Last revision: December 5th, 2025


Privacy Policy Statement


Committed to Security, Trust, and Excellence

At JBits Technology, our commitment to privacy extends far beyond meeting basic legal or regulatory obligations. As a security-first Managed Service Provider, we strive to uphold best-in-class data protection standards through a robust privacy governance framework, rigorous operational controls, and a culture built around trust and accountability.

We recognize that safeguarding personal and organizational data is essential to maintaining confidence in the services we deliver. Our privacy practices are designed not only to comply with evolving global, federal, and provincial requirements—but to exceed them. Through strong policies, continuous monitoring, industry-aligned security practices, and transparent communication, we ensure that our clients, employees, partners, and stakeholders can rely on our stewardship of their data.

Purpose of This Statement

This Privacy Statement outlines JBits Technology’s principles, approach, and expectations regarding the collection, use, storage, protection, and transfer of Personal Data across all our operations. It explains how we handle the information entrusted to us, the measures we take to secure it, and the rights and choices available to individuals interacting with our services and website.

Our goal is simple: to protect your data with integrity, secure it with industry-leading controls, and manage it responsibly at every step.


1. Introduction

JBits Technology (“we,” “us,” “our”) is committed to protecting your privacy and ensuring that your personal information is handled securely and responsibly.

This Privacy Policy explains:

  • What information we collect
  • How we use it
  • How we protect it
  • Your rights regarding your personal data

This Policy applies to:

  • Visitors of our website (www.jbitstechnology.ca)
  • Clients and prospective clients
  • Users of our managed IT services, cybersecurity services, web development, consulting, or support services
  • Participants in promotions, lead-generation campaigns, events, or surveys

By accessing our website or engaging with our services, you agree to the practices described in this Privacy Policy.

2. Definitions

  • Personal Information: Any information that identifies, or can identify, an individual (e.g., name, email, phone number).
  • Client Data: Data stored, transmitted, or processed by clients while using our IT services (e.g., files, emails, system logs).
  • Service Data: Information generated by our systems when delivering services, such as monitoring logs, device information, and performance analytics.
  • Processing: Any action performed on data (collection, storage, access, transfer, deletion, etc.).

3. Information We Collect

We collect Personal Information and technical data necessary to provide secure, high-quality managed services.

3.1 Information You Provide to Us

  • Name
  • Email address
  • Phone number
  • Company name and role
  • Service requests, support tickets, and communications
  • Billing and payment information
  • Contract details and onboarding information
  • Responses to promotions, forms, and surveys

3.2 Information Collected Automatically

When you visit our website, we may collect:

  • IP address
  • Browser and device type
  • Cookies and usage data
  • Website activity analytics
  • Referral and traffic source information

3.3 Information Collected Through Our Managed Services

For clients who subscribe to managed IT, cybersecurity, or monitoring services, we may collect:

  • System and network logs
  • Security event data
  • Endpoint telemetry (e.g., threat detections, vulnerabilities)
  • Performance metrics
  • Access logs (AD, IAM, SSO)
  • Backup metadata
  • Application usage details (if part of the contracted service)

We do not access client content (e.g., files, emails, internal documents) unless:

  • Access is required to deliver the service
  • You provide explicit permission
  • It is required for security incident response

3.4 Third-Party Data Sources

We may receive data from:

  • Technology partners
  • Cloud services (Azure, AWS, Microsoft 365, Google Workspace)
  • Ticketing platforms
  • Identity management platforms
  • Payment processors

4. How We Use Your Information

We use your information to:

4.1 Deliver IT & Managed Services

  • Provisioning devices, accounts, and systems
  • Monitoring networks and endpoints
  • Detecting and responding to cybersecurity threats
  • Managing cloud environments
  • Providing helpdesk and technical support
  • Maintaining service availability and security

4.2 Improve and Personalize Your Experience

  • Tailor recommendations
  • Enhance website functionality
  • Improve service quality, security posture, and user experience

4.3 Business Operations

  • Billing and account management
  • Contract administration
  • Service analytics and reporting
  • Communication regarding service updates or outages

4.4 Marketing and Communications

  • Sending information about new services, promotions, and events
  • Retargeting or ad personalization (if consented)
  • Lead generation and follow-ups

You may opt out of marketing communications at any time.

5. Legal Basis for Processing (PIPEDA & Best Practices)

We process personal information under the following legal grounds:

  • Consent: You provide consent when submitting forms, subscribing, or engaging our services.
  • Contractual Necessity: Data required to deliver managed IT services.
  • Legitimate Interests: Security monitoring, fraud prevention, and service improvement.
  • Legal Obligations: Compliance with cybersecurity, law enforcement, or regulatory requirements.

6. How We Share Your Information

We do not sell or trade personal information.

We may share information with:

  • Trusted technology partners (e.g., Microsoft, Google, security vendors)
  • Cloud service providers used in delivering your services
  • Payment processors
  • Service subcontractors (under binding confidentiality agreements)

We only share the minimum necessary information required for them to perform their role.

We may disclose data if:

  • Required by law or court order
  • Necessary to prevent fraud, threats, or unauthorized access
  • Authorized by the client for service delivery

7. How We Protect Your Information

We implement strict administrative, technical, and physical security controls including:

  • Zero Trust security model
  • Multi-factor authentication (MFA)
  • Encryption at rest and in transit
  • Network segmentation
  • Endpoint detection & response (EDR/XDR)
  • SIEM & SOC monitoring (if subscribed services)
  • Role-based access control (RBAC)
  • Regular vulnerability assessments
  • Secure coding and application practices
  • Personnel background checks (where applicable)

Despite best efforts, no system is 100% secure; however, we follow industry-leading MSP and cybersecurity standards.

8. Data Retention

We retain information only as long as necessary to:

  • Deliver contracted services
  • Comply with legal requirements
  • Resolve disputes
  • Maintain business records

Client logs and monitoring data may be retained for 30–365 days depending on service level agreements.

You may request deletion of your personal information at any time.

9. Your Rights

As a user in Canada, you have the right to:

  • Access your personal information
  • Correct inaccuracies
  • Request deletion (subject to legal/operational constraints)
  • Withdraw consent for marketing
  • Request details about how your data is used
  • File a privacy complaint

To exercise these rights, contact us at: privacy@jbitstechnology.ca

10. Cookies & Tracking Technologies

We may use cookies to:

  • Personalize website experiences
  • Improve analytics
  • Enable retargeting ads
  • Maintain session security

You may adjust your browser settings to block or manage cookies.

11. Third-Party Websites

Our website may link to third-party websites. We are not responsible for their content, policies, or security practices.

12. Data Transfers Outside Canada

Some data may be stored or processed in countries where our cloud partners operate (e.g., USA, Europe). These partners comply with recognized security and privacy standards.

We require all partners to maintain equal or stronger protections than Canadian regulations.

13. Children’s Privacy

Our services are not intended for individuals under 16 years of age. We do not knowingly collect information from minors.

14. Updates to This Policy

We may update this Privacy Policy periodically. Revisions will be posted on this page with an updated “Last Updated” date.

Continued use of our website or services after changes constitutes acceptance of the updated policy.

15. Contact Us

If you have questions about this Policy or how we handle your information, please contact:

JBits Technology Limited 

11 Puncheon Way, Bedford, NS, B4B 2L1, Canada 

Email: privacy@jbitstechnology.ca  

Phone: +1-902-989-7517 

Website: www.jbitstechnology.ca