The legal bit
Nexor respects your privacy
Any personal information you provide us through our contact form or any other form including and similar to your name, address, organisation, telephone number and e-mail address will not be released, sold, or rented to any entities or individuals outside Nexor.
We collect your information so that we can contact you, or your company, for marketing purposes. If you wish to opt out of being contacted, then please contact us, and we will remove your details.
We protect your information using good practice security, independently assessed to meet the requirements of ISO 27001 and Cyber Essentials Plus.
Like millions of other websites, we use Google Analytics on www.nexor.com.
Google Analytics is a piece of software that grabs data about our visitors (you). It’s something like an advanced server log.
What does Google Analytics record?
- What website you came from to get here;
- How long you stay for;
- What kind of computer you’re using;
- And quite a bit more.
What do we do with your data?
The tracking information allows us to better understand the kind of people who come to our site and what content they are reading. This allows us to make better decisions about design and writing to provide more information of interest to our visitors.
Occasionally, we will compile aggregate statistics about the number of visitors this site receives and browsers being used. No personally identifying data is included in this type of reporting.
All of our activity falls within the bounds of the Google Analytics Terms of Service.
Remember the risks whenever you use the Internet
While we do our best to protect your personal information, we cannot guarantee the security of any information that you transmit to Nexor and you are solely responsible for maintaining the secrecy of any passwords or other account information.
In addition, other Internet sites or services that may be accessible through Nexor have separate data and privacy practices independent of us, and therefore we disclaim any responsibility or liability for their policies or actions. Please contact those vendors and others directly if you have any questions about their privacy policies.
For any other information please contact us.
RECENT BLOG POSTS
Traditionally, our approach to managing cyber security risks has been ‘static’ – in the sense that the threat analysis, risk assessment and treatment plan are performed as manual operations ‘up front’ of solution deployment – usually as part of a Secure Development Lifecycle (SDL) – such as Nexor’s CyberShield Secure Development methodology.
For our 2017 Christmas greetings we ran a Nexor Treasure Hunt asking our customers to find the link between Nexor and the buildings in the images below.
Whilst the global online environment is seeing an increase in cyber threats, companies and government bodies still need to share information, including sensitive intelligence documents, in a secure way within their organisation.
Be the first to know about developments in secure information exchange