Privacy Policy

We take your privacy seriously


Roka Security LLC (“Roka Security”) is committed to protecting the privacy of our visitors’ and our customers’ personal information. This notice describes Roka Security’s Privacy Policy as it pertains to our website at (the “Website”) and any/all email messages that you may receive from Roka Security. Please read this Privacy Policy before using the Website or submitting any information. By using this Website, you are acknowledging that you have read and understand this Privacy Policy.

We may from time to time revise or modify this Privacy Policy, and the date of last revision will be available at the top of this page, so please be sure to check back periodically. The most recent version of this Privacy Policy is available at If you have objections to any part of the Privacy Policy, please discuss them with us prior to accessing or using the Website.

Roka Security makes our best attempt to explain and cover every in house and third party tracking mechanism we use.  If you find that something in the policy is omitted or in conflict with what you observe, we want to know.  Please email us with your concern and example of the issue at info at

What Roka Security Collects

What information we collect: Roka Security may ask for and collect personally identifiable and other information about you or another entity on whose behalf you are authorized to act. Depending on the information, products or services you request, you may be asked to provide your or your company’s name, address, telephone number and email address. We may also collect other information about you or your company if you choose to provide it.

Besides the information that you knowingly provide, Roka Security collects non-personally identifiable information, such as the domain names and IP addresses of its visitors, along with usage statistics and browsing history. Roka Security may combine this information with the personally identifiable and other information it collects through the website and elsewhere. We also collect information about which of our email messages you open, which email links you click on, whether you forward email messages from Roka Security and other information.

How we collect information

In addition to the information you provide and the other methods described above, we may also collect information using cookies, web beacons or similar technologies. These methods permit us to collect various types of information, including which pages you visit, how you use the Website, which of our email messages you open, and other information.

Roka Security may use third party cookies, web beacons and tracking tools on our site as well.

How Roka Security uses the information it collects:

  • To provide you with personalized content.
  • To administer and improve the Website and our email campaigns.
  • To process your orders.
  • To address your inquiries.
  • To alert you to new features, special events, products and services.
  • For the purposes for which you provided the information.
  • To enforce our legal rights, including our Website Terms of Use agreement.
  • To customize content and advertising on third party providers platforms. This includes marketing and re-marketing.

 Ways to Opt Out of Tracking

Below are links that take you to site to either opt-out or desribe how you can opt out of the tracking.

Specific Usage Agreements

In particular, Roka Security may use the following third parties tracking mechanisms to provide this tracking ability. This list is not meant to be exhaustive but to inform the user. Roka Security may use other third party tracking mechanisms other than outlined here.  Again, please let us know if you find something to be missing.


Roka Security may have tracking code that is working with third parties to collect user data through your websites or mobile applications for purposes of serving ads targeted to their interests. Users may opt out of interest-based advertising through the Do Not Track functionality in their web browser, or through such other methods as Twitter may specify from time to time at (or any successor url).


Roka Security may use Facebook’s Conversion Tracking or Custom Audiences from our Website. As such,

a.  Third parties may use cookies, web beacons, and similar technologies to collect or receive information from Roka Security’s website and elsewhere on the internet and use that information to provide measurement services and target ads,

b. Users may opt out of interest-based advertising through the Do Not Track functionality in their web browser

c. A user can access a mechanism for exercising such choice at the following site

Google Analytics

Roka Security uses google analytics to track user activity on our site, for the purposes of advertising and re-marketing. To opt out of a third-party vendor’s use of cookies by visiting the Network Advertising Initiative opt-out page.


Roka Security may use LinkedIn’s Tracking mechanisms to better serve interest based ads and retargeting to visitors of its websites.


Roka Security may use Pardot’s tracking system for it’s website, emails and other communication with visitor’s to the website and people who Roka Security communicates with.

Future Events

n the future, we may sell some or all or our assets. In the event of a sale of our assets including our database(s), the information collected by Roka Security may be transferred. We will include in any purchase agreement a requirement involving personally identifiable information that the buyers honor our Privacy Policy.

Information Sharing with Third Parties: Roka Security may disclose the information it collects to another entity (i) for purposes of outsourcing one or more of the functions described in this Privacy Policy; (ii) to confirm or update information provided by you; (iii) to inform you of important information; (iv) as a part of a sale of assets as described in the previous section; (v) so that our partners and affiliates can provide you with information about the products and services they offer and/or (vi) as otherwise authorized by you. We also may share your information in response to a subpoena, legal order or official request, when we believe you have acted in violation of the Terms of Use, or as otherwise permitted or required by law.

Sharing and use of de-identified information: Information that is de-identified (stripped of any information that could be used to identify any person) may be used by Roka Security for any reason and shared with third parties subject to applicable laws.

How we protect information: Roka Security protects against the loss, misuse and alteration of the personally identifiable information we collect by implementing appropriate administrative, technical and physical safeguards to protect the privacy and security of information. Our servers are protected by reasonable physical and electronic security measures, and we use encryption wherever warranted or required.