Last updated: March 26, 2021
Cyber Tech & Risk provides an opportunity for individuals to learn about technology, risk and security through various programs we offer such as industry events, conferences, and content we post on our website. We aim to build knowledge and connect people in order to gain skills, identify new opportunities, advance career development, and expand professional networks.
INFORMATION WE MAY COLLECT
This section informs you about what type of personal information we may collect about you when you interact with us, such as on our website or when registering for an event.
Contact Information. We may collect your name, email address, phone number, and address when you register for an event or subscribe to our mailing list. We may also collect information such as your company or organization name and your role within your company so that we can communicate with you based on your role and industry.
Transactional Information. We may collect financial information, such as credit card information or bank account information, for financial transactions, through our third party payment processors.
Demographic and Other Information. We may collect your IP address when you use our website. We may also collect demographic information about you, such as country, region, and city. This information allows us to understand how our website users spend time on our website, the pages accessed, and the type of device used when they visit our website.
Photographs and Audio Data. We may record or take photographs of some or all of our events, which may feature those who are in attendance, including speakers, attendees, sponsors or exhibitors. If you are a speaker, we may store video or audio recordings of your presentation.
HOW WE COLLECT INFORMATION
Directly From You. Generally, we collect personal information directly from you when you provide us with your information via our website or when you email us. For example, we may collect your personal information in the following ways:
- When you sign up for Cyber Tech & Risk marketing materials such as newsletters or promotions.
- When you register for an event.
- If you attend our event, we may collect information about if you allow us to scan your attendee badge or QR code, when you provide a business card, or any other method whereby you choose to share your information with us.
Through the Use of Technology. Similar to most websites, we may collect certain information about you when you visit our website through the use of standard technology, such as web beacons or cookies. The information we collect may include IP addresses, the region or general location where you are accessing the website, browser type, website pages accessed, and access times.
The information is often de-identified and aggregated to provide us with the opportunity to manage our website, help resolve problems, analyze the use of our website, and optimize your experience on the website.
Cookies and Use of Cookie Data: A ‘cookie’ is a small data file sent to your computer when you visit a website. When you revisit the website, the cookie allows that site to recognize your browser and collect information about your website’s usage. We use the following types of cookies on our website.
- Strictly necessary cookies.These cookies are required to operate our website.
- Performance cookies.These cookies collect information about how you use our website. This data may be used to help optimize our website and make it easier for you to navigate the website.
- Functional cookies.These cookies allow our website to remember choices you make and personalize your experiences, such as remembering your preferences.
- Third-party cookies.Third-party cookies are those placed by websites and/or parties other than our website. These cookies may be used on our websites to improve our products or services. These cookies are subject to the respective privacy policies for these external services.
- Analytics cookies.These cookies allow us to understand things like how long a visitor stays on our websites, what pages they visit and how they arrived at our website.
Pixels. In addition to cookies, we sometimes use small graphic images known as ‘pixels’ (also known as web beacons, clear GIFs, or pixel tags). We use pixels in our email communications to you (if you have selected to receive such communications) to help us understand whether our email communication has been viewed. We also use third-party pixels (such as those from Google and other advertising networks) to help us provide advertising that is relevant to your interests.
HOW WE USE INFORMATION
We mainly process your personal information to fulfill a service order, such as registration to an event we are hosting. In doing so, we provide you with the services you have requested or purchased from us, including live events, recorded events, and other content. We use this information to refine our services and tailor them to your needs as well as to communicate with you about other services we offer that may help you.
Cyber Tech & Risk has a legitimate interest to process your information to better understand our customers’ needs, concerns, and interests and ensure we operate optimally. At times, we may rely on your consent to process your information.
To Provide You with Our Services. If you are an attendee at one of our events, we may use your personal information for a legitimate business purpose, including event registration and processing payments. We may also require your personal information to:
- Provide customer support and quality assurance;
- Deliver functionality on our website and for its technical and functional management
If you are a presenter at one of our events, we may collect information about you, including your name, company name, contact information, and photographs and/or video or audio recordings. We may also collect information provided by event attendees who evaluated your performance as a presenter.
To Contact You. We require your contact information for transactional communication, including responding to your requests and inquiries or communicating with you about standard business administrations, such as event changes/cancellations to scheduled events.
To Process Payments. We use your personal information to process payments to the extent that doing so is necessary to complete a transaction and perform our contract with you or your company.
To Build a Relationship with You. We may communicate with you for marketing purposes or to provide you with content we think would be relevant to you, including promotions on services or upcoming events. We may process your information to manage our relationship, communicate with you, and keep records of our communications.
To Improve Our Services. We might use your personal information to customize your experience with us, including displaying content based on your preferences. This may involve analyzing, developing, improving, and optimizing our website and services.
To Comply with our Legal Requirements. We might be required to collect personal information to comply with our legal obligations, such as complying with our tax reporting obligations or to verify your identity.
Other. We may use personal information for other purposes for which you have consented or have been notified through other means or as required by applicable law.
WHO WE DISCLOSE INFORMATION TO
We may disclose your personal information to a third party for various purposes, including:
- to perform functions on our behalf such as an event platform, in which case those parties are obligated use your personal information solely for the purpose of performing services for us and for no other purpose
- to assist us in developing our services
- to provide us with analytics and insights
- to process your payments
- if our company or assets are acquired by or merged with another company
- if required to do so to comply with relevant laws or respond to subpoenas or warrants served on us or to protect/defend our company’s rights, customers, or users of our website.
The events that we host may be sponsored. We may provide an attendee list to sponsors, co-sponsors and exhibitors of our events. We may also allow sponsors, co-sponsors and/or exhibitors to send you material by email once per sponsored event. If you do not wish to have your information included in an attendee list you can contact Cyber Tech & Risk directly at email@example.com to have your name removed from the list.
When disclosing your personal information, we limit the information we provide to the third parties to only that which is necessary to fulfill their service. In certain circumstances, you may be required to submit your personal information directly to the third party event platform, when registering for our event.
HOW WE COLLECT YOUR CONSENT
We assume you provide us with consent to collect, use and disclose your personal information, such as when you register for an event on our website. We also assume we have your consent to collect your personal information when you visit or interact with our website.
We may seek your explicit consent in certain circumstances, such as before sending you newsletters or when the law requires us to do so.
You may withdraw your consent at any time, subject to legal or contractual restrictions. For example, you may unsubscribe from receiving commercial emails from us by clicking on the “unsubscribe” link provided at the bottom of our emails or contacting us. Please note that by withdrawing your consent, our services to you may be limited as we may not be able to provide you with our services without necessary information. To the extent this occurs, we will inform you.
If you have any questions about withdrawing your consent, please contact us at firstname.lastname@example.org.
Exhibitors at our in-person events may wish to scan your badge or QR code on your event ticket, as an example, so they can contact you with more information. By allowing an exhibitor to scan your badge, you consent to provide the exhibitor with your contact information so that they may contact you after the event. If you do not wish the exhibitor to contact you, please communicate this directly with the exhibitor at the event or thereafter. In addition, for virtual events, by visiting exhibitors’/sponsors’ virtual booths, the exhibitor and/or sponsor may collect your contact information, and thereafter you may be contacted by the exhibitor post-event.
WHERE WE STORE YOUR INFORMATION
HOW WE PROTECT YOUR PERSONAL INFORMATION
Our Services are not intended for nor do we knowingly collect personal information from children under 16 years of age. No one under age 16 should provide any personal information to or on our website. If we learn we have collected or received personal information from a child under 16 without verification of parental consent, we will delete that information. If you believe we might have any information from or about a child under 16, please contact us at email@example.com.
YOUR RIGHTS AND CHOICES
If you wish to withdraw from direct email marketing communications from Cyber Tech & Risk, you can always click the “unsubscribe” button included in our emails. Please note, you cannot unsubscribe from some emails such as those related to the provision of our services (e.g. event registrations, payments and security notifications).
How to Control Cookie Settings
Most web browsers are set to accept cookies. However, you can change your browser setting to refuse, remove, or block cookies. Changing your settings may affect the functionality of our website and how you interact with it. Choosing to visit and/or use our website without disabling cookies indicates your consent for using the cookies on our website.
To opt-out of analytics on our websites, you may adjust your cookie preferences as described above. For more information on how to opt-out of tracking technology from Google Analytics, click here.
ACCESSING YOUR PERSONAL INFORMATION
In accordance with applicable law and upon verifying your identity, we will provide you with access to your personal information within a reasonable timeline. If you identify an inaccuracy or incompleteness in your personal information, we will amend your information and notify any third parties as required by applicable laws. Where we cannot provide you with access to your personal information, such as when the records contain the personal information of another individual or business confidential information, we will inform you of this and provide you with an explanation. If you want to dispute our decision, you may do so by contacting the Privacy Commissioner of Canada or your local Privacy Authority.
You may seek access to/or make corrections to your personal information by sending us a written request to:
or by mail to:
Cyber Tech & Risk
100 King Street West, Suite 5600
Toronto, Ontario M5X 1C9
Attention: Privacy Office
HOW TO CONTACT US
or postal mail at:
Cyber Tech & Risk
100 King Street West, Suite 5600
Toronto, Ontario M5X 1C9
Attention: Privacy Office