Privacy Policy for Utah Residents

This section provides information specific to Utah Residents. This Notice supplements our Privacy Policy. Please see our Privacy Policy for more information on the type of personal data we collect, how we use it and who we share it with.

If you are a Utah resident, you have the following rights:

  • You have the right to know and see what Personal Information we have collected about you in a usable format.
  • You have the right to request we delete the Personal Information we have collected about you, subject to applicable legal exceptions.
  • You have the right to “opt out” of targeted advertising and the sale of your Personal Information (as defined under UT Law).

How to Make a Request Under this Policy

In addition to using the links Do Not Sell My Personal Information there are several ways for you to submit any of the above personal information requests. You may:

  1. Send a request by mail to:
    FortifyIQ, Inc.
    Attention Privacy
    81 Washington Street, Suite #307
    Salem, MA 01970
    USA
  2. Send a request via email to privacy@fortifyiq.com.
  3. Click here.

FortifyIQ, Inc., will endeavor to respond to all requests within 30 days. To respond to your requests to access, obtain a copy of, correct or delete your personal data, we will need to verify your identity and/or authority to make such requests and access, receive, modify or delete such personal data. When you submit a request, we will take steps to verify your identity. You are not required to create an account with us to submit a request. We may ask you to provide us with information about yourself in order to verify your identity. We will only use the personal information you provide in connection with identity verification to verify the requestor’s identity or authority to make the request and whenever feasible, we will attempt to match the information you provide with information we may already have about you.

You may use an Authorized Agent to Make such Requests

You may use an authorized agent to submit a request to opt out of targeted advertising or the sale of personal data. Authorized agents may submit such requests to privacy@fortifyiq.com. Authorized agents can make a request on your behalf if we are provided with verification of your identity and confirmation that you provided the agent authority to act on your behalf.

Links to Other Websites

Our websites and mobile applications link to other websites that are not operated or controlled by FortifyIQ, Inc. We do not monitor or control, and are therefore not responsible for, the privacy practices or the content of linked external websites. We recommend reviewing the privacy policies for any linked websites you visit.

Changes to Our Privacy Notice

We may make changes to this Privacy Notice periodically and will provide at the top of this Notice the date it was most recently updated. Using our websites, mobile applications, or services where this Privacy Notice is posted or noticed constitutes your acceptance of our privacy practices.

Contact Information

If you have questions about this Privacy Notice or wish to contact us concerning personal information you provided to us, you may reach us by email or US Mail as follows:

  1. FortifyIQ, Inc.
    Attention Privacy
    81 Washington Street, Suite #307
    Salem, MA 01970
    USA
  2. Send a request via email to privacy@fortifyiq.com
  3. Click here.
Fortify’s AES security evaluation by SGS

“Summary. The leakage analysis (Welch t-test) on over 30 million traces did not show statistically significant first- and second-order differences between trace sets with fixed and random inputs. The template-based DPA analysis, on the pseudo-random trace set for the profiling phase (15 million traces) and on a sub-set of 300k fix input traces for matching phase targeting the first-round S-box output, and template attack on ciphertext, did not indicate any potential information leakage.”

” The results for the soft IP presented in the report were obtained on the TOE which is the basic hardware implementation of the soft IP without additional levels of security (e.g. that are present in a secure silicon layout). Therefore the internal strength of the soft IP itself was evaluated. This indicates that the investigated features and parameters of the soft IP implementation should be robust against SCA and fault injection attacks in different implementations including ASIC. Nevertheless, according to the Common Criteria rules, the strength of the final composite product must be evaluated on its own.”

Request Technical Details