Don't miss our November webinar: The Top 6 Unknown SDLC Risks Legit Uncovers. Save your spot →

Blog Contact Us Sign In
legit security logo white letters
  • Platform
    Platform - ASPM Icon
    Application Security Posture Management (ASPM)
    Platform - Secrets and Source Code Leakage Protection Icon
    Secrets and Source Code Leakage Protection
    Platform - Continuous Compliance and SBOM Icon
    Continuous Compliance and SBOM
    Platform - Software Supply Chain Security SSCS Icon
    Software Supply Chain Security (SSCS)
    Platform - AI Security Posture Management (AI-SPM) Icon
    AI Security Posture Management (AI-SPM)
    Platform - AppSec Vulnerability Management Icon
    AppSec Vulnerability Management
    Integrations
  • Why Legit
    Why Legit - Customers Icon
    Customers
  • Resources
    Resources - Blog Icon
    Blog
    Resources - Resource Library Icon
    Resource Library
    Resources - Open Source with Legitify Icon
    Open Source w/ Legitify
    Resources - Events Icon
    Events
  • Company
    Company - Partners Icon
    Partners
    Company - About Legit Icon 2
    About Legit
    Company - Press Releases Icon 1
    Press Releases
    Company - In the News Icon
    In the News
    Company - Careers Icon
    Careers
Book a Demo
Platform
header mobile nav icon
Platform
Platform - ASPM Icon
Application Security Posture Management (ASPM)
Platform - Secrets and Source Code Leakage Protection Icon
Secrets and Source Code Leakage Protection
Platform - Continuous Compliance and SBOM Icon
Continuous Compliance and SBOM
Platform - Software Supply Chain Security SSCS Icon
Software Supply Chain Security (SSCS)
Platform - AI Security Posture Management (AI-SPM) Icon
AI Security Posture Management (AI-SPM)
Platform - AppSec Vulnerability Management Icon
AppSec Vulnerability Management
Integrations
Why Legit
header mobile nav icon
Why Legit
Why Legit - Customers Icon
Customers
Resources
header mobile nav icon
Resources
Resources - Blog Icon
Blog
Resources - Resource Library Icon
Resource Library
Resources - Open Source with Legitify Icon
Open Source w/ Legitify
Resources - Events Icon
Events
Company
header mobile nav icon
Company
Company - Partners Icon
Partners
Company - About Legit Icon 2
About Legit
Company - Press Releases Icon 1
Press Releases
Company - In the News Icon
In the News
Company - Careers Icon
Careers
Request a Demo

Privacy Policy

 

This privacy policy (“Privacy Policy”) governs how we, Legit Security Ltd. (together, “Legit Security” “we”, “our” or “us”) use, collect and store Personal Data we collect or receive from or about you (“you”) such as in the following use cases:

  1. When you browse or visit our website, https://www.legitsecurity.com/ (“Website”)
  2. When you make use of, or interact with, our Website
    1. When you subscribe to our distribution list(s) / newsletter(s)
    2. When you contact us (e.g. customer support, need help, submit a request, chat)
  3. When you make use of, or interact with, our platform that we license (each individually, and collectively, the “Platform”)
    1. When you create an account, log in and make use of the Platform.
  4. When you attend a marketing event and/or we exchange business cards and you provide us with your Personal Data
  5. When we acquire your Personal Data from third-party sources (such as lead-generation companies)
  6. When we use the Personal Data of our customers (e.g. contact details)
  7. When we use the Personal Data of our service providers (e.g. contact details)
  8. When you interact with us on our social media profiles (e.g., LinkedIn)

Please read this Privacy Policy carefully, so you can understand our practices and your rights in relation to personal data. “Personal Data” or “Personal Information” means any information that can be used, alone or together with other data, to uniquely identify any living human being and any information deemed as Personally Identifiable Information by privacy laws. Please note that this is a master privacy policy and some of its provisions only apply to individuals in certain jurisdictions. Important note: Nothing in this Privacy Policy is intended to limit in any way your statutory right, including your rights to a remedy or means of enforcement.

Table of contents:

  1. What information we collect, why we collect it, and how it is used
  2. How we protect and retain your Personal Data
  3. How we share your Personal Data
  4. Additional information regarding transfers of Personal Data
  5. Your privacy rights. How to delete your account.
  6. Use by children
  7. Interaction with third party products
  8. Log files
  9. Analytic tools
  10. Specific provisions applicable under California privacy law
  11. Contact us

This Privacy Policy can be updated from time to time and, therefore, we ask you to check back periodically for the latest version of this Privacy Policy.  If we implement significant changes to the use of your Personal Data in a manner different from that stated at the time of collection, we will notify you by posting a notice on our Website or by other means.

1. WHAT INFORMATION WE COLLECT, WHY WE COLLECT IT, AND HOW IT IS USED
Specific Personal Data we collect Why is the Personal Data collected and for what purposes? Consequences of not providing the Personal Data
When you browse or visit our Website
Cookies, analytic tools and log files

For more information, please read our cookies policy.
Marketing, better customer experience, analytics, statistics, among others. Certain non-essential Website features may not be available

Read more about the purposes of each cookie here: https://www.legitsecurity.com/cookies-policy 
When you make use of, or interact with, our Website
When you subscribe to our distribution list(s) / newsletter(s)
· Email address · To add you to our mailing list
· To send you Legit Security news and marketing communications
Cannot add you to our mailing list
Cannot send you Legit Security news
When you contact us (e.g. customer support, need help, submit a request, chat)
· Full name
· Email address
· Phone number
· Company name
· Job position
· Message / comments
· Any other Personal Information that you decide to provide/supply us with
· To process and answer your questions
· To provide support (e.g., to solve problems)
· To customize your experience
· To send you marketing communications
Cannot process and answer your questions

Cannot provide support (e.g., to solve problems)

Cannot customize your experience

Cannot send you marketing communications
When you make use of, or interact with, our Platform
When you create an account, log in and make use of the Platform
· Full name
· Email address
· User details
· Usage patter
· IP address
· Geolocation (IP address level)
· Browser data (technical data)
· Any other Personal Information that you decide to provide/supply us with
To allow you to create a user in our Platform
To allow you to log in and make use of our Platform
To track your actions in our Platform (in an aggregated manner), for example to improve our services
Cannot allow you to create a user in our Platform

Cannot allow you to log in and make use of our Platform

Cannot track your actions in our Platform
When you attend a marketing event and/or we exchange business cards and you provide us with your Personal Data
· Full name
· Email address
· Phone number
· Company name
· Job position
· Country
· Any other data you decide to provide/supply us with
· To establish a business connection
· To send you marketing communications
Cannot establish a business connection

Cannot send you marketing communications
When we acquire your Personal Data from third-party sources (such as lead-generation companies)
Contact details · To establish a business connection
· To contact you and send you marketing communications
Cannot establish a business connection

Cannot contact you and send you marketing communications
When we use the Personal Data of our customers (e.g. contact details)
· Full name
· Email address
· Phone number
· Payment details
· Company name
· Job title
· Country
· Any other data you decide to provide/supply us with
· To provide our products and services
· To perform the relevant agreement
· To send you contract-related communications
· To send you marketing communications
Cannot communicate with you

Cannot provide the services

Cannot perform the agreement

Cannot send you marketing communications
When we use the Personal Data of our service providers (e.g. contact details)
· Full name
· Email address
· Phone number
· Payment details
· Company name
· Job title
· Country
· Any other data you decide to provide/supply us with
· To contact our service providers
· To perform/execute the agreement
Cannot communicate with our service providers

Cannot perform the agreement
When you interact with us on our social media profiles (e.g., LinkedIn)
· Full name
· Email address
· Any other data you decide to provide/supply us with
· To answer your questions Cannot answer your questions

 

Finally, please note that some of the abovementioned Personal Data will be used for detecting, taking steps to prevent, and prosecution of fraud or other illegal activity, to identify and repair errors, to conduct audits, and for security purposes. Personal Data may also be used to comply with applicable laws, with investigations performed by the relevant authorities, law enforcement purposes, and/or to exercise or defend legal claims. In certain cases, we may or will anonymize or de-identify your Personal Data and further use it for internal and external purposes, including, without limitation, to improve the services and for research purposes. “Anonymous Information” means information which does not enable identification of an individual user, such as aggregated information about the use of our services. We may use Anonymous Information and/or disclose it to third parties without restrictions (for example, in order to improve our services and enhance your experience with them).

2. HOW WE PROTECT AND RETAIN YOUR INFORMATION

2.1) Security. We have implemented appropriate technical, organizational and security measures designed to protect your Personal Data. However, please note that we cannot guarantee that the information will not be compromised as a result of unauthorized penetration to our servers. As the security of information depends in part on the security of the computer, device or network you use to communicate with us and the security you use to protect your user IDs and passwords, please make sure to take appropriate measures to protect this information.
2.2) Retention of your Personal Data. Your Personal Data will be stored until we delete the record and we proactively delete it or you send a valid deletion request, please note that in some circumstances we may store your Personal Data for longer periods of time, for example (i) where we are required to do so in accordance with legal, regulatory, tax or accounting requirements, or (ii) for us to have an accurate record of your dealings with us in the event of any complaints or challenges, or (iii) if we reasonably believe there is a prospect of litigation relating to your Personal Data or dealings Regarding retention of cookies, you can read more in our cookie policy.

 

3. HOW WE SHARE YOUR PERSONAL DATA

In addition to the recipients described above, we may share your Personal Data as follows:

3.1 ) With our business partners with whom we jointly offer products or services. We may also share Personal Data with our affiliated companies.

3.2) We may use third party service providers to process your Personal Data for the purposes outlined above, including, without limitation:
3.2.1) With cloud service providers for hosting purposes;
3.2.2) With service providers in order to help us manage our Website and Platform;
3.2.3) With email providers, marketing, CRM, notification tool, lead tools and other similar tool providers (for example, Hubspot); and
3.2.4) With analytic companies, in order to help us understand and analyze data we collect (which may include Personal Data) in accordance with this policy (e.g., Hotjar and Google Analytics).

3.3) To the extent necessary, with regulators, courts or competent authorities, to comply with applicable laws, regulations and rules (including, without limitation, federal, state or local laws), and requests of law enforcement, regulatory and other governmental agencies or if required to do so by court order;

3.4) If, in the future, we sell or transfer, or we consider selling or transferring, some or all of our business, shares or assets to a third party, we will disclose your Personal Data to such third party (whether actual or potential) in connection with the foregoing events;

3.5) In the event that we are acquired by, or merged with, a third party entity, or in the event of bankruptcy or a comparable event, we reserve the right to transfer, disclose or assign your Personal Data in connection with the foregoing events, including, in connection with, or during negotiations of, any merger, sale of company assets, consolidation or restructuring, financing, or acquisition of all or a portion of our business by or to another company; and/or

3.6) Where you have provided your consent to us sharing or transferring your Personal Data (e.g., where you provide us with marketing consents or opt-in to optional additional services or functionality).

 

If you want to receive the list of the current recipients of your Personal Data, please make your request by contacting us to privacy@legitsecurity.com.

 

4. ADDITIONAL INFORMATION REGARDING TRANSFERS OF PERSONAL DATA

4.1) Storage: We store the Personal Data with the following storing companies: AWS with servers located in the US, East.


4.2) External transfers: Where we transfer your Personal Data (for example to third parties who provide us with services), we will generally obtain contractual commitments from them to protect your Personal Data in accordance with the requirements under applicable privacy law.

5. YOUR PRIVACY RIGHTS. HOW TO DELETE YOUR ACCOUNT

5.1) Rights: The following rights (which may be subject to certain exemptions or derogations) shall apply to certain individuals (some of which only apply to individuals protected by the Israeli privacy law):
- You have a right to access Personal Data held about you; and
- You have a right to amend or delete Personal Data.

5.2) Deleting your account: Should you ever decide to delete your account, you may do so by emailing privacy@legitsecurity.com. If you terminate your account, any association between your account and Personal Data we store will no longer be accessible through your account. However, given the nature of sharing on certain services, any public activity on your account prior to deletion will remain stored on our servers and will remain accessible to the public.

6. USE BY CHILDREN. We do not offer our products or services for use by children and, therefore, we do not knowingly collect Personal Data from, and/or about children under the age of eighteen (18). If you are under the age of eighteen (18), do not provide any Personal Data to us without involvement of a parent or a guardian. We do not intend to offer information society services directly to children. In the event that we become aware that you provide Personal Data in violation of applicable privacy laws, we reserve the right to delete it. If you believe that we might have any such information, please contact us at privacy@legitsecurity.com.

7. INTERACTION WITH THIRD PARTY PRODUCTS. We enable you to interact with third party websites, mobile software applications and products or services that are not owned or controlled by us (each a “Third Party Service”). We are not responsible for the privacy practices or the content of such Third Party Services. Please be aware that Third Party Services can collect Personal Data from you. Accordingly, we encourage you to read the terms and conditions and privacy policies of each Third Party Service.

8. LOG FILES. We use log files. We use such information to analyze trends, administer the Website, track users’ movement around the Website, and gather demographic information.

9. ANALYTIC TOOLS
  • Google Analytics. The Website uses a tool called “Google Analytics” to collect information about use of the Website. Google Analytics collects information such as how often users visit this Website, what pages they visit when they do so, and what other websites they used prior to coming to this Website. We use the information we get from Google Analytics to maintain and improve the Website and our products. We do not combine the information collected through the use of Google Analytics with Personal Information we collect. Google’s ability to use and share information collected by Google Analytics about your visits to this Website is restricted by the Google Analytics Terms of Service, available at https://marketingplatform.google.com/about/analytics/terms/us/, and the Google Privacy Policy, available at http://www.google.com/policies/privacy/. You may learn more about how Google collects and processes data specifically in connection with Google Analytics at http://www.google.com/policies/privacy/partners/. You may prevent your data from being used by Google Analytics by downloading and installing the Google Analytics Opt-out Browser Add-on, available at https://tools.google.com/dlpage/gaoptout/.
  • Hotjar. The Platform uses Hotjar in order to better understand our users’ needs and to optimize this service and experience. Hotjar is a technology service that helps us better understand our users experience (e.g. how much time they spend on which pages, which links they choose to click, what users do and don’t like, etc.) and this enables us to build and maintain our service with user feedback. Hotjar uses cookies and other technologies to collect data on our users’ behavior and their devices. This includes a device's IP address (processed during your session and stored in a de-identified form), device screen size, device type (unique device identifiers), browser information, geographic location (country only), and the preferred language used. Hotjar stores this information in a pseudonymized user profile. Hotjar is contractually forbidden to sell any of the data collected on our behalf. For further details, please see Hotjar’s privacy policy at https://www.hotjar.com/legal/policies/privacy. You can opt-out to the creation of a user profile, Hotjar’s storing of data about your usage of our Platfrom and Hotjar’s use of tracking cookies on other Platform on this link https://www.hotjar.com/legal/compliance/opt-out.
  • We reserve the right to remove or add new analytic tools.

10. SPECIFIC PROVISIONS APPLICABLE UNDER CALIFORNIA PRIVACY LAW

10.1) California Privacy Rights: California Civil Code Section 1798.83 permits our customers who are California residents to request certain information regarding our disclosure of Personal Information to third parties for their direct marketing purposes. To make such a request, please send an email to privacy@legitsecurity.com. Please note that we are only required to respond to one request per customer each year.

10.2) Our California Do Not Track Notice (Shine the Light): Do Not Track (“DNT”) is a privacy preference that users can set in certain web browsers. Please note that we do not respond to or honor DNT signals or similar mechanisms transmitted by web browsers, but we may allow third parties, such as companies that provide us with analytics tools, to collect personally identifiable information about an individual consumer’s online activities over time and across different web sites when a consumer uses the Services.

 

11. CONTACT US. If you have any questions, concerns or complaints regarding our compliance with this notice and the data protection laws, or if you wish to exercise your rights, we encourage you to first contact us at privacy@legitsecurity.com.

***

 

Platform
Platform Sofware Supply Chain AppSec Control Plane Code To Cloud Security Compliance & SBOM Secret Scanning
Customers
Customers
Company
Partners About Us Careers News Events Contact Us
Resources
Blog Resource Library Open Source
Learn
SDLC Security DevOps Security GitHub Security Secure Software Supply Chain Application Security Posture Management
legit security logo white letters
Privacy Policy Terms of Use © 2025 Legit Security