(Last Updated January 15, 2021)

This Online Privacy Statement is an explanation of the information we collect, how we use it, and how the use of this information can benefit your experience on our websites and during your relationship with us. The information outlined below will assist you in making informed decisions while doing business with us.

IT Vortex, LLC, a New Jersey Corporation, (hereafter referred to as IT Vortex), values you as our customer and recognizes that privacy is important to you. In order to provide multiple access points to the services and products we offer, IT Vortex operates www.theitvortex.com and other portals (individually, “Website” and collectively, “Websites”.). IT Vortex is dedicated to protecting your privacy and safeguarding your “personally identifiable” information. We are committed to using our customers’ information only in a responsible manner. We are committed to respecting your privacy and adhering to the principles of applicable data protection and privacy laws.

We want you to be familiar with how we collect, use and disclose information. This Privacy Statement describes IT Vortex’s privacy practices in connection with information that we collect through the Website from which you are accessing this Privacy Statement, through the software applications made available by us for use on or through computers and mobile devices (the “Apps”), through our social media pages that we control from which you are accessing this Privacy Statement (collectively, our “Social Media Pages”), through email messages that we send to you that link to this Privacy Statement, and through your communications with us and when you do business with us (collectively, including the Websites, the Apps and our Social Media Pages, the “Online Services,” and together with offline channels, the “Services”). By providing Personal and Other Information to us, you agree to the terms and conditions of this Privacy Statement.


IT Vortex does not collect personally identifiable information when you browse our Websites unless you voluntarily and knowingly provide such information. This means that we will not know your name, your email address, or any other personally identifiable information just because you browse our website unless you:

“Personal Information” is information that identifies you as an individual or relates to an identifiable individual. We may collect Personal Information such as:

We and our partners may collect Personal Information in a variety of ways, including:

When we do need to collect Personal Information from you, we will ask you and/or your employer, to voluntarily supply us with the information we need. You may be offered the choice not to submit your personal information or to decide what communications you want to receive from us. However, doing so may cause certain transactions to become affected. For example, failure to provide your name will prevent the processing of sales.

If you submit any Personal Information relating to other people to us or to our partners in connection with the Services (e.g., if you make a referral for another individual or company), you represent that you have the authority to do so and to permit us to use the information in accordance with this Privacy Statement.


We may use Personal Information in a variety of ways, including:


IT Vortex will never sell your Personal Information to third parties or allow its use in any manner except with the purpose to reasonably ensure and permit the business relationship that you wish to conduct with IT Vortex. Your Personal Information, when we have your consent to do so, may be disclosed in connection with the following services:


IT Vortex may collect Other Information that does not disclose your Personal Information, including information such as the browser and type of device you are using, app usage data, data collected using cookies, pixel tags or Web beacons to obtain information while visiting our Websites. If we are required to treat Other Information as Personal Information under applicable law, then we may use it for the purposes for which we use and disclose Personal Information as detailed in this Statement.

We and our third party service providers may collect Other Information in a variety of ways, including:

IT Vortex’s cookies are created by our Websites only, and are not designed to be used on the Internet after leaving one of our Websites. We track the usage of our Websites in order to better meet your needs and to help make it easier for you to find information in the future.

Cookies further allow us to select which of our advertisements or offers are most likely to appeal to you and display them while you are on the Online Services or to send you advertisements and marketing emails. We may also use cookies or other technologies to track responses to our online advertisements and marketing emails. If you do not want information collected through the use of cookies, there is a simple procedure in most browsers that allows you to automatically decline cookies or be given the choice of declining or accepting the transfer to your computer of a particular cookie (or cookies) from a particular site. If, however, you do not accept cookies, you may experience some inconvenience in your use of the Online Services. For example, we may not be able to recognize your computer, and you may need to log in every time you visit. You also may not receive advertising or other offers from us that are relevant to your interests and needs.


We may use and disclose Other Information for any purpose, except where we are required to do otherwise under applicable law. In some instances, we may combine Other Information with Personal Information (such as combining your name with your location). If we do, we will treat the combined information as Personal Information as long as it is combined.

In addition, we are not responsible for the information collection, use, disclosure or security policies or practices of other organizations, such as Facebook, Apple, Google, Microsoft, RIM or any other app developer, app provider, social media platform provider, operating system provider, wireless service provider or device manufacturer.


IT Vortex recognizes the importance of information security, and is constantly reviewing and enhancing all technical, physical, and logical security rules and procedures. We use reasonable methods to secure your personal information from unauthorized access, use or disclosure. After information reaches IT Vortex, it is stored in an encrypted format on secure servers that reside behind firewalls designed to block unauthorized access from outside of IT Vortex. All IT Vortex-owned Websites and servers have security measures in place to help protect your personally identifiable information against loss, misuse, and alteration while under our control. Although guaranteed security does not exist either on or off the internet, we safeguard your information using both procedural and technical safeguards, including the use of a Network Solutions Certificate Authority. IT Vortex secures the Personal Information you provide on computer servers in a controlled, secure environment. When Personal Information (such as a credit card number, or other financial information) is transmitted through our website, it is protected through the use of encryption by way of a Network Solutions’ service known as Secure Sockets Layer (SSL), an encryption method used to help protect your data from interception and hacking while in transit. IT Vortex protects against unauthorized access of this data by using both technology and comprehensive security policies.

Unfortunately, no data transmission or storage system can be guaranteed to be 100% secure. If you have reason to believe that your interaction with us is no longer secure (for example, if you feel that the security of your account has been compromised), please immediately notify us in accordance with the “Contacting Us” section below.


If you no longer want to receive marketing-related emails from us on a going-forward basis, you may opt-out by following the instructions in any such email you receive from us. We will try to comply with your request(s) as soon as reasonably practicable. Please note that if you opt-out of receiving marketing-related emails from us, we may still send you important administrative messages, from which you cannot opt-out.

How you can access, change or suppress your Personal Information:

If you would like to review, correct, update, suppress or delete Personal Information that you have previously provided to us, you may contact us at [email protected], or:

IT Vortex, LLC
Privacy Department
237 West Midland Ave.
Paramus, NJ 07652
United States of America

In your request, please make clear what Personal Information you would like to have changed, whether you would like to have your Personal Information suppressed from our database, or other limitations you would like to put on our use of your Personal Information. For your protection, we may only implement requests with respect to the Personal Information associated with the particular email address that you use to send us your request, and we may need to verify your identity before implementing your request. We will try to comply with your request as soon as reasonably practicable.

Retention: Unless specifically requested, we ask that you not send us, and you not disclose, any sensitive Personal Information (e.g., social security numbers, national identification number, information related to racial or ethnic origin, political opinions, religion or other beliefs, health, biometrics or genetic characteristics, criminal background or trade union membership) on or through the Services or otherwise to us.

Please note that we may need to retain certain information for recordkeeping purposes and/or to complete any transactions that you began prior to requesting a change or deletion (e.g., when you sign a contract with IT Vortex, we must maintain your Personal Information until the contract
ends). There may also be residual information that will remain within our databases and other records, which will not be removed. In addition, there may be certain information to which we are unable to enable you to review, for legal, security, or other reasons. Although we will make no more marketing use of information you have asked to be deleted, occasionally, information that you request to be removed will be retained in certain files for a period of time in order to properly resolve disputes or to troubleshoot problems. In addition, some types of information may be stored indefinitely on back-up systems or within log files due to technical, financial or legal requirements.

We will retain your Personal Information for the period necessary to fulfill the purposes outlined in this Privacy Statement unless a longer retention period is required or permitted by law.


IT Vortex performs business transactions worldwide. Sharing information cross border is essential to the Services so that you receive the same high quality service wherever you are in the world. As a result, we may, subject to applicable law, transfer Personal and Other Information collected in connection with the Services, to these entities in countries where information protection standards may differ from those in the country where you reside. By signing a contract with IT Vortex, you understand that we may transfer your personal information globally.

IT Vortex strives to keep all our customers and visitors informed and equally able to take advantage of the benefits offered by IT Vortex. However, if you reside outside of the United States, certain data privacy regulations may require us to obtain your permission before we send
you information that you have not requested from us.

The Websites are hosted in the United States and are intended solely for visitors located within the United States. If you choose to use any Website from the European Union or other regions of the world with laws governing data collection and use that may differ from U.S. law, then please note that you are transferring your Personal Information outside of those regions to the United States for storage and processing, and by providing your Personal Information on any Website you consent to that transfer, storage, and processing. IT Vortex may limit the availability of any Website or any service or product described on any Website to any person or geographic area at any time. If you choose to access any Websites from outside the United States, you do so at your own risk. If you live outside of the United States, you understand and agree that we will transfer your information to the United States.


IT Vortex is committed to protecting the privacy of minors. If you are under the age of thirteen (13), we ask that you do not use the Websites. IT Vortex does not seek to obtain, nor does it wish to receive personally identifiable information directly from minors; however, we cannot always determine the age of persons who access and use our Websites. If we do learn that personally identifiable information has been collected on any Website from a minor and without verifiable parental consent, then we will take the appropriate steps to delete this information. If you are a parent or guardian and discover that your minor child has obtained an account on Website or has otherwise provided personally identifiable information, you may alert us at [email protected], and request that we delete that child’s personally identifiable information from our Websites.


We may change this Privacy Statement. The “LAST UPDATED” date at the top of this page indicates when this Privacy Statement was last revised. Any changes will become effective when we post the revised Privacy Statement on the Website. Your use of the Services following these changes means that you accept the revised Privacy Statement.

Contacting Us
If you have any questions about this Privacy Policy, you may contact us at
[email protected], or:

IT Vortex, LLC
Privacy Department
237 West Midland Ave.
Paramus, NJ 07652
United States of America

Because email communications are not always secure, please do not include credit card, government identity numbers or other sensitive information in your emails to us.



IT Vortex utilizes VMWare’s NSX network virtualization and security product which is the network and security platform that enables the virtual cloud network, software-defined approach to networking that extends across datacenters, clouds, endpoints, and things. With NSX Datacenter,
networking and security is brought closer to the application wherever it’s running from VMs to containers to bare metal. Through the NSX product IT Vortex creates SDN solutions comprised of routing, switching, distributed firewalling, load balancing, VPNs, and context-aware micro-segmentation
when the client’s needs call for more in depth security processes.

NSX allows for and meets the following industry certifications: FIPS – NSX Datacenter for vSphere 6.3.0 has a FIPS mode that uses only cipher suites that comply with FIPs. ICSA – This is an industry wide accepted standard certification which tests and certifies products including anti-virus, firewall, IPSec VPN, cryptography, SSL VPN, network IPS, anti-spyware, and PC firewall products. Both NSX Datacetner for vSphere Distributed Firewall and Edge Firewall are certified against ICSA Corporate Firewall criteria.
NSX also maps to the NIST special publication 800-125B “Secure Network Virtual Configuration for Virtual Machine (VM) Protection”. Common Criteria – NSX Data Center for vSphere 6.3.0 has been tested for compliance with the EAL2+ level of assurance. PCI Compliance – Other standards such as NIST 800-53, IRS 1075, and MARS-E are made possible via the strong GRC procedures that NSX logging and auditing allows.

The basis behind NSX is a zero trust model (Security by Default) that allows for a completely hardened system out of the box and then only upon business needs are rules and processes designed to facilitate access whether external to internal (North/South) or internally (East/West). IT Vortex uses NSX across all its vDCs and client vDCs to accomplish micro-segmentation of critical applications, DMZs, and agent-less anti-virus.

NSX also allows for DNE (Distributed Network Encryption) which encrypts all traffic in the hypervisor based on group-keying concepts and rules defined by the business process owners. Cryptographic tokens are used for authentication and encryption. Keys are of type symmetric and each
key also has a unique identifier called KeyID which is at 128-bits.











Notes: * Additional fees may apply