The legal bit
Nexor respects your privacy
Any personal information you provide us through our contact form or any other form including and similar to your name, address, organisation, telephone number and e-mail address will not be released, sold, or rented to any entities or individuals outside Nexor.
We collect your information so that we can contact you, or your company, for marketing purposes. If you wish to opt out of being contacted, then please contact us, and we will remove your details.
We protect your information using good practice security, independently assessed to meet the requirements of ISO 27001 and Cyber Essentials Plus.
Like millions of other websites, we use Google Analytics on www.nexor.com.
Google Analytics is a piece of software that grabs data about our visitors (you). It’s something like an advanced server log.
What does Google Analytics record?
- What website you came from to get here;
- How long you stay for;
- What kind of computer you’re using;
- And quite a bit more.
What do we do with your data?
The tracking information allows us to better understand the kind of people who come to our site and what content they are reading. This allows us to make better decisions about design and writing to provide more information of interest to our visitors.
Occasionally, we will compile aggregate statistics about the number of visitors this site receives and browsers being used. No personally identifying data is included in this type of reporting.
All of our activity falls within the bounds of the Google Analytics Terms of Service.
Remember the risks whenever you use the Internet
While we do our best to protect your personal information, we cannot guarantee the security of any information that you transmit to Nexor and you are solely responsible for maintaining the secrecy of any passwords or other account information.
In addition, other Internet sites or services that may be accessible through Nexor have separate data and privacy practices independent of us, and therefore we disclaim any responsibility or liability for their policies or actions. Please contact those vendors and others directly if you have any questions about their privacy policies.
For any other information please contact us.
RECENT BLOG POSTS
What Is Zero Trust? The term ‘Zero Trust’ was first coined by John Kindervag in 2010, building off a concept put forward by David Lacey at the Jericho Forum, an international group founded in 2004 that worked to promote deperimeterization. Deperimeterization means to...
You may see the term ‘threat actor’ within risk assessments or other articles - but what is a threat actor? Threat actors are people or entities who are responsible for an incident that impacts the cyber security of another person or organisation. Cyber threat actors...
So, you have moved to Office 365. I can imagine that your IT department is rejoicing the fact they will never again have to run ESEUTIL, especially at 2am on a corrupt exchange database - it’s an experience nobody wants. Office 365 offers a secure, resilient,...
Be the first to know about developments in secure information exchange