Privacy Policy

Privacy Policy

By using or accessing this website you signify your acknowledgment and assent to the Privacy Policy set forth below. If you do not agree to this policy, please do not use this website. Cyber Security Simplified reserves the right to revise this policy at any time by updating this posting, and your use after such change signifies your acceptance of the changed terms. Please check this policy periodically for changes.

This policy applies to the websites and related services of Cyber Security Simplified (“Cyber Security Simplified,” “we,” or “us”). Cyber Security Simplified provides this Privacy Policy to inform you of our policies and procedures regarding the collection, use and disclosure of personal information that we receive when you visit or use our websites (www.cybersecuritysimplified.com) and related functionality, product and service offerings. This Privacy Policy does not apply to the use or disclosure of information that is collected or obtained by us through other means.

Personal Data

If you browse our website, you may generally do so anonymously without providing any personal information. We collect personally identifiable and transactional information when you sign up to receive information from us, or send us an email or inquiry. You will know this data is being collected because you will have to fill out a form.

Passive Collection Of Usage Information

The servers hosting our website collect general data (“Usage Information”) pertaining to users of this website and the mobile devices and programs from which they access this site. Usage information may include IP address, domain name, referring web page, browser type, mobile device type, device operating system, device settings, device identifiers and information about the way you use your device or this site (such as the length of time spent, the pages accessed while visiting this site, and links or ads clicked). Usage Information does not, in and of itself, identify you personally, but we may link it to personal information for registered users. This Usage Information is collected and analyzed to help us manage and administer our website, to customize and improve the content of our website, and to support and advance our promotional efforts. Usage Information may be collected using the following methods:

(1) Cookies – A cookie is a small file stored on your computer or device by a website to give you a unique ID. We may use cookies to monitor site usage patterns, track new visitors to this site and to recognize past users so that we may customize and personalize content. If for any reason you don’t want to take advantage of cookies, you may have your browser not accept them, although this may disable or render unusable some of the features of our site.

(2) Tags – Tags/beacons (a.k.a. web beacons or clear gifs) are small graphic images designed to allow us or a third party to collect Usage Information (such as when you view a web page or e-mail that contains the web beacon) and monitor user activity. We may permit third parties to place tags on our sites or in e-mails sent on our behalf for purposes of collecting Usage Information.

(3) Conversion tracking – We may use conversion tracking or other search engine features that permit us to measure the effectiveness of search engine results.

(4) Web Analytics – We may use third-party website analytics tools and embedded tags/tracking code that collect information about visitor traffic on our sites and mobile applications, including Google Analytics. Use of such analytic Usage Information collected by third parties will be governed by the applicable third party’s privacy policy.

(5) Passive Identifiers – The servers hosting our site may generally detect and collect Usage Information provided by your browser or device such as your internet protocol (IP) address, device identifiers, and domain name. We may also collect information about your location that is provided to us by your mobile device or browser.

How We Protect Information

We treat information in a confidential manner. Our employees are required to protect the confidentiality of information and may access information only when there is an appropriate reason to do so. We also maintain physical, electronic and procedural safeguards to protect information; these safeguards comply with all applicable laws. Employees are required to comply with our established policies.

Compliance With Legal Process

We may disclose personal information if we are required to do so by law or we in good faith believe that such action is necessary to (1) comply with a law or with legal process; (2) protect and defend our rights and property; (3) protect against misuse or unauthorized use of this website; or (4) protect the personal safety or property of our users (among other things, this means that if you provide false information or attempt to pose as someone else, information about you may be disclosed as part of any investigation into your actions).

Changes To This Privacy Policy

Cyber Security Simplified reserves the right to change or update this policy at any time, with reasonable notice to users of its website via email or by means of posting an updated version of this Privacy Policy on our website. Any changes or updates will be effective immediately upon posting. By continuing to use or access the website after such change, you agree to be bound by the modified Privacy Policy.

TOP