Privacy policy
This Policy applies as between you, the User of this Web Site and Deltamine Inc. the owner and provider of this Web Site. This Policy applies to our use of any and all Data collected by us in relation to your use of the Web Site and any Services or Systems therein.
1. Definitions and Interpretation
In this Policy the following terms shall have the following meanings:
"Account": means collectively the personal information, Payment Information and credentials used by Users to access Material and / or any communications System on the Web Site;
"Content": means any text, graphics, images, audio, video, software, data compilations and any other form of information capable of being stored in a computer that appears on or forms part of this Web Site;
"Cookie": means a small text file placed on your computer by Deltamine Inc. Ltd when you visit certain parts of this Web Site. This allows us to identify recurring visitors and to analyse their browsing habits within the Web Site.
"Data": means collectively all information that you submit to the Web Site. This includes, but is not limited to, Account details and information submitted using any of our Services or Systems;
"Deltamine Inc.": means Deltamine Inc., ADDRESS;
"Service": means collectively any online facilities, tools, services or information that Deltamine Inc. makes available through the Web Site either now or in the future;
"System": means any online communications infrastructure that Deltamine Inc. makes available through the Web Site either now or in the future. This includes, but is not limited to, web-based email, message boards, live chat facilities and email links;
"User" / "Users": means any third party that accesses the Web Site and is not employed by Deltamine Inc. and acting in the course of their employment; and
"Website": means the website that you are currently using (campus.deltamine.com) and any sub-domains of this site (e.g. subdomain.yourschool.com) unless expressly excluded by their own terms and conditions.
2. Data Collected
Without limitation, any of the following Data may be collected:
- 2.1 name;
- 2.2 date of birth;
- 2.3 job title & profession;
- 2.4 contact information such as email addresses and telephone numbers;
- 2.5 demographic information such as post code, preferences and interests;
- 2.6 financial information such as credit / debit card numbers;
- 2.7 IP address (automatically collected);
- 2.8 web browser type and version (automatically collected);
- 2.9 operating system (automatically collected);
- 2.10 a list of URLS starting with a referring site, your activity on this Web Site, and the site you exit to (automatically collected); and
- 2.11 Cookie information (see Clause 10 below).
3. Our Use of Data
- 3.1 Any personal Data you submit will be retained by Deltamine Inc. for as long as you use the Services and Systems provided on the Web Site. Data that you may submit through any communications System that we may provide may be retained for a longer period of up to one year.
- 3.2 Unless we are obliged or permitted by law to do so, and subject to Clause 4, your Data will not be disclosed to third parties. This includes our affiliates and / or other companies within our group.
- 3.3 All personal Data is stored securely in accordance with the principles of the Data Protection Act 1998. For more details on security, see Clause 9 below.
- 3.4 Any or all of the above Data may be required by us from time to time in order to provide you with the best possible service and experience when using our Web Site. Specifically, Data may be used by us for the following reasons:
- 3.4.1 internal record keeping;
- 3.4.2 improvement of our products / services;
- 3.4.3 transmission by email of promotional materials that may be of interest to you;
- 3.4.4 contact for market research purposes which may be done using email, telephone, fax or mail. Such information may be used to customise or update the Web Site.
4. Third Party Web Sites and Services
Deltamine Inc. may, from time to time, employ the services of other parties for dealing with matters that may include, but are not limited to, payment handling, delivery of purchased items, search engine facilities, advertising and marketing. The providers of such services do not have access to certain personal Data provided by Users of this Web Site. Any Data used by such parties is used only to the extent required by them to perform the services that Deltamine Inc. requests. Any use for other purposes is strictly prohibited. Furthermore, any Data that is processed by third parties must be processed within the terms of this Policy and in accordance with the Data Protection Act 1998.
5. Changes of Business Ownership and Control
- 5.1 Deltamine Inc. may, from time to time, expand or reduce its business and this may involve the sale of certain divisions or the transfer of control of certain divisions to other parties. Data provided by Users will, where it is relevant to any division so transferred, be transferred along with that division and the new owner or newly controlling party will, under the terms of this Policy, be permitted to use the Data for the purposes for which it was supplied by you.
- 5.2 In the event that any Data submitted by Users will be transferred in such a manner, you will be contacted in advance and informed of the changes. When contacted you will be given the choice to have your Data deleted or withheld from the new owner or controller.
6. Controlling Access to your Data
- 6.1 Wherever you are required to submit Data, you will be given options to restrict our use of that Data. This may include the following:
- 6.1.1 use of Data for direct marketing purposes; and
- 6.1.2 sharing Data with third parties.
7. Your Right to Withhold Information
- 7.1 You may access certain areas of the Web Site without providing any Data at all. However, to use all Services and Systems available on the Web Site you may be required to submit Account information or other Data.
- 7.2 You may restrict your internet browser’s use of Cookies. For more information see Clause 10 below.
8. Accessing your own Data
- 8.1 You may access your Account at any time to view or amend the Data. You may need to modify or update your Data if your circumstances change. Additional Data as to your marketing preferences may also be stored and you may change this at any time.
- 8.2 You have the right to ask for a copy of your personal Data on payment of a small fee.
9. Security
Data security is of great importance to Deltamine Inc. and to protect your Data we have put in place suitable physical, electronic and managerial procedures to safeguard and secure Data collected online.
10. Changes to this Policy
Deltamine Inc. reserves the right to change this Privacy Policy as we may deem necessary from time to time or as may be required by law. Any changes will be immediately posted on the Web Site and you are deemed to have accepted the terms of the Policy on your first use of the Web Site following the alterations.
11. Contacting Us
If there are any questions regarding this privacy policy you may contact us at campus@deltamine.com
Featured links
Get in touch
-
1140 Avenue of the Americas, 9th Floor
New York, NY 10036 -
learning@deltamine.com
-
+1 (212) 537-5899
Connect with us
Copyright © 2024
CIA Triad
Three principles of security control and management. Also known as the information security triad. Also referred to in reverse order as the AIC triad.
Three principles of security control and management. Also known as the information security triad. Also referred to in reverse order as the AIC triad.
Confidentiality
The fundamental security goal of keeping information and communications private and protecting them from unauthorized access.
The fundamental security goal of keeping information and communications private and protecting them from unauthorized access.
Integrity
The fundamental security goal of keeping organizational information accurate, free of errors, and without unauthorized modifications.
The fundamental security goal of keeping organizational information accurate, free of errors, and without unauthorized modifications.
Availability
The fundamental security goal of ensuring that computer systems operate continuously and that authorized persons can access data that they need.
The fundamental security goal of ensuring that computer systems operate continuously and that authorized persons can access data that they need.
Non-Repudiation
The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data.
The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data.
National Institute of Standards and Technology (NIST) - https://www.nist.gov
Develops computer security standards used by US federal agencies and publishes cybersecurity best practice guides and research.
Develops computer security standards used by US federal agencies and publishes cybersecurity best practice guides and research.
Cybersecurity Frameworks (CSFs)
Standards, best practices, and guidelines for effective security risk management. Some frameworks are general in nature, while others are specific to industry or technology types.
Standards, best practices, and guidelines for effective security risk management. Some frameworks are general in nature, while others are specific to industry or technology types.
Security Controls
A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA) of information.
A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA) of information.
Gap Analysis
An analysis that measures the difference between the current and desired states in order to help assess the scope of work included in a project.
An analysis that measures the difference between the current and desired states in order to help assess the scope of work included in a project.
Identity and Access Management (IAM)
A security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets like networks, operating systems, and applications.
A security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets like networks, operating systems, and applications.
Identification
The process by which a user account (and its credentials) is issued to the correct person. Sometimes referred to as enrollment.
The process by which a user account (and its credentials) is issued to the correct person. Sometimes referred to as enrollment.
Authentication
A method of validating a particular entity's or individual's unique credentials.
A method of validating a particular entity's or individual's unique credentials.
Authorization
The process of determining what rights and privileges a particular entity has.
The process of determining what rights and privileges a particular entity has.
Accounting
Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted.
Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted.
Authentication, Authorization, and Accounting (AAA)
A security concept where a centralized platform verifies subject identification, ensures the subject is assigned relevant permissions, and then logs these actions to create an audit trail.
A security concept where a centralized platform verifies subject identification, ensures the subject is assigned relevant permissions, and then logs these actions to create an audit trail.
Managerial Control
A category of security control that gives oversight of the information system.
A category of security control that gives oversight of the information system.
Operational Control
A category of security control that is implemented by people.
A category of security control that is implemented by people.
Technical Control
A category of security control that is implemented as a system (hardware, software, or firmware). Technical controls may also be described as logical controls.
A category of security control that is implemented as a system (hardware, software, or firmware). Technical controls may also be described as logical controls.
Physical Control
A category of security control that acts against in-person intrusion attempts.
A category of security control that acts against in-person intrusion attempts.
Preventive Control
A type of security control that acts before an incident to eliminate or reduce the likelihood that an attack can succeed.
A type of security control that acts before an incident to eliminate or reduce the likelihood that an attack can succeed.
Detective Control
A type of security control that acts during an incident to identify or record that it is happening.
A type of security control that acts during an incident to identify or record that it is happening.
Corrective Control
A type of security control that acts after an incident to eliminate or minimize its impact.
A type of security control that acts after an incident to eliminate or minimize its impact.
Directive Control
A type of control that enforces a rule of behavior through a policy or contract.
A type of control that enforces a rule of behavior through a policy or contract.
Deterrent Control
A type of security control that discourages intrusion attempts.
A type of security control that discourages intrusion attempts.
Compensating Controls
A security measure that takes on risk mitigation when a primary control fails or cannot completely meet expectations.
A security measure that takes on risk mitigation when a primary control fails or cannot completely meet expectations.
Chief Information Officer
A company officer with the primary responsibility for management of information technology assets and procedures.
A company officer with the primary responsibility for management of information technology assets and procedures.
Chief Technology Officer
A company officer with the primary role of making effective use of new and emerging computing platforms and innovations.
A company officer with the primary role of making effective use of new and emerging computing platforms and innovations.
Chief Security Officer
Typically the job title of the person with overall responsibility for information assurance and systems security.
Typically the job title of the person with overall responsibility for information assurance and systems security.
Information System Security Officer (ISSO)
Organizational role with technical responsibilities for implementation of security policies, frameworks, and controls.
Organizational role with technical responsibilities for implementation of security policies, frameworks, and controls.
Security Operations Center (SOC)
The location where security professionals monitor and protect critical information assets in an organization.
The location where security professionals monitor and protect critical information assets in an organization.
Development and Operations (DevOps)
A combination of software development and systems operations, and refers to the practice of integrating one discipline with the other.
A combination of software development and systems operations, and refers to the practice of integrating one discipline with the other.
DevSecOps
A combination of software development, security operations, and systems operations, and refers to the practice of integrating each discipline with the others.
A combination of software development, security operations, and systems operations, and refers to the practice of integrating each discipline with the others.
Computer Incident Response Team
Team with responsibility for incident response. The CSIRT must have expertise across a number of business domains (IT, HR, legal, and marketing, for instance).
Team with responsibility for incident response. The CSIRT must have expertise across a number of business domains (IT, HR, legal, and marketing, for instance).
Vulnerability
A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.
A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.
Threat
A potential for an entity to exercise a vulnerability (that is, to breach security).
A potential for an entity to exercise a vulnerability (that is, to breach security).
Risk
Likelihood and impact (or consequence) of a threat actor exercising a vulnerability.
Likelihood and impact (or consequence) of a threat actor exercising a vulnerability.
Internal/External
The degree of access that a threat actor possesses before initiating an attack. An external threat actor has no standing privileges, while an internal actor has been granted some access permissions.
The degree of access that a threat actor possesses before initiating an attack. An external threat actor has no standing privileges, while an internal actor has been granted some access permissions.
Threat Actor
A person or entity responsible for an event that has been identified as a security incident or as a risk.
A person or entity responsible for an event that has been identified as a security incident or as a risk.
Level of Sophistication/Capability
A formal classification of the resources and expertise available to a threat actor.
A formal classification of the resources and expertise available to a threat actor.
Resources/Funding
The ability of threat actors to draw upon funding to acquire personnel, tools, and to develop novel attack types.
The ability of threat actors to draw upon funding to acquire personnel, tools, and to develop novel attack types.
Service Disruption
A type of attack that compromises the availability of an asset or business process.
A type of attack that compromises the availability of an asset or business process.
Data Exfiltration
The process by which an attacker takes data that is stored inside of a private network and moves it to an external network.
The process by which an attacker takes data that is stored inside of a private network and moves it to an external network.
Disinformation
A type of security control that discourages inA type of attack that falsifies an information resource that is normally trusted by others.trusion attempts.
A type of security control that discourages inA type of attack that falsifies an information resource that is normally trusted by others.trusion attempts.
Blackmail
Demanding payment to prevent the release of information.
Demanding payment to prevent the release of information.
Extortion
Demanding payment to prevent or halt some type of attack.
Demanding payment to prevent or halt some type of attack.
Fraud
Falsifying records, such as an internal fraud that involves tampering with accounts.
Falsifying records, such as an internal fraud that involves tampering with accounts.
Hackers
Often used to refer to someone who breaks into computer systems or spreads viruses, ethical hackers prefer to think of themselves as experts on and explorers of computer security systems.
Often used to refer to someone who breaks into computer systems or spreads viruses, ethical hackers prefer to think of themselves as experts on and explorers of computer security systems.
Unauthorized
A hacker operating with malicious intent.
A hacker operating with malicious intent.
Authorized
A hacker engaged in authorized penetration testing or other security consultancy.
A hacker engaged in authorized penetration testing or other security consultancy.
Unskilled Attackers
An inexperienced, unskilled attacker that typically uses tools or scripts created by others.
An inexperienced, unskilled attacker that typically uses tools or scripts created by others.
Hacktivist
A threat actor that is motivated by a social issue or political cause.
A threat actor that is motivated by a social issue or political cause.