The legal bit
Nexor respects your privacy
Any personal information you provide us through our contact form or any other form including and similar to your name, address, organisation, telephone number and e-mail address will not be released, sold, or rented to any entities or individuals outside Nexor.
We collect your information so that we can contact you, or your company, for marketing purposes. If you wish to opt out of being contacted, then please contact us, and we will remove your details.
We protect your information using good practice security, independently assessed to meet the requirements of ISO 27001 and Cyber Essentials Plus.
Like millions of other websites, we use Google Analytics on www.nexor.com.
Google Analytics is a piece of software that grabs data about our visitors (you). It’s something like an advanced server log.
What does Google Analytics record?
- What website you came from to get here;
- How long you stay for;
- What kind of computer you’re using;
- And quite a bit more.
What do we do with your data?
The tracking information allows us to better understand the kind of people who come to our site and what content they are reading. This allows us to make better decisions about design and writing to provide more information of interest to our visitors.
Occasionally, we will compile aggregate statistics about the number of visitors this site receives and browsers being used. No personally identifying data is included in this type of reporting.
All of our activity falls within the bounds of the Google Analytics Terms of Service.
Remember the risks whenever you use the Internet
While we do our best to protect your personal information, we cannot guarantee the security of any information that you transmit to Nexor and you are solely responsible for maintaining the secrecy of any passwords or other account information.
In addition, other Internet sites or services that may be accessible through Nexor have separate data and privacy practices independent of us, and therefore we disclaim any responsibility or liability for their policies or actions. Please contact those vendors and others directly if you have any questions about their privacy policies.
For any other information please contact us.
RECENT BLOG POSTS
Information Security is at a crossroads; we have more and more tools available to mitigate attacks but the number of security incidents such as data breaches is on the rise - why is this? Everyone thinks they know what they should be doing when it comes to information...
Going through Scrum Master training gave me one of the greatest leadership tools I’ve ever received, one that I use on a daily basis within my role as a Product Manager, but also as a leader in my organisation and in the wider community. It's a mindset that's called...
Are We Looking for Unicorns Are we looking for realistic combinations of skills and certifications in cyber security recruitment, or are we looking for mythical candidates who, like unicorns, simply don't exist? That was the question posed on Monday 8th February,...
Be the first to know about developments in secure information exchange