The legal bit
Nexor respects your privacy
Any personal information you provide us through our contact form or any other form including and similar to your name, address, organisation, telephone number and e-mail address will not be released, sold, or rented to any entities or individuals outside Nexor.
We collect your information so that we can contact you, or your company, for marketing purposes. If you wish to opt out of being contacted, then please contact us, and we will remove your details.
We protect your information using good practice security, independently assessed to meet the requirements of ISO 27001 and Cyber Essentials Plus.
Like millions of other websites, we use Google Analytics on www.nexor.com.
Google Analytics is a piece of software that grabs data about our visitors (you). It’s something like an advanced server log.
What does Google Analytics record?
- What website you came from to get here;
- How long you stay for;
- What kind of computer you’re using;
- And quite a bit more.
What do we do with your data?
The tracking information allows us to better understand the kind of people who come to our site and what content they are reading. This allows us to make better decisions about design and writing to provide more information of interest to our visitors.
Occasionally, we will compile aggregate statistics about the number of visitors this site receives and browsers being used. No personally identifying data is included in this type of reporting.
All of our activity falls within the bounds of the Google Analytics Terms of Service.
Remember the risks whenever you use the Internet
While we do our best to protect your personal information, we cannot guarantee the security of any information that you transmit to Nexor and you are solely responsible for maintaining the secrecy of any passwords or other account information.
In addition, other Internet sites or services that may be accessible through Nexor have separate data and privacy practices independent of us, and therefore we disclaim any responsibility or liability for their policies or actions. Please contact those vendors and others directly if you have any questions about their privacy policies.
For any other information please contact us.
RECENT BLOG POSTS
What is High Assurance? As computer security systems have evolved over the years, hackers have become more sophisticated. Their methods have changed, targeting any vulnerabilities to try and find a way into a system. No business is immune from cyber attacks,...
Back to the basics with Cyber Essentials Four years is a long time in cyber security; a lot can change in that time. But surprisingly, a lot also stays the same. Back in 2016, the National Cyber Security Centre released a white paper on Common Cyber Attacks: Reducing...
The King is Dead, Long Live the King! For the last few years, the cyber security commentary has been if you focus on the basics, and do the basics well, you will prevent 90% plus of cyber security attacks. To many this has been interpreted as doing the “Cyber...
Be the first to know about developments in secure information exchange