Request Your Demo

"*" indicates required fields

Contact Information

Privacy Policy

Effective Date: February 16th, 2022

Pixm takes the privacy of all customer stakeholders very seriously. This privacy policy describes how customer data is used and shared to help Pixm fulfill its mission to stop phishing breaches and make the web safer. By using or accessing the Services in any manner, you acknowledge that you accept the practices and policies outlined in this Privacy Policy, and you hereby consent that we will collect, use, and share your information in the following ways.

Please remember that your use of Pixm’s Services is at all times subject to the Terms of Use (“TOU”), which incorporates this Privacy Policy.  Any terms we use in this Policy without defining them have the definitions given to them in the TOU.

What does this Privacy Policy cover?

This Privacy Policy covers our treatment of personally identifiable information (“Personal Information”) that we gather when you are accessing or using our services (“Services”). These services include but are not limited to the free browser extension and the enterprise browser extension. This Privacy Policy does not pertain to the practices of companies we don’t own or control, or people that we don’t manage.

We gather various types of Personal Information from our users, as explained in more detail below, and we use this Personal Information internally in connection with our Services. This Personal Information is used to provide, personalize, and improve our Services. It is used to allow you to set up a user account and profile, to allow us to contact you and to fulfill your requests for certain products and services, and to analyze how you use the Services. In certain cases, we may also share some Personal Information with third parties, but only as described below.

We do not knowingly collect or solicit personal information from anyone under the age of 13. If you are under 13, please do not attempt to register for the Services or send any personal information about yourself to us. If we learn that we have collected Personal Information from a child under age 13, we will delete that information as quickly as possible. If you believe that a child under 13 may have provided us personal information, please visit https://pixmsecurity.com/contact/ to contact us.

Will Pixm ever change this Privacy Policy?

We’re constantly trying to improve our Services, so we may need to change this Privacy Policy from time to time as well, but we will alert you to changes by placing a notice on the https://pixmsecurity.com/, by sending you an email, and/or by some other means.  Please note that if you’ve opted not to receive legal notice emails from us (or you haven’t provided us with your email address), those legal notices will still govern your use of the Services, and you are still responsible for reading and understanding them.  If you use the Services after any changes to the Privacy Policy have been posted, that means you agree to all of the changes.

What Information does Pixm Collect?

Free Browser Extension

Information You Knowingly Provide Us

No Personal Information is required for users to install and use the Free Browser Extension. 

Information Collected Automatically

We do not automatically collect any Personal Information or otherwise sensitive user data like authentication information or financial information. We do not collect browsing activity except as it relates to preventing phishing breaches. All free users are kept anonymous. 

In order to provide our real time phishing prevention service, we do collect data automatically while keeping the user identity anonymous. For example, we automatically collect data associated with login URLs such as HTML content, URL and screenshot, and data associated with the browser like browser version, screen resolution, and installation timestamp. We will only store such data if we determine an associated URL to represent a phishing attack. If we determine the URL to be a phishing attack, we store it in our phishing threat intel (“Threat Intel”) database. 

The Threat Intel database contains no Personal Information. In the event that a phishing URL contains Personal Information as the result of a spear phishing attack that inserts such Personal Information into the URL, a security professional will manually remove such Personal Information. 

Our Threat Intel database is to prevent phishing breaches for other extension users and may be shared with third party security stakeholders to prevent phishing breaches for their users.

Enterprise Browser Extension

Information You Knowingly Provide Us

We may collect and store any information you knowingly provide to us. When extension users register their browser extension on the extension mini dashboard, we may collect their organization email address (“Organization Email Address”) if the email address provided is an email associated with a registered Enterprise Account.

Besides an Organization Email Address, no Personal Information is required to use the Enterprise Browser Extension.

Information Collected Automatically

We do not automatically collect any Personal Information or otherwise sensitive user data like authentication information or financial information. We do not collect browsing activity except as it relates to preventing phishing breaches.

In order to provide our real time phishing prevention service for Enterprise Browser Extension users and notify enterprise account holders of suspected phishing incidents, we do collect user data automatically from our enterprise extension users. For example, we automatically collect data associated with login URLs such as HTML content, URL and screenshot, and data associated with the browser like browser version, screen resolution and timestamp, and the organization email address or user ID of the registered enterprise extension user. We will only store such data if we determine an associated URL to represent a phishing attack. If we determine the URL to be a phishing attack, we store it in our enterprise customer’s database so they can view the phishing incident and its associated Organization Email Address address or User ID. 

We separately store the phishing URL in our Threat Intel database, without any associated Organization Email Address or associated Enterprise Account information. The Threat Intel database contains no Personal Information. In the event that a phishing URL contains Personal Information as the result of a spear phishing attack that inserts such Personal Information into the URL, a security professional will manually remove such Personal Information. 

Our Threat Intel database is to prevent phishing breaches for other extension users and security stakeholders who might be targeted by URLs or domains in the database.

Enterprise Account

Information You Knowingly Provide Us

We may receive and store any information you knowingly provide to us. For example, during the registration process on the website for an Enterprise Account “Enterprise Account”, we may collect Personal Information such as your name, email address, phone number and organization name. 

We may communicate with you if you’ve provided us the means to do so. For example, if you’ve given us your email address, we may send you promotional email offers or email you about your use of the Services. Also, we may receive a confirmation when you open an email from us. This confirmation helps us make our communications with you more interesting and improve our services.  If you do not want to receive communications from us, please indicate your preference by contacting us at https://pixmsecurity.com/contact.

Information Collected Automatically

For Pixm users registered with your organization, we collect information according to the above section “Enterprise Browser Extension”.

Will Pixm Share Any of the Personal Information it Receives?

Pixm does not rent or sell your Personal Information.

Pixm does share anonymized URL information stored in its Threat Intel database in order to prevent phishing breaches for other extension users and to enable other security stakeholders to prevent phishing breaches.

Share This