Our Policies

Read Our Policies

Terms and Conditions

 

These terms and conditions (“Terms and Conditions”) control your use of this website csexperts.in (“Website”). In these Terms and Conditions, “Cyber Security experts” is referred to as the “Company”, “us,” or “we.”

‘You’ refers as user or a paying customer. If you are a company or another person who gives access to company products, you agree to take responsibility in full in case of damages or indemnification that could properly lie against the customer.

The website of cyber security experts – csexperts.in (the ‘Site’), the educational services made available through the site and the content (the ‘Products’) are owned, operated and maintained, as applicable, by cyber security experts  (‘we’, ‘our’, ‘us’, or the ‘Company’). The Site, Products and Content are, collectively, the ‘Company Products’.

By (a) using or accessing the Company Products, including, but not limited to downloading or accessing,
(b) offering a Course through the Site or through Software; you agree to the terms and conditions set forth in these Terms of Use (the “Terms”)

BY USING THIS WEBSITE OR ITS PRODUCTS AND SERVICES, YOU AGREE AND WARRANT THAT YOU HAVE READ, UNDERSTOOD, AND AGREE TO BE BOUND BY THESE TERMS. COMPANY’S PRIVACY POLICY CAN BE FOUND AT csexperts/privacy-policy (‘Privacy Policy’). IF YOU DO NOT ACCEPT THESE TERMS, YOU MUST NOT USE – AND ARE NOT AUTHORIZED TO USE – ALL OR ANY PORTION OF THE COMPANY’S WEBSITE AND ITS PRODUCTS OR SERVICES (AS DEFINED BELOW).

Please read them carefully before you use the services of this site.

  1. This site is not to be used in an unlawful fashion; it is imperative that you adhere to the privacy policy and respect the terms and conditions of the website.
  2. Under no circumstances will the company be held responsible for any modification to the content it provides on the website through its products and services, including but not limited to any errors, omissions, loss, or damage that may be experienced in connection with the use of exposure, any content made available via our products, services, or various resources such as email, blog, etc.
  3. Our services can be accessed via the internet upon payment of the necessary fees to the company. At the same time, we are not accountable for the fees associated with the use of hardware, software, or internet services providers. In addition, the user is entirely accountable for the effective operation of computer hardware and internet access.
  4. To access certain sections of the site, you will be required to provide login credentials. The company reserves the right to deny access to our services to any user who fails to comply with these terms.
  5. We ensure that users have uninterrupted access to our service; however, there is no obligation to do so. • Cyber Security Experts is not liable for or obligated to address issues in your network or server that exceed specific guidelines.

Website usage guidelines?

  1. Do not post, distribute, or disseminate any content or information that is defamatory, infringing, indecent, offensive, or illegal;
  2. Do not upload, install, or transfer files that are protected by intellectual property laws or software that affects other computers;
  3. Do not harass, threaten, stalk, or otherwise violate the rights of others.
  4. It is forbidden to alter HTML source code, reverse engineer it, or try to hack it.
  5. Avoid using spam services or scripts or anything that can impact infrastructure and, consequently, users.
  6. Don’t advertise, send spam, or sell services like phishing links, eBooks, or digital downloads.
  7. Content on websites or user-submitted content cannot be copied, distributed, or plagiarized.

The content

Cyber Security Experts, its partners, affiliates, or third parties own all website material and information that you can see, hear, or experience in any other way on the Site. The Site, the Service, and the content are only for your personal, non-business use.
You won’t copy any information from the website or make something similar that you can send, show, or distribute.

 

Links and Hyperlinks Terms

Links to other websites may be found on this page. We are not in charge of these websites’ content and do not purport to have any control over it. The included links are only there to give users information. We will not be held accountable as a result.

Hyperlinks

  1. The main page of this website and any other pages cannot be mirrored or framed on any other website.
  2. Avoid using spam links or anchor language that could give the wrong impression when linking to our pages and subpages. This could lead to misunderstandings among users.
  3. Please refrain from using or including intellectual property pictures, designs, or content, as well as copyrighted or registered trademarks, as links to our website.
  4. Links to websites endorsing bigotry or terrorism should be avoided.
  5. Don’t include links to websites that violate human rights or offer pornographic content.

Copyright and Intellectual Property

Our users should respect and value the intellectual property of others, just as we do.
Trademark and copyright laws protect all of the site’s content. Its affiliates, csexperts.in, and other third-party licensors are the owners of the trademarks and copyrights. You are not permitted to copy, alter, publish, or reproduce any of the content on this website, which includes text, graphics, code, and/or software. Cyber Security Experts does not assume any liability for content on other websites (apart from our partners and affiliates) that you may come across while looking for or using their products or services. Such information will be administered by the terms of use and privacy policies of the websites you visit.

Cybersecurity experts have the authority to block or stop access for users who violate their intellectual property and do not respect it. None of the website’s digital photos or logos may be used by anybody. When copyright concerns arise, the trademark owner must provide written approval.


Claims of Intellectual Property Violations

 

If you think someone has used your work without your consent in a way that violates your copyright, take action. We will take action if you could kindly supply us with the details below.

  1. The authorized representative acting on behalf of the copyright owner must provide a physical or digital signature.
  2. A description of the work protected by copyright that you allege violates your intellectual property.
  3. On the website of cyber security specialists, there is a description of the location and method of infringement of the content you say is infringing, in sufficient detail for us to locate it.
  4. Contact information, including address, phone number, and email address.
  5. A declaration from you confirming that the data you submitted is correct and that your claim of intellectual property or copyright is on your owner’s behalf;
  6. You can notify cyber security professionals of your copyright claims. Contact info@tlcyber.in via email.

Transaction Terms

 

The following terms of transaction are accepted when you make a purchase on the Cyber Security Experts website.

  1. You must pay for the transaction in order to conduct it on the cyber security expert’s website.
  2. Please ensure that you carefully review your payment details, including the total bill, taxes, and discounts.
  3. Before making a purchase, you must consent to additional terms and conditions for specific products.

WE DO NOT MAKE ANY WARRANTIES, EXPRESSED OR IMPLIED, WITH RESPECT TO ANY PRODUCTS OR SERVICES SOLD ON OR THROUGH CYBER SECURITY EXPERTS.

 

  1. No additional or distinct terms contained in any purchase order, document, transmission, or other communication shall be binding upon cyber security experts unless they are explicitly agreed to in writing.
  2. The Cyber Security Experts reserve the right to limit the order quantity on any item and to refuse service to anyone, without prior notice and at its sole discretion.

Pricing Disclaimer

 

  1. All products, prices, and promotions on the cyber security experts website are subject to change without prior notification.
  2. We strive to ensure that the information we provide is reliable and current; however, it is possible that one or more items on our website may be priced inaccurately.
  3. Cyber Security Experts reserves the right to modify the prices of all our products, offers, or discounts, which may be the result of human errors, technical errors, digital images, or a discrepancy in the pricing information received from our suppliers. As a result of market conditions, course termination, providers, pricing changes, errors in advertisements, and other mitigating circumstances, these modifications are implemented. It is important to note that the price you paid at the time of purchase remains valid for you.

Proprietary Use of Cyber Security Experts Study Material

 

All of the study materials that are provided to the delegates, associates, and affiliates are the intellectual property of Cyber Security Experts. Thus, it is prohibited to duplicate, transmit digitally, mechanically, or by photocopying, recording, or translating any course materials into other languages without written permission.

Usage of Personal Information of Participants

 

We reserve the right to include your image in any promotional material, including photos and videos, that we use. In addition, we may utilize your personal information to provide you with information regarding our other training courses. Nevertheless, we will not distribute or share your personal information with any third-party marketing database or disclose it to any third party, except in the event of a specific case, after appropriate verification of the third party or pursuant to any applicable law.

Limitation of Liability

 

Use of the Website, the Services, and the Content and Courseware is solely at your own risk. You expressly acknowledge this. We cannot guarantee that the Website, the Services, or access to the Content and Courseware will be uninterrupted or error-free. Additionally, we cannot guarantee the accuracy or reliability of any information provided through the Website, the Services, or the Content and Courseware, nor can we guarantee the results that may be obtained from their use. Under no circumstances will We or any individual or entity that is involved in the development, production, or distribution of the Website, the Services, or the Content and Courseware be held accountable for any direct, indirect, incidental, special, or consequential damages that may result from the use of or inability to use the Website, the Services, or the Content and Courseware.

The disclaimer of liability outlined in this clause pertains to all damages or injuries resulting from any failure of performance, errors, omissions, interruptions, deletions, defects, delays in operation or transmission, computer viruses, communication line failures, theft, destruction, unauthorized access, alterations, or use of records or any other materials, regardless of whether it arises from breach of contract, negligence, or any other cause of action. You acknowledge that we are not responsible for any defamatory, offensive, wrongful, or illegal actions of third parties or other users of the Website, Services, Content, or Courseware, and that any risk of damage or injury from such actions is solely the responsibility of each user. You acknowledge that the liability of Us or our affiliates, directors, officers, employees, agents, and licensors, if applicable, resulting from any legal claim (whether in contract, tort, or otherwise) related to the Services or the Content and Courseware shall be limited to the amount you paid for the specific training course.

Term and Termination

In the event that you falsify something, default, act improperly, or violate your responsibilities under this agreement, we retain the right to immediately block your access to the Content and Courseware (“Event of Default”). When a default event occurs, we will have the right to use all of our legal options, including those provided by this agreement, applicable laws, and equity, to pursue compensation for any losses or claims brought on by the default event.

Indemnity

You agree to indemnify and hold Us, along with our subsidiaries, affiliates, contractors, licensors, directors, officers, employees, and agents, harmless from any and all claims, losses, damages, liabilities, and expenses, including attorneys’ fees, that arise from your unauthorized use of the Website, the Services, and the Content and Courseware, or any violation or breach of this Agreement or its provisions.

Waiver

 

The failure or delay on our part to exercise any right, remedy, power, or privilege under this agreement shall not be construed as a waiver of that right, remedy, power, or privilege, or of the exercise of any other right, remedy, power, or privilege. No term of this Agreement shall be considered waived, and no breach shall be consented to, unless the party asserting a waiver or consent executes a written document that includes their signature. No consent to any breaches or waiver of any rights shall be construed as a waiver of any other rights or consent to any other breach.

Severability

 

The remaining provisions of this Agreement shall remain in full force and effect in the event that any of the provisions are declared invalid or unenforceable by the applicable laws listed in the Governing Law and Jurisdiction section. The Agreement will be considered reformed by substituting a valid and enforceable provision that closest reflects the parties’ intentions as expressed by the invalidated or unenforceable provision.

Governing Law and Jurisdiction

 

This Agreement will be governed by and interpreted in accordance with the Laws of India, with the courts in Thiruvalla, India having exclusive jurisdiction over any matters related to, connected with, or arising from this Agreement.

Amendment and Assignment

 

We maintain the authority to unilaterally alter or adjust this Agreement without providing any advance notice to you. We will publish the revised agreement on the Website to ensure you are informed of the revisions, modifications, and amendments made by us to this Agreement. Your ongoing use of or access to the Website, the Services, and the Content and Courseware after any changes to this Agreement have been posted will signify your acceptance of those changes. Assignment of this Agreement or the rights and obligations herein to any third party is not allowed, and you will solely be responsible for any breach of this Agreement or any associated terms and conditions.

Entire Agreement

 

This Agreement, together with the Privacy Policy, Refund Policy, and any other guidelines, rules, and/or disclaimers available on the Website, represents the complete understanding governing your use of our website and replaces any previous agreements, if applicable, concerning any matters addressed in this Agreement.

Grievance Redressal

 

If you have any concerns or questions, please feel free to contact our Grievance Officer. Our Grievance Officer will make every effort to resolve your concerns as quickly as possible. Feel free to reach out to us at:

 

Or

Contact us at For Indian Learners – +91- 8951147172 & For International Learners +91-8951147172

Any notice or communication that may need to be provided to Cyber Security Experts under these Terms or any terms shared with you can be sent in writing or via email to the following addresses:

Policy No :2  -Refund and Course Rescheduling policy

Please accept our gratitude for purchasing our courses.

Our objective is to guarantee that our users have a positive experience while they are in the process of evaluating, purchasing, and discovering our training courses, whether they are online or in a physical classroom. Below are the terms and conditions that govern the Refund Policy, as they are applicable to any online, offline purchase. When you purchase a training course or project guidance from a cyber security expert website, you are consenting to our Privacy Policy, Terms of Use Policy, and the items listed below.

Cancellation and Refunds: Online Classroom Learning

 

Cyber Security Experts preserves the right to postpone or cancel an event in the event of instructor illness or force-majeure events, such as floods, earthquakes, political instability, or pandemic situations such as COVID-19.

  1. A refund request will be denied if you have participated in the online classroom training for over one day’s session or have accessed or downloaded course materials from the learning portal.
  2. Refunds are not available for courses that are offered at a discount.
  3. Refunds will not be issued for courses tied to the academic institute.
  4. Refunds are not available for the degree programs. All enrolments and payments made are considered complete and conclusive.
  5. If the delegate fails to attend as scheduled, no refund will be issued.
  6. For refunds, the tax amount will not be included in the refund.

 

Batch Deferral / Rescheduling Policy:

 

  1. If a learner wishes to defer their batch or restart classes in a new batch for any reason, they can submit their request by sending an email to info@tlcyber.in.
  2. Batch deferment is permitted only once without incurring any extra charges.
  3. A learner may request a deferral to any of the cohorts commencing within the next 3-6 months from the start date of their initially enrolled batch.
  4. Batch deferral requests are permitted only a single time, provided the learner has not completed more than 20% of the program.
  5. If a learner wishes to defer for the second time, a deferral fee amounting to 10% of the total course fees paid for the program, plus applicable taxes, will be charged.
  6. Please be advised that all refunds will be processed within 30 working days, following the review and approval of any such request.

Cancellation and Refunds: Self-Paced Learning

 

  1. Refunds will not be issued for Self-Paced courses.
  2. No refund will be issued, and access will be revoked if it is discovered that the course is being shared with others or used by multiple users. Additionally, if the intention behind purchasing the course is to copy the material or content, the account will be blocked immediately.

Kindly be advised that any dispute, difference, or question that may arise between the parties involved, or any individual claiming under them, regarding this agreement or its subject matter shall be referred to a sole Arbitrator appointed by the first party. The award issued by the arbitrator will be final and binding on all parties involved. The venue for arbitration will be Thiruvalla, Kerala. All disputes shall be subject to the jurisdiction of the courts located in Thiruvalla, Kerala, India.

 

 

 

Policy No :3 -Privacy Policy

PLEASE READ THE FOLLOWING CAREFULLY

At Cyber Security Experts (“CS experts”, “we”, “us”), we genuinely care about your privacy and want to ensure you understand how we collect, use, and share information about you. This Privacy Policy shares how we gather data and highlights your rights to access, correct, or limit our use of your personal information. When you visit or use the Cyber Security Experts website, mobile applications, APIs, or related services (the “Services”), this Privacy Policy applies unless we mention a different policy or state otherwise.

The data controller for all information gathered from you regarding your use of the Services is Cyber Security Experts, a partnership firm registered in India, with the registered office at Ezhumattoor, Thiruvalla. If you need to reach out, feel free to contact our privacy team at info@tlcyber.in!                                                                                                                                                                                   
By using the Services, you’re agreeing to the terms of this Privacy Policy. If you don’t agree with this Privacy Policy or any other agreement related to your use of the Services, it’s best to refrain from using them.

Legal Basis for Processing Data

 

We use the following criteria to process your data:

  • Your express consent to process your data (as outlined in Section 2 below) and for the purposes listed in Section 4 below;
  • To fulfil agreements you have made to provide any of the Services; and  Our legitimate interests, such as creating and managing accounts on our Services to give you access to all content, updates, and services you have purchased and to support the smooth operation of our business.

What Data We Collect

 

Some of the information we gather directly from you includes information you enter yourself, information about your involvement in classes, and information from third-party platforms that you link to Cyber Security Experts . Additionally, we automatically gather certain information about your device and the areas of our services that you use or interact with.

 

Data You Provide to Us

 

The information we gather about you may vary based on how you use the Services. Here are a few illustrations to help you comprehend the information we gather.
We obtain the following information directly from you when you register for an account and use the Services, including through a third-party platform. We obtain the following information directly from you when you register for an account and use the Services, including through a third-party platform.

Account Data

Creating a user account is necessary in order to access specific features, such as enrolling for a program. We gather and maintain the information you provide when you create or update your account, including your name, email address, password, city, program/courses you are interested in learning, IP address, work experience, industry, and phone number. Additionally, we assign you a unique identifying number (“Account Data”).

Shared Content

Various components of the Services enable you to engage with other users or share content publicly. This includes the ability to share your e-portfolio, send messages to program managers, or attach photos or other work. The public may have access to this shared content, contingent upon its uploading location.

Program Data

We gather specific data regarding your enrolment in a program, such as the program, courses, assignments, and exams you have initiated and completed, your interactions with teaching assistants, responses to inquiries, and other materials submitted to fulfil course requirements.

Student Payment Data

 

We gather specific information about your payment, including your name and email address, in order to facilitate the processing of your payment. Our payment processing partners require that you submit specific payment and invoicing information, such as your name, credit card information, billing address, and zip code to them directly. In the interest of security, cyber security experts does not collect or store sensitive cardholder data, including entire credit card numbers and card authentication data.

Sweepstakes, Promotions, and Surveys

We may ask you to fill out a poll or take part in a promotion (such as a challenge, contest, or sweepstakes), which could happen on the Services or a different website. As a participant, you give us information like your name, email address, or phone number, which we will collect and keep. Otherwise stated in the promotion rules or in another privacy policy, this Privacy Policy applies to that data. The information gathered will be used to run the contest or poll, such as selecting winners and sending out prizes. People who want to win prizes may have to agree to us sharing some of their personal information with the public, like on a winner’s page. The privacy policies of any third-party platforms we use to run a survey, event, or feedback form will be followed.

Communications and Support

No matter if you have an account or not, if you contact us for help or to report a problem, we will collect and store your messages, contact information, and other information about you, such as your name, email address, location, and any other information you give us or that we derive automatically (which we will talk about below). Within the limits of this Privacy Policy, we use this information to answer your question or address your issue.

 

How We Get Data about You

 

We utilize tools such as cookies, web beacons, analytics services, and advertising providers to collect the data mentioned above. Certain tools provide you with the option to decline data collection.

Cookies and Data Collection Tools

 

According to our Cookie Policy, Cyber Security Experts and service providers working on our behalf (such as Google Analytics and third-party advertisers) utilize server log files and automated data collection tools, including cookies, tags, scripts, customized links, device or browser fingerprints, and web beacons (collectively referred to as “Data Collection Tools”) when you access and use the Services. The Data Collection Tools automatically monitor and gather specific System Data and Usage Data (as outlined in Section 1) when you utilize the Services. In certain instances, we connect data obtained through those Data Collection Tools to additional data that we gather as outlined in this Privacy Policy.

Cookies are utilized for purposes such as analysing your use of the Services, personalizing your experience, simplifying the login process, and recognizing you upon your return. Cookies are utilized for purposes such as determining if a page has been visited, tracking whether an email has been opened, and optimizing advertising by excluding current users from specific promotional messages or identifying the origin of a new page visit.

The types of cookies used by us includes

Essential Cookies: These cookies are necessary for the fundamental functionalities provided by the Site and Service(s). These cookies are instrumental in ensuring that a user remains logged in to the Service(s) and that they are able to recall pertinent information upon future visits.

Insight Cookies: These cookie types are employed to monitor user activities within the Service(s), thereby enabling us to enhance your user experience.

Marketing cookies: These are employed to deliver personalized and interest-based advertisements that are in accordance with your browsing history and other similar activities on our websites.

 

 


It is possible to configure your web browser to notify you of attempts to install cookies on your computer, restrict the categories of cookies that are permitted, or completely reject cookies. If you do, you may be unable to utilize some or all of the Services, and your experience may be modified or rendered less functional.

Analytics

We make use of third-party browser and mobile analytics tools, such as Google Analytics. The third-party website you came from, how frequently you visit, events inside the Services, and usage and performance data are just a few of the data that these services utilize to help us analyse how you use the Services. In addition to providing information that might be of interest to you, we utilize this data to enhance the Services and gain a better understanding of how the Services function across various devices.

Online Advertising

We deliver ads about our providers on other websites and apps using third-party advertising providers including Facebook, Google’s ad services, and others. The adverts may be based on your Usage Data and System Data (as described in Section 1) and these ad service providers’ tracking data. Ads can be targeted to your interests based on recent or past behaviour on other sites and services.
Based on the advertising services we use, they may store cookies or other tracking technologies on your computer, phone, or other devices to collect data about your use of our Services and deliver you targeted ads. Your email address and publicly shared Services content may be shared with service providers to offer targeted advertising.

What We Use Your Data For, and How Long We Store it

How we use your data

To deliver our Services, interact with you, troubleshoot issues, safeguard against fraud and abuse, improve and update our Services, analyse how people use our Services, serve tailored advertising, and as needed by law or for safety and integrity, we utilize your data.

We use the data we collect through your use of the Services to:

  • Manage and provide the Services, which includes streamlining communication with other users and displaying personalized content.
  • Process requests and reservations for programs, courses, specific services, information, or features.
  • Maintain communication with you regarding your account by:
  • Responding to your inquiries and apprehensions
  • Sending you administrative messages and information, such as notifications about changes to our Service, updates to our agreements, and messages from instructors and teaching assistants
  • Sending you information and in-app messages about your progress in courses, feedback about the course, referral/reward programs, new services, new features, promotions, newsletters, and other available courses (although you may opt out at any time)
  • Manage the setting of your account preferences
  • Support the technical operation of the Services, including the resolution of issues, the security of the Services, and the prevention of fraud and abuse
  • Collect user feedback
  • Develop a more comprehensive understanding of you by integrating your data with that of third-party data providers or analysing the data with the assistance of analytics service providers.
  • Identify distinctive users across devices
  • Customize advertisements across devices
  • Enhance our Services and create new products, services, and features
  • Analyse trends and traffic, track purchases, and track usage data
  • Promote the Services on third-party websites and applications
  • As required or permitted by law; or
  • As we, in our sole discretion, consider necessary to ensure the safety or integrity of our users, employees, third parties, the public, or our Services.

Criterion for Determining Data Retention Period

 

We are unable to pinpoint the precise time frame for which we might keep your information. We will, however, keep your data for longer than is required, taking into consideration the following:

  • The reason or purposes for which your data is being used, both now and in the future (for example, if it is required to keep such data on file in order to fulfil our contractual commitments to you or to get in touch
  • If we have any further legal justification (such as your consent) to continue processing your data;
  • If we are subject to any legal duties to preserve records, such as those made by applicable laws
  • Whether there is a pertinent industry standard regarding the length of time that such data should be kept
  • The risk and liability associated with our keeping the data
  • The degree of difficulty we may encounter in maintaining the data’s accuracy and timeliness
  • Any additional circumstances (such as the nature and status of Cyber Security Experts relationship with you)

Who We Share Your Data With?

We give learning managers and instructors access to specific information about you. Your information might also be shared if necessary for security, legal compliance, or business reorganization. Last but not least, with your permission or after the data has been aggregated or de-identified, we may distribute it in other ways. Your information may be disclosed to third parties in the following situations or as otherwise specified in this privacy statement:

  • With Your Learning Consultants, Admissions, and Cyber Security Experts Team : In order for your Instructor or Admission Team to recommend the best program or course for you, we provide them with the information we have about you. Your phone number, email address, city, nationality, employment history, and other work-related details might be included in this data.
  • With Your professors, Evaluators, and Moderators: For courses you enrol in, we share information about you to your professors or teaching assistants so they can make the course better for you. Additionally, they will utilize this information to figure out how well you did in the program and to assess your skills so that the relevant institution or university may issue you a certificate that is needed for bookkeeping purposes. Email address, phone number, employment history, performance information, and learning management system activities are among the details you have given with them.
  • With students, the public, and other mentors: If you are a mentor or instructor, we distribute the information we have about you to our students, program managers, and Cyber Security Experts  staff so they can get in touch with you to ask questions or offer assistance. Included in this data could be your name, phone number, email address, professional and educational background, and information about your actions on our website and learning management system.
  • With Service Providers, Contractors, and Agents: We give your information to outside businesses that handle our paying and advertising needs, including retargeted advertising. In order to deliver the service, we have requested, these service providers may have access to your personal information and must only use it as instructed by us.
  • For Security and Legal Compliance: We may share your information with third parties if we (at our sole discretion) believe that it is
  • Required or Permitted by Law
  • Requested as part of a judicial, governmental, or legal inquiry, order, or proceeding;
  • Reasonably necessary as part of a valid subpoena, warrant, or other legally-valid request;
  • Necessary to enforce our Terms of Use, Privacy Policy, and other legal agreements;
  • Necessary to detect, prevent, or address fraud, abuse, misuse, potential legal violations (or rule or regulation), or security or technical issues; or
  • Reasonably necessary in our discretion to guard against impending harm to cyber Security Experts  rights, property, or safety.

 

  • We may also provide our auditors and legal counsel with information about you so they can assess our disclosure obligations and rights under this privacy policy.
    We might share, disclose, or transfer all of your data to the successor organization during the transition or while contemplating a transition (including due diligence) in the event of a change in control, such as a merger, acquisition, corporate divestiture, dissolution (including bankruptcy), or sale of all or part of Cyber Security Expert’s assets.
  • The data can be used or published for any purpose after it has been aggregated or de-identified.
  • With Your Consent: You can allow us to share information with a third party that isn’t protected by this privacy statement.

 

 

Information Security

We take precautions against the loss, abuse, and alteration of the information under our control by implementing industry-standard security measures on our websites and services. Any personal information you give us, including your payment card number or login credentials, will be encrypted using Secure Socket Layer (SSL). Even while we will take every precaution to protect your personal information, you are still responsible for any transmissions you make to our websites or through the Service(s). We will implement stringent protocols and security measures as soon as we get your personal data in an effort to stop unauthorized access. We use suitable procedures for gathering, storing, and processing data as well as security measures to guard against unwanted access, modification, disclosure, or destruction of your personal data, username, password, transaction data, and data stored on our website.

  • To make your visit as safe as possible, we regularly scan our website for known vulnerabilities and security flaws.
  • We also regularly use malware scanning.
  • Only a select group of individuals with special access permissions to these systems and a commitment to maintaining confidentiality can access your personal information, which is housed behind guarded networks.
  • Furthermore, all credit and sensitive data you submit is secured using Secure Socket Layer (SSL) technology, and all financial transactions are handled by secure gateway providers rather than being stored or handled on our computers.

Your Rights

You have rights regarding how your data is used, such as the option to choose not to receive promotional emails, cookies, or have your data collected by specific analytics companies. Within our services, you can update or delete your account. You can also contact us for individual rights requests regarding your personal data, including the ability to limit how we process your data, to have all of the data we have on file about you deleted, and to request that the data be sent to you or transferred to another service in a machine-readable format.

Your Choices about the Use of Your Data

You may not be able to access some of the Services’ features if you decide not to give us certain data.

  • Using the unsubscribe link in promotional communications or by modifying your account’s email options, you can choose not to receive any more of our communications.
  • You will receive transactional and relationship messages about the Services, such as order confirmations, administrative confirmations, significant updates about the Services, and notices about our policies, regardless of your email preference choices.
  • Cookies and other forms of local data storage may be controlled by the browser or device you use. Additionally, your wireless device may let you manage whether location or other data is gathered and shared.
  • To obtain information and manage cookies used for customized advertising from participating companies, visit the Network Advertising Initiative and Digital Advertising Alliance consumer opt-out pages, or the Your Online Choices website if you live in the EU.
  • The Google Ads Settings page allows you to modify Google Display Network ads or choose not to participate in Google’s display advertising.
  • To stop Google Analytics from using your data for analytics or enrichment, use the Google Analytics Opt-out Browser Add-on.
  • Please email us at info@cxexperts.in with any queries you may have regarding your data, how we use it, or your rights.

Accessing, Updating and Correcting, Porting and Deleting Your Personal Data

You have the following options for accessing and updating the personal information that cyber security experts gather and keep:

  • You can enter into your account and make changes at any moment to update the data you supply directly.
  • In order to completely delete your account, you can send an email to info@tlcyber.in
  • Note that even after your account has been closed, some or all of your data may still be accessible to others. This includes, but is not limited to, any data that has been

(a) copied, stored, or shared by other users (such as in course comments)

 (b) shared or disseminated by you or others (such as in your shared content) or

(c) uploaded to a third-party platform.

  • Even when your account is closed, we keep your information for as long as we have a good reason to (and in compliance with the law) to do so, such as to help with legal requirements, settle disputes, and uphold our agreements. In accordance with this Privacy Policy, we may keep and share such information even after your account has been closed.
  • To request that your personal data be accessed, corrected, ported, or deleted, or to limit how it is processed, send an email to info@tlcyber.in. We ask that you give us up to 30 days to respond. To protect you, we might need to send the request using the email address linked to your account. We might also need to confirm your identity before granting your request.
  • Note that we may keep some data after deletion if we have a legal need to do so, such as to fulfil transactions or for required record-keeping.

Revocation of Consent

We understand that your consent may be used to process your data. Please email us at info@tlcyber.in. if you would want to revoke the consent you have granted us to process your data as specified in Section 3 above. Kindly give us up to 30 days to respond. We may need to confirm your identity before executing your request, and for your protection, we might need the request to be sent from the email address linked to your account.
Additionally, please be aware that this type of consent revocation will only be effective in the future and will not impact the legality of any data processed using your previously granted consent.

Complaints about our privacy policy or use of your data

We recognize that even while we take every precaution to keep your data safe and secure, you could have complaints about how we use it or about our data security procedures. If you have any concerns of this nature, please contact us at info@tlcyber.in. If our response does not satisfy you, you can also contact your local national data protection authorities .Despite our strong recommendation that you write to us with any complaints or grievances, you are still free to contact the national data protection authorities .

Children’s Personal Information

Cyber Security Experts  does not knowingly collect any personal information from children under the age of 16. If you are under the age of 16, please do not submit any personal information through our Websites or Service(s). We encourage parents and legal guardians to monitor their children’s Internet usage and to help enforce this Policy by instructing their children never to provide personal information through our Service(s) or Websites without their permission. If you have reason to believe that a child under the age of 16 has provided personal information to us through our Websites or Service(s), please contact us and we will remove that information and terminate the child’s account from our databases.

DATA Transfer

In addition to our operations, businesses, and service providers in the information sector and globally, the company’s headquarters are located in India. Therefore, your personal information may be transferred, stored, or accessed in jurisdictions that may not offer the same degree of data protection as your home country by us or our service providers. We shall take measures to guarantee that the jurisdictions in which we process your personal information have a sufficient degree of protection. We offer sufficient protection for the transfer of personal data to non-EU nations if you are a member of the EU through a number of intercompany agreements that are founded on the basic contractual provisions permitted by EU legislation. You can get a copy of these agreements by getting in touch with us, as explained below.

Access to personal information

When collecting or using personal information for purposes like improving user experience, enabling optional services or features, or communicating with you, we depend on your consent.

Withdrawal of consent

As far as we are concerned, we can only access or use your personal information with your permission. You always have the option to revoke your consent whenever we use it.

Erasure

Also, if you ask us to, we will delete all of your personal data that we have. As long as we don’t think processing your request could interfere with others’ freedom of speech or information, or if it violates any applicable local laws, we may refuse to do so.

Access to personal information

We are dedicated to being fully open and honest about the personal data we own. If you would like us to give you access to all of your personal information, we shall comply.

Rectification


You are permitted to request that your Personal Information be corrected if you believe it is inaccurate. We reserve the right to turn down requests that are frivolous or vexatious, could potentially compromise the privacy of others, or would be highly impracticable to process. Use the information provided below to contact us or our data protection officer in order to request the exercise of any of these rights. Subsequently, our website permits users to modify their personal information through its interface. In the same vein, you may eliminate additional files or information that you have stored by logging in and employing the available functions to delete.

Objections and Complaints

If you have any objections or complaints, please email info@tlcyber.in

Grounds of Processing

When we process your Personal Information, we will only do so in the following situations:

  • Processing your personal information is in our legitimate interest
  • We must use it to fulfil our obligations for the services we have rendered to you. For instance, processing your personal information is required to meet the company’s legal requirements and serves a legitimate interest in providing, securing, and improving our services as well as informing you of any changes to those services and new offerings.
  • The company is required by law in the jurisdictions where it conducts business to gather, handle, disclose, and keep your personal information.
  • The business may also provide information to law enforcement or third parties upon request in accordance with legal procedures.

Updates & Contact Info

Users will be notified by email, in-product notice, or another legally mandated method whenever we make a significant modification to this policy. Modifications take effect on the day they are published. If you have any questions, issues, or disagreements, please email us.

  1. Modifications to This Privacy Policy

This Privacy Policy may be updated from time to time. We will send you an email, post a notice on the Services, or follow any applicable legal requirements if we make any significant changes to it. A synopsis of the main adjustments will also be provided. Changes will take effect the day they are posted, unless otherwise noted.
Your continued use of the Services after the date of any change will be interpreted as your acceptance of (and commitment to abide by) the updated Privacy Policy, as allowed by applicable law. All prior privacy policies have been superseded by the updated one.

  1. Interpretation

The definitions of any capitalized phrases not covered in this policy are found in our Terms of Use

  1. Questions

If you have any questions, concerns, or disputes regarding our Privacy Policy, please feel free to contact our privacy team (including our designated personal information protection manager) at info@tlcyber.in  

  1. Cookie Policy

To provide functionality and to identify you across various services and devices, Cyber Security Experts  and our third-party partners—including our advertising and analytics partners use cookies and other tracking technologies, such as web beacons, device identifiers, and pixels.
Alternatively, you can disable all cookies or have your computer alert you whenever a cookie is received. Your browser’s settings are where you accomplish this. Because every browser is unique, check the Help Menu to find out how to change your cookies correctly.
Some of the features that make your site experience more efficient might not work properly if you disable cookies.

Please be aware that if advertising technology is incorporated into the Services, you might still see advertisements on other websites and apps, but they won’t be customized based on your preferences.

Links to Third Party Sites

Links on our webpages lead to external websites that are not under Cyber Security Experts ownership or control. Please be advised that the privacy policies of these other websites or third parties are not under our control. It is our recommendation that you read the privacy policies of all websites that gather personal information and exercise caution when leaving our websites.

Public Forums

Publicly accessible blogs and community forums are available on our websites. You should be conscious that anyone who has access to these areas may read, gather, and utilize any information you include. Please write to info@tlcyber.in to request that your personal information be removed from our blog or community forum. We may occasionally be unable to delete your personal data; in these situations, we will notify you of the impossibility and provide an explanation.
On its websites, Cyber Security Experts might offer blogs or discussion boards for its community. Any personal information you decide to post in such a forum could be seen, gathered, or utilized by other forum users, who could then use it to send you inappropriate messages. Cyber Security experts has no control over the private data you choose to post in these forums.
When sharing information publicly, keep in mind that search engines may index it.

Single Sign-On & Other social Media Features

Social networking buttons, such the “Like” and “Share” buttons on Facebook, are integrated into our websites. These features may gather your IP address, the page you are on  our websites, and may set a cookie to allow the feature to work as intended, if you do not object. Our websites either host social media tools and widgets directly or through a third party. The privacy statement of the business that offers these features governs how you use them.
Google sign-in services are available for you to use to access our websites. In addition to verifying your identification, the services will provide you the choice to give us certain personal data, like your name and email address.

Amendments

This Privacy Policy is subject to change at any moment at our discretion. We’ll send you an email, update the date at the bottom of this page, and put a notice on our site’s main page when we accomplish these things. We urge users to regularly visit this page to be updated on any updates regarding our efforts to safeguard the personal data we gather. You accept responsible for reviewing this privacy statement on a regular basis and staying informed of any changes. When any changes are posted to this policy, your continuing use of these websites or the service(s) after that time will be considered your acceptance of those changes. In the event that you disagree with the provisions of this Policy or any updated version of it, you may decide to stop using the Websites or Service(s).

Contacting Us

You can address your concerns with our Managing Partner, who is in charge of handling data protection complaints, using the information below:

 

Name: Anup Mathew Thomas

Email ID: director@tlcyber.in

You can also reach out to us through postal mail at: Cyber Security Experts, Ezhumattoor P.O, Thiruvalla, Kerala – 689586

 

 

We are here to take your career to the next level...

Get in touch with us today to raise a free project, course enquiry

Ready to take your career to the next level?

Reach out to us today and get a detailed complimentary college project review and consultation from our experts.