Privacy Policy

 

This privacy policy is effective as of 1/1/2006

This notice applies to all information collected or submitted on the CBI website. On some pages, you can order products, make requests, register to receive materials, and sign-up for events. The types of personal information collected at these pages are:

  • Name
  • Company
  • Title
  • Address
  • Email address
  • Phone number

The Way We Use Information:

We use the information you provide about yourself when tabulating numbers for CBI sponsored events, and to confirm attendance.

We use return email addresses to answer the email we receive. Such addresses are not used for any other purpose and are not shared with outside parties.

You can register with our website if you would like to receive our newsletter as well as updates on our new products and services. Information you submit on our website will not be used for this purpose unless you fill out the registration form.

We use non-identifying and aggregate information to better design our website and to share with advertisers. For example, we may tell an advertiser that X number of individuals visited a certain area on our website, or that Y number of men and Z number of women filled out our registration form, but we would not disclose anything that could be used to identify those individuals.

Finally, we never use or share the personally identifiable information provided to us online in ways unrelated to the ones described above without also providing you an opportunity to opt-out or otherwise prohibit such unrelated uses.

Our Commitment To Data Security

To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.

Our Commitment To Children’s Privacy

Protecting the privacy of the very young is especially important. For that reason, we never collect or maintain information at our website from those we actually know are under 13, and no part of our website is structured to attract anyone under 13.

How You Can Access Or Correct Your Information

You can access all your personally identifiable information that we collect online and maintain by requesting a review of our registrations database. We use this procedure to better safeguard your information.

You can correct factual errors in your personally identifiable information by sending us a request that credibly shows error.

To protect your privacy and security, we will also take reasonable steps to verify your identity before granting access or making corrections.

How To Contact Us

Should you have other questions or concerns about these privacy policies, please call us at 800.747.8585 or send us an email at help@cbihome.com.

Your privacy is important to us. To better protect your privacy we provide this notice explaining our online information practices and the choices you can make about the way your information is collected and used. To make this notice easy to find, we make it available on our homepage and at every point where personally identifiable information may be requested.

Are your keystrokes being recorded? Learn more about keylogger software and how to protect yourself and your organi… https://t.co/UNYGgy4yva
How many cyber #vulnerabilities are you aware of? Here are 4 that should be on your list. #cybersecurity #pentesthttps://t.co/JAZciXspPP
Close the Communication Gap: What You Risk By Not Educating Employees on Cybersecurity https://t.co/4csNmuP6e5https://t.co/izJ7QKDcsw
Cloud overspending: Three questions to ask before you bust your budget | ITProPortal https://t.co/nRm1WYp2ns
Not long ago, phishing attacks were fairly easy for the average Internet user to spot https://t.co/Mx6jmZb1Cr https://t.co/bGemNH9V2z
Not long ago, phishing attacks were fairly easy for the average Internet user to spot https://t.co/tTrZU3em1Q https://t.co/NDgo0Ihc3F
Revised NIST Infrastructure Cybersecurity Framework Released https://t.co/QWMrn7FQlO
Not long ago, phishing attacks were fairly easy for the average Internet user to spot https://t.co/zPUroKq3o8 https://t.co/CUqWciNHbv
Revised NIST Infrastructure Cybersecurity Framework Released https://t.co/v1OG0Ut4R7
Revised NIST Infrastructure Cybersecurity Framework Released https://t.co/syI4BmRD3z
60 Cybersecurity Predictions For 2018 https://t.co/YiSOTAG6Rg
60 Cybersecurity Predictions For 2018 https://t.co/3BXlLQOp2e
Are you aware of these 4 vulnerabilities? https://t.co/r9tRzbQ4lR #cybersecurity #cybervulnerabilities https://t.co/RwS4d4gDoS
Cybersecurity professionals aren’t keeping up with training https://t.co/cto33PMmen
60 Cybersecurity Predictions For 2018 https://t.co/YThWxF9nL1
Not long ago, phishing attacks were fairly easy for the average Internet user to spot https://t.co/CkSgeqbu3c https://t.co/dqnbGbAya6
Cybersecurity professionals aren’t keeping up with training https://t.co/8vm7sgPkwt
Rewarding your employees to learn about cybersecurity is a win-win for your organization https://t.co/DIWyiP1v1Qhttps://t.co/DdWgQozj5P
Cybersecurity professionals aren’t keeping up with training https://t.co/XQxb0rnq8a
60 Cybersecurity Predictions For 2018 https://t.co/pWwiJBhLr2