Privacy Policy

Last Updated: 06/27/2024

1. Introduction

1.1 Heaviside Industries, Inc. ("Company", "we", "our", "us") is committed to protecting your privacy. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you visit our website and use our services. By accessing or using our Services, you agree to the collection and use of information in accordance with this policy.

2. Information We Collect

2.1 We may collect the following types of information.

2.2 Personal Information. Name, email address, phone number, and other contact details.

2.3 Technical Information. IP address, browser type, operating system, and other technical details.

2.4 Usage Data. Information about how you use our website and services.

3. Use of Information

3.1 We use the information we collect for various purposes, including.

3.2 To provide and maintain our Services.

3.3 To notify you about changes to our Services.

3.4 To allow you to participate in interactive features of our Services.

3.5 To provide customer support.

3.6 To gather analysis or valuable information so that we can improve our Services.

3.7 To monitor the usage of our Services.

3.8 To detect, prevent, and address technical issues.

4. Data Protection and Security

4.1 We implement appropriate technical and organizational measures to protect your personal information against unauthorized access, alteration, disclosure, or destruction. These measures include.

4.2 Encryption. Encrypting data in transit and at rest.

4.3 Access Controls. Implementing strict access controls to limit who can access your information.

4.4 Regular Audits. Conducting regular security audits and vulnerability assessments.

5. California Privacy Rights

5.1 If you are a California resident, you have the right to request information regarding the disclosure of your personal information to third parties for direct marketing purposes. To make such a request, please contact us at Brooke.lawrence@theheaviside.com.

6. DFARS, NIST SP 800-171, and CMMC Compliance

6.1 In compliance with DFARS 7012, contractors handling Covered Defense Information (CDI) must:

6.2 Provide adequate security to safeguard CDI that resides on or is transiting through contractor information systems. This includes implementing security controls as specified in NIST SP 800- 171.

6.3 Implement security requirements specified in NIST SP 800-171 to protect CDI. These controls include, but are not limited to, access control, incident response, and system and communications protection.

6.4 Report cyber incidents that affect CDI or the contractor's ability to perform the requirements of the contract to the DoD within 72 hours.

6.5 Submit the incident report through the DoD's cyber incident reporting portal.

6.6 Provide access to affected media and equipment for forensic analysis and support the DoD in assessing the impact of the cyber incident.

6.7 Compliance with CMMC 2.0, specifically Control SC.L2-3.13.11, is required. This includes employing FIPS-validated cryptography to protect the confidentiality of Controlled Unclassified Information (CUI) when transmitted over external networks.

7. Changes to This Privacy Policy

7.1 We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page. You are advised to review this Privacy Policy periodically for any changes.

8. Contact Us

8.1 If you have any questions about this Privacy Policy, please contact us at Brooke.Lawrence@theheaviside.com.

Additional Clauses

9. Proprietary Information and Inventions (PII). The business, technical, and financial information obtained from or provided to contractors, consultants, or employees is considered Proprietary Information. This information must be kept confidential and used only for the purpose of evaluating a potential business relationship with the Company.

10. Intellectual Property Rights. The Company owns all intellectual property rights related to any inventions, works of authorship, designs, know-how, ideas, and information made or conceived by consultants, contractors, or employees during their engagement with the Company.

11. Non-Disclosure Obligations. Proprietary Information must be held in strict confidence, and reasonable precautions must be taken to protect such information. Unauthorized use or disclosure of Proprietary Information is prohibited.

12. Cybersecurity Measures. Immediate reporting of cyber threats to Phillip Walker, who oversees and manages all cyber threat responses and compliance with DFARS regulations.

Acceptance of Terms

By using our services, you acknowledge that you have read, understood, and agree to be bound by these Terms of Service and Privacy Policy.