Menu Close

Privacy Policy

Information We Collect

We do not collect personally identifiable information (e.g., name, address, phone number, email address) unless you provide it to us. No other attempts are made by Stridium Cybersecurity Advisors (Stridium) to identify individual users or their personal usage habits. We collect only aggregate information about the numbers of individuals who visit our web site and what those individuals look at. This website uses industry-standard software to create summary statistics, which are used for such things as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.

When you click on our site’s Facebook, Twitter, LinkedIn or YouTube icons, your browser will open a new window linking you to the associated website and you are subject to that website’s privacy policy. Each platform posts a Privacy Policy for you to review regarding their service, the types of information they collect and how they use and share it. We highly recommend you understand the privacy policies of the services you use. Please also review Stridium’s social media guidelines for more information.

In addition, when you click on either the Facebook or Twitter social share icon, each of the icons open in a new window to share the content that’s applied to what you’re trying to share.

Information You Willingly Provide

When you subscribe to communications from Stridium (newsletters, email alerts, etc.) you can expect we will contact you regarding online safety; you will receive updates from Stridium about free resources and upcoming events; we do not share our contact lists (period); at times we use our lists to inform people of important events in cybersecurity or to make them aware of our new service offerings; you can opt out at any time.

How We Protect Information

For site security purposes and to ensure that this service remains available to all users, this website employs industry-standard methods to monitor network traffic to identify unauthorized attempts to upload or change information or otherwise cause damage. Unauthorized attempts to upload information or change information on this web site are strictly prohibited and may be punishable by law, including the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.