Information Security Policy


Information Security Policy

The goal of the Softbuilder Information Security plan is to protect the Confidentiality, Integrity, and Availability of the data employed within the organization while providing value to the way we conduct business. Softbuilder is committed to respecting and protecting the privacy of its customers, partners and website visitors.

Data Collected by Softbuilder

Softbuilder collects personal data when you:

  • Sign up for trial of one of our Products;
  • Visit our website;
  • Use our Products;
  • Subscribe to our newsletters.

Softbuilder collects the following data:

From the website:

  • Your name, email addresse, company/organization name, city, state, and country;
  • Website traffic information and cookies;
  • Information about your trials, licenses, subscriptions and free licenses.

From our products:

  • Hardware ID;
  • Installation and Uninstallation of the product.

We use the information we collect in various ways, including to:

  • Provide, operate, and maintain our website;
  • Improve, personalize, and expand our website;
  • Understand and analyze how you use our website;
  • Develop new products, services, features, and functionalities;
  • Communicate with you, either directly or through one of our partners, including for customer service, to provide you with updates and other information relating to the website, and for marketing and promotional purposes;
  • Send you emails;
  • Find and prevent fraud;
  • Generate product license keys.
  • Hardware ID;

Organizational security measures

Secure development practices

Softbuilder’s development teams use agile practices to continually improve our products. Our working processes let us quickly identify and fix vulnerabilities.

Security training for employees

All Softbuilder’s employees receive security training to ensure that they have accurate knowledge and a full appreciation of the importance of information security.

Data Access Control

Softbuilder grant access only to authorized employees and assigns only the minimum permissions necessary for those employees to fulfil their duties.

Information Security Incident Management

Information security incidents and vulnerabilities associated with information systems will be communicated in a timely manner. Appropriate corrective action will be taken.

Subscribe to our newsletter to receive news, discounts and exclusive offers!


I agree to Terms of Use and Privacy Policy*

gdpr-image
This website uses cookies to improve your experience. By using this website you agree to our Privacy Policy.