Privacy
Cyber 8 is an open forum of contributors, some whom have independently
undertaken an effort to provide this Site for the benefit of facilitating
communications with other contributors. Personal information received through this Site may be used by the Operators in accordance with this Privacy Policy.
1. SCOPE AND APPLICABILITY
This Privacy Policy applies to personal information collected through this Site.
2. CONSENT
This Privacy Policy provides transparency about how we collect, process, and
share personal information. By interacting with us, you consent to our collection and use of your personal information as disclosed in this Privacy Policy.
This Privacy Policy may be updated from time-to-time based on changes in the
law and changes in our privacy practices. If we intend to use your personal
information for purposes different than those for which it was collected, we will seek your consent prior to making such changes.
3. INFORMATION WE COLLECT AND RECEIVE
Usage Data. We collect a variety of information (some of which may be
personally identifiable to you) from individuals who access our website and
online services. This information includes:
- Log Data – Information collected by our servers when you access our website through your browser, including your Internet Protocol (IP) addresses, referral URLs, browser type and settings, date and time of usage, language preferences, and cookie data
- Device Information – Information collected about your device, including the type of device, operating system, application IDs, and unique device identifiers and crash data
- Location Data – Approximate location information based on your IP address combined with other information, including information about your browser and device
Other Information. If you interact with us by contacting or interfacing with us,
we may collect personal information made available to us through such
interactions. This information may include:
- Contact Information – Your name, phone number, email address, and physical address, etc.
- Other Information – Anything else you may share or is gleaned from your interactions with us
4. USE OF PERSONAL INFORMATION
We may use personal information collected to provide this Site and for the
purpose of facilitating communications with other contributors.
Other uses of personal information include:
- Communicating with you and others by email, phone, and other means
- Providing information about Cyber 8
- Detecting and preventing abuse and security issues
- Complying with legal and regulatory obligations
To the extent that may be required by law, our use of your personal information shall be consistent with the purposes disclosed to you in this Privacy Policy.
If your personal information is de-identified or anonymized through aggregation or by other means to the extent that it can no longer reasonably identify you, then this information will no longer be considered “personal information” under this Privacy Policy.
5. DATA RETENTION AND DISPOSAL
We may retain and dispose of personal information in accordance with our data retention and disposal policies, if any, consistent with applicable law.
6. HOW WE SHARE INFORMATION
The categories of third parties with whom your information may be shared
include:
- Cyber 8 Contributors – We may share your personal information with other Cyber 8 contributors
- Service Providers – We may share personal information with our service providers as needed to operate our business, including with our computing, web services, and storage service providers
- Vendors and Partners – We may share your personal information with our vendors and partners, including other attorneys, experts, investigators, and consultants with whom we work
- Business Services – We may share personal information with our business services providers in the operation of our business, including security vendors, developers, auditors, analytics service providers, and professional advisors
- Government and Legal – We may share any category of personal information with third parties as may be required by applicable law, regulation, or legal process
7. INQUIRING ABOUT YOUR PRIVACY
If you have an established relationship with us, please contact us using the
normal channels through which we communicate with you. Otherwise, you may make an inquiry by emailing inquiries@cyber8.org.
8. COOKIE NOTICE AND “DO NOT TRACK” REQUESTS
We use cookies to track user interactions and personalize your user experience.
For example, we may use Google Analytics to collect and process such data. You can learn how Google uses this data here: www.google.com/policies/privacy/partners/ In such cases, the privacy policies of these third party providers, including Google, will govern how your personal
information may be used.
In accordance with the California Online Privacy Protection Act (CalOPPA), we
want to inform you about our “Do Not Track” (“DNT”) request policy. DNT is a
feature that some web browsers offer to allow users to send signals to websites
so that no information about their browser session will be shared. You may
enable your web browser to send our website a DNT request, but your browsing and user experience may be degraded. You can learn more about how DNT works here: https://www.eff.org/issues/do-not-track
9. CHILDREN’S DATA
In accordance with the Children’s Online Privacy Protection Act (“COPPA”) and other state laws, our website and associated services are not marketed to
children under sixteen (16) years of age and we do not intentionally collect
information from children. We encourage parents and guardians to take
appropriate steps to ensure the safety and privacy of their children online.
10. INFORMATION SECURITY
We work hard to protect our systems from harm and to safeguard the
confidentiality, integrity, and availability of personal information. Our efforts
generally include utilizing strong encryption and leveraging physical, technical,
and administrative controls to prevent the unauthorized access to and
disclosure of personal information. However, it would be naïve to assume that
any amount of diligence could prevent every conceivable risk to your personal
data. We encourage all users to exercise caution when interacting with our
website and services, just as they would any other website.
Good security starts with good personal security hygiene. We recommend that
you connect to our website over secure networks and stay alert to unusual or
suspicious activities.
If any personal information we possess is the subject of a data breach and your
personal data is implicated according to any U.S. state or federal law that may
apply, then we will take such action, as such law or laws may require.