Privacy policy

Thank you for visiting the National Cybersecurity Cluster’s website. The National Cybersecurity Cluster is committed to protecting the privacy of its visitors and has created this privacy policy to disclose our information gathering and dissemination practices for www.cybersecuritycluster.org.ua. We will not collect personal information about you when you visit our website unless you choose to provide that information to us.

This privacy policy explains:


– What information we automatically collect about you;
– Information you may submit;
– Choices you have about the use of your information;
– How you can access information we maintain about you;
– How we protect your information;
– Use of cookies on our site;
– Additional information about our policy;
– How you can contact us.

Information We Automatically Collect and Store

As is true of most websites, certain information is automatically collected when you visit us to browse through our site, read pages or download information. The information is not personal and cannot and will not be traced back to you. The information is:
– The Internet domain and IP address from which you access our website;
– The type of browser and operating system used to access our site;
– The date and time you access our site;
– The pages you visit;
– If you linked to the National Cybersecurity Cluster’s site from another website, and the address of that website.

We use this information to help us make our site more useful to visitors — to learn about the number of visitors to our site and the pages they visit. We do not track or record information about individuals and their visits.

Information You Submit

If you choose to register with us for any of our newsletters, to donate to the National Cybersecurity Cluster or to serve as an expert reviewer for the National Cybersecurity Cluster the information will be collected in a database and used for the specific activity for which you provided the information. We use the same database for periodic mailings about the National Cybersecurity Cluster activities. If you choose not to receive such materials in the future, simply click the ‘unsubscribe’ button on the bottom of a message we send. We will not share your information with any other organization without your permission. If you send a resumé, that information will be used only to consider your application for a job and to contact you for purposes related to the application. We will keep your resumé on file for up to six months. If you use the National Cybersecurity Cluster’s electronic proposal submission system to apply for funding opportunities, grant programs or the National Cybersecurity Cluster Solutions, any information voluntarily submitted as part of that process will be used and protected as explained under the specific program’s application guidelines. Program guidelines are linked directly to each program’s application. If you choose to make an online donation to the National Cybersecurity Cluster or to otherwise sponsor an event of the National Cybersecurity Cluster, you may provide your credit card billing information. As this information is collected and transferred over the Internet to our secure server, it is encrypted using Secure Socket Layer (SSL) technology, the industry standard security technology that is designed to protect sensitive information. Our donation pages display the Verisign Secure Site Seal to assure you that our Website is authentic and that all transactions are secured by SSL encryption. If you are making a donation, the credit card information that you provide at the time of donation is used only to process your donation and will not be used by us for any other purposes and will not be retained after the transaction has been processed. In the event you wish to update or delete any information in our possession at any time for any reason, please contact the National Cybersecurity Cluster at [email protected] to make a request.

How We Protect Your Information

Protecting your privacy and your information is a top priority for the National Cybersecurity Cluster. We continue to make every effort to protect your data from loss, misuse, unauthorized access or disclosure, alteration, or destruction. Inside the National Cybersecurity Cluster data is stored in password-controlled servers with limited access. Your information is only accessible to those employees who need it to perform their jobs. All the National Cybersecurity Cluster employees are aware of our privacy and security policies.

Use of Cookies

A cookie is a small packet of information web applications use to store persistent state information on the user’s computer. The National Cybersecurity Cluster does not use cookies to retrieve any information from your computer. Some areas of the National Cybersecurity Cluster’s website make use of a special type of cookie, a session cookie, to process your session. Unlike other cookies, session cookies are not intended to provide a permanent means for tracking users across multiple visits to a website. The session cookie is deleted from your computer when you close your browser.

Additional Information

No transmission of data over the Internet is guaranteed to be completely secure. It may be possible for third parties not under the control of the National Cybersecurity Cluster to intercept or access transmissions or private communications unlawfully. While we strive to protect your personal information, the National Cybersecurity Clustercannot ensure or warrant the security of information you transmit to us. Any such transmission is done at your own risk. The National Cybersecurity Cluster reserves the right to change this privacy policy at any time. Any such changes will be posted online.

Your Help Is Needed

Although The National Cybersecurity Cluster does its best to protect your privacy on this website, we need your help. You can help in the following ways:
1. You have control over your own privacy. Think carefully before providing any personal information;
2. Although this site has security measures in place to protect the loss, misuse, and alteration of the information under our control, no email or web transmission is completely secure against interception. If you are worried because your communication is very sensitive, do not send it via email or submit it online. See below for additional ways to contact us;
3. Remember that we cannot protect your privacy once you leave our sites, such as by “hyperlink.” So when you visit other websites, check each site’s privacy policy yourself, and be careful about the information you offer up;
4. We may send your personalized information via email or provide personalized links in emails that allow data fields to be automatically populated with certain personal information. Therefore, you should always keep your email account information secure and not allow others to access your email account;

In addition to the records left on your computer by cookies, your browser and operating system contain other records of your web browsing and other actions (e.g., browser history). As with cookies, you can find information about how to clear these history trails in your browser’s “Help” section or through other websites that provide detailed information for each browser and operating system.

GENERAL PRIVACY STATEMENT

he National Cybersecurity Cluster collects personal information from external parties such as technical reviewers, panel members, site visit experts, consultants, applicants and grantees.

Definition of Personal Data

Though the specific type of information the National Cybersecurity Cluster gathers depends on the circumstance, personal data collected may include:
– Personal and professional contact information including address, phone, fax, email;
– Tax identification number or Social Security number;
– Date and/or place of birth;
– Driver’s License number;
– Passport information;
– Citizenship and Residency status;
– Work history and related information;
– Bank account information (to facilitate electronic transfers to grantees, vendors and contractors);
– Credit card information;
– Level of educational attainment; (may be determined implicitly from publicly disseminated information based on academic titles, e.g., Dr. Joseph Johnson, Prof. Jane Jones).

Purpose for Collection of Personal Data

The National Cybersecurity Cluster gathers this information for one or more of the following reasons:
– Compliance with export control and other applicable regulations;
– Required reporting for tax purposes;
– Verification of identity for bank transfers;
– Reporting (in the aggregate) to sponsors on composition of applicant or grantee base;
– Provision of information necessary for execution of the peer review, grant or contracting process;
– Internal monitoring and evaluation of National Cybersecurity ClusterPrograms to determine their impact and efficacy;
– Dissemination of information (in the aggregate) on the National Cybersecurity Cluster activities, e.g., percent of female participants in National Cybersecurity Cluster Programs by country or region.

Handling of Personal Information

With the exception of the dissemination of information on the National Cybersecurity Clusteractivities referenced above, the National Cybersecurity Cluster will use any information you submit only for the purposes for which it was submitted. The National Cybersecurity Cluster does not share personal information with external parties unless specifically required by law or in order to fulfill funder requirements for reporting in the aggregate on applicant, participant or grantee base. Under no circumstances will the National Cybersecurity Cluster sell, share or otherwise exchange personal data for commercial purposes. The National Cybersecurity Cluster has established internal protocols for safe handling of information received via e-mail to protect data of the sender.

Audit

The National Cybersecurity Cluster conducts periodic internal and external audits of staff written and electronic records to ensure compliance with this policy. We will update this policy for handling of personal information as we deem necessary, so please be sure to reread it each time you plan to submit personal data to the National Cybersecurity Cluster. By submitting your personal information to us, you are agreeing that the National Cybersecurity Cluster may use the information in accordance with this privacy policy. The National Cybersecurity Cluster reserves the right to change this privacy policy at any time. Any such changes will be posted online.