Since 2006, our mission at Teel Technologies is to provide the best tools, training and services for professionals tasked with investigating mobile devices and digital media. With a focus on the total lab establishment, training in all skill levels, as well as applying our extensive experience and expertise in our services offering, we provide a comprehensive approach to all clients, to meet their specific requirements.
Our unyielding credo of maintaining the highest level of integrity and quality ensures our customers are provided with the best service and support in the industry. Teel Technologies is registered with the Small Business Administration.
Physical Address: 22 Knight Street Norwalk, CT 06851
Website Address: https://www.teeltech.com
What personal data we collect and why we collect it
Contact form submissions are kept for customer service purposes and for quote requests. We do not use the information submitted through them for marketing purposes.
If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Google will use this information on our behalf to evaluate the use of our online offer by users to compile reports on the activities within this online offer and to provide us with further services related to the use of this online offer and the internet usage. In this case, pseudonymous usage profiles of the users can be created from the processed data.
We only use Google Analytics with activated IP anonymization. This means that the IP address of the users will be shortened by Google within member states of the European Union or in other contracting states of the Agreement on the European Economic Area. Only in exceptional cases will the full IP address be sent to a Google server in the USA and shortened there.
The IP address submitted by the user’s browser will not be merged with other data provided by Google. Users can prevent the storage of cookies by setting their browser software accordingly; Users may also prevent the collection by Google of the data generated by the cookie and related to their use of the online offer as well as the processing of this data by Google by downloading and installing the browser plug-in available under the following link: https://tools.google.com/dlpage/gaoptout?hl=en.
Incidentally, the personal data will be anonymized or deleted after a lapse of 26 months.
Opt-out for Google Analytics
Who we share your data with
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Your contact information
Phone: (203) 855-5387
How we protect your data
We use an SSL certificate to encrypt data used during transactions. SSL stands for Secure Sockets Layer, a global standard security technology that enables encrypted communication between a web browser and a web server. It is utilized by millions1 of online businesses and individuals to decrease the risk of sensitive information (e.g., credit card numbers, usernames, passwords, emails, etc.) from being stolen or tampered with by hackers and identity thieves. In essence, SSL allows for a private “conversation” just between the two intended parties.
What data breach procedures we have in place
We use Wordfence to alert when core files have been altered or when data has been leaked. This alert goes to the site administrator who then reports to the top-level management.