Privacy Policy

 

This privacy policy is effective as of 1/1/2006

This notice applies to all information collected or submitted on the CBI website. On some pages, you can order products, make requests, register to receive materials, and sign-up for events. The types of personal information collected at these pages are:

  • Name
  • Company
  • Title
  • Address
  • Email address
  • Phone number

The Way We Use Information:

We use the information you provide about yourself when tabulating numbers for CBI sponsored events, and to confirm attendance.

We use return email addresses to answer the email we receive. Such addresses are not used for any other purpose and are not shared with outside parties.

You can register with our website if you would like to receive our newsletter as well as updates on our new products and services. Information you submit on our website will not be used for this purpose unless you fill out the registration form.

We use non-identifying and aggregate information to better design our website and to share with advertisers. For example, we may tell an advertiser that X number of individuals visited a certain area on our website, or that Y number of men and Z number of women filled out our registration form, but we would not disclose anything that could be used to identify those individuals.

Finally, we never use or share the personally identifiable information provided to us online in ways unrelated to the ones described above without also providing you an opportunity to opt-out or otherwise prohibit such unrelated uses.

Our Commitment To Data Security

To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.

Our Commitment To Children’s Privacy

Protecting the privacy of the very young is especially important. For that reason, we never collect or maintain information at our website from those we actually know are under 13, and no part of our website is structured to attract anyone under 13.

How You Can Access Or Correct Your Information

You can access all your personally identifiable information that we collect online and maintain by requesting a review of our registrations database. We use this procedure to better safeguard your information.

You can correct factual errors in your personally identifiable information by sending us a request that credibly shows error.

To protect your privacy and security, we will also take reasonable steps to verify your identity before granting access or making corrections.

How To Contact Us

Should you have other questions or concerns about these privacy policies, please call us at 800.747.8585 or send us an email at help@cbihome.com.

Your privacy is important to us. To better protect your privacy we provide this notice explaining our online information practices and the choices you can make about the way your information is collected and used. To make this notice easy to find, we make it available on our homepage and at every point where personally identifiable information may be requested.

Always be on the lookout for Social Media spoofing #CBIBlog https://t.co/24IZGnkroo https://t.co/y0JscoHQZu
Always be on the lookout for Social Media spoofing #CBIBlog https://t.co/Kbok13axkk https://t.co/R1FcepSgpl
5 Cybersecurity Terms Everyone Should Know | CBI https://t.co/pT1Slvr12N by @CBI_IT
5 Cybersecurity Terms Everyone Should Know | CBI https://t.co/J4RpjKAX8P by @CBI_IT
Improve Your Cyber Hygiene With These 5 Social Media Dos and Don’ts #CBIBlog https://t.co/Cx3fTyYps0 https://t.co/qp6db088RP
Social engineers come up with new tricks all the time, be prepared #CBIBlog https://t.co/ieYlvl2ZC5 https://t.co/w4CdZddlFM
Improve Your Cyber Hygiene With These 5 Social Media Dos and Don’ts #CBIBlog https://t.co/zhFaFSJC5P https://t.co/sRL6Tf2gIY
7 Simple Ways to Safeguard Your Social Media Accounts From Social Engineers #CBIBlog https://t.co/VxiSNYxJ8V https://t.co/R33fgqvRe1
Hackers can attempt to spoof you through IP, email, calls or other methods #CBIBlog https://t.co/mcqyXhTuvP https://t.co/YbH65TlD2L
Join us in Charlotte, New York, Las Vegas, Tampa. #IBMBigFix #Security https://t.co/saGkBkqSkS https://t.co/eG6jY2Enlv
4 Ways to Easily Identify Spoofing in Seconds #CBIBlog https://t.co/ZFBXs4H6gM https://t.co/BUOiBaQRPd
5 Cybersecurity Terms Everyone Should Know | CBI https://t.co/1uX5ixVXxF by @CBI_IT
7 Simple Ways to Safeguard Your Social Media Accounts From Social Engineers #CBIBlog https://t.co/bP3QHjUdlz https://t.co/rTmIYpXk4s
Hackers can attempt to spoof you through IP, email, calls or other methods #CBIBlog https://t.co/x7kzfK9414 https://t.co/YpnVrNIQWN
Customizing your SIEM structure can really weigh your team down #CyberSecurity #SIEM https://t.co/feJAebkqPl https://t.co/WVO7iUSUrS
Join us in Charlotte, New York, Las Vegas, Tampa. #IBMBigFix #Security https://t.co/Tt4uQ66nVc https://t.co/jfrKgErROf
Here is three types of cyberattacks you may not have heard of #CyberCrime https://t.co/sE9QmaKSds
4 Ways to Easily Identify Spoofing in Seconds #CBIBlog https://t.co/I7q3xVrwpD https://t.co/Fm3ethdDkx
Here is three types of cyberattacks you may not have heard of #CyberCrime https://t.co/9BUqoWjY3o
CBI's strategic program practice can build encryption in to a security plan specific to your company #CBIBloghttps://t.co/qnfauA26bz