Share This Article
Sign up to stay
Information We Collect
We do not collect personally identifiable information (e.g., name, address, phone number, email address) unless you provide it to us. No other attempts are made by the National Cybersecurity Alliance to identify individual users or their personal usage habits. We collect only aggregate information about the numbers of individuals who visit our web site and what those individuals look at. This website uses industry-standard software to create summary statistics, which are used for such things as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.
In addition, when you click on either the Facebook or Twitter social share icon, each of the icons open in a new window to share the content that’s applied to what you’re trying to share.
Information You Willingly Provide
When you subscribe to communications from NCA (newsletters, email alerts, etc.) you can expect we will contact you about ways to get involved in your community regarding online safety; you will receive updates from NCA about free resources and upcoming events; we do not share our contact lists (period); at times we use our lists to inform people of important events in cybersecurity by our partners (industry, non-governmental organizations and government); you can expect to hear from NCA on average a couple of times per month and, in the ramp-up to Cybersecurity Awareness Month (October) and Data Privacy Week (January), more frequently; you can opt out at any time.
How We Protect Information
For site security purposes and to ensure that this service remains available to all users, this website employs industry-standard methods to monitor network traffic to identify unauthorized attempts to upload or change information or otherwise cause damage. Unauthorized attempts to upload information or change information on this web site are strictly prohibited and may be punishable by law, including the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.