Privacy Policy

Last updated: March 1, 2025

Introduction

Updated for 2025 Canadian Privacy Standards

This Privacy Policy describes how Tridacom IT Solutions (“we,” “us,” “our,” “Tridacom”) collects, uses, and discloses information about you. This Privacy Policy applies when you use our websites, mobile applications, or other online products and services that link to this Privacy Policy (collectively, our “Services”), contact our customer service team, engage with us on social media, or otherwise interact with us.

We encourage you to read this Privacy Policy carefully to understand our practices regarding your personal information and how we will treat it.

Policy Updates

We may change this Privacy Policy from time to time to reflect changes in our practices or for other operational, legal, or regulatory reasons. When we make changes, we will:

Update the effective date at the top of this policy
Post the updated policy on our website with a prominent notice
For significant changes, send you a notification via email or display in-app notifications
In some cases, request your explicit consent to material changes
We recommend reviewing this Privacy Policy regularly to stay informed about our information practices and your privacy rights.

About Tridacom IT Solutions

Tridacom IT Solutions is a leading Canadian technology service provider specializing in:

Managed IT services and support
Secure cloud solutions and infrastructure
Advanced cybersecurity protection
Custom software development
Digital transformation consulting

We are committed to protecting your privacy and ensuring the security of your personal information in compliance with the highest standards of Canadian and international privacy laws.

Our Privacy Commitment

  • Transparency in data practices
  • Minimal data collection
  • Industry-leading security
  • User control over information
  • Continuous compliance monitoring

Policy Scope

This Privacy Policy provides a comprehensive overview of our information practices, covering:

Information Collection

What data we collect and how we obtain it

Information Usage

How we use your information and our legal bases

Information Sharing

When and with whom we share your information

Your Rights & Choices

How to access, modify, or delete your information

Data Security

How we protect your information from unauthorized access

International Transfers

How we handle cross-border data transfers

Data Retention

How long we keep your information

Children's Privacy

Special protections for children's data

Policy Updates

How we notify you of changes to this policy

Contact Information

How to reach us with privacy questions

2025 Canadian Privacy Standards

Updated to align with the Consumer Privacy Protection Act (CPPA) and global best practices

Our Privacy Policy has been comprehensively updated to align with Canada's enhanced privacy framework in 2025, incorporating the following key elements:

Enhanced Transparency

Clear explanations of our data practices in accessible language, with visual elements to improve understanding.

Explicit Consent

Clearer consent mechanisms with granular options and the ability to modify or withdraw consent at any time.

Data Portability

Tools for you to export your personal information in a structured, commonly used format for transfer to other services.

Algorithmic Transparency

Explanations about how automated systems use your data to make decisions or recommendations that affect you.

Privacy by Design

Privacy protections built into our services from inception, not added as an afterthought or compliance checkbox.

Enhanced Enforcement

Accountability under the CPPA's stronger enforcement mechanisms, including significant penalties for non-compliance.

Source: Office of the Privacy Commissioner of Canada, Consumer Privacy Protection Act (CPPA) Guidelines, 2025

Key Terms

Throughout this Privacy Policy, we use certain key terms that have specific meanings under Canadian privacy laws:

Personal Information:Information that identifies or can identify an individual directly or indirectly
Information that identifies, relates to, describes, is reasonably capable of being associated with, or could reasonably be linked, directly or indirectly, with you. Under Canadian privacy laws, this includes any information about an identifiable individual.
Processing:Any operation performed on personal information
Any operation or set of operations performed on personal information, such as collection, recording, organization, structuring, storage, adaptation, retrieval, use, disclosure, or erasure.
Data Controller:The entity that decides how and why data is processed
The entity that determines the purposes and means of processing personal information (in most cases, Tridacom IT Solutions).
Data Processor:A third party that processes data on behalf of the controller
A third party that processes personal information on behalf of Tridacom IT Solutions.
Special Categories of Data:Sensitive information requiring extra protection
Sensitive personal information that reveals racial or ethnic origin, political opinions, religious beliefs, health information, or biometric data.
De-identified Information:Information modified to remove identifying elements
Information that has been modified to remove or obscure direct and indirect identifiers, presenting a reasonable risk of re-identification under the circumstances. Under the CPPA, de-identified information still qualifies as personal information and is subject to many privacy requirements.
Anonymized Information:Information irreversibly stripped of identifying elements
Information that has been permanently and irreversibly modified such that it can no longer be used to identify an individual, either directly or indirectly. Under the CPPA, truly anonymized information is not considered personal information.
Automated Decision System:Technology that makes decisions with minimal human involvement
A system that uses algorithms, including artificial intelligence, to make or assist in making decisions about individuals. Under the CPPA, individuals have the right to explanations about how these systems make decisions affecting them.
Service Provider:Organization that processes data on behalf of another
An organization that processes personal information on behalf of another organization as part of providing services to that organization. Under the CPPA, service providers have specific obligations regarding safeguards, breach notification, and data use limitations.
Privacy Management Program:Formal structure for privacy compliance
A documented set of policies, practices, and procedures designed to ensure an organization's compliance with privacy laws. The CPPA requires organizations to implement privacy management programs that are appropriate to the volume and sensitivity of the personal information under their control.

Automatic Collection

When you access or use our Services, we automatically collect certain information about your device and your interaction with our Services. This section describes the types of information we collect automatically.

Device and Usage Information

We collect information about how you access our Services, including:

  • Device type, such as desktop, mobile, or tablet
  • Operating system and version
  • Browser type and version
  • IP address
  • Device identifiers (such as advertising IDs)
  • Regional and language settings
  • Network information
  • Internet service provider

Browsing Information

As you navigate through our Services, we collect information about your browsing actions, including:

  • Pages or screens you view
  • Links you click
  • Date and time of your visits
  • Duration of time spent on pages
  • Referring website, search terms, or links that directed you to our Services
  • Features used and content viewed
  • User preferences and settings

2025 Collection Updates

In accordance with updated privacy regulations, we have enhanced our controls around automatic data collection:

  • Data Minimization: We only collect information that is necessary for the functioning of our Services
  • Retention Limits: Automatically collected data is subject to shorter retention periods
  • Enhanced Consent: We obtain explicit consent before collecting certain types of device information
  • Purpose Limitation: We use automatically collected information only for specified, explicit, and legitimate purposes

Tracking Technologies

We use various tracking technologies to collect information automatically, including:

  • Cookies: Small data files stored on your device that help us improve our Services and your experience, see patterns in how users interact with our Services, and recognize returning users
  • Pixels and Beacons: Electronic images that help us deliver cookies, count visits, understand usage, and determine the effectiveness of communications
  • Local Storage: Features that allow websites to store data locally on your device, enabling features like automatic sign-in and site preferences
  • Analytics Tools: Third-party services that help us understand how users interact with our Services

For more information about how we use cookies and your choices regarding cookies, please see the “Cookies” section of this Privacy Policy.

Personal Information

In addition to the information we collect automatically, we also collect various types of personal information directly from you or from third parties. This section describes the categories of personal information we collect and the sources of this information.

Information You Provide to Us

We collect personal information you provide directly to us, including:

  • Account Information: When you create an account, we collect your name, email address, password, company name, job title, and other profile information
  • Contact Information: Your name, email address, postal address, phone number, and other contact details
  • Payment Information: Your credit card details, billing address, and other payment information (though we do not store full credit card numbers or CVV codes)
  • Service Usage Information: Information about the services you are interested in or have purchased
  • Communications: Information you provide in communications with us, including customer support requests, feedback, and survey responses
  • User Content: Information you provide when you participate in forums, discussions, or other interactive features of our Services

Business Client Information

As a B2B service provider, we collect and process information about our business clients, including:

  • Business contact information of representatives and employees
  • Business and financial information necessary for contracting
  • Account credentials for authorized users
  • IT infrastructure details necessary for service delivery
  • Service usage data, including logs, configurations, and performance metrics
  • Contract and billing information

Special Categories of Personal Information

We generally do not collect sensitive personal information (also known as special categories of data) unless it is necessary for our services or required by law. Such information may include:

  • Government-issued identification numbers (only when required for legal compliance or fraud prevention)
  • Biometric information (only with explicit consent, such as for advanced security features)
  • Health information (only when directly relevant to specific services)

Information From Third Parties

We may collect personal information from third parties, including:

  • Business Partners: Information shared by our business partners, resellers, or distributors when you purchase our services through them
  • Service Providers: Information from service providers that help us operate, improve, and market our Services
  • Identity Verification Services: Information to verify your identity when required for security purposes
  • Public Sources: Publicly available information such as business contact information, professional profiles, or information shared on public social media platforms

Information We Derive

We may derive information about you based on the information we collect. For example, we may derive:

  • Your general geographic location based on your IP address
  • Your preferences based on your usage of our Services
  • Industry insights based on aggregated client data
  • Security risk profiles based on login patterns and device information

Use and Processing

We use the information we collect for various purposes described in this section. How we use your information depends on your relationship with us, the services you use, and the choices you make.

How We Use Your Information

We process your personal information for these purposes in reliance on our legitimate business interests, in order to enter into or perform a contract with you, with your consent, and/or for compliance with our legal obligations. We use the information that you provide for the following:

  • To identify who you are.
  • To provide you with the products and services you've requested.
  • To administer your account. Including processing your payments and fulfilling your orders.
  • To contact you about your account and provide customer service support, including responding to your comments and questions.
  • To share information about your account or activity with you.
  • To ask you for feedback about our products and services.
  • To engage in marketing activities, such as sending you targeted ads.
  • To deliver content, products, and services that may be of interest to you.
  • To process your entries into sweepstakes, contests, or giveaways.
  • To improve our products and services and develop new ones.
  • To comply with the law.
  • To detect, investigate, and prevent fraudulent transactions and other illegal activities and protect our rights and property as well as our users and merchants.

Legitimate Business Purposes

We may use your personal information for our legitimate business purposes, including:

  • Service Delivery: Providing, maintaining, and improving our Services
  • Security: Protecting against security breaches, unauthorized transactions, theft, fraud, and other harmful activity
  • Communications: Sending service announcements, updates, security alerts, and support messages
  • Analytics: Understanding how our Services are used and improving our offerings
  • Research and Development: Developing new products, services, and features
  • Marketing: Marketing our Services and providing personalized content and recommendations

2025 Processing Standards

Our data processing practices adhere to current privacy principles, including:

  • Lawfulness, Fairness, and Transparency: We process data lawfully, fairly, and in a transparent manner
  • Purpose Limitation: We collect data for specified, explicit, and legitimate purposes
  • Data Minimization: We limit data collection to what is necessary for our purposes
  • Accuracy: We take reasonable steps to ensure personal data is accurate and kept up to date
  • Storage Limitation: We retain data only as long as necessary for our stated purposes
  • Integrity and Confidentiality: We implement appropriate technical and organizational measures to protect data
  • Accountability: We take responsibility for our data processing activities and can demonstrate compliance

Automated Decision Making

In some cases, we may use automated processing of your information to make decisions or take actions that may affect your access to our Services or how you experience them. For example:

  • Fraud detection and prevention systems that may block transactions or activities
  • Security systems that may restrict access based on login patterns or device information
  • Content recommendation systems that personalize your experience

You have the right to object to automated decision-making in certain circumstances. Please see the “User Rights” section for more information on how to exercise this right.

Legal Bases for Processing (GDPR and Similar Regulations)

For individuals in regions where laws like the GDPR apply, we process personal information on the following legal bases:

  • Consent: When you have given your consent to the processing
  • Contractual Necessity: When processing is necessary to perform a contract with you
  • Legal Obligation: When we need to comply with a legal obligation
  • Legitimate Interests: When processing is in our legitimate interests and not overridden by your rights
  • Vital Interests: When processing is necessary to protect someone's life
  • Public Interest: When processing is necessary for a task carried out in the public interest

Billing and Payments

This section describes how we handle billing information and process payments when you purchase our products and services.

Payment Processing

When you make a purchase from us, we collect payment information, which may include:

  • Credit or debit card information
  • Bank account information for electronic funds transfers
  • Billing address
  • Payment history
  • Other payment information necessary to process your transaction

Our third-party payment processor stores your credit card data. This information is encrypted and stored with “reasonable security measures.” For more information on how payments are handled, or to understand the data security and privacy afforded such information, please refer to our third-party payment processor's terms of use and privacy policy.

Billing Records

We maintain records of your billing and payment information for:

  • Processing payments for products and services
  • Facilitating automatic renewals if you have opted in to such services
  • Providing receipts and invoices
  • Responding to disputes or inquiries about charges
  • Complying with tax and accounting obligations

Payment Security

We take the security of your payment information seriously and implement various measures to protect it:

  • Encryption: All payment transactions are encrypted using industry-standard SSL technology
  • PCI Compliance: Our payment processing systems comply with Payment Card Industry Data Security Standards (PCI DSS)
  • Tokenization: We use tokenization to minimize the storage of actual payment card numbers
  • Access Controls: We restrict access to payment information to authorized personnel only
  • Third-Party Processors: We work with reputable payment processors that maintain high security standards

Retention of Billing Information

We retain billing and payment information as necessary to:

  • Process recurring payments if you have an ongoing subscription
  • Comply with financial regulations and tax requirements
  • Prevent fraud and unauthorized transactions
  • Address disputes or refund requests

We retain billing records for the period required by applicable financial and tax regulations, typically 7 years.

Your Choices

You have certain choices regarding your billing and payment information:

  • Update or correct your billing information in your account settings
  • Delete saved payment methods (except as needed for active subscriptions or as required by law)
  • Opt out of automatic renewals where available
  • Request a copy of your billing records as part of your general data access rights

Managing Information

We provide various ways for you to access, update, delete, and manage your personal information. This section explains how you can manage the information we hold about you.

Your Account

If you have an account with us, you can access and update certain information through your account settings. You can:

  • Update your profile information, such as your name, email address, and password
  • Update your communication preferences
  • View your order history and subscription information
  • Manage your saved payment methods
  • Update your marketing preferences

Communication Preferences

You can manage your communication preferences in the following ways:

  • Email Preferences: You can update your email preferences or unsubscribe from marketing emails by clicking the unsubscribe link in any marketing email we send or by updating your preferences in your account settings
  • Service Communications: You may not opt out of service-related communications (such as account verification, purchase confirmations, technical notices, and security alerts), as these are necessary for the operation of our Services
  • Push Notifications: If you have installed our mobile app, you can manage push notification preferences through your device settings

2025 User Control Enhancements

In line with evolving privacy standards, we offer enhanced controls for managing your information:

  • Preference Centre: A centralized dashboard to manage all your privacy and data preferences
  • Consent Management: Granular controls for managing consent for different types of data processing
  • Data Export: Self-service tools to export your data in machine-readable formats
  • Activity Log: Access to logs showing key actions taken with your account
  • Device Management: View and manage devices that have accessed your account

Cookies and Tracking Technologies

You have several options for managing cookies and other tracking technologies:

  • Cookie Preferences: You can manage your cookie preferences through our cookie banner or preference centre
  • Browser Settings: Most web browsers allow you to control cookies through browser settings, including rejecting cookies or clearing stored cookies
  • Do Not Track: You can enable Do Not Track (DNT) in your browser, though our response to DNT signals may vary
  • Ad Choices: You can opt out of interest-based advertising through industry tools like the Digital Advertising Alliance or Network Advertising Initiative

Deleting Your Information

You can request deletion of your personal information in the following ways:

  • Account Deletion: You can request to delete your account through your account settings or by contacting us
  • Specific Information: You can request deletion of specific information by contacting our support team
  • Retention Limitations: Some information may be retained for legitimate business or legal purposes, even after you request deletion

Please note that deleting your information or account may impact your ability to use our Services. For more information on your rights related to your personal information, please see the “User Rights” section of this Privacy Policy.

Disclosure

We may share your personal information with third parties in certain circumstances. This section describes when and why we may disclose your information to others.

Service Providers

We share personal information with service providers who help us operate, improve, and secure our Services. These service providers include:

  • Hosting and infrastructure providers
  • Payment processors
  • Customer support services
  • Analytics providers
  • Email and communication service providers
  • Security and fraud prevention services
  • Marketing and advertising partners

We require all service providers to respect the security and confidentiality of your information and to use it only for the specified purposes for which it was shared.

Business Transfers

If we are involved in a merger, acquisition, financing, reorganization, bankruptcy, or sale of company assets, your information may be transferred as part of that transaction. We will notify you of any change in applicable policies.

Legal Requirements

We may disclose your information if we believe in good faith that such disclosure is necessary to:

  • Comply with applicable laws, regulations, legal processes, or governmental requests
  • Protect the rights, property, or safety of Tridacom IT Solutions, our customers, or the public
  • Detect, prevent, or address fraud, security, or technical issues
  • Enforce our Terms of Service and other agreements, including investigation of potential violations

With Your Consent

We may share your personal information with third parties when you have given us your consent to do so. For example, we may ask for your consent to:

  • Feature your testimonial or feedback on our website
  • Share your information with specific business partners
  • Integrate with third-party services you use
  • Participate in case studies or research

Aggregated and De-identified Information

We may share aggregated or de-identified information that cannot reasonably be used to identify you. For example, we may share:

  • Aggregated statistics about service usage
  • De-identified data for research and analysis
  • Industry trend information
  • Performance benchmarks

Third-Party Disclosure Limitations

We implement various safeguards to limit third-party disclosure risks:

  • Data Processing Agreements: We enter into contracts with service providers that restrict how they can use your information
  • Security Assessments: We evaluate the security and privacy practices of our service providers
  • Minimization: We share only the information necessary for the specific purpose
  • Access Controls: We implement technical restrictions on access to shared information

Retention

This section explains how long we keep your personal information and what factors we consider when determining retention periods.

General Retention Principles

We retain your personal information for as long as necessary to:

  • Provide our Services to you
  • Comply with legal obligations
  • Resolve disputes
  • Enforce our agreements
  • Protect our legitimate business interests

When determining appropriate retention periods, we consider the amount, nature, and sensitivity of the personal information, the potential risk of harm from unauthorized use or disclosure, the purposes for which we process the information, and applicable legal requirements.

Specific Retention Periods

While retention periods vary based on the type of information and purpose of processing, here are general guidelines for specific categories:

  • Account Information: Retained for the duration of your account plus a reasonable period after account closure (typically 1-2 years)
  • Transaction Records: Retained for 7 years to comply with tax and financial regulations
  • Customer Service Communications: Retained for 2-3 years after resolution
  • Marketing Preferences: Retained until you opt out or withdraw consent
  • Usage Data: Retained in identifiable form for 1-2 years, then aggregated or anonymized
  • Cookies and Tracking Data: Varies by cookie type (see our Cookie Policy), typically between one session and 2 years

2025 Data Minimization Standards

In accordance with evolving privacy standards, we have enhanced our retention practices to include:

  • Automated Deletion: Systems to automatically delete or anonymize data after specified retention periods
  • Regular Data Reviews: Periodic audits to identify and securely delete unnecessary data
  • Retention Controls: User-configurable retention settings for certain types of data
  • Minimized Collection: Collecting only the data necessary for specific purposes
  • Data Lifecycle Management: Comprehensive data management from collection to deletion

Exceptions to Retention Periods

In some cases, we may retain your information for longer periods, such as:

  • When required by law, regulation, or legal process
  • For ongoing legal claims or disputes
  • To prevent fraud or abuse
  • To protect legitimate business interests
  • When you request that we keep your information

Deletion and Anonymization

When the retention period expires, we will either delete, anonymize, or aggregate your personal information so that it can no longer be associated with you. The choice between deletion and anonymization depends on:

  • Technical feasibility of secure deletion
  • Business need for historical analytics
  • Legal requirements for information handling
  • Risk assessment of potential re-identification

Transfer of Information

Tridacom IT Solutions is based in Canada, and we process and store information on servers located in Canada and potentially other countries. This section explains how we handle cross-border transfers of your personal information.

Global Operations

As a global service provider, we may transfer your personal information to, and process it in, countries other than the one in which you reside. These countries may have data protection laws that are different from those in your country of residence.

When we transfer your information across borders, we take appropriate measures to ensure that your personal information receives an adequate level of protection in the countries where we process it.

Transfer Mechanisms

We use various legal mechanisms to ensure adequate protection for cross-border transfers of personal information, including:

  • Adequacy Decisions: Transferring data to countries that the relevant authorities have determined provide adequate protection
  • Standard Contractual Clauses: Implementing contracts approved by regulatory authorities that ensure appropriate data protection
  • Binding Corporate Rules: Where applicable, applying approved internal rules for transfers within our corporate group
  • Consent: Obtaining your explicit consent for certain transfers, after informing you of the potential risks
  • Necessary Transfers: When the transfer is necessary for the performance of a contract or for important public interest reasons

2025 Cross-Border Transfer Standards

In response to evolving regulations regarding international data transfers, we have enhanced our practices to include:

  • Transfer Impact Assessments: Regular assessments of privacy risks for international data transfers
  • Enhanced Contractual Safeguards: Additional protections beyond standard contractual clauses
  • Data Localization Options: Where feasible, options to keep data in specific geographic regions
  • Transparency Reporting: Clear documentation of where data is processed and what protections apply
  • Vendor Management: Rigorous screening of service providers who process data in other countries

Regional Considerations

We comply with specific regional requirements for cross-border transfers, including:

  • European Economic Area (EEA): For transfers from the EEA to countries without an adequacy decision, we implement appropriate safeguards as required by GDPR
  • Canada: We comply with requirements under PIPEDA (and CPPA when enacted) for transfers of personal information outside Canada
  • California: We adhere to CCPA/CPRA requirements regarding disclosure of cross-border transfers
  • Other Regions: We monitor and comply with evolving requirements in other jurisdictions where our customers are located

Your Rights Regarding Transfers

Depending on your location, you may have specific rights related to cross-border transfers of your personal information. These may include:

  • The right to be informed about transfers to other countries
  • The right to obtain a copy of the safeguards we use for transfers
  • The right to object to certain transfers
  • The right to withdraw consent to transfers based on consent

To exercise these rights or for more information about our transfer mechanisms, please contact us using the information provided in the “Contacting Us” section.

User Rights

Depending on your location, you have specific rights regarding your personal information. This section outlines these rights and how to exercise them effectively.

Your Core Privacy Rights

Based on applicable privacy laws in Canada (including the Consumer Privacy Protection Act and Personal Information Protection and Electronic Documents Act), you have the following fundamental rights:

Right to Access

Request information about what personal data we hold about you and obtain a copy of that information.

Right to Rectification

Correct inaccurate personal information or complete incomplete information we maintain about you.

Right to Erasure

Request deletion of your personal information when it's no longer necessary or when other conditions apply.

Right to Restrict Processing

Limit how we use your data in certain circumstances, such as when you contest its accuracy.

Right to Data Portability

Receive your data in a structured, machine-readable format and transfer it to another provider.

Right to Object

Object to processing of your personal information, particularly for direct marketing purposes.

Right to Withdraw Consent

Withdraw previously given consent at any time for any processing based on that consent.

2025 Canadian Privacy Enhancements

In compliance with the latest updates to Canadian privacy regulations and in alignment with global best practices, we support these additional rights:

New

Right to Explanation

Request explanations for automated decisions that significantly affect you, including profiling and algorithmic systems.

New

Right to Restrict AI Processing

Limit the use of your personal information for AI training, machine learning, or algorithm development purposes.

New

Right to Correction Propagation

When you correct your data, we will propagate these corrections to third parties with whom we've shared your information.

New

Right to Human Review

Request human review of automated decisions that have legal or similarly significant effects on your rights.

New

Right to Temporary Processing Limitation

Request temporary suspension of certain processing activities while your concerns are being investigated and resolved.

New

Right to De-Indexing

Request removal of your personal information from search indexes when specific conditions are met under Canadian law.

Source: Office of the Privacy Commissioner of Canada, Consumer Privacy Protection Act (CPPA) Guidelines, 2025

How to Exercise Your Rights

You can exercise your privacy rights through multiple convenient channels:

Self-Service Portal

Access our Privacy Dashboard to manage your preferences, access your data, and submit rights requests directly.

Email Request

Contact our Data Protection Officer at privacy@tridacom.com with your specific request.

Online Form

Submit a request through our Privacy Rights Request Form with details about your specific request.

Written Request

Mail a written request to our physical address listed in the "Contacting Us" section.

Response Timeline

To protect your privacy, we will verify your identity before fulfilling your request. We will respond within the timeframe required by applicable Canadian law, typically within 30 days. If we need more time due to complexity, we'll notify you and explain the reason for the extension.

Limitations and Exceptions

While we strive to honor all legitimate privacy rights requests, there may be situations where we cannot fully fulfill your request or may need to limit its scope:

Rights of Others

When fulfilling your request would adversely affect the privacy or legal rights of other individuals

Legal Compliance

When we have legal obligations that prevent us from fulfilling your request completely

Technical Limitations

When information has been anonymized and can no longer be associated with your identity

Excessive Requests

When requests are manifestly unfounded, excessive, or repetitive in nature

Legal Claims

When information is necessary for the establishment, exercise, or defense of legal claims

National Security

When disclosure could compromise national security or public safety interests

If we cannot fully comply with your request, we will explain why and inform you about your right to file a complaint with the Office of the Privacy Commissioner of Canada or other relevant supervisory authorities.

International Users

Our services are primarily designed for users in Canada and the United States, but we welcome users from around the world. This section provides additional information for international users.

Regional Privacy Rights

Depending on your location, you may be entitled to specific privacy rights under local laws. We have summarized key regional provisions below.

European Economic Area (EEA), UK, and Switzerland

If you are located in the EEA, UK, or Switzerland, the following additional information applies:

  • Data Controller: Tridacom IT Solutions is the data controller for personal information processed through our services.
  • Legal Basis: We process your personal information on several legal bases as described in the “Use and Processing” section, including contract performance, legitimate interests, legal obligation, and consent.
  • Cross-Border Transfers: When we transfer your information outside the EEA, UK, or Switzerland, we implement appropriate safeguards as described in the “Transfer of Information” section.
  • Additional Rights: You have the right to lodge a complaint with your local data protection authority if you are unhappy with how we have processed your personal data.

California, USA

If you are a California resident, you have rights under the California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA):

  • Right to Know: You can request information about the categories of personal information we collect, the purposes for which we use it, the categories of sources from which we collect it, and the categories of third parties with whom we share it.
  • Right to Access: You can request a copy of the specific personal information we have collected about you.
  • Right to Delete: You can request deletion of your personal information, subject to certain exceptions.
  • Right to Correct: You can request correction of inaccurate personal information.
  • Right to Opt-Out: You can opt-out of the sale or sharing of your personal information and limit the use of your sensitive personal information.
  • Non-Discrimination: We will not discriminate against you for exercising your CCPA/CPRA rights.

To submit a request under the CCPA/CPRA, please contact us using the methods described in the “How to Exercise Your Rights” section.

Canada - Consumer Privacy Protection Act (CPPA)

As a Canadian company, we are committed to complying with the Consumer Privacy Protection Act (CPPA) which is expected to replace PIPEDA in 2025. The following information outlines how we adhere to these enhanced privacy requirements:

  • Explicit Consent Requirements: We obtain clear, informed consent for collection, use, and disclosure of your personal information, with stronger consent requirements for sensitive data.
  • Right to Data Portability: You can request your personal information in a structured, commonly used format that can be transferred to another organization.
  • Right to Deletion: You can request the deletion of your personal information when it is no longer needed or when you withdraw consent.
  • Algorithmic Transparency: We provide explanations about how automated decision-making systems that use your personal information make predictions, recommendations, or decisions.
  • De-identified Data Protections: We maintain appropriate safeguards for de-identified data and prevent re-identification where possible.
  • Enhanced Privacy Management Program: We maintain a comprehensive privacy management program that includes policies, practices, and procedures to ensure compliance.
  • Private Right of Action: You may have the right to seek damages through the court system for violations of your privacy rights.
2025 Update: Our privacy practices have been updated to align with the CPPA's enhanced standards for accountability, transparency, and individual control over personal information.

Source: Office of the Privacy Commissioner of Canada, Consumer Privacy Protection Act (CPPA) Guidelines, 2025

2025 International Compliance Framework

As part of our commitment to global privacy standards, we are implementing an enhanced international compliance framework:

  • Regional Privacy Officers: We have designated regional privacy officers for major geographic areas
  • Localized Privacy Notices: We are developing region-specific privacy notices that reflect local requirements
  • Enhanced Data Subject Request System: We are implementing a unified system to handle data subject requests from all regions
  • Global Consent Management: We are deploying a global consent management platform that adapts to regional requirements
  • Cross-Border Transfer Monitoring: We are enhancing our systems to monitor and document cross-border data flows in real-time

Language and Accessibility

This Privacy Policy is available in English. In certain regions, we may provide translations as required by local law. In case of any discrepancy between the English version and any translation, the English version will prevail.

We are committed to making our Privacy Policy accessible to all users, including those with disabilities. If you need this Privacy Policy in an alternative format, please contact us at privacy@tridacom.com.

Security

We take the security of your personal information seriously and employ a variety of measures to protect it from unauthorized access, alteration, disclosure, or destruction.

Technical Safeguards

We implement technical measures to protect your personal information, including:

  • Encryption: We use industry-standard encryption to protect data in transit and at rest, including TLS/SSL for data transmission and AES-256 for stored data
  • Access Controls: We implement multi-factor authentication, role-based access controls, and least privilege principles
  • Network Security: We employ firewalls, intrusion detection systems, and other network security measures
  • Vulnerability Management: We conduct regular security assessments, penetration tests, and vulnerability scans
  • Monitoring: We maintain logging systems to detect and respond to unusual activities

Organizational Measures

Our security program includes organizational measures such as:

  • Security Policies: We maintain comprehensive security policies and procedures
  • Employee Training: We provide regular security awareness training to all employees
  • Third-Party Assessments: We conduct security assessments of our service providers
  • Incident Response: We maintain incident response plans to address security incidents promptly
  • Business Continuity: We implement business continuity and disaster recovery plans

2025 Security Enhancements

In our ongoing commitment to enhance data protection, we are implementing the following security improvements:

  • Zero Trust Architecture: We are transitioning to a zero trust security model that requires strict identity verification for all users and systems
  • Advanced Threat Protection: We are implementing AI-powered threat detection systems to identify and respond to emerging threats
  • Privacy-Enhancing Technologies: We are deploying technologies like homomorphic encryption and secure multi-party computation for enhanced data protection
  • Automated Compliance Monitoring: We are implementing automated systems to continuously monitor compliance with security requirements
  • Security Maturity Model: We are adopting a formal security maturity model to measure and improve our security capabilities

Security Certifications and Frameworks

We align our security practices with recognized security frameworks and standards, including:

  • ISO 27001 (Information Security Management)
  • NIST Cybersecurity Framework
  • CIS Controls
  • SOC 2 compliance principles

Your Role in Security

While we implement robust security measures, the security of your account also depends on your actions. We recommend that you:

  • Use strong, unique passwords for your account
  • Enable multi-factor authentication when available
  • Keep your login credentials confidential
  • Be alert to phishing attempts and suspicious activities
  • Keep your devices and software updated
  • Review your account activity regularly and report any suspicious activity

Note: No method of transmission over the Internet or electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security.

Data Breach

Despite our best efforts to protect your information, security incidents may occur. This section explains how we handle data breaches and our notification procedures.

What Is a Data Breach?

A data breach is a security incident in which sensitive, protected, or confidential information is accessed, disclosed, altered, or destroyed without authorization. Data breaches may involve:

  • Unauthorized access to our systems or databases
  • Theft or loss of devices containing personal information
  • Accidental disclosure of personal information
  • Malicious attacks such as hacking, malware, or phishing
  • Employee misconduct or negligence

Our Response to Data Breaches

In the event of a data breach, we will take the following steps:

  1. Containment and Assessment: We will act promptly to contain the breach and assess its scope and severity
  2. Investigation: We will conduct a thorough investigation to determine the cause and extent of the breach
  3. Remediation: We will take steps to address the cause of the breach and prevent similar incidents in the future
  4. Notification: We will notify affected individuals, regulatory authorities, and other relevant parties as required by law
  5. Review: We will review and update our security practices as necessary

Notification Process

Our data breach notification process follows these principles:

  • Timeliness: We will notify affected individuals without undue delay, typically within 72 hours of discovering a breach, where feasible
  • Clarity: Notifications will be clear, concise, and in plain language
  • Relevance: We will provide information relevant to the specific breach, including the nature of the breach, types of data affected, and potential consequences
  • Actionable: We will include guidance on steps individuals can take to protect themselves
  • Accessible: Notifications will be delivered through appropriate channels to reach affected individuals

2025 Breach Response Standards

We are enhancing our breach response capabilities to meet evolving privacy regulations and emerging best practices:

  • Automated Breach Detection: We are implementing advanced systems to automatically detect and alert us to potential data breaches
  • Integrated Response Platform: We are developing an integrated platform to streamline breach response and notification processes
  • Global Notification Workflows: We are establishing region-specific notification workflows to ensure compliance with local regulations
  • Enhanced Forensic Capabilities: We are expanding our forensic capabilities to better investigate complex breaches
  • Security Credit Monitoring Services: For significant breaches, we will offer appropriate credit monitoring and identity protection services

Risk Assessment

When assessing the risk posed by a data breach, we consider factors such as:

  • The nature, sensitivity, and volume of the affected personal information
  • The ease of identification of individuals from the affected information
  • The severity of consequences for affected individuals
  • The likelihood of the information being misused
  • Special characteristics of affected individuals (e.g., children or vulnerable adults)

If You Receive a Breach Notification

If you receive a notification from us about a data breach, we recommend you:

  • Read the notification carefully and follow any specific instructions provided
  • Change your password and update security questions for affected accounts
  • Monitor your accounts for suspicious activity
  • Be vigilant against phishing attempts that may try to exploit the situation
  • Consider placing a fraud alert or credit freeze with credit reporting agencies if appropriate
  • Contact us if you have questions or concerns about the breach

Changes and Amendments

This Privacy Policy may be updated from time to time to reflect changes to our practices, technologies, legal requirements, and other factors. This section explains how we handle changes to this Privacy Policy.

Policy Updates

We reserve the right to modify this Privacy Policy at any time. When we make changes to this Privacy Policy, we will:

  • Post the updated Privacy Policy on our Website
  • Update the “Last Updated” date at the top of this Privacy Policy
  • Notify you of material changes through appropriate channels, which may include email notifications, prominent notices on our Website, or other means

2025 Policy Update Standards

In compliance with updated privacy regulations, our approach to policy changes includes:

  • Advance Notice: For significant changes, we provide at least 30 days' advance notice before the changes become effective, allowing you time to review the changes.
  • Version History: We maintain an accessible archive of previous versions of our Privacy Policy.
  • Change Summary: We provide a summary of significant changes to help you understand what has been updated.
  • Consent Renewal: In certain cases, we may seek your renewed consent after implementing material changes to our privacy practices.

Your Continued Use

Your continued use of our Website and services after the effective date of any changes to this Privacy Policy constitutes your acceptance of those changes. If you do not agree to the revised Privacy Policy, you should discontinue your use of our Website and services.

Policy Review

We encourage you to review this Privacy Policy periodically to stay informed about our information practices and your privacy rights and choices. This Privacy Policy is accessible from the footer of our Website or through the “Privacy Policy” link in your account settings.

Acceptance of This Policy

By accessing, using, or continuing to use our Website and services, you confirm that you have read, understood, and agreed to this Privacy Policy. This section explains the implications of your acceptance.

Your Acknowledgment

By using our Website and services, you acknowledge that:

  • You have read this Privacy Policy in its entirety
  • You understand how we collect, use, disclose, and protect your information
  • You consent to our processing of your personal information as described in this Privacy Policy
  • You are aware of your privacy rights and how to exercise them

Legal Basis for Processing

Your acceptance of this Privacy Policy provides us with one of several legal bases for processing your personal information, as required by applicable privacy laws. Depending on the circumstance, we may also process your information based on:

  • The performance of a contract with you
  • Compliance with a legal obligation
  • Protection of your vital interests or those of another person
  • Our legitimate interests, which are not overridden by your rights
  • Other legal bases as provided by applicable law

2025 Consent Standards

In compliance with updated privacy regulations, our consent practices include:

  • Clear and Affirmative: We obtain consent through clear affirmative actions, not pre-ticked boxes or silence.
  • Specific and Granular: We seek separate consent for different processing activities and purposes.
  • Informed: We provide clear information about what you are consenting to.
  • Freely Given: We do not make services conditional on consent to processing that is not necessary for those services.
  • Withdrawable: We make it easy for you to withdraw consent at any time.

Age Restrictions

Our Website and services are not intended for use by individuals under the age of 16. By using our Website and services, you confirm that you are at least 16 years old or that you are using our Website and services with the consent and supervision of a parent or guardian.

Contacting Us

If you have questions, concerns, or requests regarding this Privacy Policy or our privacy practices, please contact us. We are committed to addressing your privacy concerns promptly and thoroughly.

Contact Information

You can contact us using the following information:

  • Data Protection Officer: privacy@tridacom.com
  • Phone: +1 (450) 471-3445
  • Mail: Tridacom IT Solutions, 50 Queen St N, Kitchener, ON N2H 6P4, Canada
  • Online Form: Contact Form

Response Policy

When you contact us regarding privacy matters:

  • We will acknowledge receipt of your inquiry within 3 business days
  • We will provide a substantive response within 30 days, or inform you if more time is needed
  • We may ask for verification of your identity before processing certain requests
  • We will maintain records of your communications and our responses as required by law

Complaints

If you are not satisfied with our response to your privacy concerns, you have the right to lodge a complaint with:

  • The Office of the Privacy Commissioner of Canada (OPC): www.priv.gc.ca
  • Your local data protection authority if you are located outside of Canada

Privacy Policy Accessibility

This Privacy Policy is available in alternative formats upon request. If you require this Privacy Policy in a different format due to accessibility needs, please contact us using the information provided above.

Thank you for taking the time to read our Privacy Policy. We are committed to protecting your privacy and ensuring that your personal information is handled responsibly and in accordance with applicable laws.

Stay Connected

Subscribe to our newsletter for the latest technology insights, industry news, and exclusive Tridacom IT Solutions updates.

By subscribing, you agree to our Privacy Policy.

© 2025 Tridacom IT Solutions Inc. All rights reserved.Proudly serving Canadian businesses for over 15 years.