CMCSybersecurity2-1.jpg

Cybersecurity Management

Challenges Symposium 2022

Hosted at Franklin University Switzerland

Privacy Policy

Scope of the Privacy Policy

Introduction

We understand that you are aware of and care about your own personal privacy interests, and we take that seriously, thus we employ measures to process and secure it in accordance with applicable laws and the General Data Protection Regulation.

 

This Privacy Notice describes the Cybersecurity Management Challenges Symposium’s policies and practices regarding its collection and use of your personal data and sets forth your privacy rights. We recognize that information privacy is an ongoing responsibility, and so we will from time to time update this Privacy Notice as we undertake new personal data practices or adopt new privacy policies.

This Privacy Policy sets out how Cybersecurity Management Challenges Symposium (we/us/our) collects, processes and safeguards the personal information you provide to us or the personal data we collect offline via electronic forms, postcards, and purchased lists. It is designed to assist you in making informed decisions when using our Web site and our products and services. This statement will be continuously assessed against new technologies, business practices and our customers’ needs.

By visiting https://www.cmcsymposium.org/ (Website) or otherwise providing your information to us you are accepting and consenting to the practices described in this Privacy Policy.

What Information Do We Collect?

We collect personal information about the attendees, sponsors and speakers. This information is used solely for the purpose of providing you the advertised services. We use this information to provide you with the relevant goods and services.

 

We do not sell personal information to anyone or disclose it to third parties, and we use them for the purpose explicitly authorized by the data subject.

  • If you are an attendee, we collect information about you including but not limited to your last and first name, your birthdate, your email address, your kind of registration, your company name, your job title, your mailing address, your payment information and your IP address. We may also collect your phone number.

  • If you are a speaker at our event, we collect information about you including but not limited to your last and first name, your birthdate, your email address, your kind of registration, your company name, your job title, your mailing address, your payment information, your IP address, a photograph and job information. We may also collect your phone number.

  • If you are a sponsor, we will collect information about you including but not limited to your last and first name, your birthdate, your email address, your kind of registration, your company name, your job title, your mailing address, your payment information, your IP address and your company’s logo. We may also collect your phone number.


 

We do not store or ask for or process sensitive personal data other than the above noted.

Our website is a general audience site, and we do not knowingly collect information about children. Should a child whom we know to be under 13 makes known to their personal data we will use that information only to respond directly to that child to inform them that we must have parental consent before receiving their personally identifiable information.

We collect this personal data either by correspondence or website and communication usage through cookies and other tracking technologies, including the Internet protocol (“IP”) address used to connect your computer to the Internet, your browser type and version, time zone setting. We may also collect your personal data when you fill in forms.

Personal Information We May Collect and/or Process

The Cybersecurity Management Challenges Symposium relies on the legal basis of consent with a clear declaration of purpose for its collection and processing. Sometimes we have a legitimate interest in processing data to better understand the needs, concerns, and interests of Cybersecurity Management Challenges Symposium attendees, speakers and sponsors.

We process your personal information to inform you of related events, content, and other benefits or opportunities associated with your Cybersecurity Management Challenges Symposium registration. We may also use this information to help the Cybersecurity Management Challenges Symposium understand your needs and interests to better tailor our services to meet your needs.

We use the data provided by event attendees to provide them with event services, including determining the sessions likely to require the biggest rooms, and related purposes connected with the event. We also use the information for billing purposes, as some attendees do not pay at the time of registration. After the event, we de-identify the information collected from attendees and use de-identified information to review outcomes of past events and plan for future events.

We keep a record of your participation in the Cybersecurity Management Challenges Symposium as an attendee, speaker or sponsor. This information may be used to provide you with certification services or to tell you about other events.

Cybersecurity Management Challenges Symposium is sponsored. We provide an attendee list to sponsors, co-sponsors, and exhibitors of our events. We may also allow sponsors, co-sponsors and/or exhibitors to send you material by mail once per sponsored event, in which case the Cybersecurity Management Challenges Symposium engages a third-party mailing house and does not share your mailing address directly with the sponsor.

 

If you do not wish to have your information included in an attendee list or to receive information from sponsors, co-sponsors and/or exhibitors, you can express your preferences when you register for the event or you may contact the Cybersecurity Management Challenges Symposium directly at cybersymposium2022@gmail.com. Sharing your personal information with a sponsor allows you to receive the content for free.

 

We do give attendees a choice not to receive marketing messages from the sponsor or from the Cybersecurity Management Challenges Symposium.

The site of the Cybersecurity Management Challenges Symposium informs you about the sessions, the topics, and the venues.

 

The Cybersecurity Management Challenges Symposium uses Google Analytics to track how often people gain access to the website and to its content. Cybersecurity Management Challenges Symposium employs measures from simple postcards to third-party tools and service providers for automated data collection and processing purposes.

By contractual agreement, these providers will not use or share your data for any purposes outside the agreement, and only hold the data in line with our policy on data retention. 

There are many features on this website for which no registration is required, so we employ other methods to collect information that we use to improve our communications and services to you.

We will collect your personal data to provide you with your certification of participation. Only authorized employees within the Cybersecurity Management Challenges Symposium have access to your certification and personal information.

If you correspond with us by email, the postal service, or other form of communication, we may retain such correspondence and the information contained in it and use it to respond to your inquiry; to notify you of Cybersecurity Management Challenges Symposium other services; or to keep a record of your complaint, request, or similar concern. As always, if you wish to have the Cybersecurity Management Challenges Symposium “erase” your personal information or otherwise refrain from communicating with you, please contact us at cybersymposium2022@gmail.com

We use different types of cookies and other technologies to collect this information. If you want to remove or block Cookies from your device at any time, you can update your browser settings (consult your browser's "help" menu to learn how to remove or block Cookies).

 

See Cookie notice  below for more information on how we use cookies to make our site more interesting, useful, and targeted to your interests. 

 

Note: if you ask us not to contact you by email at a certain email address, we will retain a copy of that email address on our “master do not send” list in order to comply with your no-contact request.

The Cybersecurity Management Challenges Symposium has a legitimate interest in maintaining personal information of those who communicate voluntarily with us.

Purposes for Processing Data

As explained above, we process your data to provide you with the goods or services you have requested or purchased from us, including the events, content and certification. We use this information to refine our goods and services to better tailor them to your needs and to communicate with you about other services the Cybersecurity Management Challenges Symposium offers that may assist you, provide you with promotional materials that you might find interesting, internal business analysis and reporting, and other purposes consistent with this notice. Categorized as either relationship maintenance or promotional uses, these purposes include, but are not limited to, the following:

  • Promotions and discounts, and other services related to your interests.

  • Payments.

  • Maintaining relationships.

  • Personal and remote or virtual meetings, tele and video conference conversations.

Payment information

You may choose to purchase goods or services from us using a payment card. Typically, payment card information is provided directly by users, via the Cybersecurity Management Challenges Symposium website, into payment processing service to which the Cybersecurity Management Challenges Symposium subscribes, and the Cybersecurity Management Challenges Symposium does not, itself, process or store the card information. We strongly encourage you not to submit this information by email. When Cybersecurity Management Challenges Symposium employees receive payment card information from you by email, fax, phone it is entered as instructed and then deleted or destroyed.

Personal information we get from third parties

From time to time, the Cybersecurity Management Challenges Symposium receives personal information about individuals from third parties. This may happen, for example, if your we collect your personal data from a third-party website (e.g. LinkedIn) if you fill out a form on that website requesting content from or registering for the event.

Use of the Cybersecurity Management Challenges Symposium Website

As is true of most other websites, the Cybersecurity Management Challenges Symposium’s website collects certain information automatically and stores it in log files. The information may include internet protocol (IP) addresses, the region or general location where your computer or device is accessing the internet, browser type, operating system and other usage information about the use of the Cybersecurity Management Challenges Symposium’s website, including a history of the pages you view. We use this information to help us design our site to better suit our users’ needs.

 

We may also use your IP address to help diagnose problems with our server and to administer our website, analyze trends, track visitor movements, and gather broad demographic information that assists us in identifying visitor preferences.

The Cybersecurity Management Challenges Symposium has a legitimate interest in understanding how you use its website. This assists us with providing more relevant products and services, with communicating value to our sponsors and with providing appropriate staffing to meet your needs.

Our Website may contain links to other third party websites which may have their own privacy policies. We do not accept responsibility or liability for the policies or processing of your personal information by websites linked to or from our Website.

Children's Privacy

Our website is a general audience site, and we do not knowingly collect information about children. Should a child whom we know to be under 13 makes known to their personally identifiable information, we will use that information only to respond directly to that child to inform them that we must have parental consent before receiving their personally identifiable information.

Cookies

We make available a comprehensive Cookie Notice that describes the cookies used on the Cybersecurity Management Challenges Symposium’s website and provides information on how users can accept or reject them. To view the notice, just click here

How Do We Transmit Your Personal Data?

Your personal information may be accessed by staff or sponsors, transferred to and stored at, a location outside the European Economic Area (“EEA”) in which data protection laws may be of a lower standard than in the EEA. Certain countries outside the EEA have been approved by the European Commission as providing essentially equivalent protections to EEA data protection laws and therefore no additional safeguards are required to export personal information to these jurisdictions.

 

In countries which have not had these approvals, (see the full list here https://ec.europa.eu/info/law/law-topic/data-protection/international-dimension-data-protection/adequacy-decisions_en ) we will either ask for your consent to the transfer or transfer it subject to European Commission approved contractual terms that impose equivalent data protection obligations directly on the recipient unless we are permitted under applicable data protection law to make such transfers without such formalities.

Data subject rights

The European Union’s General Data Protection Regulation and Switzerland’s privacy laws provide certain rights for data subjects.

This Privacy Notice is intended to provide you with information about what personal data the Cybersecurity Management Challenges Symposium collects about you and how it is used. If you have any questions, please contact us at cybersymposium2022@gmail.com.

If you wish to confirm that the Cybersecurity Management Challenges Symposium is processing your personal data, or to have access to the personal data the Cybersecurity Management Challenges Symposium may have about you, please contact us at cybersymposium2022@gmail.com.

You may also request information about: the purpose of the processing; the categories of personal data concerned; who else outside the Cybersecurity Management Challenges Symposium might have received the data from us; what the source of the information was (if you didn’t provide it directly to the Cybersecurity Management Challenges Symposium); and how long it will be stored. You have a right to correct (rectify) the record of your personal data maintained by the Cybersecurity Management Challenges Symposium if it is inaccurate.

 

You may request that the Cybersecurity Management Challenges Symposium erase that data or cease processing it, subject to certain exceptions. You may also request that the Cybersecurity Management Challenges Symposium ceases using your data for direct marketing purposes. In many countries, you have a right to lodge a complaint with the appropriate data protection authority if you have concerns about how the Cybersecurity Management Challenges Symposium processes your personal data. When technically feasible, the Cybersecurity Management Challenges Symposium will at your request provide your personal data to you or transmit it directly to another controller.

Reasonable access to your personal data will be provided at no cost to Cybersecurity Management Challenges Symposium’s attendees sponsors and speakers upon request made to the Cybersecurity Management Challenges Symposium at cybersymposium2022@gmail.com. If access cannot be provided within a reasonable time frame, the Cybersecurity Management Challenges Symposium will provide you with a date when the information will be provided. If for some reason access is denied, the Cybersecurity Management Challenges Symposium will provide an explanation as to why access has been denied.

For questions or complaints concerning the processing of your personal data, you can email the Cybersecurity Management Challenges Symposium at cybersymposium2022@gmail.com. We will respond to your request within 72 hours and do our best to accurately accommodate the request within 30 days of receipt. Alternatively, if you are located in the European Union, you can also have recourse to the European Data Protection Supervisor or with your nation’s data protection authority.

Security of your information

To help protect the privacy of data you transmit through use of this website, we maintain physical, technical and administrative safeguards. We update and test our security technology on an ongoing basis.

 

We restrict access to your personal data to those employees who need to know that information to provide benefits or services to you. In addition, we train our employees about the importance of confidentiality and maintaining the privacy and security of your information. We commit to taking appropriate disciplinary measures to enforce our employees' privacy responsibilities.

Cybersecurity Management Challenges Symposium continues to work on implementing reasonable technical and administrative measures to safeguard and prevent any unauthorized processing of your personal data. This includes but is not limited to the combined use of physical and technical access controls, encryption, secure transmission, data minimization, and consolidation on our systems. 

We will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and data protection legal requirements. However, unfortunately, the transmission of information via the Internet is not completely secure. All information you provide to us is stored on secure servers and accessed and used subject to our security policies and standards.

Data storage and retention

Cybersecurity Management Challenges Symposium will store your data for as long as necessary for the purposes it was collected and regulatory requirements. So, if information is used for two purposes, we will retain it until the purpose with the latest period expires; but we will stop using it for the purpose with a shorter period one that period expires.

 

Obsolete and useless data will be securely destroyed. Your personal data is stored by the Cybersecurity Management Challenges Symposium on its servers. Our retention periods are based on event’s needs and your information that is no longer needed is either irreversibly anonymized (and the anonymized information may be retained) or securely destroyed.

 

For more information on where and how long your personal data is stored, and for more information on your rights of erasure and portability, please contact at cybersymposium2022@gmail.com.

Changes in this Privacy Notice

We may change the content of our Website and how we use cookies without notice, and consequently our Privacy Policy may change from time to time in the future.

 

We therefore encourage you to review them when you visit the Website from time to time to stay informed of how we are using personal information.

This Privacy Policy was last updated on 27 October 2022.

Questions, concerns or complaints

If you have questions, concerns, complaints, or would like to exercise your rights, please write us at: cybersymposium2022@gmail.com