Privacy Policy for ListCrime.com
At ListCrime.com, your privacy is important to us. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our cybersecurity-focused website and application. Please read this policy carefully to understand how we handle your data.
Disclaimer: Listcrime.com serves to provide assurance, validation, and verification through its cybersecurity tools and API integrations. However, it is important to note that this is not 100% guaranteed. We are simply an aid in your cybersecurity efforts, and all final decisions are the user’s responsibility. Listcrime cannot be held liable for information gathered from this application.
What is Personal Data?
Personal data refers to any information that can identify an individual, either directly or indirectly. This includes, but is not limited to, your name, email address, phone number, IP address, and any other information that can be linked to you personally.
What is Processing?
Processing refers to any operation or set of operations performed on personal data, whether by automated means or not. This includes collecting, recording, organizing, structuring, storing, adapting, altering, retrieving, consulting, using, disclosing, disseminating, aligning, combining, restricting, erasing, or destroying personal data.
Applicable Laws
Our data processing activities are governed by applicable data protection laws, including but not limited to the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). These laws provide guidelines on how personal data should be handled and the rights of individuals regarding their data.
Responsibility for Data Processing
At ListCrime.com, we are committed to protecting your personal data. As a small startup, we do not have a designated Data Protection Officer (DPO). However, we take data protection seriously and ensure that all data processing activities comply with relevant data protection laws, including the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).
The responsibility for data processing at ListCrime.com lies with the founder, who oversees our data protection strategy and ensures compliance with applicable laws. We are dedicated to safeguarding your information and maintaining transparency in our data processing practices.
Legal Basis for Processing Personal Data
We process personal data based on the following legal grounds:
- Consent: When you have given explicit consent for us to process your data for specific purposes.
- Contractual Necessity: When processing is necessary for the performance of a contract to which you are a party.
- Legal Obligation: When we are required to process your data to comply with a legal obligation.
- Legitimate Interests: When processing is necessary for our legitimate interests, provided that these interests are not overridden by your rights and interests.
Personal Data We Collect
We may collect the following types of personal data when you use our services:
- Personal Information: Name, email address, phone number, IP address, and account details (if you create an account).
- Non-Personal Information: Browser type and version, device type and operating system, and usage data (e.g., time spent on the platform, pages visited).
- Sensitive Information: Details submitted for phishing analysis (e.g., email contents, URLs), phone numbers or email addresses submitted for validation or dark web monitoring, and other cybercrime-related data you provide for reporting or analysis.
Sensitive Information
- Details submitted for phishing analysis (e.g., email contents, URLs)
- Phone numbers or email addresses submitted for validation or dark web monitoring.
- Other cybercrime-related data you provide for reporting or analysis.
How We Use Your Information
We use the information we collect to:
- Provide and improve our services.
- Validate and analyze potential cyber threats (e.g., phishing emails, suspicious URLs).
- Monitor and notify you about dark web exposures.
- Respond to inquiries or provide customer support.
- Send updates, alerts, or newsletters (with your consent).
- Ensure compliance with legal obligations.
How We Share Your Information
We do not sell or rent your personal information. However, we may share your information in the following circumstances:
- With Third-Party APIs: To validate data or provide insights through integrations services.
- With Law Enforcement Agencies: When legally required or in response to cybercrime reports submitted through our platform.
- With Your Consent: If you agree to share your data with a third party (e.g., to purchase a full report from 3rd party providers).
- For Business Operations: With service providers who assist us in maintaining and improving our platform.
With Partners: We may share your information with trusted partners who work with us under confidentiality agreements. These partners may use your information to help us operate the platform, conduct our business, and serve you better.
In Case of Business Transfers: If we are involved in a merger, acquisition, or sale of all or a portion of our assets, your information may be transferred as part of that transaction.
To Protect Rights and Safety: We may disclose your information if we believe it is necessary to investigate, prevent, or take action regarding illegal activities, suspected fraud, situations involving potential threats to the safety of any person, or as evidence in litigation in which we are involved.
Data Retention
We retain your data only for as long as necessary to fulfill the purposes outlined in this policy or comply with legal obligations. If you wish to delete your data, you may contact us at support @listcrime.com, however this may lead to A DELETED PROFILE.
Security of Your Information
We implement industry-standard security measures to protect your data. These include:
- Encryption of sensitive data.
- Secure storage and access protocols.
- Regular vulnerability assessments. Despite our efforts, no method of transmission or storage is 100% secure. We encourage you to take additional precautions to protect your information.
Your Privacy Rights
Depending on your location, you may have certain rights regarding your personal information, such as:
- Accessing your data.
- Requesting correction or deletion of your data.
- Withdrawing consent for data processing.
- Filing a complaint with a relevant data protection authority.
To exercise your rights, please contact us at support@listcrime.com.
Third-Party Links and Services
Our platform may include links to third-party websites or services. We are not responsible for the services, privacy practices or content of these external sites. We recommend reviewing their privacy policies before interacting with them.
Cookies and Tracking Technologies
We use cookies and similar technologies to enhance your experience and analyze usage. You can manage your cookie preferences through your browser settings.
Children’s Privacy
Our platform is not intended for children under 13 years of age. We do not knowingly collect information from children. If we discover such data has been collected, we will delete it promptly.
Updates to This Privacy Policy
We may update this policy periodically to reflect changes in our practices or legal requirements. The updated version will be posted on our website with the “Last Updated” date.
Contact Us
If you have any questions or concerns about this Privacy Policy, please contact us at: Email: support@listcrime.com
This Privacy Policy ensures transparency and builds trust with users of Listcrime.com.
User Terms of Service and Service Levels for Listcrime.com
At Listcrime.com, we are committed to providing reliable and effective services to our users. The following outlines our user service and service levels to ensure transparency and set clear expectations.
Disclaimer: Listcrime.com serves to provide assurance, validation, and verification through its cybersecurity tools and API integrations. However, it is important to note that this is not 100% guaranteed. We are simply an aid in your cybersecurity efforts, and all final decisions are the user’s responsibility. Listcrime cannot be held liable for information gathered from this application.
Service Commitment
- Availability: Our platform, including the website and application, is designed to be available 24/7, barring scheduled maintenance or unexpected outages.
- Reliability: We strive to maintain a high level of uptime, ensuring users can access tools, features, and resources when needed.
- Support: Users can reach out to our support team for assistance with the platform, cybersecurity queries, or technical issues.
1b. Commitment to Confidentiality, Integrity, and Availability (CIA) At Listcrime.com, we uphold the principles of Confidentiality, Integrity, and Availability (CIA) to ensure the highest standard of cybersecurity for our users:
- Confidentiality: We are dedicated to protecting user information from unauthorized access and disclosure. Robust encryption methods and strict access controls are in place to safeguard sensitive data.
- Integrity: Ensuring the accuracy and consistency of data is paramount. We implement rigorous checks and validation processes to maintain the reliability of information across our platform.
- Availability: Our commitment to availability means that users can rely on uninterrupted access to our services. We continuously monitor and enhance our infrastructure to prevent downtime and ensure that our tools and resources are always accessible when needed.
Response Times
We aim to address user requests promptly:
- General Inquiries: Responses are typically provided within 24-48 hours during business days.
- Critical Issues: High-priority issues, such as errors in phishing validation tools or API malfunctions, will be addressed within 6-12 hours after they are reported.
Service Offerings
Our platform provides the following core services to users:
- Cybersecurity Chatbot: Instant, AI-powered assistance for cybersecurity questions.
- News Feeds: Real-time updates on cybersecurity incidents.
- Validation Tools: URL/domain analysis, phone number verification, and phishing email detection.
- Dark Web Monitoring: Early detection and notifications for compromised data.
- Community Engagement: We leverage crowdsourcing to help validate information and provide educational insights. This collaborative approach enhances the accuracy of our services and fosters a community of informed users.
- Business Verification: Our platform offers verification services for businesses, ensuring that users can trust the entities they interact with.
- Group Chats: We facilitate group chats where users can discuss cybersecurity topics, share experiences, and seek advice from peers and experts.
- Personalized AI Agents: We are (coming soon) introducing AI agents that will guide users through various events and processes, providing real-time assistance and recommendations.
- Service Level Expectations
- Uptime Goal: Our target uptime for the platform is 99.5% annually.
- Performance: All tools and APIs are designed for fast and efficient processing, with typical response times of 1-3 seconds per request (depending on the tool and data size).
- Accuracy: While we aim for accurate and reliable results, tools like phishing validation and domain analysis are advisory and require users to exercise additional due diligence.
- User Responsibilities
To ensure effective service, users are responsible for:
- Providing accurate information when using platform tools (e.g., correct email addresses or phone numbers).
- Following best practices for cybersecurity as outlined in our educational resources.
- Reporting platform issues or errors promptly to our support team.
- Bot Account Prohibition: We do not allow bot accounts on this platform. All users must be individual human beings to ensure the integrity and security of our services.
- Service Limitations
- Third-Party APIs: Some tools rely on third-party integrations (e.g., VirusTotal, Twilio and others). Delays or inaccuracies from these services may impact our platform’s response times or data quality.
- Data Privacy: While we take every measure to protect user data, users should avoid sharing highly sensitive or unnecessary personal information when using our tools.
- Continuous Improvement
We are committed to improving our platform’s features and reliability. Feedback from users is invaluable in shaping our services. Regular updates and enhancements will be communicated via platform notifications or email.
- Support Contact Information
- Email Support: support@listcrime.com
- Live Chat: Available through the app and website during business hours.
- Phone Support: 202-956-9311
- Knowledge Base: Comprehensive guides and FAQs available on the platform.
- Escalation Process
If a user’s concern is not resolved within the standard response time, they may escalate the issue by contacting our support team and requesting a case review.
This service-level document establishes our commitment to delivering a secure, reliable, and user-friendly platform while empowering users to navigate the complexities of cybersecurity confidently.
User Service and Service Levels with API Integrations (Support)
At ListCrime.com, we leverage powerful third-party APIs to enhance the functionality of our cybersecurity-focused application and provide users with advanced tools for detection, validation, and reporting. Below are the service levels and expectations specific to these integrations.
Disclaimer: Listcrime.com serves to provide assurance, validation, and verification through its cybersecurity tools and API integrations. However, it is important to note that this is not 100% guaranteed. We are simply an aid in your cybersecurity efforts, and all final decisions are the user’s responsibility. Listcrime cannot be held liable for information gathered from this application.
API-Powered Features:
– URL and Domain Validation: Enables users to validate URLs and domains for potential malicious activity, providing historical data and real-time threat intelligence.
– Phone Number Verification: Allows users to verify the legitimacy of phone calls or text messages by querying databases for known spam or fraudulent numbers.
– Compromised Credentials Detection: Provides users with access to a comprehensive database of compromised credentials, allowing them to identify and remediate data breaches swiftly.
– Business Credit Score Access: Enables users to instantly access credit scores and financial health indicators of businesses, allowing for better decision-making and risk management.
– Visual Threat Intelligence: Offers advanced visual threat intelligence by detecting deepfakes and manipulated media, ensuring users’ protection against sophisticated cyber threats.
Service Commitments with API Usage
- Real-Time Access: Both integrations are designed to process requests instantly. Typical response times for API queries are 1-3 seconds, depending on the data being analyzed.
- Accurate Results: While we rely on these APIs for high-quality data, users should note that results may not always be comprehensive or conclusive. These tools serve as aids in cybersecurity efforts and should be used alongside other validation methods.
API-Dependent Features and Use Cases
- URL/Domain Validation (VirusTotal):
- Use Case: A user submits a suspicious URL to verify its safety before clicking.
- Service Level: The tool processes requests in real-time and returns detailed data, including malware history, phishing flags, and community-driven reports.
- Phone Number Validation :
- Use Case: A user receives a call or text from an unknown number and wants to determine if it is linked to spam or scams.
- Service Level: The Twilio integration provides immediate feedback based on the number’s activity, origin, and any known associations with fraud.
- Dark Web Monitoring:
- Use Case: A user (with explicit consent) all Listcrime.com to submit their personal information (such as email addresses and telephone number ) to our 3rs party provider to check to see if it has been compromised and is being sold or discussed on the dark web.
- Service Level: The dark web monitoring tool scans various dark web forums, marketplaces, and data dumps in real-time, providing immediate alerts if any matches are found with the user’s data. This allows users to take prompt action to secure their information.
- Email/Phishing Checking:
- Use Case: A user receives an email that appears to be from a legitimate source but wants to verify its authenticity before clicking any links or downloading attachments.
- Service Level: The email/phishing checking service analyzes the email headers, content, and embedded links in real-time. It uses advanced algorithms to detect known phishing patterns and flags suspicious emails, providing a detailed report that includes the likelihood of the email being a phishing attempt.
- Text Message Checking:
- Use Case: A user receives a text message from an unknown number containing a link or request for personal information and wants to determine if it is a scam.
- Service Level: The text message checking tool examines the sender’s number, message content, and any included links to identify potential scams. It provides real-time analysis and flags messages that match known scam patterns or originate from suspicious sources, helping users avoid falling victim to text message scams.
Service Level Expectations for API-Driven Tools
- Uptime Goal for API Services: We aim to maintain 99.5% availability of API-driven features annually, factoring in any scheduled downtime by third-party providers.
- Response Time: For most queries, response times are within 1-3 seconds. However, delays may occur if the API providers are experiencing high traffic or temporary outages.
- Scalability: Our platform is designed to scale with user demands, ensuring seamless operation even during peak usage periods.
User Responsibilities for API-Based Tools
- Input Accuracy: Users should ensure they input accurate and complete data (e.g., correct URLs, phone numbers) when using these tools to avoid errors or false results.
- Due Diligence: While APIs like VirusTotal, Twilio and others provide valuable insights, users are encouraged to corroborate findings with additional methods for maximum confidence.
Limitations of API Services
- Data Availability: The data provided by VirusTotal and Twilio and other 3rd party applications is limited to the information available in their databases. For example:
- A newly registered domain or phone number might not have sufficient historical data for analysis.
- Not all suspicious activities or entities may be captured immediately.
- Third-Party Dependencies: As these tools rely on third-party providers, temporary downtime or inaccuracies in their systems may affect performance. We monitor these services closely to minimize disruptions.
Support for API-Driven Features
- Error Reporting: Users experiencing issues with VirusTotal or Twilio tools (e.g., failed queries, incomplete results) can report them to our support team via:
- Email: [Insert Support Email]
- Live Chat: Available during business hours.
- Escalation: If an issue arises due to a third-party provider, we will liaise with the provider to resolve the matter and keep users updated on progress.
Continuous Improvement and API Partnerships
- Feature Enhancements: We regularly explore updates and improvements to our API integrations to offer more robust and accurate tools for cybersecurity.
- Additional APIs: Beyond VirusTotal and Twilio, we are actively exploring partnerships with other APIs to expand our platform’s capabilities, such as business validation, phishing analysis, and dark web monitoring.
Transparency and Data Privacy
- Secure API Usage: All data transmitted through our platform to third-party APIs is encrypted to protect user privacy.
- Limited Data Sharing: Only the necessary data required for API functionality is shared with third-party providers, in accordance with our Privacy Policy.
Communication and Data usage
Privacy Policy – SMS Messaging Section
SMS Messaging Policy
By providing your phone number and opting in during registration, you consent to receive SMS messages from ListCrime.com regarding account updates, security alerts, and cybercrime notifications.
Opt-In Consent Message “By providing your phone number, you consent to receive appointment reminders and marketing messages from Listcrime.com. Message and data rates may apply. Reply STOP to opt out.”
Opt-In Consent Message “Sign up to receive exclusive offers and promotions from Listcrime.com via SMS. Reply YES to opt-in. Reply STOP to unsubscribe. Standard messaging rates apply.”
- Opt-In: Users opt in by checking a consent box during registration or by enabling SMS notifications in their account settings.
- Message Content: Messages may include security alerts, account notifications, or cybercrime updates.
- Message Frequency: Messages are sent based on user preferences and security events.
- Opt-Out: You can unsubscribe at any time by replying STOP to any message. You may also manage your preferences in your account settings.
- Support & Help: If you need assistance, reply HELP for more information or contact support@listcrime.com.
- Data & Message Rates: Standard messaging and data rates may apply.