The legal bit
Nexor respects your privacy
Any personal information you provide us through our contact form or any other form including and similar to your name, address, organisation, telephone number and e-mail address will not be released, sold, or rented to any entities or individuals outside Nexor.
We collect your information so that we can contact you, or your company, for marketing purposes. If you wish to opt out of being contacted, then please contact us, and we will remove your details.
We protect your information using good practice security, independently assessed to meet the requirements of ISO 27001 and Cyber Essentials Plus.
Like millions of other websites, we use Google Analytics on www.nexor.com.
Google Analytics is a piece of software that grabs data about our visitors (you). It’s something like an advanced server log.
What does Google Analytics record?
- What website you came from to get here;
- How long you stay for;
- What kind of computer you’re using;
- And quite a bit more.
What do we do with your data?
The tracking information allows us to better understand the kind of people who come to our site and what content they are reading. This allows us to make better decisions about design and writing to provide more information of interest to our visitors.
Occasionally, we will compile aggregate statistics about the number of visitors this site receives and browsers being used. No personally identifying data is included in this type of reporting.
All of our activity falls within the bounds of the Google Analytics Terms of Service.
Remember the risks whenever you use the Internet
While we do our best to protect your personal information, we cannot guarantee the security of any information that you transmit to Nexor and you are solely responsible for maintaining the secrecy of any passwords or other account information.
In addition, other Internet sites or services that may be accessible through Nexor have separate data and privacy practices independent of us, and therefore we disclaim any responsibility or liability for their policies or actions. Please contact those vendors and others directly if you have any questions about their privacy policies.
For any other information please contact us.
RECENT BLOG POSTS
The average car manufactured today contains over 100 million lines of code. This represents a huge data surface which threat actors can attack to alter a component’s behaviour from its originally intended function. On top of this, new security implications will arise...
The Issue of Phishing Attacks 90% of security attacks start with a phishing attempt. This is because attackers want to get hold of your password. Once they have obtained this, they can become you, and access wherever you can access. Passwords work as a “share secret”...
When talking to board members and senior executives of SMEs about cyber security, a common phrase we hear is “It won’t happen to us”. This is justified by “We are not sufficiently important”, or “We don’t have anything they would want”. “Well, it did”, Ian Major of...
Be the first to know about developments in secure information exchange