Privacy Policy

Effective Date: February 18, 2025
Last Updated: February 18, 2025

1. Introduction

Welcome to Rocketgraph! Your privacy is important to us. This Privacy Policy explains how we collect, use, store, and protect your personal information when you visit our website, use our services, or interact with us.

By accessing or using our website, you agree to the terms outlined in this Privacy Policy. If you do not agree, please refrain from using our website.

2. Information We Collect

We may collect the following types of information:

a. Personal Information
  • Name
  • Email address
  • Phone number
  • Company name
  • Job title
  • Billing information (if applicable)
b. Technical Information
  • IP address
  • Browser type and version
  • Operating system
  • Device information
  • Website usage data (via cookies and analytics tools)
c. User-Submitted Data
  • Support tickets
  • Contact form submissions
  • Dataset requests
  • Other voluntary submissions

3. How We Use Your Information

We use the information collected to:

  • Provide, maintain, and improve our services
  • Process support requests and inquiries
  • Communicate with users about updates, promotions, or service-related notices
  • Enhance website functionality and user experience
  • Ensure security and prevent fraud

4. How We Share Your Information

Rocketgraph does not sell or rent your personal data. However, we may share it with:

  • Service Providers: Third-party vendors that help us operate our website and services (e.g., hosting providers, analytics tools).
  • Legal Compliance: If required by law or to protect the rights and safety of Rocketgraph or others.
  • Business Transfers: If Rocketgraph undergoes a merger, acquisition, or asset sale.

5. Data Security

We implement industry-standard security measures to protect your data from unauthorized access, alteration, disclosure, or destruction. However, no internet-based service is 100% secure, so we encourage users to take necessary precautions.

6. Cookies and Tracking Technologies

We use cookies and similar tracking technologies to enhance your browsing experience. You can manage your cookie preferences through your browser settings.

7. Your Rights and Choices

Depending on your location, you may have the right to:

  • Access, update, or delete your personal information
  • Opt out of marketing communications
    Request data portability
  • Restrict or object to data processing

To exercise these rights, contact us at in**@ro*********.com.

8. Third-Party Links

Our website may contain links to third-party websites. Rocketgraph is not responsible for their privacy practices, and we encourage you to review their policies separately.

9. Changes to This Policy

We may update this Privacy Policy periodically. Any changes will be posted on this page with a revised "Last Updated" date.

10. Contact Us

If you have any questions or concerns about this Privacy Policy, please contact us at:

Email: in**@ro*********.com
Website: rocketgraph.com

Put your hardest-to-solve problems on the launch pad

CYBERSECURITY

CYBERSECURITY
Analyze network traffic to detect anomalies and unusual patterns in network behavior to prevent attacks and speed up responses.

FRAUD DETECTION

FRAUD DETECTION
Go beyond simple lookups to uncover fraud and illegal activity hidden in connections five, 10, 15 layers deep… or more.

FINE-TUNED FORECASTS

FINE-TUNED FORECASTS
Bring together trillions of internal and external data points—literally—to make better predictions about the future.

ANTI-MONEY
LAUNDERING (AML)

ANTI-MONEY
LAUNDERING (AML)

Expose complex money laundering schemes by analyzing the relationships between individuals, organizations, and transactions. 

INSIDER THREAT
DETECTION

INSIDER THREAT
DETECTION

Model relationships between employees, contractors, and other stakeholders to identify potential insider threats.

COUNTERTERRORISM

COUNTERTERRORISM
Investigate and map relationships between individuals and organizations involved in terrorism activities. 

DISASTER RESPONSE
AND RECOVERY

DISASTER RESPONSE
AND RECOVERY

Model relationships between response teams, resources, and affected areas to optimize disaster response efforts.

PERSONALIZED
CUSTOMER SERVICE

PERSONALIZED
CUSTOMER SERVICE

Build a deep understanding of customer behavior to drive product recommendations and personalized services.

Put your hardest-to-solve problems on the launch pad

CYBERSECURITY

CYBERSECURITY
Analyze network traffic to detect anomalies and unusual patterns in network behavior to prevent attacks and speed up responses.

FRAUD DETECTION

FRAUD DETECTION
Go beyond simple lookups to uncover fraud and illegal activity hidden in connections five, 10, 15 layers deep… or more.

FINE-TUNED FORECASTS

FINE-TUNED FORECASTS
Bring together trillions of internal and external data points—literally—to make better predictions about the future.

ANTI-MONEY
LAUNDERING (AML)

ANTI-MONEY
LAUNDERING (AML)

Expose complex money laundering schemes by analyzing the relationships between individuals, organizations, and transactions. 

INSIDER THREAT
DETECTION

INSIDER THREAT
DETECTION

Model relationships between employees, contractors, and other stakeholders to identify potential insider threats.

COUNTERTERRORISM

COUNTERTERRORISM
Investigate and map relationships between individuals and organizations involved in terrorism activities. 

DISASTER RESPONSE
AND RECOVERY

DISASTER RESPONSE
AND RECOVERY

Model relationships between response teams, resources, and affected areas to optimize disaster response efforts.

PERSONALIZED
CUSTOMER SERVICE

PERSONALIZED
CUSTOMER SERVICE

Build a deep understanding of customer behavior to drive product recommendations and personalized services.

Scroll to Top