Ethical Guidelines
We consider the effects of our choices with regarding to our technology and operating our service. We follow a privacy-first principles that go beyond basics.
Every decision matters: how and what we communicate to new customers, what information we collect and what tools we use to improve our service. We believe in leading by example, and commit to the following:
No personal information
We aim for zero user information collected as defined in our concise privacy policy. We ask for the minimum, your email address or any other personal information like your name and company email address.
No trackers
Trackers by ad companies and social networks monitor your actions and aid in profiling you. You won’t find them on Aronetics – we are a tracking free web address.
No third-party tools
Tools like Google Analytics collect personally identifiable information that you share willingly or not, we don’t acknowledge them deeper than type of machine or country.
No secrets
Aronetics’ ownership, company structure and team is semi-public, so you know who is responsible for protecting your privacy and available on either LinkedIn or GitHub.
No false promises
We don’t advertise benefits that are not attainable by using a our technology.
Openness and accountability
Our technologies are close source and available for review on our GitHub page, we attempt to be as open as possible after legal agreements are met.
We don’t do marketing
We are committed to spreading the word about our technology and mission to help more people protect their privacy. Considering the state of modern marketing, this is a challenging task.
We consider most marketing methods harmful, and refuse to engage in them. The following list represents all tactics we have considered and either rejected or eliminated over the years.
Paid reviews
We will not begin an affiliate program to protest against the practice of paid reviews and misleading recommendations by “best InfoSec/Cybersecurity” websites.
Surveillance ads
Surveillance ads use personal information and behavioral data for personal targeting and retargeting purposes. We attempt to limit Facebook, Google and all forms of programmatic advertising on our website.
Dark patterns
We shun fake reviews, made up social proofs, countdown timers, expiring deals, exit consoles and tricks that make it hard to cancel our service. If you have issues and do not contact us, our software removes only itself.
Fear, uncertainty and doubt
Pushing subscriptions with scare tactics is common in the infosec/cybersecurity industry. We acknowledge the grave threat and suggest a myriad of tools need to be used.
Buying endorsements
We believe influencers and YouTube creators with no information security expertise should not endorse any services or technology in exchange for payment or social status.
Spam
We shun spam on social media and buying email lists of prospective customers, two marketing tactics frequently used by providers.
How we attract new customers
Our mission supersedes making profit and we reinvest most of our revenue into improving our service and educational projects. Yet cybersecurity is the elephant in the room, and as a business and we are working on attracting new customers, while keeping our values and commitments in mind.