Updated May 2019
Cyber-Operatives, doing business as Cyber-Operatives (“Cyber-Operatives”, “Company”, “we” or “us”), respects the privacy of the visitors and/or users of its website at http://www.Cyber-Operatives.org/ and any other Cyber-Operatives-related websites (collectively, the “Site”) and related Services (“User” or “you”) and is committed to protect the personal information that its Users share with it. We believe that you have a right to know our practices regarding the information we may collect and use when you visit and/or use our Site and Services.
1. Your Consent (PLEASE READ CAREFULLY!)
FOR AVOIDANCE OF DOUBT, YOU HEREBY CONSENT TO THE COLLECTION, PROCESSING, TRANSFER AND USE OF YOUR PERSONAL INFORMATION. YOU ALSO ACKNOWLEDGE AND CONFIRM THAT YOU ARE NOT REQUIRED TO PROVIDE US WITH YOUR PERSONAL INFORMATION AND THAT SUCH INFORMATION IS VOLUNTARILY PROVIDED TO US.
2. Which information we may collect on our Users?
We may collect two types of data and information from our Users:
a. Non-identifiable and anonymous information (“Non-personal Information”). We are not aware of the identity of the User from whom we have collected the Non-personal Information. Non-Personal Information is any unconcealed information which does not enable identification of an individual User, and which is available to us while such User is entering into and/or using the Site. Non-personal Information which is being gathered consists of technical information, behavioral information and aggregated information, and may contain, among other things, the activity of the User on the Site, type of operating system, User’s ‘click-stream’ or searches on the Site, type and version of browser, keyboard language, screen resolution, etc.
b. Personally identifiable information (“Personal Information”).This information may identify an individual or may be of a private and/or sensitive nature.
Users of the Site automatically provide their IP address mainly for enhancing the User’s experience and for geo-location and security purposes, as further detailed below.
In addition, Personal Information which is being gathered consists of any personal details provided consciously and voluntarily by the User:
The Personal Information is collected from the details the Users provide in the Contact Form on the Site which includes the User’s name, e-mail address and telephone number. The User can optionally provide via the Contact Form any text he/she wishes to insert into the “message box”.
For avoidance of doubt, any Non-Personal Information connected or linked to any Personal Information shall be deemed as Personal Information as long as such connection or linkage exists.
3. How Do We Collect Information on Our Users?
There are a few methods that we use:
We collect information through your entry and use of the Site. In other words, when you are using the Site and Service we are aware of it and may gather, collect and store the information relating to such usage.
We collect information which you decide to provide us voluntarily. For example, we collect Personal information when you contact us through the contact form.
We may gather, collect and store such information either independently or through the help of our authorized third-party service providers as detailed below.
4. What are the Purposes of the Collection of Information?
Non-personal Information is collected in order to:
Use it for statistical and research purposes and for customization and improvement of our Site and Services.
Enhance the User’s experience while using the Site and Services.
Personal Information is collected in order to:
Provide and personalize our Services to our Users.
Provide the Users with updates about the Company’s developments, new offerings, news regarding the Site and services, etc.
Provide Users with updated information regarding our products and services.
Be able to contact Users for the purpose of providing them with technical assistance and in order to provide them the Services.
Determine general geolocation information (i.e., country) from which the User’s computer is connected to the Internet in order for us to know the general location of our Site’s Users as well as in order to safeguard our Site.
5. Sharing Information with Third Parties
For avoidance of doubt, Cyber-Operatives may use Non-personal Information and transfer and disclose it to third parties at its discretion.
6. Deletion or Modification of Personal Information
In any event, if for any reason you (or any person) wish to delete or modify Personal Information, please send us an e-mail with adequate detail of your request to: privacy@Cyber-Operatives.org and we will make reasonable efforts to modify or delete any such Personal Information pursuant to any applicable privacy laws. Note that unless otherwise explicitly specified herein and/or unless you instruct us otherwise we may retain your Personal Information for as long as reasonably required for the purposes of which such Personal Information was collected, all as permitted under any applicable privacy laws.
Aggregated and/or anonymous information derived from your use of the Site or Services may remain on our servers indefinitely.
The Site is intended for Users over the age of eighteen (18). Therefore, Cyber-Operatives does not intend and does not knowingly collect Personal Information from children under this age. We reserve the right to request proof of age at any stage so that we can verify that minors under this age are not using the Site.
We take reasonable measures to maintain the security and integrity of our Site and prevent unauthorized access to it or use thereof through generally accepted industry standard technologies and internal procedures. The Personal Information is hosted on Hubspot, Salesforce, and SalesLoft cloud servers which provide advanced strict security standards (both physical and logical). In addition we employ highly secure services design and implementation using encryption and architectures mechanisms. Please note, however, that there are inherent risks in transmission of information over the Internet or other methods of electronic storage and we cannot guarantee that unauthorized access or use will never occur. THE COMPANY SHALL NOT BE RESPONSIBLE OR LIABLE FOR UNAUTHORIZED ACCESS, HACKING, OR OTHER SECURITY INTRUSIONS OR FAILURE TO STORE OR THE THEFT, DELETION, CORRUPTION, DESTRUCTION, DAMAGE, OR LOSS OF ANY DATA OR INFORMATION.