/p>\n\n\n\n<p><strong>Professional Information:<\/strong> Names, titles, contact details, company information, and professional credentials. For high-profile clients, we maintain emergency contacts and security-relevant professional information.<\/p>\n\n\n\n<p><strong>Technical and Security Data:<\/strong> IP addresses, system logs, network traffic patterns, cybersecurity assessment results, and threat intelligence. This diagnostic information helps us identify and address security vulnerabilities.<\/p>\n\n\n\n<p><strong>Assessment Data:<\/strong> Physical security evaluations generate detailed vulnerability information, facility layouts, access control data, and surveillance footage when conducting comprehensive risk assessments.<\/p>\n\n\n\n<p><strong>Business Information:<\/strong> Contract details, billing records, and payment information processed through secure, PCI-compliant channels.<\/p>\n\n\n\n<p>We collect this information through direct engagement during consulting work, on-site assessments, SOC monitoring services, website interactions, and publicly available threat intelligence sources.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>3. HOW WE USE YOUR INFORMATION<\/strong><\/h2>\n\n\n\n<p>Every piece of information serves a specific security purpose. We use it to conduct risk assessments, deliver managed SOC services, perform incident response investigations, and continuously improve our security methodologies.<\/p>\n\n\n\n<p>We also use information for essential business operations like contract management, billing, regulatory compliance, and maintaining the high service standards our clientele expects.<\/p>\n\n\n\n<p>Some information helps protect the broader ecosystem through threat detection, monitoring for emerging attack patterns, and fraud prevention activities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>4. INFORMATION SHARING<\/strong><\/h2>\n\n\n\n<p>We share information only when necessary and appropriate:<\/p>\n\n\n\n<p><strong>Trusted Partners:<\/strong> Carefully selected technology providers, cloud infrastructure partners, and specialized security vendors access client information under strict contractual obligations that mirror our privacy commitments.<\/p>\n\n\n\n<p><strong>Legal Requirements:<\/strong> We comply with court orders, properly authorized law enforcement requests, and regulatory obligations. We evaluate each request carefully and share only what&#8217;s legally required.<\/p>\n\n\n\n<p><strong>Business Continuity:<\/strong> In unlikely scenarios involving mergers or acquisitions, information transfers would include appropriate confidentiality protections.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>5. DATA RETENTION<\/strong><\/h2>\n\n\n\n<p>We balance practical business needs with privacy principles:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Service-related data: Duration of relationship plus 7 years<\/li>\n\n\n\n<li>Security assessment data: Up to 10 years (security patterns evolve slowly)<\/li>\n\n\n\n<li>Financial records: 7 years following standard business practices<\/li>\n\n\n\n<li>Marketing communications: Until you opt out<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>6. INTERNATIONAL OPERATIONS<\/strong><\/h2>\n\n\n\n<p>Operating globally means information sometimes crosses borders. We use Standard Contractual Clauses, maintain current international certifications, and implement enhanced safeguards like additional encryption for transfers requiring extra protection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>7. YOUR RIGHTS AND CONTROL<\/strong><\/h2>\n\n\n\n<p>You have meaningful control over your information:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Access:<\/strong> Request detailed information about what we have and how we use it<\/li>\n\n\n\n<li><strong>Corrections:<\/strong> We&#8217;ll promptly fix any inaccuracies<\/li>\n\n\n\n<li><strong>Deletion:<\/strong> Request information removal (subject to legal\/contractual obligations)<\/li>\n\n\n\n<li><strong>Processing Controls:<\/strong> Object to specific uses or restrict processing<\/li>\n\n\n\n<li><strong>Marketing:<\/strong> Easy opt-out from communications<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>8. OUR SECURITY MEASURES<\/strong><\/h2>\n\n\n\n<p>Security isn&#8217;t just our business\u2014it&#8217;s how we protect your information daily. We use enterprise-grade encryption for data in transit and at rest, multi-factor authentication with least-privilege access controls, and multiple layers of network protection.<\/p>\n\n\n\n<p>Our facilities maintain the same physical security standards we recommend to clients. Regular security assessments and external audits validate our protective measures.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>9. WEBSITE TECHNOLOGY<\/strong><\/h2>\n\n\n\n<p>Our website uses cookies for functionality, user experience, and security. You can control cookie settings through your browser, though some features may not work with cookies disabled.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>10. POLICY UPDATES<\/strong><\/h2>\n\n\n\n<p>When we update this policy, we notify affected clients through appropriate channels and clearly mark changes. Material updates receive prominent notification with time to review.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>11. REGIONAL COMPLIANCE<\/strong><\/h2>\n\n\n\n<p><strong>European Union:<\/strong> We comply with GDPR requirements, serving as data controller or processor based on the service context. Legal bases include legitimate interests, contract performance, legal compliance, and explicit consent.<\/p>\n\n\n\n<p><strong>United States:<\/strong> We follow applicable federal and state privacy laws, including emerging state requirements and sector-specific regulations.<\/p>\n\n\n\n<p><strong>Mexico:<\/strong> Compliance with Federal Law on Protection of Personal Data, ensuring appropriate consent and security measures.<\/p>\n\n\n\n<p><strong>Saudi Arabia:<\/strong> Full compliance with Personal Data Protection Law requirements and technical safeguards.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>12. CONTACT US<\/strong><\/h2>\n\n\n\n<p>For privacy questions or requests:<br><strong>Email:<\/strong> contact@arestech.us<\/p>","protected":false},"excerpt":{"rendered":"<p>1. OUR PRIVACY COMMITMENT At Arestech, we&#8217;ve built our reputation on trust. When you&#8217;re dealing with cybersecurity and physical protection, privacy isn&#8217;t just legal compliance\u2014it&#8217;s the foundation of everything we do. This policy explains how we handle your personal information, because absolute security starts with transparency. 2. INFORMATION WE COLLECT We handle several types of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-318","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privacy Policy - Ares Tech<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/arestech.us\/es\/privacy-policy\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy Policy - Ares Tech\" \/>\n<meta property=\"og:description\" content=\"1. OUR PRIVACY COMMITMENT At Arestech, we&#8217;ve built our reputation on trust. When you&#8217;re dealing with cybersecurity and physical protection, privacy isn&#8217;t just legal compliance\u2014it&#8217;s the foundation of everything we do. This policy explains how we handle your personal information, because absolute security starts with transparency. 2. INFORMATION WE COLLECT We handle several types of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/arestech.us\/es\/privacy-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Ares Tech\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-20T17:07:34+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/arestech.us\\\/privacy-policy\\\/\",\"url\":\"https:\\\/\\\/arestech.us\\\/privacy-policy\\\/\",\"name\":\"Privacy Policy - Ares Tech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/arestech.us\\\/#website\"},\"datePublished\":\"2025-05-27T17:34:00+00:00\",\"dateModified\":\"2025-06-20T17:07:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/arestech.us\\\/privacy-policy\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/arestech.us\\\/privacy-policy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/arestech.us\\\/privacy-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/arestech.us\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/arestech.us\\\/#website\",\"url\":\"https:\\\/\\\/arestech.us\\\/\",\"name\":\"Ares Tech\",\"description\":\"An eye on everything\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/arestech.us\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy Policy - Ares Tech","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/arestech.us\/es\/privacy-policy\/","og_locale":"es_MX","og_type":"article","og_title":"Privacy Policy - Ares Tech","og_description":"1. OUR PRIVACY COMMITMENT At Arestech, we&#8217;ve built our reputation on trust. When you&#8217;re dealing with cybersecurity and physical protection, privacy isn&#8217;t just legal compliance\u2014it&#8217;s the foundation of everything we do. This policy explains how we handle your personal information, because absolute security starts with transparency. 2. INFORMATION WE COLLECT We handle several types of [&hellip;]","og_url":"https:\/\/arestech.us\/es\/privacy-policy\/","og_site_name":"Ares Tech","article_modified_time":"2025-06-20T17:07:34+00:00","twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/arestech.us\/privacy-policy\/","url":"https:\/\/arestech.us\/privacy-policy\/","name":"Privacy Policy - Ares Tech","isPartOf":{"@id":"https:\/\/arestech.us\/#website"},"datePublished":"2025-05-27T17:34:00+00:00","dateModified":"2025-06-20T17:07:34+00:00","breadcrumb":{"@id":"https:\/\/arestech.us\/privacy-policy\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/arestech.us\/privacy-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/arestech.us\/privacy-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/arestech.us\/"},{"@type":"ListItem","position":2,"name":"Privacy Policy"}]},{"@type":"WebSite","@id":"https:\/\/arestech.us\/#website","url":"https:\/\/arestech.us\/","name":"Ares Tech","description":"An eye on everything","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/arestech.us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/pages\/318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/comments?post=318"}],"version-history":[{"count":2,"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/pages\/318\/revisions"}],"predecessor-version":[{"id":340,"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/pages\/318\/revisions\/340"}],"wp:attachment":[{"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/media?parent=318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}