1. Website Visitors
Like most website operators, Counter Threat Group collects non-personally-identifying information of the sort that web browsers and servers typically make available, such as the browser type, language preference, referring site, and the date and time of each visitor request. Counter Threat Group’s purpose in collecting non-personally identifying information is to better understand how Counter Threat Group visitors use its website. From time to time, Counter Threat Group may release non-personally-identifying information in the aggregate, e.g., by publishing a report on trends in the usage of its website.
Counter Threat Group also collects potentially personally-identifying information like Internet Protocol (IP) addresses for logged in users and for users leaving comments on Counter Threat Group blogs/sites. Counter Threat Group only discloses logged in user and commenter IP addresses under the same circumstances that it uses and discloses personally-identifying information as described below, except that commenter IP addresses and email addresses are visible and disclosed to the administrators of the blog/site where the comment was left.
2. Gathering of Personally-Identifying Information
Certain visitors to Counter Threat Group websites choose to interact with Counter Threat Group in ways that require Counter Threat Group to gather personally-identifying information. The amount and type of information that Counter Threat Group gathers depends on the nature of the interaction. In each case, Counter Threat Group collects such information only insofar as is necessary or appropriate to fulfill the purpose of the visitor’s interaction with Counter Threat Group. Counter Threat Group does not disclose personally-identifying information other than as described below. And visitors can always refuse to supply personally-identifying information, with the caveat that it may prevent them from engaging in certain website-related activities.
3. Aggregated Statistics
Counter Threat Group may collect statistics about the behavior of visitors to its websites. Counter Threat Group may display this information publicly or provide it to others. However, Counter Threat Group does not disclose personally-identifying information other than as described below.
4. Protection of Certain Personally-Identifying Information
Counter Threat Group discloses potentially personally-identifying and personally-identifying information only to those of its employees, contractors and affiliated organizations that (i) need to know that information in order to process it on Counter Threat Group’s behalf or to provide services available at Counter Threat Group websites, and (ii) that have agreed not to disclose it to others. Some of those employees, contractors and affiliated organizations may be located outside of your home country; by using Counter Threat Group websites, you consent to the transfer of such information to them. Counter Threat Group will not rent or sell potentially personally-identifying and personally-identifying information to anyone. Other than to its employees, contractors and affiliated organizations, as described above, Counter Threat Group discloses potentially personally-identifying and personally-identifying information only in response to a subpoena, court order or other governmental request, or when Counter Threat Group believes in good faith that disclosure is reasonably necessary to protect the property or rights of Counter Threat Group, third parties or the public at large. If you are a registered user of an Counter Threat Group website and have supplied your email address, Counter Threat Group may occasionally send you an email to tell you about new features, solicit your feedback, or just keep you up to date with what’s going on with Counter Threat Group and our products. If you send us a request (for example via email or via one of our feedback mechanisms), we reserve the right to publish it in order to help us clarify or respond to your request or to help us support other users. Counter Threat Group takes all measures reasonably necessary to protect against the unauthorized access, use, alteration or destruction of potentially personally-identifying and personally-identifying information.
6. Business Transfers
If Counter Threat Group, or substantially all of its assets, were acquired, or in the unlikely event that Counter Threat Group goes out of business or enters bankruptcy, user information would be one of the assets that is transferred or acquired by a third party. You acknowledge that such transfers may occur, and that any acquirer of Counter Threat Group may continue to use your personal information as set forth in this policy.
What personal data we collect and why we collect it
If you fill out one of our contact forms, any information that you put into the contact form is collected to allow us to contact you in response to your contact form entry.
Mailing List Signup Forms
If you fill out one of our mailing list signup forms, any information that you put into the mailing list signup form is collected to allow us to add you to our mailing list as you have requested by submitting this form.
Live Chat Forms
If you contact us via our live chat system on our website, any information that you put into the chat window is collected to allow us to communicate with you as you have requested by engaging in the live chat system.
If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Who we share your data with
We do not share your data with any third party services or individuals directly. We only share data for the purposes of our own access and we do not authorize any third party services to access your information except with our express permission for the purposes of assisting us in accessing your information.
How long we retain your data
If you complete a purchase on our website, WordPress automatically creates an account for you in order to store your order data and create your subscription. This account information is stored indefinitely to allow us to keep accurate records of any data we are obliged to keep for administrative, legal, or security purposes.
If you fill out one of our contact forms, your data is stored in our website database and counterthreatgrp.com indefinitely. Additionally, this information is stored in our website backups.
If you sign up for our mailing list, your data is stored in MailChimp.com indefinitely, or until that data is determined to be no longer valid or necessary for us to contact you in accordance with our mailing list procedures.
What rights you have over your data
If you are a citizen of the EU/EEA and have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
If you are a citizen of the EU/EEA and have or have had a website maintenance plan with us, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Any information entered in to one of our contact forms is sent to us via email to counterthreatgrp.com where we are able to read and respond to your message. This information is also stored in our website and website backups.
Any information entered into a mailing list signup form is sent to MailChimp.com in order for us to send you our mailing list content.
How we protect your data
We use two factor authentication in systems where we store any sensitive data such as passwords. This helps us to protect your information from unauthorized access by requiring more than just a username and password to access that information.
If at any point Counter Threat Group becomes aware of a data breach through one of the third parties listed above, or by our own measures, we will immediately contact all affected parties and also take immediate action in accordance with the rules and regulations of the authority having jurisdiction.
Please report any violations of this website maintenance contract or these TOS by contacting us.
Counter the Threat
How prepared is your organization to withstand current or perceived threats? Begin the process and survey your readiness by pressing the Free Assessment button below.
COUNTER THREAT GROUP, LLC.
Rick Klepper 678-588-1622
Glenn White 205-796-5753
Doug Wilson 205-903-3272