Your Privacy & Security Matter
Our commitment to protecting your data through transparency, controls, and compliance.

Our Approach
At DbCom, we take a proactive, principles-based approach to data protection. Our information, privacy, and security practices are designed to safeguard sensitive data, ensure regulatory compliance, and support the trust of our clients, employees, and website visitors.
We embed privacy and security into every part of our operations — from secure system design and role-based access controls to responsible data classification, retention, and disposal.
Our policies align with recognized regulatory frameworks, including the General Data Protection Regulation (GDPR) and the Gramm-Leach-Bliley Act (GLBA), and reflect our commitment to transparency, accountability, and ethical data use.

Privacy At a Glance
-
We collect and process data strictly to deliver contracted services.
Data processing is governed by executed agreements
We retain and protect client data in accordance with applicable laws and industry best practices
Information is securely classified, stored, and disposed of under formal policy controls
We do not share or use client data for marketing purposes
-
We collect limited personal information when you interact with our site.
Data is collected via web forms, cookies, and analytics tools
Used for communication, marketing, and service inquiries
You can manage consent preferences via cookie settings
We do not sell personal data
To exercise your rights or if you have any questions regarding this Privacy Statement, please get in touch with us by phone at 609-651-8222 or by mail at.
DbCom Consulting, Inc.
2 Research Way
Princeton, NJ 08540
Read our full [Privacy Policy]
Security Overview
At DbCom, our security program is built on a foundation of layered controls, policy enforcement, and continuous improvement. We take a defense-in-depth approach to safeguarding systems, networks, and data, prioritizing confidentiality, integrity, and availability at every stage.
-
Role-based access, MFA, and structured onboarding/offboarding processes protect systems and data.
-
Isolated infrastructure with VPN, firewalls, and secure remote desktop access.
-
Data is encrypted in transit and at rest using the latest TLS, AES-256, and client-managed keys when required.
-
OAuth2, JWT, rate limiting, and regular scans safeguard APIs and web services.
-
Background checks, NDAs, and mandatory security awareness training.
-
Data storage follows client preference; disposal is formal, reviewed, and never performed without approval.
Contact Us
DbCom - EQube
Financial Technologies | Regulatory Compliance
2 Research Way
Princeton, NJ 08540
Phone: 609) 651-8222 option 3
Email: sales@dbcomsys.com