Skip to content

Privacy Policy

Company: Tecnico Desk LLC

Effective Date: 2025-08-08 · Last Updated: 2025-08-08 · Next Review: 2026-08-08

Questions: privacy@tecnicodesk.com

1) Overview

This Privacy Policy explains how we collect, use, disclose, and protect personal data in connection with our managed IT and security services, help desk, remote support, consulting services (the "Services"), and our websites and web forms (the "Sites"). This policy is written to support the Colorado Privacy Act (CPA) and other applicable U.S. privacy requirements. [oai_citation:1‡Colorado General Assembly](https://content.leg.colorado.gov/sites/default/files/2021a_190_signed.pdf)

Controller vs. Processor

  • We act as a Controller for personal data we collect through our Sites, marketing, billing, HR, and account management.
  • We act as a Processor (or service provider) for personal data we handle on behalf of clients through tools and workflows the client authorizes. In that case, processing is governed by our contract (for example MSA, SOW, DPA, or BAA), and the client is the Controller.

2) Who We Are and How to Contact Us

3) What Personal Data We Collect (by context)

A. Sites and Marketing (Controller)
Identifiers (name, email, phone), business contact info, device and usage data (for example IP address, browser type, and cookie identifiers), and form submissions.

B. Clients and End Users (Processor)
Business contact details, ticket and asset metadata, device identifiers, logs and telemetry, configuration state data, and security signals (alerts and detections) from tools the client authorizes. We do not request more data than needed for the Services.

C. Remote Support and Monitoring
Session metadata (time, technician, device), screen content visible during a session, and command or action history necessary to troubleshoot. Session recordings are off by default and used only when enabled and authorized by the client.

D. Sensitive Data
We aim to avoid processing sensitive data unless it is necessary for the Services and covered by contract. Where required (for example PHI under HIPAA), we process according to agreed safeguards (see your DPA or BAA).

4) Purposes of Processing

5) Legal Bases or Authority

6) How We Use AI

We may use enterprise AI features to assist internal workflows such as ticket triage, drafting documentation, and summarization. We do not use conversational AI tools to make autonomous changes inside client environments. Human review is required for client-facing outputs.

We do not intentionally input credentials, secrets, or unredacted regulated data into conversational interfaces. Where a client engagement requires handling regulated data, controls and tooling are defined by contract and scope.

See our AI Usage Policy for additional handling rules.

7) Cookies, Analytics, and Tracking

We use necessary cookies and similar technologies for basic site operation and security. Where we use analytics or marketing tools, we configure them to reduce data collection where feasible.

If our Sites use tracking that qualifies as targeted advertising under applicable law, we provide appropriate notice and opt-out options, and we honor recognized universal opt-out mechanisms where required. [oai_citation:4‡Colorado Secretary of State](https://sos.state.co.us/CCR/DisplayRule.do?action=ruleinfo&ruleId=3396)

8) Disclosures of Personal Data

We maintain written agreements with sub-processors as required and limit access to what is needed to provide services.

9) Security

We maintain a security program designed to reduce risk, including access controls, MFA where appropriate, least-privilege role assignment, monitoring, patching, and incident response practices. Security controls vary by service scope and the client environment.

No security program can guarantee absolute security. We focus on reasonable and proportionate safeguards for the Services we provide.

10) Your Rights (Colorado Privacy Act)

Colorado residents acting in an individual or household context may have the right to access, correct, delete, and obtain a portable copy of personal data we control, and to opt out of targeted advertising, the sale of personal data, and certain profiling. [oai_citation:5‡Colorado General Assembly](https://content.leg.colorado.gov/sites/default/files/2021a_190_signed.pdf)

How to exercise your rights

Email privacy@tecnicodesk.com with your request. We will take reasonable steps to verify identity and respond within required timeframes.

Under the CPA, controllers generally respond within 45 days and may extend once by an additional 45 days when reasonably necessary. Appeals are generally decided within 45 days. [oai_citation:6‡Colorado General Assembly](https://content.leg.colorado.gov/sites/default/files/2021a_190_signed.pdf)

Note on business and employment data

Some privacy rights do not apply to individuals acting in a commercial or employment context. For client employee data we handle as a Processor, direct requests to your employer or the applicable Controller.

11) Opt Outs and Universal Signals

Where applicable, we honor recognized universal opt-out mechanisms for targeted advertising, sale, or profiling, consistent with Colorado requirements and the Colorado AG rules (for example Global Privacy Control where implemented). [oai_citation:7‡Colorado Secretary of State](https://sos.state.co.us/CCR/DisplayRule.do?action=ruleinfo&ruleId=3396)

You can also submit opt-out requests by emailing privacy@tecnicodesk.com.

12) Data Retention

We retain personal data only as long as needed for the purposes described in this policy, to comply with law, or as required by contract. When retention ends, we delete or de-identify data where feasible.

13) Children

Our Sites and Services are not directed to children under 13, and we do not knowingly collect personal data from children except where a client engagement explicitly requires it and is governed by contract and applicable law.

14) International Data Transfers

When data is transferred across borders, we rely on appropriate mechanisms and safeguards proportionate to risk. Customer data residency is primarily driven by the client environment and scope. Some security and edge services may operate globally to improve availability.

15) Remote Support and Workforce Privacy

16) Changes to This Policy

We may update this policy from time to time. If changes are material, we will update the effective date and provide notice where appropriate.

Appendix A: How We Process Data as a Processor

Appendix B: Sub-Processor List

The table below is a summary list for transparency. A client-specific sub-processor list and contractual terms are available upon request when applicable.

Vendor Service Data types Region(s) Retention defaults Contract Security attestations
CloudflareEdge security (DNS/CDN/WAF)IP addresses, HTTP request metadata, DNS logsGlobal (Anycast)Per service defaultsDPA/SCCsSOC 2/ISO 27001
Microsoft Entra IDIdentity & SSOUser identifiers, roles, auth logsUS (tenant region)Tenant and policy dependentMicrosoft DPASOC 2/ISO 27001
Microsoft DefenderEndpoint security (EDR/AV)Endpoint telemetry, alerts, file/process metadataUS (tenant region)Tenant and policy dependentMicrosoft DPASOC 2/ISO 27001
Microsoft 365Productivity & collaborationEmail and collaboration data per client configurationUS (tenant region)Admin setMicrosoft DPASOC 2/ISO 27001
IntuneUEM/MDMDevice identifiers, compliance state, configurationUS (tenant region)Admin setMicrosoft DPASOC 2/ISO 27001
HubSpotCRM & marketingLead/contact data, email engagement, web formsTenant dependentAdmin setDPA/SCCsSOC 2/ISO 27001
FormspreeWebsite forms relayForm submissions and metadataUSAdmin setDPA-
Monday.comProject managementProject/task data, user identifiersTenant dependentAdmin setDPA/SCCsSOC 2/ISO 27001
Microsoft AzureCloud infrastructure (internal)Internal business data, logsUS regionsAdmin setDPA/SCCsSOC 2/ISO 27001
AWSCloud infrastructure (internal)Internal business data, logsUS regionsAdmin setDPA/SCCsSOC 2/ISO 27001

Appendix C: Regional Addenda

Appendix D: CPA Disclosures Snapshot

This page is provided for transparency and does not, by itself, create contractual obligations. Contractual terms appear in applicable service agreements and addenda.