Reykja Cybersecurity - Privacy Policy

Privacy Policy

Last modified: March 9, 2025

This privacy policy applies to products or services provided, owned and operated by Reykja Cybersecurity AB (later Reykja). This policy outlines the information we collect, process, and use; information you may provide to the websites, products or services provided by Reykja; and outlines the choices made available to you regarding the ways in which we use your personal information.



Collection and Use of Information


If you are not a customer:

Website

If you just visit one of our web page as normal, we don’t collect anything (beside from normal web logs, see below *1). We don’t have any spy-ads-analyst-tools on the webpage that collect your personal information whether you like it or not. We don’t place any cookies for “better experience” beside from a PHPSESSID security cookie witch helps from session hijacking (this cookie is automatically removed when you close the browser - depending on your settings). We don’t have JavaScript or similar (unless there is a specific feature on a specific page). We don’t have any “like” buttons or other links. We don’t have anything, it's a clean site as we protect the privacy of our visitors.

If you abuse, scan or do any non normal browsing, we collect and save the data as evidence.


Mail



If you contact us by mail and just have a random question, we normally delete you mail at the same time.
If you contact us by mail and have questions about our service where we discuss a potential business deal, we normally save the mail under ongoing discussion.
If you contact us by mail regarding Reykja or security questions, we save the mail as long as needed.
If you are from a government agencies in any case, we save the mail as long as needed.
If you do any criminal stuff, we collect and save you data as evidence.


Abuse

If you abuse our products or services in any way, we collect any relevant data and save it as evidence. Depending on what you do, we may/are obliged to contact government agencies.


Notices above

1) We save and collect normal logs from IDS, firewalls, web servers and other networks equipment at Reykja Data Centers. These logs are automatically deleted with different time intervals, normally between one to sex mount depending on the security level.




If you are a customer:

Website

If you just visit one of our our web page as normal, we don’t collect anything (beside from normal web logs, see below *1). We don’t have any spy-ads-analyst-tools on the webpage that collect your personal information whether you like it or not. We don’t place any cookies for “better experience” beside from a PHPSESSID security cookie witch helps from session hijacking (this cookie is automatically removed when you close the browser - depending on your settings). We don’t have JavaScript or similar (unless there is a specific feature on a specific page). We don’t have any “like” button or other links. We don’t have anything, it's a clean site as we protect the privacy of our visitors.

If you abuse, scan or do any non normal browsing, we collect and save the data as evidence.


Web Services

Same rules as above (Website) and also;
If you are using any web services we provide, we only collect metadata as you userid, IP-address and time when you log in for up to sex months depending on the service and your settings (see policies regarding the service). The metadata stays within your service and is often visible to your company administrators. The metadata is not shared to anyone outside your company or Reykja. If you providing information within the service, we collect that information. If you delete provided data within the service, the data is normally permanently deleted immediately (see policies regarding the service) and Backups below.


Mail


If you contact us by mail and just have a question, we normally save you mail. If you want us to remove it, please tell us.
If you contact us by mail regarding the service we provide to you, we normally save the conversation regarding to the specific service and matter.


Support system


If you contact us via our internal support system and just have a question, we normally save you question. If you want us to remove it, please tell us.
If you contact us via our internal support system regarding the service we provide to you, we normally save the conversation in the system.

Note! You can see all the support conversations within the support system. If old conversations is not there, it’s permanent deleted.


Backups

Depending to your services there may be a backup solution to it. Please see you contract and the policies (if there is) regarding your specific service if there is a backup solution connected to it. Your contract will show what and how long the data is saved.


Abuse

If you abuse our products or services in any way, we collect any relevant data and save it as evidence. Depending on what you do, we may/are obliged to contact government agencies. We may also stop parts/all your service under the investigation.


Notices above

1) We save and collect normal logs from IDS, firewalls, web servers and other networks equipment at Reykja Data Centers. These logs are automatically deleted with different time intervals, normally between one to sex mount depending on the security level.




The metadata - Your data

The metadata you provide is yours, not ours!
We only hold the metadata within the service we provide to you.


Use and share of the data outside Reykja



We never share, give or sell any metadata or data; except:

1) We may use statistics how many attacks, what type we block, analyze or similar information (note: not data/metadata) for our business interests that we may share in our marketing, on the web or other channels. We will never publish any data/metadata/information that can connect to you, your company, your clients, your service or any similar.

2) If government agencies contact us in a criminal matter regarding you data we need to respond along the law.


Final words

We only save necessary information that you provide about your company that we need for the service we provide, billing and other purpose.

When you cancel our service and the contract is cleared, all your company information, metadata, mail etc. will be deleted except for any legal document, tax information, any contract agreement if needed.

Flash/SSD/HDD within Edina/Embla or other services will go through one of the following options (contracted):
1) Any encrypted volumes on block storage devices will be wiped and destroyed.
2) Any encrypted block storage devices will be wiped witch RCMP TSSIT OPS-II (The Royal Canadian Mounted Police Technical Security Standard Information Technology, Appendix OPS-II: Media Sanitization) Security level 8.
3) Any encrypted block storage devices will be properly destroyed / total destruction. Evidence of destruction is handed over.




Reykja and Domains

Domains affected within Reykja:
We only use ReykjaCS.com in our communication with you.
If you use a service within Reykja which use other domains, you will be informed.


Reykja Cybersecurity AB
Cyber Defence and Investigation

Corporate identity: ‍559247-6708‍

info@ReykjaCS.com
GPG key

GPG info:
ID: 0x38722307142DC43B
Fingerprint SHA256: 6ca0d9f4d78 d5627fc4e74 42e76a63905 74c770ec82f f0c5c6e75d9 276710ded





© 1998 - 2025 Reykja Cybersecurity AB - Designed and coded by Reykja - All rights reserved