Privacy Policy

Last Updated: December 1, 2025

1. Introduction

ThreatPulsar, Inc. ("ThreatPulsar," "we," "our," or "us") operates the ThreatPulsar threat intelligence platform, accessible at threatpulsar.com. This Privacy Policy describes how ThreatPulsar collects, uses, shares, and protects personal data in connection with your use of our website, platform, and related services (collectively, the "Services").

ThreatPulsar is headquartered at 1201 Wilson Blvd, Arlington, VA 22209, United States. Elena Vasquez serves as Chief Executive Officer. For privacy inquiries, contact us at support@threatpulsar.com or by phone at +1 (703) 529-6147.

This Privacy Policy applies to:

  • Visitors to the ThreatPulsar website (threatpulsar.com)
  • Registered users of the ThreatPulsar platform (including trial accounts)
  • Enterprise customers and their authorized users accessing the platform via API or web interface
  • Recipients of ThreatPulsar communications, including marketing emails and product update notices

By accessing or using the Services, you acknowledge that you have read and understood this Privacy Policy. If you do not agree with our data practices, do not use the Services.

2. Data We Collect

ThreatPulsar collects several categories of personal and non-personal data depending on how you interact with our Services.

2.1 Data You Provide Directly

Account Registration Data: When you create a ThreatPulsar account, we collect your name, business email address, company name, job title, and optionally your phone number. This data is required to create and manage your account.

Contact Form Submissions: When you submit a contact request or demo request through our website, we collect your name, email address, company, and the content of your message.

Payment Information: When you subscribe to a paid ThreatPulsar plan, payment is processed by our third-party payment processor (Stripe, Inc.). ThreatPulsar receives a transaction confirmation and the last four digits of your payment card but does not store full card numbers, CVV codes, or banking details. Stripe's Privacy Policy governs their processing of your payment data.

Support Requests: When you contact ThreatPulsar support, we collect the content of your support request and any attachments you provide, along with your account information associated with the support ticket.

IOC Submission Data: When you use the ThreatPulsar platform to submit indicators of compromise (IP addresses, domain names, file hashes, URLs) for enrichment, we process those indicators through our enrichment pipeline. IOC submissions are associated with your account and tenant context. See Section 5 (Data Retention) for how long IOC submission data is retained.

2.2 Data Collected Automatically

Log Data: Our servers automatically log information about requests to the ThreatPulsar website and API, including: IP address of the requesting client, request timestamp, HTTP method and path, response status code, referrer URL, and user agent string. Log data is retained for up to 90 days for security and debugging purposes.

Usage Analytics: We use analytics tools to collect information about how users interact with the ThreatPulsar web interface. This includes pages visited, features accessed, time spent in the platform, clicks on UI elements, and error events. Analytics data is used to improve the platform and is associated with a session identifier that may be linked to your account.

Cookies and Tracking Technologies: ThreatPulsar uses cookies and similar technologies as described in our Cookie Policy (available at threatpulsar.com/legal/cookies.html). Cookies serve purposes including session management, preferences, and analytics.

Device and Browser Data: We collect information about the device and browser used to access ThreatPulsar, including browser type and version, operating system, screen resolution, and timezone. This data is used for platform compatibility and security purposes.

2.3 Data from Third Parties

ThreatPulsar may receive data about you from third-party sources, including:

  • LinkedIn and other professional networks, when you request information about ThreatPulsar through LinkedIn advertising or profile forms
  • Resellers and channel partners who refer enterprise customers to ThreatPulsar
  • Business intelligence providers that supplement account data with firmographic information (company size, industry classification) for enterprise customers

3. How We Use Data

ThreatPulsar uses collected data for the following purposes:

3.1 Providing the Services

We use your account data, IOC submission data, and API access logs to deliver the ThreatPulsar platform services to you: processing IOC enrichment requests, generating ATT&CK mapping results, delivering SOAR integration responses, and providing access to the analyst workload dashboard. Without this processing, we cannot provide the Services.

3.2 Account Management

We use account data to authenticate users, manage subscription status, enforce API rate limits, and communicate with you about your account (billing, plan changes, expiration notices, and security alerts such as new login from an unrecognized device).

3.3 Platform Improvement

Usage analytics data, error logs, and aggregated (non-identifying) IOC submission patterns are used to improve the accuracy of our enrichment models, expand threat feed coverage, tune ATT&CK mapping confidence scores, and improve the reliability and performance of the platform infrastructure.

3.4 Customer Support

Support request data is used to resolve technical issues and answer questions. Support staff have access to relevant account and platform data needed to assist with specific requests.

3.5 Marketing Communications

With your consent (or where we have a legitimate interest), we use your email address to send product updates, security research publications from the ThreatPulsar research team, webinar invitations, and information about new features. You may unsubscribe from marketing communications at any time by clicking the unsubscribe link in any marketing email or contacting support@threatpulsar.com.

3.6 Legal Compliance and Security

We process data as necessary to comply with applicable legal obligations, respond to lawful government requests, enforce our Terms of Service, and investigate potential security incidents, fraud, or platform abuse.

4. Data Sharing

ThreatPulsar does not sell personal data to third parties. We share data only in the following circumstances:

4.1 Service Providers

We use third-party vendors to operate certain aspects of the Services, including cloud infrastructure providers (Amazon Web Services), payment processing (Stripe), email delivery (for transactional and marketing emails), analytics platforms, and customer support software. These providers access data only as necessary to perform services on our behalf and are bound by contractual data processing agreements that prohibit them from using the data for their own purposes.

4.2 Threat Intelligence Feed Partners

When ThreatPulsar submits an IOC for enrichment, that IOC is transmitted to our integrated threat intelligence feed partners (including but not limited to VirusTotal, Shodan, AbuseIPDB, and others listed in the platform documentation). Each feed partner processes the submitted IOC according to their own privacy policies and terms of service. ThreatPulsar selects feed partners that operate under data processing agreements consistent with applicable privacy law requirements.

4.3 Legal Requirements

We may disclose data when required by law, court order, or government authority, or when we believe in good faith that disclosure is necessary to: (a) comply with a legal obligation; (b) protect the rights, property, or safety of ThreatPulsar, our customers, or the public; or (c) detect, prevent, or address fraud, security, or technical issues.

4.4 Business Transfers

If ThreatPulsar is involved in a merger, acquisition, financing, or sale of all or a portion of its assets, customer data may be transferred as part of that transaction. We will notify affected users via email or prominent notice on our website before data is transferred and becomes subject to a different privacy policy.

5. Data Retention

ThreatPulsar retains data for as long as necessary to provide the Services and as required by law:

  • Account data: Retained for the duration of the account, plus 90 days after account closure to support recovery requests. After 90 days, account data is deleted or anonymized.
  • IOC submission data: Retained for 12 months for enterprise accounts and 30 days for free trial accounts. Retained data is used to support enrichment context building (pattern analysis within your tenant) and to respond to support queries about historical enrichment results.
  • API access logs: Retained for 90 days for security and debugging purposes, then deleted.
  • Payment records: Retained for 7 years as required by US tax and accounting regulations.
  • Support records: Retained for 3 years from case closure to support audit and quality assurance purposes.
  • Marketing consent records: Retained for the duration of the subscription relationship plus 3 years to document consent history.

You may request earlier deletion of your personal data by submitting a deletion request to support@threatpulsar.com. Requests are processed within 30 days. Note that some data may need to be retained for legal compliance or security purposes even after an account deletion request.

6. Your Rights

Depending on your jurisdiction, you may have the following rights with respect to your personal data:

6.1 Rights Under GDPR (EEA and UK Users)

If you are located in the European Economic Area or United Kingdom, you have the following rights under the General Data Protection Regulation (GDPR) or UK GDPR:

  • Right of access: You may request a copy of the personal data we hold about you.
  • Right to rectification: You may request correction of inaccurate personal data.
  • Right to erasure ("right to be forgotten"): You may request deletion of your personal data, subject to legal retention requirements.
  • Right to restriction: You may request that we restrict processing of your data in certain circumstances.
  • Right to data portability: You may request a machine-readable copy of personal data you have provided to us, where technically feasible.
  • Right to object: You may object to processing of your personal data for direct marketing or where we rely on legitimate interests as the legal basis for processing.
  • Right to withdraw consent: Where processing is based on consent, you may withdraw consent at any time without affecting the lawfulness of prior processing.

To exercise any GDPR right, submit a request to support@threatpulsar.com with the subject line "GDPR Rights Request" and specify the right you are exercising and the data involved. We will respond within 30 days. You also have the right to lodge a complaint with the supervisory authority in your EU member state or the UK Information Commissioner's Office (ICO).

6.2 Rights Under CCPA (California Users)

If you are a California resident, you have the following rights under the California Consumer Privacy Act (CCPA):

  • Right to know: You may request disclosure of the categories and specific pieces of personal information we have collected about you, the categories of sources from which it was collected, the purposes for collection, and the categories of third parties with whom we have shared it.
  • Right to delete: You may request deletion of personal information, subject to exceptions for legal compliance, security, and other legitimate purposes.
  • Right to opt out of sale: ThreatPulsar does not sell personal information as defined under CCPA.
  • Right to non-discrimination: ThreatPulsar will not discriminate against you for exercising CCPA rights.

To submit a CCPA request, contact us at support@threatpulsar.com or +1 (703) 529-6147.

7. Cookies

ThreatPulsar uses cookies for session management, security, analytics, and marketing purposes. Detailed information about the cookies we use is available in our Cookie Policy at threatpulsar.com/legal/cookies.html. You can manage your cookie preferences through the cookie consent banner displayed on your first visit to the site.

8. Data Security

ThreatPulsar implements technical and organizational security measures appropriate to the sensitivity of the data we process, including:

  • Encryption of data in transit using TLS 1.2 or higher
  • Encryption of data at rest using AES-256
  • Per-tenant encryption key hierarchies for enterprise customer data
  • Multi-factor authentication requirements for all ThreatPulsar staff accounts
  • Regular penetration testing and vulnerability assessments by third-party security firms
  • Access controls limiting staff access to customer data to those with a documented need
  • Logging and monitoring of all administrative access to production systems
  • SOC 2 Type II audit program (report available under NDA for enterprise customers)

No security system is impenetrable. While we take reasonable measures to protect your data, we cannot guarantee the absolute security of data transmitted over the internet. If you believe your ThreatPulsar account has been compromised, contact support@threatpulsar.com immediately.

9. International Data Transfers

ThreatPulsar is based in the United States. If you access our Services from the EEA, UK, or other jurisdictions with data transfer restrictions, your personal data may be transferred to and processed in the United States, which may have different data protection standards than your country.

For transfers from the EEA or UK to the United States, ThreatPulsar relies on Standard Contractual Clauses (SCCs) as the legal mechanism for data transfer. Enterprise customers located in the EEA or UK may request a copy of the applicable SCCs by contacting support@threatpulsar.com.

10. Children's Privacy

ThreatPulsar Services are designed for enterprise use by security professionals and are not directed to individuals under the age of 18. We do not knowingly collect personal data from individuals under 18. If we become aware that we have inadvertently collected personal data from a minor, we will delete it promptly.

11. Changes to This Privacy Policy

ThreatPulsar may update this Privacy Policy from time to time to reflect changes in our practices, technology, legal requirements, or other factors. When we make material changes, we will notify registered users by email at the address associated with their account and post the updated policy at this URL with a revised "Last Updated" date at least 14 days before the changes take effect. Continued use of the Services after the effective date of an updated Privacy Policy constitutes acceptance of the updated terms.

12. Contact Us

For questions about this Privacy Policy, to exercise your data rights, or to report a potential privacy concern, contact ThreatPulsar at:

  • Email: support@threatpulsar.com
  • Phone: +1 (703) 529-6147
  • Mail: ThreatPulsar, Inc., 1201 Wilson Blvd, Arlington, VA 22209

For EU/UK data protection inquiries specifically, you may also contact our designated EEA representative at the same email address with the subject line "EEA Data Protection Inquiry."