Privacy Policy - Effective Date: January 1, 2024

At Verity Bloom, your privacy and the security of your data are not just a commitment; they are fundamental to our operations and integral to our DeFi consulting services. We understand the critical importance of trust in the blockchain space and are dedicated to maintaining the highest standards of data protection and client confidentiality in all blockchain and DeFi engagements.

This Privacy Policy outlines how Verity Bloom collects, uses, maintains, and discloses information collected from users (each, a "User") of the veritybloom.com website ("Site") and all products and services offered by Verity Bloom. This policy applies to the Site and all services offered by Verity Bloom, covering interactions from initial consultation to long-term project engagement.

For any questions regarding this policy or your data, please contact our dedicated Privacy Officer at [email protected].

Last updated: March 15, 2024

Abstract representation of secure data flow and privacy shields, symbolizing Verity Bloom's robust data protection.
Our commitment to safeguarding your information is paramount.

Information We Collect and How We Use It

Verity Bloom collects various types of information to provide and improve our services, communicate with you, and ensure the security of our platforms. Our collection methods are transparent and proportionate to the service being rendered.

Personal Information Collected

Technical and Usage Data Collection

Client Project Data Handling and Confidentiality

Confidentiality for client project data is paramount. All project-specific information, including intellectual property, strategy documents, and proprietary technical designs, is held under strict confidentiality agreements. Our internal procedures ensure that access to such data is restricted to authorized personnel directly involved in your project. We adhere to SOC 2 Type II compliance for data handling and security procedures, reinforcing our commitment to protecting your sensitive information.

Third-Party Data Sharing Limitations

Verity Bloom does not sell, trade, or rent Users' personal identification information to others. We may share generic aggregated demographic information not linked to any personal identification information regarding visitors and users with our business partners, trusted affiliates, and advertisers for the purposes outlined above. We may use third-party service providers to help us operate our business and the Site or administer activities on our behalf, such as sending out newsletters or surveys. We may share your information with these third parties for those limited purposes provided that you have given us your permission or where necessary for legal compliance, such as GDPR and CCPA.

Visual metaphor of data flowing securely into a fortress-like blockchain, representing Verity Bloom's secure data handling.
Every piece of data is handled with precision and secured by advanced protocols.

Data Security and Protection Measures

Verity Bloom employs robust security measures to protect your personal and project-related data from unauthorized access, alteration, disclosure, or destruction. Our multi-layered approach to security ensures the integrity and confidentiality of your information, reflecting zero data breaches since our company's founding in 2019.

Encryption Standards

We utilize industry-leading encryption standards, including AES-256 for data at rest and TLS 1.2+ for data in transit, to secure all communication and stored records. This ensures that your information remains confidential and impenetrable during transmission over networks and while stored on our secure servers.

Access Controls and Employee Training

Access to sensitive data is strictly governed by the principle of least privilege. Only authorized personnel with a legitimate business need can access specific information. All Verity Bloom employees undergo rigorous background checks and continuous data security and confidentiality training, reinforcing their understanding of best practices and their role in protecting client data.

Regular Security Audits and Vulnerability Assessments

To proactively identify and mitigate potential weaknesses, we conduct regular internal and external security audits, penetration testing, and vulnerability assessments. These assessments are performed by independent, certified cybersecurity firms to ensure an unbiased evaluation of our security posture.

Incident Response Procedures

Despite comprehensive preventative measures, we maintain a detailed and tested incident response plan to address any potential data security events promptly and effectively. This plan includes immediate containment, thorough investigation, notification protocols as mandated by regulatory requirements (e.g., GDPR, CCPA), and remediation steps to prevent recurrence.

Complex network of secure connections and data locks, illustrating Verity Bloom's advanced security architecture.
Our security infrastructure is designed to be resilient and impenetrable.

Your Rights and Choices Regarding Personal Data

Verity Bloom is committed to empowering you with control over your personal data. We fully comply with international data privacy regulations such as GDPR and CCPA, ensuring you have clear, actionable rights regarding your information.

Right to Access, Modify, and Delete Personal Information

You have the right to request access to the personal data we hold about you. You may also request corrections to any inaccuracies or the deletion of your personal data, subject to legal and contractual obligations for data retention. To exercise these rights, please contact our Privacy Officer via the details provided in the introduction.

Opt-Out Procedures for Marketing Communications

You can opt out of receiving marketing communications from Verity Bloom at any time by following the unsubscribe link provided in our emails or by contacting us directly. Please note that even if you opt out of marketing communications, we may still send you non-promotional messages related to your services with us.

Data Portability Rights

Where applicable by law, you have the right to receive a copy of your personal data in a structured, commonly used, and machine-readable format and to transmit that data to another controller without hindrance from us.

Complaint Procedures and Regulatory Contact

If you have concerns about our data handling practices, we encourage you to contact our Privacy Officer in the first instance. We are dedicated to resolving any issues promptly and transparently. If you are not satisfied with our response, you have the right to lodge a complaint with your local data protection authority.

Illustration of a person holding a digital key or shield, symbolizing user control over their data, set against a secure blockchain background.
You have full control and transparency over your personal data.

Contact Us with Any Privacy Questions

Your peace of mind is our priority. If you have any further questions or data protection concerns, please do not hesitate to reach out.

Email Our Privacy Officer