Cyberyn Logo
CYBERYN
  • Strategy & Compliance ▼
    ■ Assessment & Risk Evaluation ■ Compliance & Insurance ■ Awareness Training
  • Fleet Defense ▼
    ■ Endpoint & Fleet Security ■ Cloud Security ■ Email Protection ■ Ransomware Protection
  • Offensive Security ▼
    ■ Penetration Testing ■ Portal Security ■ Vulnerability Scanning
  • Managed Ops ▼
    ■ SOC & Monitoring ■ Incident Response ■ Managed Services
  • CONTACT OPS

PRIVACY PROTOCOL

Last Updated: August 06, 2025

1. DATA COLLECTION

Cyberyn Systems Inc. ("Cyberyn") collects minimal data necessary to secure your fleet operations. This includes:

  • Contact information provided via our secure forms (Name, Email, DOT Number).
  • System logs and telemetry data from monitored endpoints (for SOC services).
  • Cookies used strictly for site functionality and security analysis.

2. USE OF INFORMATION

We use your data solely for:

  • Providing cybersecurity and compliance services.
  • Alerting you to active threats or breaches.
  • Improving our threat detection algorithms.

We do not sell your data to third-party brokers.

3. DATA SECURITY

All client data is encrypted at rest (AES-256) and in transit (TLS 1.3). Our SOC operates under strict zero-trust protocols. Access to your data is limited to authorized security analysts.

4. YOUR RIGHTS

You have the right to request a copy of your data or request deletion of non-essential records. Contact our Data Protection Officer at contact@cyberyn.com.

Cyberyn Logo CYBERYN

The premier cybersecurity defense for the US Logistics & Supply Chain infrastructure. FMCSA Compliant. Zero Trust. Unbreakable.

LNTWIG

DEFENSE PROTOCOLS

  • Risk Assessment
  • Fleet Defense
  • 24/7 SOC Monitoring
  • Penetration Testing
  • DOT Compliance

HEADQUARTERS

  • 📍101 Cyber Blvd, Suite 404
    Austin, TX 78701
  • ✉️contact@cyberyn.com
© 2025 CYBERYN SYSTEMS INC.PRIVACYTERMS
● SYSTEMS ONLINEENCRYPTION: 256-BIT