Security Policy

Security Policy Last Updated: Sept 2025 

Run LLC dba Run Digital and RunLeadGen (rundigital.com)

At Run Digital, protecting our partners’ and users’ information is one of our highest priorities. We implement administrative, technical, and physical safeguards to ensure the confidentiality, integrity, and availability of your data. This Security Policy outlines our approach to securing the systems, platforms, and processes that support our services.

1. Data Protection

Encryption: All sensitive information (such as payment details and login credentials) is transmitted using Secure Socket Layer (SSL) or Transport Layer Security (TLS) protocols.

Storage: Payment data is not stored on our servers. Where necessary, data is encrypted at rest and protected using industry-standard practices.

Access Controls: Only authorized personnel have access to client data, and access is granted based on job responsibilities.

2. Systems Security

Firewalls & Monitoring: Our servers are protected by firewalls and are continuously monitored for suspicious activity.

Regular Updates: All operating systems, software, and plugins are regularly updated to mitigate vulnerabilities.

Malware Protection: Systems are protected against viruses, malware, and unauthorized access through security tools and monitoring.

3. Account & User Security

Authentication: Strong password requirements and two-factor authentication (2FA) are encouraged for accounts where available.

Client Responsibility: Clients are responsible for maintaining the security of their own login credentials and are encouraged to change passwords regularly.

4. Data Privacy

Our Privacy Policy governs how we collect, use, and protect your personal information. In short:

We do not sell or share your information with third parties without consent.

Data collected is limited to what is necessary for providing services.

Confidential business data shared with us is protected under our service agreements.

5. Incident Response

In the event of a suspected or confirmed security breach, we will investigate promptly and notify affected clients as required by law.

Steps will be taken to contain the issue, mitigate risks, and prevent recurrence.

6. Third-Party Services

We may use trusted third-party vendors (e.g., payment processors, analytics tools, hosting providers) that maintain their own robust security and compliance programs. We ensure these vendors align with industry standards for data protection.

7. Ongoing Improvements

Security is an ongoing process. We regularly review and improve our policies, tools, and practices to stay aligned with evolving threats and industry best practices.

8. Contact Us

If you have questions about this Security Policy or believe there may be a security concern, please contact us at: [email protected]