← Back to Home

ketch.com Scam Check: 85/100 Trust | ScamMinder

Website: ketch.com

Screenshot of ketch.com

Safety Score

85/100
✓ Safe Website

This website appears legitimate based on AI analysis.

AI Analysis Results

Category: Technology
About this website:

Detailed Analysis Report: Is Ketch.com Safe and Legit? Website Overview and Purpose Ketch is a data privacy management software platform designed to help businesses manage and comply with data privacy regulations. It offers tools for consent management, data subject requests, and risk assessments, aiming to empower organizations to leverage data responsibly while ensuring compliance with laws like GDPR and CCPA. Content Quality and User Experience Key Experience Highlights Intuitive interface that simplifies the management of privacy preferences and compliance tasks. Comprehensive resources including blogs, case studies, and regulatory compliance hubs. Clear call-to-action buttons for signing up and requesting demos, enhancing user engagement. Responsive design that adapts well to various devices, ensuring accessibility for all users. Claims Verification and Red Flags ⚠️ Red Flags Detected No significant red flags detected. The website presents clear information about its services and maintains a professional appearance. ⚠️ Caution Points Users should verify the specific features and pricing details before committing to a subscription. Ensure to read the privacy policy to understand data handling practices. Security Note: The website uses a valid SSL certificate issued by WE1, ensuring secure connections. Legitimacy and Reputation Assessment The domain has been operational for 25 years , indicating a long-standing presence in the market. It is hosted in San Francisco, United States , with a clean security record on VirusTotal, showing no malicious detections. The website has a professional design and provides extensive information about its services and compliance practices. Final Verdict and Recommendations Conclusion: Ketch.com is a legitimate and safe platform for businesses looking to manage data privacy compliance. Users can confidently explore its offerings. Best practices include reviewing the privacy policy and understanding the features before signing up for services.

Risk Assessment: safe
📊 Analysis Reasons:
  • [DOMAIN HISTORY] Domain registered for 25 years, indicating stability and legitimacy.
  • [SECURITY] SSL certificate issued by WE1 is valid and ensures secure connections.
  • [REPUTATION] No malicious detections on VirusTotal, indicating a clean security record.
  • [CONTENT QUALITY] Professional design with clear information about services and compliance.
  • [TRUST SIGNALS] Extensive resources and documentation available for users.
Score Source: openai
AI Confidence: high

Technical Details

Data Privacy Management Software | Easy Privacy Compliance\n\n\n\n\n\n\n\n\n
\n\n\n\n
Growing tired of OneTrust? Migrate seamlessly with Ketch Switch
\"\"
\"\"\"\"
\"Ketch
Based on 100+ reviews on
THE #1 AI PRIVACY COMPANY

power your business
WITH AI-READY DATA

Ketch is modern privacy management software that keeps your data clean, permissioned, and AI-ready. Power growth without regulatory or reputational risk.

Get a Demo
\"Ketch
Take a Tour
\n\n\n\n
\"purple\"buffalo\"Paramount\"forbes\"dollar\"whiteclaw\"dunkin\"imax\"ziprecruiteris\"seatgeek\"pret\"arby's\"inchcape\"the\"betterment\"chipotle\"demandbase\"grindr\"hasbro\"baskin\"purple\"buffalo\"Paramount\"forbes\"dollar\"whiteclaw\"dunkin\"imax\"ziprecruiteris\"seatgeek\"pret\"arby's\"inchcape\"the\"betterment\"chipotle\"demandbase\"grindr\"hasbro\"baskin
\"purple\"buffalo\"Paramount\"forbes\"dollar\"whiteclaw\"dunkin\"imax\"ziprecruiteris\"seatgeek\"pret\"arby's\"inchcape\"the\"betterment\"chipotle\"demandbase\"grindr\"hasbro\"baskin\"purple\"buffalo\"Paramount\"forbes\"dollar\"whiteclaw\"dunkin\"imax\"ziprecruiteris\"seatgeek\"pret\"arby's\"inchcape\"the\"betterment\"chipotle\"demandbase\"grindr\"hasbro\"baskin
\"Ketch
Take a Tour

DATA PRIVACY SOFTWARE
FOR THE AI ERA

Any vendor can collect consent. Ketch actually connects it across all of your data systems
  • Adaptive compliance with every data law.
  • Customizable banners and experiences.
  • Modern, lightweight tag infrastructure.
  • APIs to connect consent to your data systems.
30%
Productivity gain preparing for new data privacy and AI regulations.
\"A
Free your stakeholders from manual DSR tasks. Ketch saves time with smart automation
  • Drag-and-drop DSR workflow builder.
  • Buildable, as-you-need-it automation.
  • APIs and webhooks to connect data systems.
  • Reporting and queue intelligence.
  • Support for Apple in-app account deletion.
+95%
Productivity gain vs manual DSR workflows.
\"data
Stop the never-ending scanning. Identify risks immediately with AI-powered system discovery
  • Eliminate static spreadsheets for software.
  • AI-powered discovery provides fast insights.
  • Real-time data mapping for ROPA creation.
  • Granular data visibility down to individual cells.
+70%
Productivity gain vs manual survey-based data discovery.
\"data
Assessments are tedious. Make them easier with real-time data insights and collaboration tools
  • Customizable templates for DPIAs, PIAs, and TIAs.
  • Natively integrated with data mapping software to pre-populate system data.
  • In-platform collaboration tools for enrolling departmental stakeholders.
+30%
Productivity gain vs manual workflows.
\"example
Support your digital customer experience with easy-to-use, on-brand preference selection
  • Responsible capture of first party data.
  • Give customers complete control over communication preferences.
  • Enforce customer preferences across your entire data ecosystem
38:1 ROI
$38 ROI for each $1 spent on preference and consent management (DMA).
\"example

AI-first privacy management software for the enterprise

\"Frontier
“Personalized service and customer care. The support received when onboarding and during implementation make the set-up process easy and interactive. It's really nice to work with a live person who is dedicated to your needs. One of the reasons we chose Ketch was it was easy to use and training of personnel is a breeze.”
Mimi SchaeferLead Data Privacy and Vendor Risk Management Programs
\"Frontier
“Setting up our Ketch instance from an administrative perspective was extremely user-friendly. It made the onboarding process a breeze, allowing us to hit the ground running”
Jack DukeshererOperations Manager
\"Frontier
“As an attorney, I find Ketch Consent Management invaluable for making necessary privacy risk adjustments quickly and confidently, without needing extensive technical knowledge. This level of control and ease of use is rare in the market.”
John DombrowskiAssociate General Counsel for Compliance and IP
Get a Demo
\"right

Our customers see 12x ROI

Compared to legacy, cookie-based data privacy management solutions.

\"Olly
“We spoke with other vendors who struggled to understand the complexity of our data collection and tracking challenges. It felt so good to speak with Ketch. The team immediately recognized and empathized with our challenges.”
Jennifer PetersDirector of DTC, Martech, & Digital Compliance
\n
0:09
\"time
Many Ketch customers make the transition from legacy solutions to Ketch in as little as 2-4 weeks.
\"ketch
Ketch onboarding support includes Slack communication, onboarding checklists, and thorough documentation.
\"Seatgeek
“Ketch offers a streamlined way of ensuring privacy compliance. It enables you to ensure compliance across the board with respect to privacy and other similar regulatory requirements.”
Tim JanasSenior Corporate Counsel
\n
\"\"
Ketch includes pre-built templates for every major privacy and AI regulation: GDPR, CCPA/CPRA, and more.
\"\"
Privacy leaders say that using Ketch helps them build better relationships with marketing and data stakeholders.
\"Seatgeek
“Building partner and client relationships is the foundation of our business growth. Thanks to Ketch, we’re making good on the promises in our privacy policy and positioning privacy as a growth lever.”
Brian HickieChief Information Officer
\n
\"face
Are customer loyalty and reward programs critical to your growth? Ketch enables you with permissioned data to power these programs.
\"secured
Sharing data with partners or advertisers? Ketch helps you ensure this data is responsibly-gathered.
\"privacy
\"Example
INTEGRATIONS

PRE–BUILT APIS WITH 1,000+ SYSTEMS, APPS and MODELS

Our Integrations
\"right
\"Example

Why do brands
work with Ketch?

Access to unmatched experts in privacy, data, and customer service.

\"Max
“Data privacy is at the intersection of three uniquely complex disciplines: law, data management, and advertising. We’re solving problems with the whole picture in mind.”
Max AndersonCo-Founder, Head of Product
\"Ketch
Talk to Max
\"Kara
“In the most complex customer data environments, we make Ketch deployment easy with high-touch communication and support.”
Kara KennedyCustomer Success Manager
\"Ketch
Talk to Kara
\"Sam
“Helping our customers solve privacy problems within complex data ecosystems is a challenging, rewarding task.”
Sam AlexanderFounding Engineer
\"Ketch
Talk to Sam
\"Prachi
“Building privacy software requires curiosity. No one else is tackling privacy management with this level of purpose-built automation and data connectivity.”
Prachi KhandekarSoftware Engineer
\"Ketch
Talk to Prachi
Slide 4 of 4.
\"\"
\"\"
Inability to keep up with changing regulations
Flexible compliance with every law

Comply

Obnoxious cookie banners on every channel
Customized privacy experiences
\"\"
No visibility into data initiatives and risks
Complete insight of your data footprint

Control

Manual, point-in-time spreadsheets
Automated discovery and classification
\"\"
Repetitive privacy tasks impacting important work
Automated workflows to support business needs

Connect

Lack of enforcement in business systems
Consent signals connected to every system and app
\"\"
Start for free now

Get started
with Ketch
in minutes

Achieve day one privacy compliance and add features as you go.

Sign Up For Free
\"right
\n\n\n\n\n\n\n","screenshot":"https://cdn.scamminder.com/include/uploads/2025/11/ketch.com-20251112-103155.webp","loadTimeInSeconds":8.001,"title":"Data Privacy Management Software | Easy Privacy Compliance","keywords":"","description":"Ketch's privacy management software, with its Data Permissioning privacy platform, helps leverage data responsibly for deeper customer engagement and growth.","links":["https://ketch.com/privacy-policy","https://www.ketch.com/?utm_campaign=customer%20banner&utm_source=ketchcookiebanner&utm_medium=banner&org=switchbitcorp","https://www.ketch.com/onetrust-alternative","https://ketch.com","https://ketch.com/platform/overview","https://ketch.com/platform/consent-management","https://ketch.com/platform/dsr-automation","https://ketch.com/platform/data-mapping","https://ketch.com/platform/ai-governance","https://ketch.com/platform/marketing-preference-management","https://ketch.com/platform/risk-assessments-and-reporting","https://ketch.com/platform/data-sentry","https://www.ketch.com/ketch-free-cookie-banner?utm_campaign=plg&utm_source=website&utm_medium=subnav","https://ketch.com/solutions/legal-teams","https://ketch.com/solutions/marketing-teams","https://ketch.com/solutions/engineering-teams","https://ketch.com/solutions/retail-ecommerce","https://ketch.com/solutions/technology","https://ketch.com/solutions/communications-and-media","https://ketch.com/solutions/financial-services","https://ketch.com/solutions/website-tracker-scanning","https://ketch.com/solutions/progressive-consent","https://ketch.com/solutions/do-not-sell-or-share","https://ketch.com/integrations","https://ketch.com/onetrust-alternative","https://ketch.com/solutions/identity-management","https://ketch.com/solutions/privacy-frameworks","https://ketch.com/solutions/enterprise-privacy-software","https://ketch.com/solutions/mid-market-privacy-software","https://ketch.com/solutions/small-business-privacy-software","https://ketch.com/blog/posts/time-brings-ease-and-automation-to-privacy-requests-with-ketch","https://ketch.com/blog","https://ketch.com/privacy-huddle","https://www.ketch.com/blog/tags/case-study","https://www.ketch.com/regulatory-compliance/general-data-protection-regulation-gdpr","https://www.ketch.com/regulatory-compliance/california-consumer-privacy-act-ccpa","https://www.ketch.com/regulatory-compliance/colorado-privacy-act-cpa","https://www.ketch.com/regulatory-compliance/virginia-consumer-data-protection-act-vcdpa","https://ketch.com/regulatory-compliance","https://ketch.com/practical-guide-to-privacy","https://ketch.com/pricing","https://ketch.com/vision-and-mission","https://ketch.com/about","https://ketch.com/news","https://ketch.com/partnerships","https://ketch.com/careers","https://ketch.com/contact-us","https://www.ketch.com/resources/dirty-data-broken-ai-study","https://ketch.com/request-a-demo","https://www.ketch.com/ketch-free-cookie-banner?utm_campaign=plg&utm_source=website&utm_medium=hp","https://www.ketch.com/request-a-demo","https://ketch.com/ketch-free-cookie-banner","https://ketch.com/osano-alternative","https://ketch.com/trustarc-alternative","https://ketch.com/transcend-alternative","https://ketch.com/privado-alternative","https://ketch.com/thought-leadership","https://ketch.com/developers","https://ketch.com/privacy-promise","https://ketch.com/terms-of-service","https://www.ketch.com/sitemap.xml"],"scraper_engine":"Puppeteer (Enhanced)","screenshot_size_bytes":151305,"domSignals":{"lang":"en","canonical":"https://www.ketch.com/","hasLogin":false,"hasCheckout":false,"hasContact":true,"hasPolicy":true,"ogTitle":"Data Privacy Management Software | Easy Privacy Compliance","ogSite":"","ogDescription":"Ketch's privacy management software, with its Data Permissioning privacy platform, helps leverage data responsibly for deeper customer engagement and growth."},"formRisks":[],"httpStatus":200,"finalUrl":"https://www.ketch.com/","htmlLength":374992,"textLength":11102,"lowEvidenceRecovery":false,"parkingDetection":{"isParked":false},"otherpages":{"internalLinks":["https://ketch.com/privacy-policy"],"internalPageContents":["Growing tired of OneTrust? Migrate seamlessly with Ketch Switch\nSign Up Free\nGet a Demo\nPRIVACY POLICY\nLast updated and effective as of: August 1st, 2025\n1. Welcome to Ketch!\n\nKetch Kloud, Inc. (“Ketch”, “we”, or “us”) is a software company that sells tools for companies to understand, implement, and manage their privacy obligations to their consumers and to control how they store and process data to make compliance with those obligations easy.\n\nThis Privacy Policy applies to your use of Ketch’s tools, services, and platform, including any associated Ketch mobile or desktop applications, ketch.com and other Ketch websites (collectively “the Services”, and any websites specifically, the “Websites”), as well as your relationship with Ketch.\n\n‍By accessing or using the Services, you are agreeing to this Privacy Policy and concluding a legally binding agreement between yourself and Ketch.\n\nIf you do not agree with this Privacy Policy, please do not access or use the Services.\n\n‍You should read our Privacy Policy in full to understand what data we collect, how we use it, and the circumstances where we may share it.\n\nThis Privacy Policy may change over time. If we make changes to it, we will post the modified Privacy Policy on our website here. We encourage you to visit this page periodically to learn of any updates.\n\n2. What Information We Collect\n\nWe collect personal information (also referred to as personal data) and non-personal information (e.g., aggregated data or de-identified data) from you when you use our Services. We may receive this information from you directly, through automated means, or from third parties.\n\n‍Information you Provide Us: We receive personal information about you that you choose to provide to us, including when you create an account; search for or purchase our offerings; configure settings; seek employment or business opportunities with us, communicate with us; or otherwise use our Services.\n\n‍Information Collected Automatically:  When you interact with our Services or use a Ketch application, we may collect analytic information about your device or web browser.  This may include information such as:\n\nTechnical information, such as your IP address, device ID, browser type, operating system, or language\nUsage information, such as the pages visited or features used;\n\nInformation from Third Parties:  We may receive information about you from public or other third party sources, such as our service providers or partners.  For example, we may receive marketing, sales generation, or recruitment information.  \n\n3. How We Use Your Personal Information\n\nWe collect, use, process, and store your personal information to:\n\nProvide, maintain, and improve our Services.\nCustomize your experience and respond to your inquiries.\nEvaluate job applications and manage recruitment.\nAnalyze usage for internal business purposes.\nComply with legal and contractual obligations.\nConduct research and product development.\nTo process data with machine learning algorithms, which helps us build, personalize, and improve the Services.\nTo detect, investigate and prevent harmful, fraudulent, and illegal activity and security issues and protect the rights and property of Ketch and others.\nTo enable communications through the Services.\n\nTo contact you about additional Ketch services you might be interested in, unless you opt-out (see “How to Opt-Out of Email Communications”).\n\nAs required by applicable law, legal process, or regulation.\n\nFor purposes as disclosed at the time you provide your information, with your consent, and as further described in this Privacy Policy.\n\n\nWe may also use de-identified and aggregated data to understand trends, improve our offerings, or for benchmarking purposes.  We will not attempt to re-identify any de-identified data.  \n\nWe do not use your personal information for decisions that produce legal or similarly significant effects solely based on automated processing, unless you have explicitly consented or as permitted by law.\n\n4. When We May Share Your Personal Information\n\n\nWe may only share your personal information with third parties under the following circumstances:\n\n\nService Providers: with our trusted agents and service providers that are contractually engaged to provide us with services, such as cloud hosting, analytics, marketing, payment processing, and customer support.  These companies are obligated by contract to safeguard any personal information they receive from us.  \n\nBusiness Transfers and Partners: with any of our affiliated companies, including a parent company, subsidiaries, joint ventures, or other companies under common control with us.  In the event of a merger, acquisition, or sale of assets, your information may be transferred to the acquiring entity.  \n\nConsent-Based:  With your consent.\n\nLegal Proceedings:  If we believe that disclosure is reasonably necessary to comply with a law, regulation, valid legal process (e.g., subpoenas or warrants served on us), or governmental or regulatory request to protect the security or integrity of the Services; and/or to protect the rights, property, or safety of Ketch, its employees, customers, users, or others. If we are going to release your data, we will do our best to provide you with notice in advance by email, unless we are prohibited by law from doing so.\n\n5. When We Use and Share Non-Personal Information\n\n\nWe use and share your non-personal information in a variety of ways, including to improve the Services.\n\n\n6. Cookies and Tokens\n\n\nWe use tracking technologies, such as cookies, local storage, and pixel tags as described further below.\n\nCookies\nCookies may be set and accessed on your computer. Upon your first visit to the Services, a cookie will be sent to your computer that uniquely identifies your browser. \"Cookies\" are small files containing a string of characters that is sent to your computer's browser and stored on your device when you visit a website. You can reset your browser to refuse all cookies or to indicate when a cookie is being sent; however, if you reject cookies, you may not be able to sign into the Services or take full advantage of our Services. Additionally, if you clear all cookies on your browser, you may need to reset any privacy settings in your browser which are stored in cookies.\n\nOur Services use the following types of cookies for the purposes set out below:\n\n\nType of Cookie\n\n\nPurpose\n\n\nAnalytics and Performance Cookies\n\n\nThese cookies are used to collect information about traffic to our Services and how users use our Services. The information gathered does not identify any individual visitor, but rather enables us to count the number of unique visitors. It includes the number of visitors to our Services, the websites that referred them to our Services, the pages that they visited on our Services, what time of day they visited our Services, whether they have visited our Services before, and other similar information. We use this information to help operate our Services more efficiently, to gather broad demographic information and to monitor the level of activity on our Services. We use Google Analytics for this purpose. Google Analytics uses its own cookies. It is only used to improve how our Services works. You can find out more information about Google Analytics cookies here. You can find out more about how Google protects your data here. You can prevent the use of Google Analytics relating to your use of our Services by downloading and installing the browser plugin available via this link. Please note that our transfer of information to Google might be deemed a sale in certain jurisdictions. Where applicable, we will provide you a notice of our transfer of information and provide you with the ability to opt-out of such sale or sharing of information.\n\n\nEssential Cookies\n\n\nThese cookies are essential to provide you with services available through our Services and to enable you to use its features. For example, they allow you to log in to secure areas of our Services and help the content of the pages you request load quickly. Without these cookies, the services that you have asked for cannot be provided, and we only use these cookies to provide you with those services.\n\n\nFunctionality Cookies\n\n\nThese cookies allow our Services to remember choices you make when you use our Services, such as remembering your language preferences, remembering your login details, remembering which polls you have voted in and in some cases, to show you poll results, and remembering the changes you make to other parts of our Services which you can customize. These cookies also enable us to identify you across various screens and devices as you login and use our Services, as well as enable us to work with partners to resolve your digital identities and personalize your experiences across our Services, our partners and customers, and across channels. The purpose of these cookies is to provide you with a more personal experience and to avoid you having to re-enter your preferences every time you visit our Services.\n\n\nFlash\n\n\nA Flash cookie is a data file placed on a device via the Adobe Flash plug-in that is built into or downloaded by you onto your device. Flash cookies are used for various purposes, including, without limitation, enabling a Flash feature and remembering your preferences. For more information about Flash and the privacy choices Adobe offers, visit this link. If you choose to adjust your Flash privacy settings on your device some features of the Services may not function properly.\n\n\nPixel Tags\n\n\nWe also use “pixel tags,” which are small graphic files that allow us and third parties to monitor the use of the Services and collect usage data. We may also insert pixel tags on third parties’ websites. A pixel tag can collect information such as the IP address of the computer that downloaded the page on which the tag appears; the URL of the page on which the pixel tag appears; the time (and length of time) the page containing the pixel tag was viewed; the type of browser that retrieved the pixel tag; and the identification number of any cookie previously placed by that server on your computer. We use pixel tags to collect information about your visit, including the pages you view, the links you click, and other actions taken in connection with our sites and Services and use them in combination with our cookies to provide offers and information of interest to you. We may also use pixel tags to collect data related to a website visit. Similar functionality may be enabled in a mobile app through the use of an SDK (Software Development Kit). Pixel tags also enable ad networks to serve targeted advertisements to you when you visit the Services or other websites.  Please note that our transfer of information to these third-party might be deemed a sale in certain jurisdictions. Where applicable, we will provide you a notice of our transfer of information and provide you with the ability to opt-out of such sale or sharing of information. In addition, we use a variety of other technologies that collect similar information for security and fraud detection purposes.\n\n\nYou can also find more information about cookies and how they work, what cookies have been set on your computer or mobile device and how to manage and delete them at http://www.allaboutcookies.org and http://www.youronlinechoices.com.‍\n\n\n7. How to Opt-Out of Email Communications\n\nTo stop receiving notifications or promotions, please click the unsubscribe link found at the bottom of each email. For purposes of this policy, we refer to data subjects located in the European Economic Area, United Kingdom, and Switzerland as “EEA” users. We only send marketing communications to users located in the EEA with your prior consent. Please see the section “GDPR: Information for EEA Users” below.\n\n\n8. Storage, Security and How to Remove Your Information\n\nWe use industry standard technical, administrative, and physical controls to protect your data. While we take reasonable precautions against possible security breaches, no website or internet transmission is completely secure and we cannot guarantee that unauthorized access, hacking, data loss, or other breach will never occur. We will process and store your personal information only for the period necessary to achieve the purpose of the storage, or as permitted by law.  The criteria used to determine the period of storage of information is the respective statutory retention period. After expiration of that period, the corresponding information is routinely deleted, as long as it is no longer necessary for the fulfillment of a contract or the initiation of a contract.\n\n9. De-Activating Your Account\n\nYou can choose to deactivate your account so that you are no longer viewable on the Services. You can request deactivation through the Services or by sending a message to privacy@ketch.com.\n\n\n10. Third-Party Links\n\nThe Services may contain links to and from third-party websites. If you follow a link to any of these websites, please note that these websites have their own privacy policies, which may differ substantially from ours, and that we do not accept any responsibility or liability for their activities or the content of their privacy policies.\n\n\n11. Region-Specific Disclosures\n\nCertain U.S. States (e.g., Connecticut, Colorado, California, Virginia, Utah) provide additional privacy protections for data subjects located within their jurisdictions, including: a) the right to see what data we have about you, your computer or device (i.e., the right to know), b) the right to delete the data we have about you, your computer or device (i.e., the right to delete), c) the right to correct data we have about you, your computer or device,  d) the right to opt-out of the sale or sharing of data about you, your computer or device to certain third parties (i.e., the right to opt-out from sales/sharing of your information), and e) the right to port such data to a different company. We do not discriminate against you if you exercise any of the above rights.\n\nPlease note that we may not be able to honor a right if doing so would otherwise violate applicable law. Applicable law in certain U.S. states (e.g., Colorado, Virginia) also provide you with the right to appeal to your attorney general’s office in the event that you disagree with how we honor the aforementioned rights.\n\nApplicable law in certain U.S. states also provides you with the right to opt-out of the sale or sharing of your personal information, profiling and targeted ads. We do not transfer your personal information to third parties in exchange for money or engage in profiling or targeted ads, but we may share it with certain third parties for activities like targeted advertising, marketing, and analytics, and these may be deemed a \"sale\" under applicable law. You may opt-out of sale here if you are located in a place that requires such rights.\n‍\n‍Personal Information We Collect and Disclose for a Business Purpose.  Without limiting the description of the information we collect, we collect the categories of personal information about U.S. consumers identified in the chart below.\n\nThis information is required under California law, but we think it might be helpful to all readers of this policy as it provides a fair description of the types of information collected by Ketch in most places.\n\n\nCategories of Personal Information\n\n\nExamples\n\n\nCollected in Prior 12 Months\n\n\nA. Personal and online identifiers\n\n\nA real name, alias, postal address, unique personal identifier, online identifier Internet Protocol address, email address, and account name.\n\n\nYes\n\n\nB. Personal information categories listed in the California Customer Records statute (Cal. Civ. Code § 1798.80(e))\n\n\nA name, signature, Social Security number, physical characteristics or description, address, telephone number, passport number, driver's license or state identification card number, insurance policy number, education, employment, employment history, bank account number, credit card number, debit card number, or any other financial information, medical information, or health insurance information. Some personal information included in this category may overlap with other categories.\n\n\nWe collect names, certain payment information from Customers and partners and (while not covered under this policy) social security and insurance information for our personnel.\n\n\nC. Protected classification characteristics under California or federal law\n\n\nAge (40 years or older), race, color, ancestry, national origin, citizenship, religion or creed, marital status, medical condition, physical or mental disability, sex (including gender, gender identity, gender expression, pregnancy or childbirth and related medical conditions), sexual orientation, veteran or military status, genetic information (including familial genetic information).\n\n\nNo, except as required pursuant to management of employment (covered under a different policy).\n\n\nD. Commercial or transactions information\n\n\nRecords of personal property, products or services purchased, obtained, or considered, or other purchasing or consuming histories or tendencies.\n\n\nNo\n\n\nE. Biometric information\n\n\nGenetic, physiological, behavioral, and biological characteristics, or activity patterns used to extract a template or other identifier or identifying information, such as, fingerprints, faceprints, and voiceprints, iris or retina scans, keystroke, gait, or other physical patterns, and sleep, health, or exercise data.\n\n\nNo\n\n\nF. Internet or other similar network activity\n\n\nBrowsing history, search history, information on a consumer's interaction with a website, application, or advertisement.\n\n\nWe only collect this in connection with the Website.\n\n\nG. Geolocation data\n\n\nPhysical location or movements.\n\n\nNo\n\n\nH. Sensory data\n\n\nAudio, electronic, visual, thermal, olfactory, or similar information.\n\n\nNo\n\n\nI. Professional or employment-related information\n\n\nCurrent or past job history.\n\n\nYes, only in an employment context, which is covered under a different policy.\n\n\nJ. Non-public education information (per the Family Educational Rights and Privacy Act (20 U.S.C. Section 1232g, 34 C.F.R. Part 99)).\n\n\nEducation records directly related to a student maintained by an educational institution or party acting on its behalf, such as grades, transcripts, class lists, student schedules, student identification codes, student financial information, or student disciplinary records.\n\n\nNo\n\n\nK. Inferences drawn from other personal information.\n\n\nProfile reflecting a person's preferences, characteristics, psychological trends, predispositions, behavior, attitudes, intelligence, abilities, and aptitudes.\n\n\nYes\n\n\nCategories of Sources\nWe collect the personal information identified as collected in the chart above from the following categories of sources:\n\n\nConsumers.\nCustomers.\nCollected by our Services.\n\nInferred by our Services; and\n\nService providers.\n\n\nWhy We Collect, Use, and Share Information from Data Subjects in California\nWe use and disclose the personal information identified as collected in the chart above for our commercial and business purposes, as further described in this Privacy Policy.\nThese commercial and business purposes include, without limitation:\n\n\nOur commercial purposes, which include:\n\nTo provide the Services.\n\nTo personalize the Services.\n\nTo receive and process job applications for jobs with us.\n\nTo process data with machine learning algorithms, which helps us build, personalize, and improve the Services.\n\nWith respect to Customer Data, in accordance with our contracts with our Customers.\n\nFor internal business purposes, such as to improve our Services.\n\nTo detect, investigate and prevent harmful, fraudulent, and illegal activity and security issues and protect the rights and property of Ketch and others.\n\nTo enable communications through the Services.\n\nTo contact you about additional Ketch services you might be interested in, unless you opt-out (see “How to Opt-Out of Email Communications”).\n\nOur business purposes as identified under applicable law, which include:\n\nAuditing related to our interactions with you.\n\nLegal compliance.\n\nDetecting and protecting against security incidents, fraud, and illegal activity.\n\nDebugging.\n\nPerforming services (for us or our service providers) such as account servicing, processing orders, and payments, and analytics.\n\nInternal research for technological improvement.\n\nInternal operations.\n\nActivities to maintain and improve our services.\n\nOther one-time uses.\n\n\nRecipients of Personal Information\nWe disclose, and have disclosed in the last 12 months, all of the categories of personal information identified as collected in the chart above to the categories of third parties listed below for business purposes:\n\n\nCloud computer, data storage and file storage providers;\n\nEmail marketing providers;\n\nWebsite and b2b analytics providers;\n\nCustomer relationship management, contact database vendors, data hygiene vendors, survey vendors;\n\nProject management software providers;\n\nCustomer billing systems vendors;\n\nLogin authentication providers to ensure that the logins to our systems are working efficiently; and\n\nAuditing, debugging and security vendors.\n\n\nYour California Rights Regarding Personal Information\n‍Applicable law grants data subjects with certain rights with respect to the personal information collected by businesses. You may exercise the following rights regarding your personal information, subject to certain exceptions and limitations. For example, we tailor the rights made available to you based on applicable law in the place where our systems believe your computer or device is currently located:\n\n\nFor certain categories of personal information, the right to request a list of what personal information (if any) we disclosed to third parties for their own direct marketing purposes in the preceding calendar year and the names and addresses of those third parties.\n\nThe right to know the categories and specific pieces of personal information we collect, use, disclose, and sell about you, the categories of sources from which we collected your personal information, our purposes for collecting or selling your personal information, the categories of your personal information that we have either sold or disclosed for a business purpose, and the categories of third parties with which we have shared personal information;\n\nThe right to request that we delete the personal information we have collected from you or maintain about you.\n\nThe right not to receive discriminatory treatment for the exercise of the privacy rights conferred by applicable law.\n\n\nTo exercise any of the above rights, please contact us using the following information and submit the required verifying information, as further described below:\n\n\nManage your privacy preferences here. (Note: we tailor your privacy preferences based on applicable law in the place where our systems believe your computer or device is currently located).\n\nBy email at privacy@ketch.com.\n\nBy phone at (888) 265-6736\n\nBy mail at Ketch Kloud, Inc., Attn: Privacy, 23 Geary Street, Suite 600, San Francisco, CA 94108.\n\n\nVerification Process and Required Information\nWe may need to request additional information from you to verify your identity or understand the scope of your request, although you will not be required to create an account with us to submit a request or have it fulfilled. For example, we may require you to provide, at a minimum, at least two data points that we determine to be reliable for the purpose of verifying your identity. We will then typically attempt to match the identifying information provided by you to the personal information already maintained by us to verify the request. If you have a password protected account on the Services, we may verify your identity through the existing authentication practices for your account, in which case we will require you to re-authenticate yourself before we disclose or delete your personal information.\n\nAuthorized Agent\nYou may designate an authorized agent to make a data subject request on your behalf by verifying your identity, as described above, and providing written permission for the authorized agent to act on your behalf.\n\nNon-Discrimination\nKetch will not discriminate against a user because the user exercised any of the user’s rights described above or afforded to it under applicable data privacy law.\n\n\n12. Nevada Privacy Rights\n\nThis section, which supplements the rest of this Privacy Policy, applies to residents of Nevada.\n\nUnder Nevada law, Nevada residents may submit a request directing us not to make certain disclosures of personal information we maintain about them.\n\nTo exercise this right, please contact us:\n\nBy email at privacy@ketch.com.\n\n13. International Data Transfers for EU, UK Swiss and Brazil Individuals\n\nPersonal data collected through our Services will be transferred to and stored by us in the United States; therefore, your personal data will be processed outside your jurisdiction in a country that is not currently subject to an adequacy decision by the European Commission, and that may not provide the same level of data protection as your jurisdiction, such as the EEA. We ensure that the recipient of your personal data offers an adequate level of protection and security, for instance by entering into the appropriate back-to-back agreements and, if required, standard contractual clauses or alternative mechanism for the transfer of data as approved by the European Commission (Art. 46 GDPR) or other applicable regulator.\n\nKetch complies with the EU-U.S. Data Privacy Framework program (EU-U.S. DPF), the UK Extension to the EU-U.S. DPF, and the Swiss-U.S. Data Privacy Framework program (Swiss-U.S. DPF) as set forth by the U.S. Department of Commerce. Ketch has certified to the U.S. Department of Commerce that it adheres to the EU-U.S. Data Privacy Framework Principles (EU-U.S. DPF Principles) with regard to the processing of personal data received from theEuropean Union in reliance on the EU-U.S. DPF and from the United Kingdom (and Gibraltar) in reliance on the UK Extension to the EU-U.S. DPF.  Ketch has certified to the U.S. Department of Commerce that it adheres to the Swiss-U.S. Data Privacy Framework program Principles (Swiss-U.S. DPF Principles) with regard to the processing of personal data received from Switzerland in reliance on the Swiss-U.S. DPF.  If there is any conflict between the terms in this privacy policy and the EU-U.S. DPF Principles and/or the Swiss-U.S. DPF Principles, the Principles shall govern. To learn more about the Data Privacy Framework (DPF) program, and to view our certification, please visit https://www.dataprivacyframework.gov/. \n\nPursuant to the Data Privacy Frameworks, EU, UK, and Swiss individuals have the right to obtain our confirmation of whether we maintain personal information relating to you in the United States. Upon request, we will provide you with access to the personal information that we hold about you. You may also correct, amend, or delete the personal information we hold about you. An individual who seeks access, or who seeks to correct, amend, or delete inaccurate data transferred to the United States under the Data Privacy Frameworks, should direct their query to privacy@ketch.com. If requested to remove data, we will respond within a reasonable timeframe. \n\nWe will provide an individual opt-out choice, or opt-in for sensitive data, before we share your data with third parties other than our agents, or before we use it for a purpose other than which it was originally collected or subsequently authorized. To request to limit the use and disclosure of your personal information, please submit a written request to privacy@ketch.com.  \n\nIn the context of an onward transfer, Ketch is responsible for the processing of personal data it receives under the DPF Principles and subsequently transfers to a third party acting as an agent on its behalf. Ketch shall remain liable under the DPF Principles if its agent processes such personal data in a manner inconsistent with the DPF Principles, unless the Ketch proves that it is not responsible for the event giving rise to the damage. \n\nIn certain situations, we may be required to disclose personal data in response to lawful requests by public authorities, including to meet national security or law enforcement requirements. \n\nIn compliance with the Data Privacy Framework Principles, Ketch commits to resolve complaints about your privacy and our collection or use of your personal information transferred to the United States pursuant to the DataPrivacy Frameworks. European Union, United Kingdom, and Swiss individuals with DPF inquiries or complaints should first contact Ketch by email at privacy@ketch.com.  \n\nKetch has further committed to refer unresolved privacy complaints under the DPF Principles to an independent dispute resolution mechanism, Data Privacy Framework Services, operated by BBB National Programs. If you do not receive timely acknowledgment of your complaint, or if your complaint is not satisfactorily addressed, please visit https://bbbprograms.org/programs/all-programs/dpf-consumers/ProcessForConsumers for more information and to file a complaint. This service is provided free of charge to you.\n\nIf your  DPF complaint cannot be resolved through the abovechannels, under certain conditions, you may invoke binding arbitration for someresidual claims not resolved by other redress mechanisms.  See https://www.dataprivacyframework.gov/s/article/G-Arbitration-Procedures-dpf?tabset-35584=2. \n\nThe Federal Trade Commission has investigation and enforcement authority over our compliance with the DPF Principles. \n\nIf you believe we have not respected your rights or otherwise not handled data correctly, then we encourage you to contact us directly and wewill do everything possible to help. \n\nHowever, where you still have a complaint, then you have theright to raise the matter with the Supervisory Authority (or data protection agency) in your country for resolution.\n\n\n14. GDPR/LGPD: Information for EEA Users\n\nThis section applies to our European Economic Area (“EEA”) users. For purposes of this privacy policy, UK, Swiss and Brazil users are treated the same as EEA users.\n\nIndividuals located in the EEA have certain rights in respect of your personal data, including:\n\nThe right of access to your personal data.\n\nThe right to correct or rectify any inaccurate personal data.\n\nThe right to restrict the processing of personal data\n\nThe right to object to processing of personal data;\n\nThe right to erase your personal data;\n\nThe right to personal data portability; and\nThe right to complain to a supervisory authority.\n\n\n\nAs a Ketch user:\n\n\nWe rely on your consent as a lawful basis for processing personal data to provide you with marketing or promotional communications.\n\nWe process personal data in order to provide you with Services as requested by you or to perform our contract with you as described in this document, including:\n\nTo enable the Services to function as expected; and\n\nTo communicate with you in response to customer service inquiries and to deliver non-promotional, service-related emails.\n\nAdditionally, we process personal data based on our “legitimate interests” in providing you the Services including:\n\nTo protect against fraud.\n\nNetwork and information security; and\n\nTo offer the Services.\n\n\n\nIn some cases, Ketch may process personal data pursuant to a legal obligation or to protect your vital interests or those of another person.\n\nKetch will offer EEA, UK, Brazil and Swiss individuals whose personal data has been transferred to us the opportunity to choose whether the personal data we have received may be used or disclosed for a purpose other than the purpose for which it was originally collected or subsequently authorized by the individual. An individual may opt-out of such uses or disclosures of their personal data by contacting us at privacy@ketch.com.\n\n\n15. Exercising Rights, Contacting Us and Accessing Your Information\n\nKetch users may exercise their rights regarding their personal information as follows:\n\n\nManage your privacy preferences here. (Note: we tailor your privacy preferences based on applicable law in the place where our systems believe your computer or device is currently located).\n\nBy email at privacy@ketch.com\n\nYou may withdraw your consent to receive marketing or promotional communications at any time by clicking the “unsubscribe” link found within Ketch email updates and changing your contact preferences. Please note, you will continue to receive essential account-related information, even if you unsubscribe from promotional emails.\n\n\n\nMatt George is Ketch’s worldwide data protection officer; and he may be contacted at dpo@ketch.com.\n\n\n\nVeraSafe has been appointed as Ketch's representative in the European Union and in the United Kingdom for data protection matters, pursuant to Article 27 of the General Data Protection Regulation of the European Union. If you are unable to reach Ketch as otherwise described in this section, VeraSafe can be contacted on matters related to the processing of personal data under GDPR. To make such an inquiry, please contact VeraSafe using this contact form or via telephone at +420 228 881 031 (Netherlands) or +44 (20) 4532 2003 (UK).\n\nAlternatively, VeraSafe can be contacted at:\nVeraSafe Netherlands BV,\nKeizersgracht 555,\n1017 DR Amsterdam,\nNetherlands\n‍\nor\n\nVeraSafe United Kingdom Ltd.\n37 Albert Embankment\nLondon SE1 7TL\nUnited Kingdom\n\nIf you have any questions about our privacy practices, or if you wish to make a request, please contact us at either:\nKetch Kloud, Inc.\nAttn: Privacy\n140 New Montgomery, 4th floor\nSan Francisco, CA 94105\nor\nprivacy@ketch.com‍\n\n\n16. Children's Privacy\n\nWe do not knowingly collect personal data about children. Our websites and systems are not designed for use by individuals under the age of 16, and in particular are not designed for children under the age of 13. If we learn we have collected or obtained personal data of someone under 13, we will delete that information from our database. If you believe that this has occurred, please contact us at privacy@ketch.com.\n\n\nPLATFORM\nKetch Platform\nKetch Free\nPricing\nPRODUCTS\nConsent management\nPOPULAR\nDSR automation\nData mapping\nMarketing preference management\nRisk assessments & reporting\nData sentry\nNEW\nAI governance\nSOLUTIONS\nFor retail & ecommerce\nFor technology\nFor communications & media\nFor financial services\nCOMPARE\nOneTrust\nPOPULAR\nOsano\nTrustArc\nTranscend\nPrivado\nRESOURCES\nBlog\nNavigate privacy laws\nGuides & videos\nENGAGE\nDevelopers\nDocumentation ↗\nIntegrations\nPartners\nCOMPANY\nAbout\nNews\nPrivacy promise\nCareers\nWE'RE HIRING\nContact Us\n140 New Montgomery,\nSan Francisco, CA 94105\n\n+1 415-737-6489\n\n\nCopyright © 2025 Ketch Kloud, Inc.\nAll rights reserved.\nTrust center\nPrivacy Policy\nTerms of Service\nYour privacy choices\nDo not sell or share my personal information\nSitemap"]}},"webrisk":{"overall_risk":"unknown","threats":[],"malware":false,"social_engineering":false,"unwanted_software":false,"error":"Request failed with status code 400"},"metadata":{"preflight":{"bestUrl":"https://ketch.com","probes":[{"url":"https://ketch.com","ok":true,"status":200},{"url":"https://www.ketch.com","ok":true,"status":200},{"url":"http://ketch.com","ok":true,"status":200}],"zyteCheck":null},"best_url":"https://ketch.com","phase_a_duration_ms":3501,"phase_b_duration_ms":17645,"early_exit_reason":null,"tls_warnings":[],"zyte_preflight":null,"low_evidence_recovery":false},"virustotal":{"malicious":0,"suspicious":0,"total":98,"scanned":true},"archive_gap":{"suspicious":1,"details":{"domain_age_days":0,"total_snapshots":307,"unique_snapshots":228,"snapshot_span_days":5611,"first_snapshot":"2010-05-12","last_snapshot":"2025-09-21","consistency_analysis":{"avg_snapshots_per_month":3.65,"months_with_snapshots":84,"gap_count":101,"longest_gap_months":13,"longest_recent_gap_months":1},"yearly_activity":[{"year":2020,"count":13,"months_active":2,"active":true},{"year":2021,"count":35,"months_active":12,"active":true},{"year":2022,"count":50,"months_active":12,"active":true},{"year":2023,"count":40,"months_active":9,"active":true},{"year":2024,"count":75,"months_active":11,"active":true},{"year":2025,"count":64,"months_active":9,"active":true}],"recent_gaps":{"recent_gap_count":2,"longest_recent_gap":2},"suspicious_score":1,"suspicious_reasons":["Extremely new domain (<60 days) with disproportionate coverage"]},"reasons":[]},"evidence_coverage":"90","ai_result_latest":{"flag":"no_risk","rate":85,"about":"

Detailed Analysis Report: Is Ketch.com Safe and Legit?

\n

Website Overview and Purpose

\n

Ketch is a data privacy management software platform designed to help businesses manage and comply with data privacy regulations. It offers tools for consent management, data subject requests, and risk assessments, aiming to empower organizations to leverage data responsibly while ensuring compliance with laws like GDPR and CCPA.

\n

Content Quality and User Experience

\n

Key Experience Highlights

\n\n

Claims Verification and Red Flags

\n

⚠️ Red Flags Detected

\n

No significant red flags detected. The website presents clear information about its services and maintains a professional appearance.

\n

⚠️ Caution Points

\n\n

Security Note: The website uses a valid SSL certificate issued by WE1, ensuring secure connections.

\n

Legitimacy and Reputation Assessment

\n

The domain has been operational for 25 years, indicating a long-standing presence in the market. It is hosted in San Francisco, United States, with a clean security record on VirusTotal, showing no malicious detections. The website has a professional design and provides extensive information about its services and compliance practices.

\n

Final Verdict and Recommendations

\n

Conclusion: Ketch.com is a legitimate and safe platform for businesses looking to manage data privacy compliance. Users can confidently explore its offerings.

\n

Best practices include reviewing the privacy policy and understanding the features before signing up for services.

","status":"safe","reasons":["[DOMAIN HISTORY] Domain registered for 25 years, indicating stability and legitimacy.","[SECURITY] SSL certificate issued by WE1 is valid and ensures secure connections.","[REPUTATION] No malicious detections on VirusTotal, indicating a clean security record.","[CONTENT QUALITY] Professional design with clear information about services and compliance.","[TRUST SIGNALS] Extensive resources and documentation available for users."],"category":"Technology","red_flags":[],"final_score":85,"subcategory":"Data Privacy Management","final_status":"safe","score_source":"openai","ai_confidence":"high","claimed_brand":null,"brand_evidence":[],"business_model":"Subscription-based software services","expected_domain":null,"target_audience":"Businesses seeking data privacy compliance solutions","confidence_level":"high","guardrail_actions":[],"analysis_timestamp":"2025-11-12T10:32:51.839Z","user_recommendation":"Safe to use for data privacy management solutions.","contact_transparency":"good","professionalism_score":9,"brand_claim_confidence":null},"final_domain_age":{"days":9378,"years":25,"source":"rdap","verified":true,"allSources":["rdap"]},"guardrail_summary":{"actions":[],"scoreSource":"openai","aiConfidence":"high"},"dns":{"ip":"162.159.142.109","addresses":["162.159.142.109"],"ip_info":{"ip":"162.159.142.109","city":"San Francisco","region":"California","country":"US","loc":"37.7621,-122.3971","org":"AS13335 Cloudflare, Inc.","postal":"94107","timezone":"America/Los_Angeles","anycast":true},"ipv6_addresses":[],"nameservers":["ns-104.awsdns-13.com","ns-1511.awsdns-60.org","ns-1678.awsdns-17.co.uk","ns-618.awsdns-13.net"],"is_parking_ns":false,"mx_records":[{"exchange":"alt4.aspmx.l.google.com","priority":10,"type":"MX"},{"exchange":"alt1.aspmx.l.google.com","priority":5,"type":"MX"},{"exchange":"alt2.aspmx.l.google.com","priority":5,"type":"MX"},{"exchange":"aspmx.l.google.com","priority":1,"type":"MX"},{"exchange":"alt3.aspmx.l.google.com","priority":10,"type":"MX"}],"has_mx":true,"spf_record":"v=spf1 include:_spf.google.com include:7186579.spf07.hubspotemail.net include:sendgrid.net include:_spf.salesforce.com ~all","has_spf":true,"dmarc_record":"v=DMARC1; p=quarantine; sp=none; rua=mailto:dmarc-reports@ketch.com,mailto:dmarc_agg@vali.email; ruf=mailto:dmarc-reports@ketch.com","dmarc_policy":"quarantine","has_dmarc":true,"caa_records":[{"critical":0,"type":"CAA","issuewild":"amazon.com"},{"critical":0,"type":"CAA","issuewild":"certainly.com"},{"critical":0,"type":"CAA","issuewild":"letsencrypt.org"},{"critical":0,"type":"CAA","issuewild":"pki.goog"},{"critical":0,"type":"CAA","iodef":"mailto:caa-reporting@ketch.com"},{"critical":0,"type":"CAA","issue":"amazon.com"},{"critical":0,"type":"CAA","issue":"certainly.com"},{"critical":0,"type":"CAA","issue":"globalsign.com"},{"critical":0,"type":"CAA","issue":"letsencrypt.org"},{"critical":0,"type":"CAA","issue":"pki.goog"}],"has_caa":true,"txt_records":["cursor-domain-verification-pnaaq1=wk6bU31Fixe5qQCKn94uyUocp","google-site-verification=5XhOeRg7Rdu4W2FiN-XlRTn63cyG-OIYo_59QW-jcrI","google-site-verification=8RWotPlFWkH1JNCASw74zcKId-YUzIRrlknvAuZlygs","google-site-verification=svUnZFT3ARKpkjVwnN_aub6zmvVBmYjz0341p9gKeE8","openai-domain-verification=dv-1QhK7mxGYmpmLZ5C4uGxVc3F","reachdesk-verification=b8JL0hFuRucmWJWHo5aRvtWXR6IZVgv0Vhio3UIDpxRvNZBEqmjKuxgLYBHvVLi2","slack-domain-verification=OLFo97GEsm0pakYsmPz3cF0VDKZvaFRQ6206slMa","v=spf1 include:_spf.google.com include:7186579.spf07.hubspotemail.net include:sendgrid.net include:_spf.salesforce.com ~all","MS=ms94294272","ZOOM_verify_d19ZqJGFSV4WL1MLO4dmyQ","apple-domain-verification=n4hjE9FIQcr6t2dQ","atlassian-domain-verification=3/mz0DynYWDikcs6Bm9KlwwKdtn4wVcRN3MKBWmXpdYX9ggZbtt3MrqrufP0l1P6"],"records":{"A":["162.159.142.109"],"AAAA":[],"NS":["ns-104.awsdns-13.com","ns-1511.awsdns-60.org","ns-1678.awsdns-17.co.uk","ns-618.awsdns-13.net"],"MX":[{"exchange":"alt4.aspmx.l.google.com","priority":10,"type":"MX"},{"exchange":"alt1.aspmx.l.google.com","priority":5,"type":"MX"},{"exchange":"alt2.aspmx.l.google.com","priority":5,"type":"MX"},{"exchange":"aspmx.l.google.com","priority":1,"type":"MX"},{"exchange":"alt3.aspmx.l.google.com","priority":10,"type":"MX"}],"TXT":["cursor-domain-verification-pnaaq1=wk6bU31Fixe5qQCKn94uyUocp","google-site-verification=5XhOeRg7Rdu4W2FiN-XlRTn63cyG-OIYo_59QW-jcrI","google-site-verification=8RWotPlFWkH1JNCASw74zcKId-YUzIRrlknvAuZlygs","google-site-verification=svUnZFT3ARKpkjVwnN_aub6zmvVBmYjz0341p9gKeE8","openai-domain-verification=dv-1QhK7mxGYmpmLZ5C4uGxVc3F","reachdesk-verification=b8JL0hFuRucmWJWHo5aRvtWXR6IZVgv0Vhio3UIDpxRvNZBEqmjKuxgLYBHvVLi2","slack-domain-verification=OLFo97GEsm0pakYsmPz3cF0VDKZvaFRQ6206slMa","v=spf1 include:_spf.google.com include:7186579.spf07.hubspotemail.net include:sendgrid.net include:_spf.salesforce.com ~all","MS=ms94294272","ZOOM_verify_d19ZqJGFSV4WL1MLO4dmyQ","apple-domain-verification=n4hjE9FIQcr6t2dQ","atlassian-domain-verification=3/mz0DynYWDikcs6Bm9KlwwKdtn4wVcRN3MKBWmXpdYX9ggZbtt3MrqrufP0l1P6"],"CAA":[{"critical":0,"type":"CAA","issuewild":"amazon.com"},{"critical":0,"type":"CAA","issuewild":"certainly.com"},{"critical":0,"type":"CAA","issuewild":"letsencrypt.org"},{"critical":0,"type":"CAA","issuewild":"pki.goog"},{"critical":0,"type":"CAA","iodef":"mailto:caa-reporting@ketch.com"},{"critical":0,"type":"CAA","issue":"amazon.com"},{"critical":0,"type":"CAA","issue":"certainly.com"},{"critical":0,"type":"CAA","issue":"globalsign.com"},{"critical":0,"type":"CAA","issue":"letsencrypt.org"},{"critical":0,"type":"CAA","issue":"pki.goog"}]}},"ssl":{"type":"DV","issuer":"WE1","valid_from":"Nov 10 21:13:45 2025 GMT","valid_to":"Feb 8 22:13:40 2026 GMT","san":["ketch.com"],"valid":true,"days_to_expiry":89,"san_covers_hostname":true,"within_date_window":true},"whois":{"age_days":9378,"age":"25 years and 8 months","is_hidden":false,"whois_privacy":false,"raw_data":"Domain Name: ketch.com\r\nRegistry Domain ID: 21958826_DOMAIN_COM-VRSN\r\nRegistrar WHOIS Server: whois.registrar.amazon\r\nRegistrar URL: https://registrar.amazon.com\r\nUpdated Date: 2025-08-20T23:31:29Z\r\nCreation Date: 2000-03-09T11:37:00Z\r\nRegistrar Registration Expiration Date: 2027-03-09T10:37:00Z\r\nRegistrar: Amazon Registrar, Inc.\r\nRegistrar IANA ID: 468\r\nRegistrar Abuse Contact Email: trustandsafety@support.aws.com\r\nRegistrar Abuse Contact Phone: +1.2024422253\r\nDomain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited\r\nDomain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited\r\nDomain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited\r\nRegistry Registrant ID: Not Available From Registry\r\nRegistrant Name: On behalf of ketch.com owner\r\nRegistrant Organization: Identity Protection Service\r\nRegistrant Street: PO Box 786\r\nRegistrant City: Hayes\r\nRegistrant State/Province: Middlesex\r\nRegistrant Postal Code: UB3 9TR\r\nRegistrant Country: GB\r\nRegistrant Phone: +44.1483307527\r\nRegistrant Phone Ext:\r\nRegistrant Fax: +44.1483304031\r\nRegistrant Fax Ext:\r\nRegistrant Email: d59373f7-7fa8-4347-aaa2-0d9db962f82d@identity-protect.org\r\nRegistry Tech ID: Not Available From Registry\r\nTech Name: On behalf of ketch.com owner\r\nTech Organization: Identity Protection Service\r\nTech Street: PO Box 786\r\nTech City: Hayes\r\nTech State/Province: Middlesex\r\nTech Postal Code: UB3 9TR\r\nTech Country: GB\r\nTech Phone: +44.1483307527\r\nTech Phone Ext:\r\nTech Fax: +44.1483304031\r\nTech Fax Ext:\r\nTech Email: d59373f7-7fa8-4347-aaa2-0d9db962f82d@identity-protect.org\r\nName Server: NS-104.AWSDNS-13.COM\r\nName Server: NS-618.AWSDNS-13.NET\r\nName Server: NS-1678.AWSDNS-17.CO.UK\r\nName Server: NS-1511.AWSDNS-60.ORG\r\nDNSSEC: unsigned\r\nURL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/\r\n>>> Last update of WHOIS database: 2025-11-12T10:31:38Z <<<\r\nFor more information on Whois status codes, please visit https://icann.org/epp\r\n\r\nBy submitting a query to the Amazon Registrar, Inc. WHOIS database, you\r\nagree to abide by the following terms. The data in Amazon Registrar, Inc.'s\r\nWHOIS database is provided by Amazon Registrar, Inc. for the sole purpose of\r\nassisting you in obtaining information about domain name accuracy. You agree\r\nto use this data only for lawful purposes and further agree not to use this\r\ndata for any unlawful purpose or to: (1) enable, allow, or otherwise support\r\nthe transmission by email, telephone, or facsimile of commercial advertising\r\nor unsolicited bulk email, or (2) enable high volume, automated, electronic\r\nprocesses to collect or compile this data for any purpose, including mining\r\nthis data for your own personal or commercial purposes. Amazon Registrar, Inc.\r\nreserves the right to restrict or terminate your access to the data if you fail\r\nto abide by these terms of use. Amazon Registrar, Inc. reserves the right\r\nto modify these terms at any time.\r\n\r\nVisit Amazon Registrar, Inc. at https://registrar.amazon.com\r\n\r\nContact information available here:\r\nhttps://docs.aws.amazon.com/Route53/latest/DeveloperGuide/domain-contact-support.html\r\n\r\nŠ 2020, Amazon.com, Inc., or its affiliates\r\n\r\n\r\n"},"ranking":{"rank":1239834,"top_1m":false}},"reviews":[],"has_archive":false,"archive_data":null,"archive_stats":null}};