Privacy Policy

 

This privacy policy is effective as of 1/1/2006

This notice applies to all information collected or submitted on the CBI website. On some pages, you can order products, make requests, register to receive materials, and sign-up for events. The types of personal information collected at these pages are:

  • Name
  • Company
  • Title
  • Address
  • Email address
  • Phone number

The Way We Use Information:

We use the information you provide about yourself when tabulating numbers for CBI sponsored events, and to confirm attendance.

We use return email addresses to answer the email we receive. Such addresses are not used for any other purpose and are not shared with outside parties.

You can register with our website if you would like to receive our newsletter as well as updates on our new products and services. Information you submit on our website will not be used for this purpose unless you fill out the registration form.

We use non-identifying and aggregate information to better design our website and to share with advertisers. For example, we may tell an advertiser that X number of individuals visited a certain area on our website, or that Y number of men and Z number of women filled out our registration form, but we would not disclose anything that could be used to identify those individuals.

Finally, we never use or share the personally identifiable information provided to us online in ways unrelated to the ones described above without also providing you an opportunity to opt-out or otherwise prohibit such unrelated uses.

Our Commitment To Data Security

To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.

Our Commitment To Children’s Privacy

Protecting the privacy of the very young is especially important. For that reason, we never collect or maintain information at our website from those we actually know are under 13, and no part of our website is structured to attract anyone under 13.

How You Can Access Or Correct Your Information

You can access all your personally identifiable information that we collect online and maintain by requesting a review of our registrations database. We use this procedure to better safeguard your information.

You can correct factual errors in your personally identifiable information by sending us a request that credibly shows error.

To protect your privacy and security, we will also take reasonable steps to verify your identity before granting access or making corrections.

How To Contact Us

Should you have other questions or concerns about these privacy policies, please call us at 800.747.8585 or send us an email at help@cbihome.com.

Your privacy is important to us. To better protect your privacy we provide this notice explaining our online information practices and the choices you can make about the way your information is collected and used. To make this notice easy to find, we make it available on our homepage and at every point where personally identifiable information may be requested.

Malware found pre-installed on some Android devices https://t.co/uXZlORJiWk https://t.co/rNITSLIVX5
Companies have increasing confidence in the cloud and its security capabilities #InfoSec #CloudSecurityhttps://t.co/hg14AWsIDb
Malware, adware, hidden apps & other risks make more than 20 million mobile devices susceptible for attacks… https://t.co/kEmikW1i3t
Who's responsible for disclosing new security vulnerabilities? #InfoSec https://t.co/421bePLUf7 https://t.co/yB59wTELZo
Why small-business owners are easy prey for hackers #InfoSec https://t.co/70i2Zl7MDi https://t.co/1RgbSdRL1X
#ShadowIT continues to expand in organization's environments. Learn more about the risks #InfoSechttps://t.co/zsUACHzdLq
When #Ransomware hits, should a company pay up? https://t.co/XrsBj5G12H https://t.co/DaXCsNoSnA
Who's responsible for disclosing new security vulnerabilities? #InfoSec https://t.co/BTM4lHy6i1 https://t.co/yUIHUsidDp
#ShadowIT continues to expand in organization's environments. Learn more about the risks #InfoSechttps://t.co/GDzYmDjdhc
Why small-business owners are easy prey for hackers #InfoSec https://t.co/HgxAcbSk0Q https://t.co/Jxtstjkcqp
CBI & @IBMSecurity have teamed up once again to bring Proof of Technology events to a city near you throughout 2017… https://t.co/J9JN4XGgGZ
CBI & @IBMSecurity have teamed up once again to bring Proof of Technology events to a city near you throughout 2017… https://t.co/ClUE788hbx
#IoT devices continue to expand within organizations. Let's see how organizations hold themselves accountable… https://t.co/25KYcHYwy6
CBI & @IBMSecurity have teamed up once again to bring Proof of Technology events to a city near you throughout 2017… https://t.co/SdFVuLD849
#ApplicationSecurity continues to evolve as security teams uncover hidden vulnerabilities #InfoSechttps://t.co/uZjPFeF3hC
#IoT devices continue to expand within organizations. Let's see how organizations hold themselves accountable… https://t.co/GGXfafItLR
#ApplicationSecurity continues to evolve as security teams uncover hidden vulnerabilities #InfoSechttps://t.co/jRBAP3dM5I
#ShadowIT continues to haunt the threat landscape in Cloud security #InfoSec https://t.co/v0VPU98G9L https://t.co/l74YUhZLgY
What are the top three threats CISOs can't yet handle? https://t.co/nPsqH4fqzc https://t.co/atM6whVMeu
Rogue apps plague IT teams. Knowing how many applications are really on your network is crucial #InfoSechttps://t.co/aNFRXz9bHu