1. Information We Collect
1.1 Information You Provide
We may collect personal information that you voluntarily submit through:- Contact forms
- Training or consultation requests
- Cybersecurity Culture Survey
- Email subscription or “Subscribe” forms
- Resource downloads, briefings, or inquiries
- Name
- Email address
- Phone number
- Company/organization
- Role or title (if provided)
- Survey responses
- Any message or details you submit voluntarily
1.2 Information Automatically Collected
We may collect limited technical data automatically when you access the site, including:- IP address
- Browser type
- Device information
- Pages visited
- Links clicked
- Referring website
- Time spent on pages
- Cookies
- Server logs
- Google Analytics (Measurement ID: G-57LT7Y5W4E)
- WordPress.com/Jetpack analytics tools
2. How We Use Your Information
We may use the information we collect to:- Respond to inquiries or requests
- Provide training, consulting, or advisory services
- Send updates when a new article is published (only if you subscribe)
- Deliver survey results and insights
- Improve website performance and user experience
- Analyze how visitors engage with the site
- Ensure site security and prevent misuse
- Comply with legal requirements
3. Information Sharing
We may share data only under the following limited circumstances:3.1 Service Providers
We use trusted third parties to help operate the website, including WordPress.com hosting, Jetpack email services, analytics tools, and form-processing platforms. These providers may access information solely to perform tasks on our behalf and are bound by confidentiality obligations.3.2 Legal Requirements
We may disclose information if required by law, court order, subpoena, or legitimate law enforcement request.3.3 Business Operations
If we undergo a business transfer (e.g., sale, merger, reorganization), user information may be included as part of that process. We do not share information for advertising or marketing purposes.4. Data Security
We take reasonable administrative, technical, and physical measures to protect your information, including:- HTTPS encrypted connections
- Secure WordPress.com Business hosting
- Restricted access to stored data
- Ongoing monitoring for suspicious activity
5. Your Rights & Choices
You may:- Request a copy of your information
- Request that we correct or update your information
- Ask us to delete your data (unless legally required to retain it)
- Unsubscribe from emails at any time via provided links