YOUR PERSONAL INFORMATION AND HOW IT IS USED
Cyber Associates is dedicated to protecting your privacy when you access our website. Accordingly, this notice describes our privacy and security practices and identifies and describes the types of information collected and how that information is used. Cyber Associates does not collect any personal non-system information about a user unless the user provides that information voluntarily by submitting a contact form during a visit to this website.
SYSTEM INFORMATION COLLECTED WHEN YOU ACCESS THIS WEBSITE
When you visit this website, Cyber Associates automatically collects and stores the following system information about your visit:
- User client hostname – The hostname or Internet Protocol (IP) address of the user requesting access to the Cyber Associates website.
- HTTP header, “user agent” – The user agent information includes the type of browser, its version, and the operating system on which the browser is running.
- HTTP header, “referrer” – The referrer specifies the web page from which the user accessed the current web page.
- System date – The date and time of the user’s request.
- Full request – The exact request the user made.
- Status – The status code the server returned to the user.
- Content length–The content length, in bytes, of any document sent to the user.
- Method – The request method used.
- Universal Resource Identifier (URI) – The location of a resource on the server.
- Query string of the URI – Anything after the questions mark in a URI.
- Protocol – The transport protocol and the version used.
The information collected is automatically used to improve our website content and to help us understand how users are interacting with different parts of the site. This information is collected for statistical analysis, to determine what information is of most and least interest to our users, and to improve the utility of the material available on the website. The information is not collected for commercial marketing purposes and Cyber Associates is not authorized to sell or otherwise disclose the information collected from the website for commercial marketing purposes.
This website uses Google Analytics, a web analytics service provided by Google, Inc. (“Google”). Google Analytics uses “cookies,” which are text files placed on your computer, to help the website analyze how users use the site. The information generated by the cookie about your use of the website (including your IP address) will be transmitted to and stored by Google on servers in the United States.
Google will use this information for the purpose of evaluating your use of the website, compiling reports on website activity and providing other services relating to website activity and Internet usage.
Google may also transfer this information to third parties where required to do so by law, or where such third parties process the information on Google’s behalf.
By using this website, you consent to the processing of data about you by Google in the manner and for the purposes set out above.
Information Collected When You Volunteer Information
During your visit to this website, you may elect to submit a message to us via a Contact Form. You will be entering information into Cyber Associates HTTPS secured pages which Cyber Associates is bound to keep confidential under US, UK, EU and Singapore Privacy Law. Cyber Associates encrypts any information you share with us using TLS/SSL so that information cannot be easily intercepted, but more about that later…
During your visit to this website, you may send an encrypted email massage to Cyber Associates via a Comment Form. Your email address and the contents of your message will be collected. Your name, time zone / geographic location, phone number, email address and the information included in your message will be used to respond to you. Your email address and other contact details are not collected for commercial purposes and Cyber Associates is not authorized to sell or otherwise disclose your this information for commercial purposes.
Although the system regards all messages it receives from users as confidential, please be advised that because the Internet is a public domain, messages sent to us outside of a Cyber Associates TLS / SSL encrypted web page (signified by HTTPS in the address bar), can and may be intercepted or accessed by a third party.
The Cyber Associates website contains links to other websites for your information and convenience. Cyber Associates has no control over the privacy practices or the content of such other websites. Please review the privacy information provided by these sites.
The responsibility for the content and accuracy of information on sites accessed by linking from our website rests with those entities providing you with information. This includes any responsibility for updating information upon which visitors may rely. The inclusion of links from this site to others does not imply any endorsement by Cyber Associates of any product, service or vendor. Any mention of products, services, or vendors is for informational purposes only.
We follow generally accepted industry standards to protect the information submitted to us, both during transmission and once we receive it. We maintain appropriate administrative, technical and physical safeguards to protect Personal Data against accidental or unlawful destruction, accidental loss, unauthorized alteration, unauthorized disclosure or access, misuse, and any other unlawful form of processing of the Personal Data in our possession.
To help ensure that your information is protected and only available to you, Cyber Associates uses Secure Sockets Layer (SSL), and third-party certification.
SSL Protocol provides a method that encrypts information passed between the Cyber Associates server(s) and your browser to prevent others from accessing your information. This method uses a “challenge handshake” (or other such secure handshake authentication) and public/private key encryption on both sides (the server and the client) to help ensure that only your browser can translate the information being sent by Cyber Associates.
Third-party certification refers to a neutral third-party who has verified the authenticity of a website and has issued the owner(s) of that website a unique certificate. The Cyber Associates website employs an SSL/TLS certificate issued by DigCert Inc. and verified by Google Trust Services conforming to TLS version 1.2 and employing Advanced Encryption Standard AES128 and Cryptographic Hash Algorithm SHA256 to secure traffic over the Internet.
While we do our utmost to protect the confidentiality, integrity and availability of the Cyber Associates web site and its data, no method of transmission over the Internet or method of electronic storage is 100% secure. We cannot ensure or warrant the security of any information you transmit to us or store with us, and you do so at your own risk. We also cannot guarantee that such information may not be accessed, disclosed, altered, or destroyed by breach of any of our physical, technical, or administrative safeguards. If you believe your Personal Data has been compromised, please contact us via the Contact section.
If we learn of a security systems breach, we will inform you of the occurrence of the breach in accordance with applicable law.
Children’s Online Privacy Rule (COPR)
Cyber Associates does not knowingly collect personal information from children or create profiles of children through this website. Users are cautioned, however, that the collection of personal information submitted in an email will be treated as though it was submitted by an adult, and may, unless exempted from access by national, federal or state law, be subject to public access.
Cyber Associates has done its utmost to protect all electronic information. However, in the unlikely event the information is hacked, or to aid in a criminal investigation, Cyber Associates may share information with law enforcement agencies as needed to investigate a crime.
If you are a resident of the European Economic Area (EEA), you have certain data protection rights. If you wish to be informed what personal data we hold about you and if you want it to be removed from our systems, please contact us.
In certain circumstances, you have the following data protection rights:
- The right to access, update or to delete the information we have on you
- The right of rectification
- The right to object
- The right of restriction
- The right to data portability
- The right to withdraw consent
Access, Correction, Deletion
Cyber Associates respects your privacy rights and provides you with reasonable access to the Personal Data that you may have provided through your use of this site. If you wish to access or amend any other Personal Data we hold about you, or to request that we delete any information about you that we have obtained from an integrated service, you may contact us as set forth in the Contact Us section below. At your request, we will have any reference to you deleted or blocked in our IT systems.
You may update, correct, or delete your personal information by following the instructions above. Please note that while any changes you make will be reflected in active user databases instantly or within a reasonable period of time, we may retain all information you submit via backups and other archiving, for the prevention of fraud and abuse, analytics, satisfaction of legal obligations, or where we otherwise reasonably believe that we have a legitimate reason to do so.
You may decline to share certain Personal Data with us, in which case we may not be able to provide to you some of the features and functionality of the site.
At any time, you may object to the processing of your Personal Data, on legitimate grounds, except if otherwise permitted by applicable law.
Subject to conditions already stated, we only retain your Personal Data for as long as necessary or until such times as we receive a written request from you to delete your communication with us.
You may contact Cyber Associates at any time via the Contact Us section below.