Privacy and Security

As a telecommunications company serving businesses, security and privacy are paramount to us. We develop modern, secure products and uphold stringent privacy standards. We believe in the coexistence of technological innovation and privacy, with values centered around effective communication, reliability, and legal compliance. Security and privacy are our top priorities, offering innovative solutions that adhere to privacy standards.

PRIVACY POLICY

The Privacy Policy details the data we collect, how we process it, and how we use it.

Read the Privacy Policy
Read the Recruitment Privacy Policy

Information on our use of cookies to enhance our service, and what cookie settings are available to users.

Read the Policy

INFORMATION SECURITY POLICY

Review our high-level information security policy.

Read the Policy

DATA PROTECTION POLICY

Insight into our high-level personal data protection policy.

Read the Policy

SECURITY AND PRIVACY MEASURES

We implement all standard security measures, including data encryption, unauthorized access prevention, plus regular audits and monitoring to detect any potential threats. All steps aim to ensure the security and confidentiality of your data.

5.1 Physical Security:

We use American and European data centers to provide a high level of physical security for data and equipment, as well as infrastructure resilience.

5.2 Access Control Management:

We utilize access control and rights distribution systems, as well as secure communication channels for remote access, to prevent unauthorized data system use.

5.3 Traffic Encryption:

Strong encryption protects SMS and voice data both during transmission and at rest, ensuring confidentiality and integrity.

5.4 Multi-Factor Authentication:

We implement multi-factor authentication to enhance security access in data processing centers and for critical systems, including SMS and voice message processing systems, preventing unauthorized access. We adhere to the principle of least privilege.

5.5 Security Monitoring Systems:

Monitoring systems are used to detect network traffic anomalies and quickly address potential security incidents.

5.6 Regular Security Audits:

We conduct periodic security audits to identify and mitigate potential vulnerabilities in infrastructure and applications.

5.7 Traffic Filtering:

Traffic filtering systems are employed to block malicious data and prevent network-level attacks.

5.8 Account Management Policy:

A strict policy, including regular password updates and access rights management.

5.9 Protection Against Phishing and Social Engineering:

We provide employee training on identifying and preventing phishing and social engineering attacks to strengthen security’s human aspect.

5.10 Data Backup and Recovery:

We conduct regular data backups, including communications, followed by testing of recovery procedures to ensure guaranteed restoration in case of an incident.

5.11 Software Updates:

Operating systems, server software, and applications are quickly updated to address known vulnerabilities and ensure overall security system stability. Vendor Assessment: Security assessments of third-party vendors ensure compliance with our security standards, with security requirements included in supplier contracts.

5.12 Vendor Assessment:

Security assessments of third-party vendors ensure compliance with our security standards, with security requirements included in supplier contracts.

DO NOT SELL OR SHARE MY PERSONAL DATA

Your privacy matters. By clicking ‘Do Not Sell My Personal Data,’ you control how your information is used and ensure it isn’t sold to third parties. We respect your rights in accordance with the California Consumer Privacy Act (CCPA) and strive to provide transparency and choice in how we handle your data.

Do Not Sell or Share My Personal Information

SUB-PROCESSORS

Please refer to this page to view the list of sub-processors we collaborate with to manage the personal data of our partners and customers.

CONTACT US

If you have any questions or concerns regarding privacy and security, contact us:

1) For security inquiries by email security@lancktele.com

2) For privacy inquiries by email privacy@lancktele.com

3) By mail: 78 SW 7th Street, Suite 500, Miami, FL 33130, USA

To exercise your privacy rights or learn about our handling of personal data, please complete the form below. You can find more information about your rights and how to exercise them in our Privacy Policy. The information provided in the form will be used solely to facilitate the processing of your request and will be handled in accordance with relevant data protection regulations.

Rest assured, ensuring the security and confidentiality of your data is our top priority and core value.

Ready to get started?