Privacy and trust
Privacy Policy
SCPX is committed to handling personal information responsibly and transparently. This page explains what we collect, why we collect it, and how to request changes.
What information we collect
- Contact details you provide via forms, email, or phone.
- Business and incident context needed to assess and deliver services.
- Website usage information (for service quality and security monitoring).
How we use information
- Respond to enquiries and deliver cybersecurity services.
- Improve our website, operations, and client support quality.
- Meet legal, contractual, and security obligations.
When we share information
We only disclose information where required to deliver services, comply with law, or protect legitimate security interests. We do not sell personal information.
Security controls
We apply administrative, technical, and operational safeguards designed to reduce unauthorised access, disclosure, or misuse of information.
Your choices and rights
You can request access, correction, or deletion of personal information (subject to legal and contractual obligations). Contact us to make a request.
Retention
We retain information only for as long as required for operational, legal, and security purposes.
Policy updates
We may update this policy to reflect legal, operational, or service changes. The latest version is published on this page.
Contact for privacy matters
Email [email protected] or submit a request through our contact form. Please include enough context for us to verify and respond efficiently.
Related security and service information
Need practical help beyond policy detail? Explore operational cybersecurity services and direct contact pathways.
Move directly from policy review to analyst support.
What happens in the first 24 hours
When risk is active, speed and clarity matter. We use a structured first-day workflow so stakeholders know exactly what is happening and what to do next.
Rapid triage, scope confirmation, evidence preservation.
Containment actions and priority stakeholder briefing.
Root-cause direction, remediation roadmap, executive update.
Choose urgent response or schedule a consultation path.
Move from uncertainty to a clear action plan
Tell us your current risk concerns and operating constraints. We’ll map practical next steps with priorities your team can execute.
Built for measurable security outcomes
Senior-led execution
Experienced specialists guiding both technical response and leadership decisions.
Business-aligned priorities
Recommendations framed by operational impact, obligations, and available capacity.
Actionable next steps
Clear ownership and sequencing so improvements are implemented, not shelved.
