Privacy Policy

ONLINE PRIVACY POLICY

qnectU and its parent and subsidiary companies respect the privacy rights of our online visitors and recognize the importance of protecting the information collected from you. We have adopted a corporate wide Online Privacy Policy (“Privacy Policy”) that guides how we collect, store and use the information you provide online. Please note that this policy applies only to sites maintained by qnectU and its parents and subsidiaries, and not to websites maintained by other companies or organizations to which we link or link to us.

We may change the terms of this Privacy Policy from time to time. By continuing to use the website after we post any changes, you accept and agree to this Privacy Policy, as modified.

If you have questions or concerns regarding this statement, you should first contact qnectU at the email address or postal address specified on our Contact Us page.

INFORMATION COLLECTION AND USE

Our primary goals in collecting personally identifiable information are to provide you with the product and services made available through our website, including, but not limited, our services, to communicate with you, and to manage your registered user account, if you have one.

INFORMATION COLLECTED UPON REGISTRATION

If you desire to have access to certain restricted sections of our website, you will be required to become a registered user, and to submit certain personally identifiable information to qnectU. This happens in a number of instances, such as when you sign up for our services, or if you desire to receive marketing materials and information. Personally identifiable information that we may collect in such instances may include your IP address, full user name, password, email address, city, time zone, telephone number, and other information that you decide to provide us with, or that you decide to include in your public profile.

USE OF CONTACT INFORMATION

In addition, we may use your contact information to market to you, and provide you with information about, our products and services, including but not limited to our services. If you decide at any time that you no longer wish to receive such information or communications from us, please follow the unsubscribe instructions provided in any of the communications.

LOG DATA

When you visit the Site, our servers automatically record information that your browser sends whenever you visit a website as Log Data. This Log Data may include information such as your IP address, browser type or the domain from which you are visiting, the websites you visit, the search terms you use, and any advertisements on which you click. For most users accessing the Internet from an Internet service provider the IP address will be different every time you log on. We use Log Data to monitor the use of the Site and of our Service, and for the Site’s technical administration. We do not associate your IP address with any other personally identifiable information to identify you personally, except in case of violation of the Website Usage Terms and Conditions.

COOKIES

We use cookies and other technologies to passively collect demographic information, personalize your experience on our site and monitor advertisements and other activities. Cookies are small files downloaded to your computer to track movements within websites. We may link cookie information to personal information. Cookies link to information regarding what items you have selected for purchase at our store or pages you have viewed. This information is used to keep track of your shopping cart and make sure you don’t see the same ad repeatedly. Also, we use cookies to deliver content specific to your interest and to monitor website usage. Some of our sites use an outside ad company to display ads. These ads may contain cookies. Our ad companies collect cookies received with banner ads, and qnectU does not have access to this information. Most browsers are automatically set to accept cookies whenever you visit a website. You can disable cookies or set your browser to alert you when cookies are being sent. However some areas of our sites will not function properly if you do so. Please note that this privacy policy covers the use of cookies by qnectU only and does not cover the use of cookies by any advertisers.

OTHER TECHNOLOGIES

Other technologies used include clear GIFs and IP address logging. Clear GIFs also known as web bugs, beacons or tags, are small graphic images placed on a web page, web-based document, or in an e-mail message. Clear GIFs are invisible to the user because they are typically very small (only 1-by-1 pixel) and the same color as the background of the web page, document or e-mail message. We do not use clear GIFs to collect personal information about you. However, we may use clear GIFs to capture statistical usage information for our web pages, features or other elements on a web page. We may correlate this information to a user to personalize user experience and for statistical analysis of user experiences on our web pages.

THIRD PARTY SERVICES

Users may register for other services from our website. Certain products and/or services available on our site are provided to you in partnership with third party(s) and may require you to disclose personally identifiable information in order to register for and access such products and/or services. Such products and/or services shall identify the third party partners at the point of registration. If you elect to register for such products and/or services your personally identifiable information will be transferred to such third party(s) and will be subject to the privacy policy and practices of such third party(s). We are not responsible for the privacy practices and policies of such third party(s) and, therefore, you should review the privacy practices and policies of such third party(s) prior to providing your personally identifiable information in connection with such products and/or services.

SERVICE PROVIDERS

We engage certain trusted third parties to perform functions and provide services to us, including, without limitation, hosting and maintenance, customer relationship, database storage and management, and direct marketing campaigns. We will share your personally identifiable information with these third parties, but only to the extent necessary to perform these functions and provide such services, and only pursuant to binding contractual obligations requiring such third parties to maintain the privacy and security of your data.

LAW ENFORCEMENT

We cooperate with government and law enforcement officials or private parties to enforce and comply with the law. We may disclose any information about you to government or law enforcement officials or private parties as we, in our sole discretion, believe necessary or appropriate to respond to claims, legal process (including subpoenas), to protect the property and rights of qnectU or a third party, the safety of the public or any person, to prevent or stop any illegal, unethical, or legally actionable activity, or to comply with the law.

BUSINESS TRANSFERS

We may sell, transfer or otherwise share some or all of our assets, including your personally identifiable information, in connection with a merger, acquisition, reorganization or sale of assets or in the event of bankruptcy. You will have the opportunity to opt out of any such transfer if the new entity’s planned processing of your information differs materially from that set forth in this Privacy Policy.

By using this website, you agree to abide by the terms of this Privacy Policy.

Effective: January 01, 2015

Answers To Common Questions

Frequently Asked Questions

Do you offer access to senior IT consultants or a vCSO for oversight and guidance? 

Yes, we offer access to senior IT consultants and provide vCSO(Virtual Chief Security Officer) as a service for our clients. Our vCSO service provides your organization with expert leadership and strategic direction tailored to your unique cybersecurity and legal compliance needs. We are here to help you navigate the complexities of cybersecurity and ensure that your security posture is robust, compliant, and capable of addressing evolving cyber threats. Book a call today to get expert help with your company’s cybersecurity and compliance.

Do you have a high level of confidence in your security posture? If so, can you explain why?

We have a high level of confidence in the security posture of our company and our clients. Our security stack includes several components to ensure strong and resilient cybersecurity measures. We provide comprehensive risk management, regular audits and assessments, advanced security technologies, employee training and awareness, and incident response planning. Our systems and solutions follow established industry standards and best practices to keep your company safe and your data secure. Since every company has different risks depending on the data, systems, utilization, and more, we can work with your team to develop a robust security plan and implement the proper measures as needed. Reach out today to strengthen your company’s security posture!

Do you have a Disaster Recovery (DR) plan? If so, what’s in place? Is it tested regularly?

We provide robust Disaster Recovery (DR) plans, covering preventative, detective, and corrective measures. Our DR strategies are tailored to each client’s specific needs and are designed to ensure rapid recovery and continuity of operations in the event of any disaster. These plans are regularly reviewed and tested to guarantee they function effectively and meet the highest standards of resilience and reliability. And if a disaster were to occur outside of regular business hours, we have you covered! At qnectU, we have a response time of mere minutes for emergency after-hours calls, ensuring a rapid response to implement your Disaster Recovery plan. Book a call today to protect your company in the event of a disaster.

Do you perform regular risk assessments?

Here at qnectU, we conduct regular risk assessments as a core part of our risk management strategy. Our process is comprehensive, involving identification, categorization, and response planning for potential security risks, including technical vulnerabilities, access controls, and more. These assessments help us understand, control, and mitigate all forms of cyber risk, ensuring that our security measures are effective and up-to-date. But most importantly, we provide continual risk assessments at pre-determined intervals based on your company’s risk level. This ensures that issues are corrected, new risks are identified, and compliance is properly documented. Want to see how our in-depth business risk assessments work? Book a consultation today to get an in-depth risk assessment of your company’s current network security.

Do you follow proven change management principles? 

We are committed to following proven change management principles. We understand the importance of structured and systematic processes in implementing changes that affect cybersecurity protocols and IT environments. Our approach is based on industry-recognized frameworks and methodologies that ensure changes are managed effectively, focusing on minimizing risks, enhancing security posture, and achieving strategic objectives.

Do you address all my compliance needs, including HIPAA?

We specialize in Compliance as a Service (CaaS), and our program is designed to meet a wide range of regulatory requirements to ensure that your business adheres to the highest standards of compliance. We demonstrate our compliance through detailed assessments, documentation, and third-party audits. Our expertise and ongoing support can give you confidence that your company’s sensitive information is managed securely and in full compliance with all regulations.

Is third-party auditing provided to ensure cybersecurity and compliance requirements are being met?

In today’s world a business can easily be compromised via a “supply chain hack.” There have been several instances where the IT company has exposed all of their clients to hacking due to their own lack of cybersecurity measures. In order to prevent this within our own company, we work closely with a third party for comprehensive auditing services to ensure that all cybersecurity and compliance requirements are met. Our rigorous audit process involves a thorough examination of our systems and practices against established industry standards and best practices. This collaboration provides an objective perspective and deep expertise to identify any potential vulnerabilities, ensuring that our cybersecurity measures are robust, up-to-date, and in full compliance with regulatory demands.

What is Compliance as a Service (Caas)? 

Compliance as a Service (Caas) means that our experts will give you specialized help in handling all the rules and regulations your business needs to follow. We do this by providing expert guidance to help you determine what rules apply to your business and how to follow them. All while giving ongoing support to monitor your compliance status and updates in regulations. This may also include any advanced tools to help manage compliance tasks and risk management surrounding compliance. CaaS takes the hassle out of compliance so you can focus on running your business with confidence.

Who is Greg Mauer? 

Gregory Mauer is the founder and CEO of our company, a best-selling author, speaker, and a cybersecurity & compliance expert. He has been on stage with the likes of the “Nice Shark”, Robert Herjavec, Siri co-founder Adam Cheyer, and business coach and author Mike Michalowicz.

Answers To Common Questions

Frequently Asked Questions

Do you offer access to senior IT consultants or a vCSO for oversight and guidance? 

Yes, we offer access to senior IT consultants and provide vCSO(Virtual Chief Security Officer) as a service for our clients. Our vCSO service provides your organization with expert leadership and strategic direction tailored to your unique cybersecurity and legal compliance needs. We are here to help you navigate the complexities of cybersecurity and ensure that your security posture is robust, compliant, and capable of addressing evolving cyber threats. Book a call today to get expert help with your company’s cybersecurity and compliance.

Do you have a high level of confidence in your security posture? If so, can you explain why?

We have a high level of confidence in the security posture of our company and our clients. Our security stack includes several components to ensure strong and resilient cybersecurity measures. We provide comprehensive risk management, regular audits and assessments, advanced security technologies, employee training and awareness, and incident response planning. Our systems and solutions follow established industry standards and best practices to keep your company safe and your data secure. Since every company has different risks depending on the data, systems, utilization, and more, we can work with your team to develop a robust security plan and implement the proper measures as needed. Reach out today to strengthen your company’s security posture!

Do you have a Disaster Recovery (DR) plan? If so, what’s in place? Is it tested regularly?

We provide robust Disaster Recovery (DR) plans, covering preventative, detective, and corrective measures. Our DR strategies are tailored to each client’s specific needs and are designed to ensure rapid recovery and continuity of operations in the event of any disaster. These plans are regularly reviewed and tested to guarantee they function effectively and meet the highest standards of resilience and reliability. And if a disaster were to occur outside of regular business hours, we have you covered! At qnectU, we have a response time of mere minutes for emergency after-hours calls, ensuring a rapid response to implement your Disaster Recovery plan. Book a call today to protect your company in the event of a disaster.

Do you perform regular risk assessments?

Here at qnectU, we conduct regular risk assessments as a core part of our risk management strategy. Our process is comprehensive, involving identification, categorization, and response planning for potential security risks, including technical vulnerabilities, access controls, and more. These assessments help us understand, control, and mitigate all forms of cyber risk, ensuring that our security measures are effective and up-to-date. But most importantly, we provide continual risk assessments at pre-determined intervals based on your company’s risk level. This ensures that issues are corrected, new risks are identified, and compliance is properly documented. Want to see how our in-depth business risk assessments work? Book a consultation today to get an in-depth risk assessment of your company’s current network security.

Do you follow proven change management principles? 

We are committed to following proven change management principles. We understand the importance of structured and systematic processes in implementing changes that affect cybersecurity protocols and IT environments. Our approach is based on industry-recognized frameworks and methodologies that ensure changes are managed effectively, focusing on minimizing risks, enhancing security posture, and achieving strategic objectives.

Do you address all my compliance needs, including HIPAA?

We specialize in Compliance as a Service (CaaS), and our program is designed to meet a wide range of regulatory requirements to ensure that your business adheres to the highest standards of compliance. We demonstrate our compliance through detailed assessments, documentation, and third-party audits. Our expertise and ongoing support can give you confidence that your company’s sensitive information is managed securely and in full compliance with all regulations.

Is third-party auditing provided to ensure cybersecurity and compliance requirements are being met?

In today’s world a business can easily be compromised via a “supply chain hack.” There have been several instances where the IT company has exposed all of their clients to hacking due to their own lack of cybersecurity measures. In order to prevent this within our own company, we work closely with a third party for comprehensive auditing services to ensure that all cybersecurity and compliance requirements are met. Our rigorous audit process involves a thorough examination of our systems and practices against established industry standards and best practices. This collaboration provides an objective perspective and deep expertise to identify any potential vulnerabilities, ensuring that our cybersecurity measures are robust, up-to-date, and in full compliance with regulatory demands.

What is Compliance as a Service (Caas)? 

Compliance as a Service (Caas) means that our experts will give you specialized help in handling all the rules and regulations your business needs to follow. We do this by providing expert guidance to help you determine what rules apply to your business and how to follow them. All while giving ongoing support to monitor your compliance status and updates in regulations. This may also include any advanced tools to help manage compliance tasks and risk management surrounding compliance. CaaS takes the hassle out of compliance so you can focus on running your business with confidence.

Who is Greg Mauer? 

Gregory Mauer is the founder and CEO of our company, a best-selling author, speaker, and a cybersecurity & compliance expert. He has been on stage with the likes of the “Nice Shark”, Robert Herjavec, Siri co-founder Adam Cheyer, and business coach and author Mike Michalowicz.

Image

Innovation

Fresh, creative solutions.

Image

Integrity

Honesty and transparency.

Excellence

Excellence

Top-notch services.

FOLLOW US

Subscribe to our newsletter!

© Copyright 2025 qnectU