Privacy Policy
Internal Application — Dark Horse IT Security
Effective Date: March 15, 2026
1. Overview
This Privacy Policy describes how Dark Horse IT Security (“Company,” “we,” or “us”) collects, uses, and protects information processed through our internal NinjaOne RMM integration application (“Application”).
This Application is strictly internal. It is used exclusively by authorized Dark Horse IT Security employees and contractors to manage and monitor client IT infrastructure. It is not a public-facing product and does not collect personal data from the general public.
2. Data Collected
The Application may process the following categories of data through the NinjaOne API:
- Device inventory data (hostnames, OS versions, hardware specs)
- Alert and monitoring data (system health, uptime, error states)
- Patch management and software inventory data
- User authentication data for accessing the Application (employee credentials only)
- API access tokens for NinjaOne integration
No personal data belonging to end-consumers or members of the public is collected, stored, or processed by this Application.
3. How We Use Data
All data processed by the Application is used solely for:
- Internal IT operations and infrastructure monitoring
- Alerting and incident response for managed client systems
- Generating internal operational reports and dashboards
- Authenticating authorized Company personnel
Data is never used for advertising, profiling, or any commercial purpose unrelated to the Company’s internal operations.
4. Data Sharing
We do not sell, rent, or share any data processed by this Application with any third party, for any reason, at any time.
Data flows only between the Application and NinjaOne’s API as required for the Application’s core functionality. NinjaOne’s handling of data is governed by NinjaOne’s own privacy policy and terms of service.
5. Data Storage
All application data is stored locally on Company-controlled infrastructure within the Dark Horse IT Security private network. No data is stored on public cloud services without explicit authorization from Company management.
API tokens and credentials are stored in environment variables and are never committed to source control or logged in plaintext.
6. Access Controls
Access to the Application is restricted to authorized Dark Horse IT Security employees and contractors. Authentication is required to use the Application. Access is revoked upon separation from the Company.
7. Data Retention
Data processed by the Application is retained only as long as necessary for operational purposes. When data is no longer needed, it is deleted from Company systems. No data archives are shared externally.
8. Security
Dark Horse IT Security implements industry-standard security practices to protect data processed by this Application, including access controls, encrypted communications (HTTPS/TLS), and regular security reviews. As an IT security firm, security is a first-class concern in all internal tooling.
9. Changes to This Policy
We may update this Privacy Policy from time to time. Changes will be reflected with an updated effective date. Continued use of the Application after changes constitutes acceptance of the revised policy.
10. Contact
Questions or concerns regarding this Privacy Policy should be directed to Dark Horse IT Security at admin@darkhorseitsecurity.com.