Data Breach Notification Policy

Maus-Tec LLC, doing business as Maus-Tec Electronics


Our Commitment

Maus-Tec is committed to protecting the personal information of our customers, creators, and users. If a security incident results in unauthorized access to personal data, we will notify affected individuals promptly, honestly, and with actionable information.

This policy applies to all Maus-Tec services, including our storefront (maustec.io), Maus-Hub, Maus-Link, OTA update services, and any future services operated by Maus-Tec LLC.


1. What Constitutes a Breach

A data breach is any confirmed unauthorized access to, acquisition of, or disclosure of personal information that compromises the security, confidentiality, or integrity of that information.

Includes:

Does NOT Include:


2. Notification Timeline

2.1 Our Commitment

Maus-Tec will notify affected individuals within 72 hours of confirming a data breach, consistent with GDPR requirements and Illinois data breach notification law (815 ILCS 530/).

2.2 Timeline Breakdown

PhaseTimeframeAction
DetectionOngoingAutomated monitoring and logging of all services
ConfirmationAs soon as possibleDetermine scope and nature of the incident
ContainmentImmediately upon confirmationStop ongoing unauthorized access
AssessmentWithin 24 hoursDetermine what data was affected and who is impacted
NotificationWithin 72 hours of confirmationNotify affected individuals
Regulatory NotificationWithin 72 hoursNotify relevant data protection authorities (GDPR, state AGs)
Follow-UpOngoingProvide updates as investigation continues

2.3 Delayed Notification

Notification may be delayed beyond 72 hours only if:

If notification is delayed, we will explain the reason for the delay in the notification.


3. Who We Notify

3.1 Affected Individuals

Every person whose personal information was compromised will receive direct notification via:

3.2 Regulatory Authorities

We will notify the following authorities as required:

AuthorityWhen RequiredTimeframe
EU Data Protection AuthoritiesIf EU residents affected (GDPR Art. 33)Within 72 hours
Illinois Attorney GeneralIf Illinois residents affected (815 ILCS 530/)Without unreasonable delay
Other US State AGsPer state-specific breach notification lawsPer state requirements
Payment processor (Stripe)If payment data is involvedImmediately

3.3 Service Providers

If the breach involves data shared with or processed by third-party service providers, we will notify those providers so they can take appropriate action on their end.


4. What the Notification Will Include

Every breach notification will include, at minimum:

  1. What happened — A plain-language description of the incident
  2. When it happened — The date or date range of the breach
  3. What information was involved — Specific types of data that were compromised (e.g., email addresses, mailing addresses, purchase history)
  4. What we are doing — Steps we have taken and are taking to contain the breach and prevent recurrence
  5. What you can do — Actionable steps you can take to protect yourself (e.g., change passwords, monitor accounts, enable 2FA)
  6. How to contact us — Direct contact information for questions

We will not hide behind vague language. If we know the specific data that was compromised, we will tell you exactly what it was.


5. What We Will NOT Do


6. Remediation

Depending on the nature and severity of the breach, Maus-Tec will provide appropriate remediation, which may include:


7. Prevention

Maus-Tec takes the following measures to prevent breaches:


8. Incident Response Team

Maus-Tec’s incident response is led by the company’s technical leadership. For a company of our size, this means the founder and senior technical staff are directly involved in all breach assessment and response decisions.


9. Post-Incident Review

After every confirmed breach, we will:

  1. Conduct a root cause analysis
  2. Implement corrective measures to prevent recurrence
  3. Update our security practices and this policy as needed
  4. Publish a post-incident summary (with personal details redacted) within 30 days of resolution

This policy is designed to comply with:


Contact

To report a security vulnerability or suspected breach:

Email: info@maus-tec.com Subject line: Security Incident Report

We take all reports seriously and will acknowledge receipt within 24 hours.