We take our customers privacy seriously and we will only collect and use your personal information as outlined below.
Data protection is a matter of trust and your privacy is important to us. We shall therefore only use your name and other information, which relates to you in the manner set out in this Privacy Policy. We will only collect information where it is necessary for us to do so and we will only collect information if it is relevant to our dealings with you.
We will only keep your information for as long as we are either required to by law or as is relevant for the purposes for which it was collected.
You can visit the Site and browse without having to provide personal details. During your visit to the Site you remain anonymous and at no time can we identify you unless you have an account on the Site and log on with your user name and password.
If you have any comments or suggestions, we would be pleased to receive them at our address or by emailing us at training@cybersecurity.my
Cyberguru.my does not sell, share or trade customers personal information collected online with third parties.
Personal information collected online will only be disclosed within our corporate group for internal use only.
When you create an account the personal information we collect may include your:
- Name
- Company
- Delivery Address
- Email Address
- Telephone
- Mobile Number
We may pass your name and address on to a third party in order to make delivery of the product to you (for example to our courier or merchant).
When you register as a user on Cyberguru.my website, we will also use your personal information to send you marketing and/or promotional materials from time to time. You can unsubscribe from marketing information by emailing us at training@cybersecurity.my.
You can update your personal information anytime by accessing your account on Cyberguru.my website.
Security of Your Personal Information:
Cyberguru.my ensures that all information collected will be safely and securely stored.
We protect your personal information by:
- Restricting access to personal information
- Maintaining technology products to prevent unauthorized computer access