We also ask you to provide personal information (your email address, name) in order to be able to periodically send you software security insights via our newsletter or to create a user account with which you can access member-only content such as our video courses. We only collect your credit card information for purchases of services or products. Your credit card information is used but never stored on our servers.
Lastly, if you complete our Free Software Security Assessment, we collect information about your company's software security practices, so we can recommend custom solutions for improving your security.
Use of the Data
We only use your personal information to provide you access to Resilient's services or to communicate with you about the services or the Website.
We employ industry-standard techniques to protect against unauthorized access of data about you that we store, including personal information like your email address.
Sharing of Data
We don't share your personal or company information with third parties. Only aggregated, anonymized data about your interaction with our website is periodically transmitted to external services to help us improve Resilient's Website and service. We currently use Google Analytics (traffic analysis, SEO optimization, and advertising of Resilient's services and products), HotJar (traffic analysis), and LinkedIn Pixel (Traffic Analysis and advertising of Resilient's services and products). Feel free to check out their own Privacy Policies to find out more.
We also use social buttons provided by services like Twitter and LinkedIn. Your use of these third-party services is entirely optional. We are not responsible for the privacy policies and/or practices of these third-party services, and you are responsible for reading and understanding those third-party services’ privacy policies.
We may choose to buy or sell assets. In these types of transactions, user information is typically one of the transferred business assets. Moreover, if we, or substantially all of our assets, were acquired, or if we go out of business or enter bankruptcy, user information would be one of the assets that is transferred or acquired by a third party. You acknowledge that such transfers may occur and that any acquirer of us or our assets may continue to use your personal information as set forth in this policy.
Should you have any questions or concerns, please write to email@example.com.