Pyxis Growth Partners Privacy Policy

pyxis-bg-2

Effective date: 10/1/2025

Trust and Security at Pyxis Growth Partners

At Pyxis Growth Partners, trust is the foundation of every client relationship. We know that your data is one of your most valuable assets, and we take its protection seriously. This page outlines how we safeguard information and uphold the highest standards of security, privacy, and compliance.


Our Commitment

We are committed to:

  • Keeping client data safe, secure, and private.
  • Using industry best practices for data protection.
  • Operating with transparency and integrity in every engagement.


Security Practices

  • Data Encryption: We use industry-standard encryption to protect client data in systems we manage and control—both in transit and at rest. While most email is encrypted in transit (via TLS), email is not an end-to-end secure medium. For sensitive information, we encourage the use of encrypted file transfer, secure messaging platforms, or other approved methods to ensure full protection.
  • Access Controls: We apply the principle of least privilege and use role-based access to systems and client environments.
  • Authentication: Multi-factor authentication (MFA) is enforced for all systems we manage.
  • Monitoring and Logging: We continuously monitor systems for suspicious activity and maintain audit trails.
  • Employee Screening: All employees undergo background checks and reference verification before hire.


Privacy and Data Protection

  • Data ownership: Clients retain full ownership of their data.
  • No Unauthorized Sharing: We do not sell, trade, or disclose client data to third parties.
  • Confidentiality: All employees and contractors are bound by confidentiality agreements.
  • Compliance Support: We help clients configure HubSpot and related systems in alignment with GDPR, CCPA, and other applicable regulations.


Business Continuity

  • Backups: We maintain secure, redundant backups for critical systems.
  • Disaster Recovery: Tested processes are in place to ensure resilience in the event of an outage.
  • Vendor Security: We carefully vet the third-party tools and platforms we use, ensuring they meet enterprise security standards.


Transparency and Compliance

  • Regulatory Awareness: We align our practices with industry standards for data privacy and security.
  • Ongoing Reviews: Our policies and procedures are regularly reviewed and updated.
  • Client Assurance: We can provide additional details about our security measures during procurement or compliance review processes.

Report a Concern

If you have a question about our security practices or believe you’ve discovered a vulnerability, please contact us immediately at: security@pyxisgrowth.com

Our Results

See how our work has generated great results for our clients.

See our Case Studies

feature-bg