Privacy Policy – Cybersecurity Day Portal
Effective Date: 26/04/2026
1. Purpose of This Policy
Cybersecurity Day Portal exists in a domain where information itself is a security asset. This Privacy Policy explains how we handle personal data across our platform, not just as a legal requirement, but as part of our broader commitment to digital trust, operational transparency, and cyber resilience.
We operate in a high-trust, high-risk information environment. That means privacy is not treated as a formality here—it is embedded into how our systems, content, and intelligence frameworks are designed.
2. What This Policy Covers
This policy applies to all interactions with Cybersecurity Day Portal, including:
- Accessing our cybersecurity intelligence content and frameworks
- Subscribing to updates or professional resources
- Engaging with our platform, services, or communications
- Any technical interaction with our website infrastructure
3. Information We Collect
We only collect data that serves a defined operational, security, or service purpose.
Information you may provide:
- Identity and professional details (name, role, organisation)
- Contact information (email, business contact channels)
- Messages, enquiries, and form submissions
- Account or subscription details where applicable
Information generated through usage:
- IP address and network indicators
- Device, browser, and system configuration
- Navigation behaviour across the platform
- Access frequency, session duration, and engagement patterns
Security and system intelligence data:
- Authentication logs and access attempts
- Security event telemetry (e.g. anomaly detection signals)
- System performance and integrity metrics
4. How We Use Information
Data collected is used strictly to operate and improve the Cybersecurity Day Portal ecosystem, including:
- Delivering strategic cybersecurity intelligence and content
- Maintaining secure access to our platform and services
- Monitoring and defending against malicious activity
- Improving usability, structure, and performance of resources
- Supporting enterprise governance and compliance alignment
- Communicating updates, insights, and relevant service information
We do not engage in data monetisation or behavioural data resale.
5. Legal Grounds for Processing
We process personal data under the following lawful bases:
- Contract necessity – to provide access to services and content
- Legitimate interest – to ensure cybersecurity, platform stability, and service improvement
- Legal obligation – where required for regulatory or compliance purposes
- Consent – where you have explicitly opted in to communications or specific services
6. Data Sharing Principles
We treat data sharing as a controlled exception, not a default behaviour.
Data may be shared only with:
- Infrastructure and security service providers supporting platform operations
- Regulatory or legal authorities when legally required
- Selected cybersecurity collaborators in anonymised or aggregated form for threat intelligence purposes
All third parties are bound by strict confidentiality and security obligations.
7. Security Architecture
Given the nature of our content and audience, security is treated as a core system design principle rather than an add-on.
We implement:
- End-to-end encryption for data in transit and storage
- Multi-layer authentication and access governance
- Continuous threat monitoring and anomaly detection systems
- Routine penetration testing and vulnerability assessments
- Role-based access controls across all internal systems
While we apply advanced safeguards, no system connected to the internet is entirely immune from risk. We therefore encourage strong credential hygiene from all users.
8. Data Retention Strategy
We retain data only for as long as it serves a defined purpose:
- Active service delivery
- Security monitoring and incident investigation
- Legal, compliance, or audit requirements
Once data is no longer required, it is securely deleted or irreversibly anonymised.
9. Your Data Rights
Depending on your jurisdiction, you may have the right to:
- Request access to your personal data
- Correct inaccurate or outdated information
- Request deletion of your data
- Restrict or object to certain processing activities
- Withdraw consent where applicable
- Request portability of your data in structured formats
We aim to respond to all valid requests within legally required timeframes.
10. Cookies and Digital Signals
We use cookies and similar technologies not for surveillance, but for operational clarity and security reinforcement.
These may be used to:
- Maintain session integrity and authentication
- Analyse system performance and user interaction flows
- Detect abnormal or potentially malicious activity
- Improve platform stability and usability
You may adjust cookie preferences via your browser settings, though this may affect functionality.
11. International Data Handling
Cybersecurity Day Portal may operate across jurisdictions. Where data crosses borders, we apply appropriate safeguards, including:
- Standard contractual protection mechanisms
- Data transfer risk assessments
- Alignment with recognised adequacy frameworks where applicable
Security standards remain consistent regardless of geography.
12. External References
Our platform may contain links to third-party resources. These are provided for informational and professional context only.
We do not control external sites and are not responsible for their privacy practices, security standards, or content.
13. Policy Evolution
Cybersecurity is not static, and neither is this policy.
We may revise this Privacy Policy periodically to reflect:
- Changes in legal or regulatory requirements
- Advancements in platform architecture or security posture
- Updates to operational practices or service scope
All updates will be posted with a revised effective date.
14. Contact and Data Protection Queries
For privacy-related enquiries, data requests, or security concerns, please contact the CSD team