Last updated: March 27, 2026
is a company incorporated in the State of Wyoming, United States. In this Privacy Policy, “VERIFION,” “we,” “us,” or “our” mean . We are a technology services provider delivering software, hosting, and infrastructure work to business clients.
Day-to-day technical operations are coordinated on a distributed basis worldwide, in line with client time zones and project locations; client infrastructure may reside with international cloud and hosting providers. We serve business customers internationally.
Our work includes, depending on the engagement: custom software development for third-party clients; infrastructure hosting and cloud arrangements (including VPS and managed environments); deployment, configuration, and ongoing maintenance of platforms such as learning management systems (for example Moodle), web applications, APIs, and backend systems; infrastructure management and technical support; network security measures including mitigation of denial-of-service and volumetric attacks when included in a service plan; and general IT consulting and tailored technical solutions agreed in writing.
This Privacy Policy describes how we handle personal information in connection with our public website at client.verifionllc.com, sales and support communications, billing, and the delivery of those professional services (collectively, the “Services”).
If a signed contract (statement of work, master services agreement, hosting or support agreement, order form, or addendum) conflicts with this Policy on a specific subject, that contract controls for the client relationship to the extent permitted by law.
We engage primarily with organizations. Personal information we process usually falls into one of these buckets:
We may collect and process:
We process information through ticketing and email, project management tools, source control and CI systems for development engagements, cloud-provider consoles, backup and configuration management utilities, remote access sessions authorized by clients, and automated jobs (log rotation, patch workflows, capacity alerts, traffic filtering rules for attack mitigation). Processing is partly automated (filtering, monitoring, alerting) and partly performed by our personnel under access policies appropriate to their role.
We use personal information to: negotiate and perform contracts; provision and administer hosting and cloud resources; develop, deploy, and maintain software deliverables; provide technical support; secure infrastructure under our management (including detection of abuse and volumetric attacks); invoice and collect amounts due; meet legal and tax obligations; enforce our agreements; improve internal operations using aggregate or de-identified statistics where reasonable; and communicate operational or policy changes.
We do not sell personal information as defined in the California Consumer Privacy Act, as amended by the California Privacy Rights Act (“CCPA”), and we do not use personal information for cross-context behavioral advertising.
We use independent vendors typical for an IT services firm, including:
We disclose personal information to the categories of providers above; to professional advisers under confidentiality; to an acquirer or successor in a merger, acquisition, or asset sale subject to continued obligations; and when we believe in good faith that disclosure is required by law, regulation, valid legal process, or to protect the rights, property, or safety of persons.
We primarily store and process data in the United States. If data is handled across borders, we take steps required by applicable law and by contractual commitments made to clients.
Retention varies by data type and contract:
We apply administrative, technical, and organizational measures suited to IT infrastructure and development work, including: role-based access to production systems; authentication and logging for administrative actions; encryption of data in transit (TLS) where applicable; encryption at rest where supported by the underlying platforms; network segmentation between environments where practicable; patch and vulnerability management; monitoring for intrusion and availability; and DDoS mitigation controls when offered under contract. Risk cannot be eliminated; we do not warrant that all attacks or outages will be prevented.
Residents of California may have rights under the CCPA/CPRA. We do not discriminate against individuals for exercising statutory privacy rights. Authorized agents may submit verifiable requests.
We use cookies and similar technologies needed for session management, authentication, load balancing, and security on client.verifionllc.com and interfaces we operate. Optional analytics cookies, if introduced later, will be described here along with choices where legally required.
We may revise this Policy by posting an updated version and changing the “Last updated” date. Material changes may be communicated to active customer contacts by email or through service notices.
— a company incorporated in the State of Wyoming, United States.