CINXE.COM

Cyber Risk GmbH | Impressum, Legal, Privacy, Data Protection, Compliance, Company Information

<!DOCTYPE html> <html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <!-- The above 3 meta tags *must* come first in the head; any other head content must come *after* these tags --> <title>Cyber Risk GmbH | Impressum, Legal, Privacy, Data Protection, Compliance, Company Information</title> <meta name="description" content=" General Terms and Conditions for all visitors to the Cyber Risk GmbH websites, and all legal transactions made through the Cyber Risk GmbH websites."> <meta name="keywords" content="Cyber Risk GmbH, company information, legal notice, Impressum, privacy, contact details, compliance with Swiss and EU law."> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "BreadcrumbList", "itemListElement": [ { "@type": "ListItem", "position": 1, "name": "Index", "item": "https://www.cyber-risk-gmbh.com" }, { "@type": "ListItem", "position": 2, "name": "About Us", "item": "https://www.cyber-risk-gmbh.com/About.html" }, { "@type": "ListItem", "position": 3, "name": "Training", "item": "https://www.cyber-risk-gmbh.com/Training.html" }, { "@type": "ListItem", "position": 4, "name": " Reading Room", "item": "https://www.cyber-risk-gmbh.com/Reading_Room.html" }, { "@type": "ListItem", "position": 5, "name": " Impressum", "item": " https://www.cyber-risk-gmbh.com/Impressum.html " } ] } </script> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "Organization", "name": "Cyber Risk GmbH", "url": "https://www.cyber-risk-gmbh.com", "logo": "https://www.cyber-risk-gmbh.com/Cyber_Risk_GmbH_Logo.jpg", "sameAs": [ "https://www.linkedin.com/company/71474270/admin/page-posts/published/", "https://x.com/Cyber_Risk_GmbH" ], "contactPoint": { "@type": "ContactPoint", "telephone": "+41-79-5058960", "contactType": "Customer Service", "areaServed": "Worldwide", "availableLanguage": "English" }, "founder": { "@type": "Person", "name": "George Lekatis" }, "description": "Cyber Risk GmbH is a leading provider of cyber risk and compliance training in Switzerland and worldwide.", "address": { "@type": "PostalAddress", "streetAddress": "Dammstrasse 16", "addressLocality": "Horgen", "addressRegion": "Canton of Zürich", "postalCode": "8810", "addressCountry": "CH" } } </script> <link rel="apple-touch-icon" sizes="180x180" href="apple-touch-icon.png"> <link rel="icon" type="image/png" sizes="32x32" href="favicon-32x32.png"> <link rel="icon" type="image/png" sizes="16x16" href="favicon-16x16.png"> <link rel="shortcut icon" type="image/x-icon" href="favicon.ico"> <link rel="manifest" href="manifest.json"> <meta name="msapplication-TileImage" content="mstile-150x150.png"> <meta name="theme-color" content="#ffffff"> <!-- Bootstrap --> <link href="css/bootstrap.min.css" rel="stylesheet"> <link href="css/style.css" rel="stylesheet"> <!--font-awesome--> <link href="https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" rel="stylesheet"> <link href="https://fonts.googleapis.com/css2?family=Montserrat:wght@100;200;300;400;500;600;700;800;900&display=swap" rel="stylesheet"> <!-- Owl Stylesheets --> <link rel="stylesheet" href="css/owl.carousel.css"> <link rel="stylesheet" href="css/owl.theme.default.css"> <!-- javascript --> <script src="js/jquery.min.js"></script> <script src="js/owl.carousel.js"></script> <style> .wrapper-banner { background: url("Cyber_Risk_GmbH_Impressum.jpg"); background-size: cover; background-position: center; } </style> <link rel="stylesheet" href="./style2.css"> <style> a:link { color: blue; background-color: transparent; text-decoration: none; } a:visited { color: blue; background-color: transparent; text-decoration: none; } a:hover { color: red; background-color: transparent; text-decoration: underline; } a:active { color: blue; background-color: transparent; text-decoration: underline; } </style> </head> <body> <!-- Fixed navbar --> <div class="wrapper-menu"> <nav id="header" class="navbar navbar-fixed-top"> <div id="header-container" class="container navbar-container"> <div class="navbar-header"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#navbar" aria-expanded="false" aria-controls="navbar"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a id="brand" class="navbar-brand" href="https://www.cyber-risk-gmbh.com/"> <img src="images/logo/CyberRisk5FINALFINAL.png" alt="Cyber Risk GmbH, Cyber Risk Awareness and Training in Switzerland, Germany, Liechtenstein" width="240" class="img-responsive"> <!--<img src="images/logo-black.png" alt="" class="shrink-logo"> --> </a> </div> <div id="navbar" class="collapse navbar-collapse"> <ul class="nav navbar-nav"> <li><a href="https://www.cyber-risk-gmbh.com/About.html" target="_blank">About</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Training.html" target="_blank">Training</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Board.html" target="_blank">For The Board</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Assessment.html" target="_blank">Assessment</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Reading_Room.html" target="_blank">Reading Room</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Contact.html" target="_blank">Contact</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Cyber_Risk_Links.html" target="_blank">Cyber Risk Links</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Impressum.html" target="_blank">Impressum</a></li> </ul> </div> <!-- /.nav-collapse --> </div> <!-- /.container --> </nav> <!-- /.navbar --> </div> <div class="container-fluid wrapper-banner"> <div class="container"> <div class="top-banner"> </div> </div> </div> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h3>Cyber Risk GmbH - Impressum</h3> <br> <br> <p class="text-left"><b>General Terms and Conditions for all visitors to the Cyber Risk GmbH websites, and all legal transactions made through the Cyber Risk GmbH websites (hereinafter “GTC”).</b></p> <p class="text-left">Updated: December 29, 2023. </p> <p class="text-left">Individuals must accept this GTC before visiting the Cyber Risk GmbH websites on their behalf, or acting on behalf of a business entity or another person. In the Cyber Risk GmbH websites individuals can find information, and they can purchase In-House Instructor-Led Training programs, Online Live Training programs, Video-Recorded Training programs, or Distance Learning with Certificate of Completion programs, provided by Cyber Risk GmbH.</p> <hr> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h3>Cyber Risk GmbH, some of our clients</h3> <br> <div class="logos"> <div class="logos-slide"> <img src="Logos/XMA8.png" alt="" > <img src="Logos/SYGNIA5.jpg" alt="" > <img src="Logos/DELL3.jpg" alt="" > <img src="Logos/VW.jpg" alt="" > <img src="Logos/Bosch9.png" alt="" > <img src="Logos/Swisslife3.JPG" alt="" > <img src="Logos/Coop3.png" alt="" > <img src="Logos/CEPI3.png" alt="" > <img src="Logos/ATLAS8.png" alt="" > <img src="Logos/INSIG8.png" alt="" > <img src="Logos/SANT8.png" alt="" > <img src="Logos/NTT38.png" alt="" > <img src="Logos/EIB15.PNG" alt="" > <img src="Logos/SC8.JPG" alt="" > <img src="Logos/schindler.jpg" alt="" > <img src="Logos/AO9.png" alt="" > <img src="Logos/GS300.JPG" alt="" > <img src="Logos/DB8.png" alt="" > <img src="Logos/TM8.png" alt="" > <img src="Logos/OK8.png" alt="" > <img src="Logos/PWC5.JPG" alt="" > <img src="Logos/Fujitsu.png" alt="" > <img src="Logos/HO5.JPG" alt="" > <img src="Logos/FIN22.png" alt="" > <img src="Logos/SAN8.png" alt="" > <img src="Logos/BAH9.png" alt="" > <img src="Logos/AT32.png" alt="" > <img src="Logos/WINS25.png" alt="" > <img src="Logos/SKY12.png" alt="" > <img src="Logos/RB78.png" alt="" > <img src="Logos/WU8.png" alt="" > <img src="Logos/TDC.JPG" alt="" > <img src="Logos/BH18.png" alt="" > <img src="Logos/DeepSec_Conference7.png" alt="" > <img src="Logos/DC12.png" alt="" > <img src="Logos/BROAD8.png" alt="" > <img src="Logos/LEMON8.PNG" alt="" > <img src="Logos/SIK8.PNG" alt="" > <img src="Logos/KUMO8.PNG" alt="" > <img src="Logos/VEST8.PNG" alt="" > <img src="Logos/MOXA8.PNG" alt="" > <img src="Logos/TIET8.PNG" alt="" > <img src="Logos/UNI8.PNG" alt="" > <img src="Logos/BCC11.PNG" alt="" > <img src="Logos/SN8.PNG" alt="" > <img src="Logos/KYN8.PNG" alt="" > <img src="Logos/PG8.PNG" alt="" > <img src="Logos/MER8.PNG" alt="" > <img src="Logos/LIB8.PNG" alt="" > <img src="Logos/ALI8.PNG" alt="" > <img src="Logos/USA8.PNG" alt="" > <img src="Logos/MAR8.PNG" alt="" > <img src="Logos/ABB8.PNG" alt="" > <img src="Logos/INSI8.PNG" alt="" > </div> </div> <script> var copy = document.querySelector(".logos-slide").cloneNode(true); document.querySelector(".logos").appendChild(copy); </script> <hr> <br> <p class="text-left"><b>Precedence.</b></p> <p class="text-left">In the event of any conflicts between the GTC and the Specific Terms for a specific training program at the Cyber Risk GmbH websites, the Specific Terms will prevail. </p> <br> <p class="text-left"><b>Content of this GTC.</b></p> <p class="text-left">Part 1. Definitions.<br> Part 2. Privacy, Legal and Statement for the visitors of the Cyber Risk GmbH websi tes.<br> Part 3. General Terms and Conditions for In-House Instructor-Led Training programs provided by Cyber Risk GmbH.<br> Part 4. General Terms and Conditions for Online Live Training programs provided by Cyber Risk GmbH.<br> Part 5. General Terms and Conditions for Video-Recorded Training programs provided by Cyber Risk GmbH.<br> Part 6. General Terms and Conditions for Distance Learning with Certificate of Completion programs, provided by Cyber Risk GmbH.<br> Part 7. Governing Law, Jurisdiction.</p> <br> <br> <p class="text-left"><b>Part 1. Definitions.</b></p> <br> <p class="text-left"><b>“Cyber Risk GmbH” </b>is a company incorporated in Switzerland. <br> <b>Registered address: </b>Dammstrasse 16, 8810 Horgen, Switzerland. <br> <b>Company number: </b>CHE-244.099.341. <br> <b>Cantonal Register of Commerce: </b>Canton of Zürich. <br> <b>Swiss VAT number: </b>CHE-244.099.341 MWST. <br> <b>EU VAT number: </b>EU276036462. Cyber Risk GmbH is registered for EU VAT purposes in Germany (Bundeszentralamt für Steuern, One-Stop-Shop, Nicht EU-Regelung) for the sale of services in the EU. Cyber Risk GmbH declares and pays EU VAT in a single electronic quarterly return submitted to Germany, and the German Bundeszentralamt für Steuern forwards the EU VAT due to each member State of the EU.</p> <br> <p class="text-left"><b>“Cyber Risk GmbH Training Programs” </b>are training programs developed, updated and provided by Cyber Risk GmbH, and include: <br> a) In-House Instructor-Led Training programs, <br> b) Online Live Training programs, <br> c) Video-Recorded Training programs, <br> d) Distance Learning with Certificate of Completion programs.</p> <br> <p class="text-left"><b>“Parties” </b>are Cyber Risk GmbH and any individual / business entity.</p> <p class="text-left"><b>“Party” </b>is Cyber Risk GmbH or any individual / business entity.</p> <br> <p class="text-left"><b>“Client” </b> is any individual (aged 18 and over and having the capacity to contract) or business entity, who purchases one or more Cyber Risk GmbH Training Programs.</p> <br> <p class="text-left"><b>“Recipient” </b> is any individual who receives one or more Cyber Risk GmbH Training Programs that have been purchased by another individual or business entity on behalf of the Recipient.</p> <br> <p class="text-left"><b>“Memorandum of Understanding” </b>is a formal, signed, and legally binding document provided by Cyber Risk GmbH to another Party, that lays out the duties, responsibilities, and commitments of Cyber Risk GmbH, and the all-inclusive cost for the provided services. It may cover the sale of one or more Cyber Risk GmbH Training Programs. </p> <br> <p class="text-left"><b>“Contract” </b>is a formal and legally binding document, signed by both Parties, that lays out the duties, responsibilities, and commitments both Parties adhere to. It may cover the sale of one or more Cyber Risk GmbH Training Programs. </p> <br> <p class="text-left"><b>“In-House Instructor-Led Training programs” </b>are programs designed or tailored specifically for persons working for a specific company or organization (Board members, risk managers and employees, compliance managers and employees, information security managers and employees, etc.). In all In-House Instructor-Led Training programs an instructor from Cyber Risk GmbH that is approved by the Client travels to the location chosen by the Client and leads the class according to the needs of the Client and the Contract.</p> <br> <p class="text-left"><b>“Online Live Training programs” </b>are synchronous (real time, not pre-recorded) training programs that take place in a live virtual meeting room provided with the assistance of platforms like Zoom, Webex, Microsoft Teams etc. In all Online Live Training programs, instructors from Cyber Risk GmbH that are approved by the Client tailor the method of delivery (interactive, non-interactive, etc.) to the needs of the Client, lead the virtual class, and answer questions according to the needs of the Client and the Contract.</p> <br> <p class="text-left"><b>“Video-Recorded Training programs” </b>are professional, pre-recorded training programs. Instructors from Cyber Risk GmbH that are approved by the Client tailor the training content according to the needs of the Client and the Contract, and they record the training content in a professional studio. The training material (including any subsequent updates) is licensed by Cyber Risk GmbH to the client for training purposes. The Client may incorporate the recorded videos to their internal learning platform and make them available on-demand. Video-Recorded Training programs include Orientation Video Training and Compliance Video Training programs. </p> <br> <p class="text-left"><b>“Distance Learning with Certificate of Completion programs” </b>(hereinafter “distance learning programs”) are asynchronous self-study distance learning programs, provided by Cyber Risk GmbH. Asynchronous programs means that Recipients receive the training material via email, and they have the freedom to study at their own speed, when it is convenient for them. </p> <br> <p class="text-left"><b>“Credentials” </b>are the username and the password required for an online exam.</p> <br> <p class="text-left"><b>“Confidential Information” </b>is any information provided by one Party to the other in written, graphic, recorded, machine readable or other form, marked as confidential in a Contract. It may include business processes, clients, suppliers, finances and other areas of the other party’s business or products, and the training programs. Confidential Information are not information that can be found in the public domain. </p> <br> <p class="text-left"><b>‘Personal data’ </b>means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.</p> <br> <p class="text-left"><b>‘Processing’ </b>means any operation or set of operations which is performed on personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.</p> <br> <p class="text-left"><b>‘Consent’ </b>of the data subject means any freely given, specific, informed and unambiguous indication of the data subject's wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her.</p> <br> <p class="text-left"><b>‘Profiling’ </b>means any form of manual or automated processing of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyse or predict aspects concerning that natural person's performance at work, economic situation, health, personal preferences, interests, reliability, behaviour, location or movements.</p> <br> <p class="text-left"><b>“Cyber Risk GmbH websites” </b>are all websites that belong to Cyber Risk GmbH, and include the following:</p> <br> <p class="text-left"><b>a. Sectors and Industries.</b></p> <p class="text-left">1. <a href="https://www.cyber-risk-gmbh.com/" target="_blank">Cyber Risk GmbH</a></p> <p class="text-left">2. <a href="https://www.social-engineering-training.ch" target="_blank">Social Engineering Training </a></p> <p class="text-left">3. <a href="https://www.healthcare-cybersecurity.ch" target="_blank">Healthcare Cybersecurity</a></p> <p class="text-left">4. <a href="https://www.airline-cybersecurity.ch" target="_blank">Airline Cybersecurity</a></p> <p class="text-left">5. <a href="https://www.railway-cybersecurity.com/" target="_blank"> Railway Cybersecurity</a></p> <p class="text-left">6. <a href="https://www.maritime-cybersecurity.com" target="_blank">Maritime Cybersecurity</a></p> <p class="text-left">7. <a href="https://www.oil-cybersecurity.com" target="_blank">Oil Cybersecurity</a></p> <p class="text-left">8. <a href="https://www.electricity-cybersecurity.com" target="_blank">Electricity Cybersecurity</a></p> <p class="text-left">9. <a href="https://www.gas-cybersecurity.com" target="_blank">Gas Cybersecurity</a></p> <p class="text-left">10. <a href="https://www.hydrogen-cybersecurity.com" target="_blank">Hydrogen Cybersecurity</a></p> <p class="text-left">11. <a href="https://www.transport-cybersecurity.com" target="_blank">Transport Cybersecurity</a></p> <p class="text-left">12. <a href="https://www.transport-cybersecurity-toolkit.com" target="_blank">Transport Cybersecurity Toolkit </a></p> <p class="text-left">13. <a href="https://www.hotel-cybersecurity.ch" target="_blank">Hotel Cybersecurity</a></p> <p class="text-left">14. <a href="https://www.sanctions-risk.com" target="_blank">Sanctions Risk</a></p> <p class="text-left">15. <a href="https://www.american-privacy-rights-act.com" target="_blank">American Privacy Rights Act of 2024 (APRA)</a></p> <p class="text-left">16. <a href="https://www.travel-security.ch" target="_blank">Travel Security</a></p> <br> <p class="text-left"><b>b. Understanding Cybersecurity.</b></p> <p class="text-left">1. <a href="https://www.disinformation.ch" target="_blank">What is Disinformation?</a></p> <p class="text-left">2. <a href="https://www.steganography.ch" target="_blank">What is Steganography?</a></p> <p class="text-left">3. <a href="https://www.cyberbiosecurity.ch" target="_blank">What is Cyberbiosecurity?</a></p> <p class="text-left">4. <a href="https://www.synthetic-identity-fraud.com" target="_blank">What is Synthetic Identity Fraud?</a></p> <p class="text-left">5. <a href="https://www.romance-scams.ch" target="_blank">What is a Romance Scam?</a></p> <p class="text-left">6. <a href="https://www.cyber-espionage.ch" target="_blank">What is Cyber Espionage?</a></p> <p class="text-left">7. <a href="https://www.sexspionage.ch" target="_blank" >What is Sexspionage?</a></p> <p class="text-left">8. <a href="https://www.restrict-act.com" target="_blank">What is the RESTRICT Act?</a></p> <br> <p class="text-left"><b>c. Understanding Cybersecurity in the European Union.</b></p> <p class="text-left">1. <a href="https://www.nis-2-directive.com" target="_blank">The NIS 2 Directive</a></p> <p class="text-left">2. <a href="https://www.digital-operational-resilience-act.com" target="_blank">The Digital Operational Resilience Act (DORA)</a></p> <p class="text-left">3. <a href="https://www.critical-entities-resilience-directive.com" target="_blank">The Critical Entities Resilience Directive (CER)</a></p> <p class="text-left">4. <a href="https://www.eu-data-act.com" target="_blank">The European Data Act </a></p> <p class="text-left">5. <a href="https://www.european-data-governance-act.com" target="_blank">The European Data Governance Act (DGA) </a></p> <p class="text-left">6. <a href="https://www.european-cyber-resilience-act.com" target="_blank">The European Cyber Resilience Act (CRA) </a></p> <p class="text-left">7. <a href="https://www.eu-digital-services-act.com" target="_blank">The Digital Services Act (DSA)</a></p> <p class="text-left">8. <a href="https://www.eu-digital-markets-act.com" target="_blank">The Digital Markets Act (DMA)</a></p> <p class="text-left">9. <a href="https://www.european-chips-act.com" target="_blank">The European Chips Act </a></p> <p class="text-left">10. <a href="https://www.artificial-intelligence-act.com" target="_blank">The Artificial Intelligence Act </a></p> <p class="text-left">11. <a href="https://www.ai-liability-directive.com" target="_blank">The Artificial Intelligence Liability Directive </a></p> <p class="text-left">12. <a href="https://www.faicp-framework.com" target="_blank">The Framework for Artificial Intelligence Cybersecurity Practices (FAICP) </a></p> <p class="text-left">13. <a href="https://www.eu-cyber-solidarity-act.com" target="_blank">The EU Cyber Solidarity Act</a></p> <p class="text-left">14. <a href="https://www.digital-networks-act.com" target="_blank">The Digital Networks Act (DNA)</a></p> <p class="text-left">15. <a href="https://www.european-eprivacy-regulation.com" target="_blank">The European ePrivacy Regulation </a></p> <p class="text-left">16. <a href="https://www.european-digital-identity-regulation.com" target="_blank">The European Digital Identity Regulation </a></p> <p class="text-left">17. <a href="https://www.media-freedom-act.com" target="_blank">The European Media Freedom Act (EMFA) </a></p> <p class="text-left">18. <a href="https://www.corporate-sustainability-due-diligence-directive.com/" target="_blank">The Corporate Sustainability Due Diligence Directive (CSDDD) </a></p> <p class="text-left">19. <a href="https://www.eu-scicf.com" target="_blank">The Systemic Cyber Incident Coordination Framework (EU-SCICF)</a></p> <p class="text-left">20. <a href="https://www.european-health-data-space.com" target="_blank">The European Health Data Space (EHDS)</a></p> <p class="text-left">21. <a href="https://www.european-financial-data-space.com/" target="_blank">The European Financial Data Space (EFDS)</a></p> <p class="text-left">22. <a href="https://www.financial-data-access.com" target="_blank">The Financial Data Access (FiDA) Regulation</a></p> <p class="text-left">23. <a href="https://www.payment-services-directive-3.com" target="_blank">The Payment Services Directive 3 (PSD3), Payment Services Regulation (PSR)</a></p> <p class="text-left">24. <a href="https://www.internal-market-emergency-resilience-act.com" target="_blank">The Internal Market Emergency and Resilience Act (IMERA)</a></p> <p class="text-left">25. <a href="https://www.digital-fairness-act.com" target="_blank">The Digital Fairness Act</a></p> <p class="text-left">26. <a href="https://www.european-cyber-defence-policy.com" target="_blank">The European Cyber Defence Policy</a></p> <p class="text-left">27. <a href="https://www.strategic-compass-european-union.com" target="_blank">The Strategic Compass of the European Union</a></p> <p class="text-left">28. <a href="https://www.european-space-law.com" target="_blank">The European Space Law (EUSL) </a></p> <p class="text-left">29. <a href="https://www.data-privacy-framework.com" target="_blank">The EU-US Data Privacy Framework </a></p> <p class="text-left">30. <a href="https://www.cyber-diplomacy-toolbox.com" target="_blank">The EU Cyber Diplomacy Toolbox </a></p> <br> <br> <p class="text-left"><b>Part 2. Privacy, Legal and Statement for the visitors of the Cyber Risk GmbH websites.</b></p> <p class="text-left"><b>Data protection.</b></p> <p class="text-left">Individuals must accept this GTC before visiting the Cyber Risk GmbH websites on their behalf, or acting on behalf of a business entity, where they can find information and they can purchase In-House Instructor-Led Training programs, Online Live Training programs, Video-Recorded Training programs, or Distance Learning with Certificate of Completion programs, provided by Cyber Risk GmbH.</p> <p class="text-left">The present GTC applies to all visitors to the Cyber Risk GmbH websites, and all legal transactions made through the Cyber Risk GmbH websites. </p> <p class="text-left">Compliance with the Swiss Act on Federal Data Protection (nFADP) and the EU General Data Protection Regulation (GDPR) is very important for us. </p> <p class="text-left">We follow the <b>“Privacy by Design” </b>principle. We integrate the protection and respect of users' privacy into the very structure of our services.</p> <p class="text-left">We also follow the <b>“Privacy by Default” </b>principle. We implement the best possible privacy and security measures by default, without any intervention from users, and we ensure we process data and limit the use or data in accordance with nFADP and GDPR. Only data that is absolutely necessary for a specific purpose is processed, and only after consent from the data subjects.</p> <p class="text-left">We only collect personal information that visitors and clients explicitly give us, and we process this information only for the reasons they are collected.</p> <p class="text-left">Personal data are:</p> <p class="text-left">(a) processed lawfully, fairly and in a transparent manner in relation to the data subject; <b>(‘lawfulness, fairness and transparency’)</b>.</p> <p class="text-left">(b) collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes; <b>(‘purpose limitation’)</b>.</p> <p class="text-left">(c) adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed; <b>(‘data minimisation’).</b></p> <p class="text-left">(d) accurate and, where necessary, kept up to date; <b>(‘accuracy’).</b></p> <p class="text-left">We do not profile visitors of our web sites. We do not use tracking methods in order to identify visitors. We do not collect personal information of the visitors of our web sites.</p> <p class="text-left">When you visit the Cyber Risk GmbH websites, our web hosting company (Hostpoint in Switzerland) may record your visit. We do not receive from Hostpoint any information to identify or profile visitors of our web sites.</p> <p class="text-left">The hosting provider (Hostpoint) of our websites automatically collects and stores information in so-called server log files, which your browser automatically transmits. These are in particular:<br> – Browser type and browser version,<br> – operating system used,<br> – Referrer URL,<br> – Host name of the accessing computer,<br> – Time of server request.</p> <p class="text-left">This data is not received by Cyber Risk GmbH and cannot be assigned to specific persons by Cyber Risk GmbH. This data is not merged with other data sources in Cyber Risk GmbH.</p> <p class="text-left">This data collection from Hostpoint is primarily used to evaluate and prevent attempts to attack the websites. In certain situations, hosting providers are legally obliged to be able to provide information about unauthorized access, in order to counteract criminal activities.</p> <p class="text-left">Cyber Risk GmbH has implemented reasonable technical and organisational security measures to protect your personal data against unauthorized access, misuse, loss or destruction.</p> <p class="text-left">All electronic messages sent to and from Cyber Risk GmbH are automatically stored. They are protected by reasonable technical and organisational measures. All emails are disposed of after the applicable retention period has expired.</p> <p class="text-left">We will disclose the information we have received only to governmental agencies or entities, regulatory authorities, or other persons, only for one reason: To comply with applicable laws, regulations, and court orders.</p> <br> <p class="text-left"><b>Cookies.</b></p> <p class="text-left">The Cyber Risk GmbH websites do not use cookies to make them more user-friendly, for marketing, or for any other reason, and do not use Google Analytics or similar services.</p> <p class="text-left">Users can control the use of cookies. Browsers give the option to restrict cookies or disable them altogether. Please note that disabling cookies does not affect the functionality and user-friendliness of the Cyber Risk GmbH websites.</p> <br> <p class="text-left"><b>What should you consider when sending data over the Internet?</b></p> <p class="text-left">The Internet is generally not regarded as a secure environment, and information sent via the Internet (such as to or from the Cyber Risk GmbH websites or via electronic messages) may be accessed by unauthorized third parties, potentially leading to disclosures, changes in content or technical failures. </p> <p class="text-left">Even if both sender and receiver are located in the same country, information sent via the Internet may be transmitted across international borders and be forwarded to a country with a lower data protection level than exists in your country of residence.</p> <p class="text-left">Ordinary e-mail messages sent over the Internet are neither confidential nor secure. They may be accessible by third parties and may entail a considerable amount of danger and risk including:<br> (a) lack of confidentiality (e-mails and their attachments can be read and/or monitored without detection);<br> (b) manipulation or falsification of the sender's address or of the e-mail's (or attachment's) content (e.g. changing the sender's address(es) or details);<br> (c) system outages and other transmission errors, which can cause e-mails and. their attachments to be delayed, mutilated, misrouted and deleted;<br> (d) viruses, worms, Trojan horses etc. may be spread undetected by third parties and may cause considerable damage; and<br> (e) interception by third parties.</p> <p class="text-left">Cyber Risk GmbH shall not be liable to you or anybody else for any damages incurred in connection with any messages sent to Cyber Risk GmbH using ordinary E-mail or any other electronic messaging system. If you want more secure communication, please let us know.</p> <br> <p class="text-left"><b>How do we deal with information from individuals under the age of 18?</b></p> <p class="text-left">The Cyber Risk GmbH websites do not collect personal data from individuals under the age of 18. Individuals under the age of 18 should receive permission from their parent or legal guardian before providing any personal data to Cyber Risk GmbH on the Cyber Risk GmbH websites.</p> <br> <p class="text-left"><b>How can you access or review your personal data?</b></p> <p class="text-left">You may, where permitted by applicable law or regulation:<br> - check whether we hold your personal data,<br> - ask us to provide you with a copy of your personal data, or<br> - require us to correct any of your personal data that is inaccurate.</p> <p class="text-left">Should you have a request regarding the processing of your personal data, please send us an email, or a letter to the following address:</p> <p class="text-left">Cyber Risk GmbH<br> Dammstrasse 16,<br> 8810 Horgen<br> Switzerland<br> Phone: +41 79 505 89 60<br> Email: george.lekatis@cyber-risk-gmbh.com<br> Web: www.cyber-risk-gmbh.com</p> <br> <p class="text-left"><b>Information requests.</b></p> <p class="text-left">If, under Article 8 of the Federal Act on Data Protection ("FADP"), you wish to request information as to whether Cyber Risk GmbH processes your personal data, please send a written request to the following address:<br> Cyber Risk GmbH<br> Dammstrasse 16,<br> 8810 Horgen<br> Switzerland<br> Phone: +41 79 505 89 60<br> Email: george.lekatis@cyber-risk-gmbh.com<br> Web: www.cyber-risk-gmbh.com</p> <br> <p class="text-left"><b>Statement.</b></p> <p class="text-left">By accessing the Cyber Risk GmbH websites, you accept this Statement ("Statement"). <b>If you do not agree to this Statement, please do not visit the Cyber Risk GmbH websites. </b>The terms of this Statement are subject to any additional terms of disclaimers or other contractual terms you have entered into with Cyber Risk GmbH such as client privacy statements or notices, non-disclosure or confidentiality agreements, and any applicable mandatory laws and regulations.</p> <p class="text-left">All information and materials published, distributed or otherwise made available on the Cyber Risk GmbH websites are provided for informational purposes, for your non-commercial, personal use only. No information or materials published on the Cyber Risk GmbH websites constitutes an investment, legal or tax advice. </p> <p class="text-left">Cyber Risk GmbH does not represent that any product or service is suitable for any specific visitor, firm or organization. No decisions should be made solely based on the contents or information found on the Cyber Risk GmbH websites. </p> <p class="text-left">When making a decision for a specific person, firm or organization, you should seek the advice of professional and legal advisors and qualified experts.</p> <p class="text-left">Cyber Risk GmbH accepts no responsibility for the correctness, accuracy, timeliness, reliability or completeness of the information provided in the Cyber Risk GmbH websites. </p> <p class="text-left">Liability claims against Cyber Risk GmbH relating to material or non-material damage caused by the use or non-use of the information provided or by the use of incorrect or incomplete information have no legal basis as a result of this Statement. If you do not accept this statement, please do not visit the Cyber Risk GmbH websites.</p> <p class="text-left">Cyber Risk GmbH reserves the right to change, to supplement, and to delete temporarily or permanently any parts of the pages of the Cyber Risk GmbH websites or any offers without separate announcement.</p> <p class="text-left">Direct or indirect references to third-party websites and hyperlinks to third-party websites are outside of our area of responsibility. Cyber Risk GmbH is in no way responsible for any content on or interaction with third-party websites. The access and use of such websites is at the user's own risk.</p> <p class="text-left">To the fullest extent permitted by law, in no event shall Cyber Risk GmbH or our affiliates, or any of our directors, employees, contractors, service providers or agents have any liability whatsoever to any person for any direct or indirect loss, liability, cost, claim, expense or damage of any kind, whether in contract or in tort, including negligence, or otherwise, arising out of or related to the use of all or part of the Cyber Risk GmbH websites, or any links to third party websites.</p> <p class="text-left">You are solely responsible for acquiring and maintaining such electronic devices and equipment that can handle and will allow you to access and use the Cyber Risk GmbH websites and for taking adequate and appropriate data security measures in accordance with good industry practice to protect yourself against fraud or cyber-attacks on a continuous basis (e.g. by using the most recent browser versions, and installing recommended security patches and up-to-date anti-virus programs and firewalls). </p> <p class="text-left">Cyber Risk GmbH specifically disclaims all liability for any tampering with any user's computer system by unauthorized parties, or for losses or liabilities suffered by any user arising from viruses or attacks by hackers.</p> <p class="text-left">In no event will Cyber Risk GmbH or our affiliates, or any of our officers, directors, employees, contractors, service providers or agents be liable for any incidental, special, punitive or consequential damages howsoever caused arising out of the use of the Cyber Risk GmbH websites, its content, or the inability to use the Cyber Risk GmbH websites.</p> <p class="text-left">This statement applies to any and all damages or injury, including those caused by any failure of performance, error, omission, interruption, deletion, defect, delay in operation or transmission, computer virus, communication line failure, theft, destruction, or unauthorized access, whether for breach of contract, tortious behavior, negligence or under any other cause of action.</p> <br> <p class="text-left"><b>Copyright.</b></p> <p class="text-left">The copyright and any other rights relating to texts, illustrations, photos or any other files on the site are the exclusive property of Cyber Risk GmbH or the mentioned owners. For the reproduction of any elements, written consent of the copyright holder must be obtained in advance. If Cyber Risk GmbH unwittingly affects the rights of others, the relevant content shall be amended immediately after it becomes known.</p> <br> <p class="text-left"><b>Photo credit.</b></p> <p class="text-left">Own pictures, and pictures purchased from Dreamstime @dreamstime.com</p> <br> <p class="text-left"><b>Note.</b></p> <p class="text-left">If sections or individual terms of the GTC are decided by the courts or authorities as not legal or correct, the content or validity of the other parts remain uninfluenced by this fact.</p> <br> <br> <p class="text-left"><b>Part 3. General Terms and Conditions for In-House Instructor-Led Training programs provided by Cyber Risk GmbH.</b></p> <p class="text-left"><b>Cost, Terms and Conditions, Cancellation Policy.</b></p> <p class="text-left">Unless otherwise agreed, the training services shall be provided at a fixed price, plus VAT and reasonable expenses that will be pre-approved by the Client.</p> <p class="text-left">The Client will be provided with timesheets and breakdowns of time spent and expenses.</p> <p class="text-left">Payments shall only be made against an invoice.</p> <p class="text-left">The copyright and all intellectual property rights relating to the training material are solely owned by and hereby reserved to Cyber Risk GmbH. Under no circumstances may the whole or any part of the training material be produced or copied in any form or by any means or translated into another language without the prior written permission of Cyber Risk GmbH.</p> <p class="text-left">Placing the material (including any and all derivative works) on a marketplace and sharing the material (including any and all derivative works) with any third party outside the Client company or organisation is strictly forbidden.</p> <p class="text-left">Cyber Risk GmbH expressly disclaims all warranties, either expressed or implied, including any implied warranty of fitness for a particular purpose, and neither assumes nor authorizes any other person to assume for it any liability in connection with the information or training programs provided. </p> <p class="text-left">Cyber Risk GmbH, its directors, managers, employees, or contractors shall not be held liable for any direct or indirect damages resulting from the use of any training material. By agreeing to this license agreement, the client agrees to indemnify, defend, and hold harmless Cyber Risk GmbH from and against all claims.</p> <p class="text-left">The training program is not legal advice for a specific legal entity. Although it is tailored to each client, it is still of a general nature only and is not intended to address the specific circumstances of any particular individual or entity. It should not be relied on in the particular context of enforcement or similar regulatory action. It does not prejudge the position that the relevant authorities might decide to take on the same matters if developments, including Court rulings, were to lead it to revise some of the views expressed in the program.</p> <p class="text-left">50% of the cost of each training program (including 50% of the total estimated expenses) is billable in advance and is payable at least 45 days prior to the course delivery date. The remaining 50% of the cost (including the remaining expenses) is due up to 30 days after the last day of the training.</p> <p class="text-left">Cancellation from the client less than 45 days before the scheduled start date will be subject to a cancellation fee of 50% of the cost of the training program.</p> <p class="text-left">Cancellation from the client 46 days or more before the scheduled start date will be subject to a cancellation fee of 20% of the cost of the training program.</p> <p class="text-left">Force Majeure: Neither the client nor Cyber Risk GmbH shall be liable to any penalty should courses be delayed or cancelled due to war, fire, strike lock-out, industrial action, accident / illness of the instructor, civil disturbance, or any other cause whatsoever beyond their control.</p> <p class="text-left">In the unlikely event of a cancellation by Cyber Risk GmbH, any payment made for the cancelled class will be fully refunded. The client understands and agrees that Cyber Risk GmbH shall not, in any way, be held responsible for any costs, including loss of airfare or other transportation costs, hotel expenses or other damages, which the client may suffer if Cyber Risk GmbH cancels a class.</p> <p class="text-left">Cyber Risk GmbH processes and stores data in compliance with both, the Swiss Federal Act on Data Protection (FADP) and the EU General Data Protection Regulation (GDPR). The service provider is Hostpoint (the servers are in the interxion data center in Zurich, the data is saved exclusively in Switzerland, and support, development and administration activities are also based entirely in Switzerland).</p> <p class="text-left">Cyber Risk GmbH is willing to sign a confidentiality or nondisclosure agreement, shall maintain confidential information in trust and confidence, and shall not disclose or use confidential information for any unauthorized purpose. Cyber Risk GmbH may use confidential information of the client only to the extent required to accomplish the purposes of the training program.</p> <p class="text-left">Cyber Risk GmbH will neither take any photos of the audience, nor publish any names, photos, or details of the training agreement on social media, web sites or catalogs, for marketing or for any other purpose.</p> <p class="text-left">Any controversy in relation to the terms of this agreement shall be governed and interpreted in accordance with the law of the Canton of Zürich, Switzerland.</p> <br> <br> <p class="text-left"><b>Part 4. General Terms and Conditions for Online Live Training programs provided by Cyber Risk GmbH.</b></p> <p class="text-left"><b>Cost, Terms and Conditions, Cancellation Policy.</b></p> <p class="text-left">Unless otherwise agreed, the training services shall be provided at a fixed price, plus VAT and reasonable expenses that will be pre-approved by the Client.</p> <p class="text-left">Payments shall only be made against an invoice.</p> <p class="text-left">The copyright and all intellectual property rights relating to the training material are solely owned by and hereby reserved to Cyber Risk GmbH. Under no circumstances may the whole or any part of the training material be produced or copied in any form or by any means or translated into another language without the prior written permission of Cyber Risk GmbH.</p> <p class="text-left">Placing the material (including any and all derivative works) on a marketplace and sharing the material (including any and all derivative works) with any third party outside the client company or organisation is strictly forbidden.</p> <p class="text-left">Cyber Risk GmbH expressly disclaims all warranties, either expressed or implied, including any implied warranty of fitness for a particular purpose, and neither assumes nor authorizes any other person to assume for it any liability in connection with the information or training programs provided. </p> <p class="text-left">Cyber Risk GmbH, its directors, managers, employees, or contractors shall not be held liable for any direct or indirect damages resulting from the use of any training material. By agreeing to this license agreement, the client agrees to indemnify, defend, and hold harmless Cyber Risk GmbH from and against all claims.</p> <p class="text-left">The training program is not legal advice for a specific legal entity. Although it is tailored to each client, it is still of a general nature only and is not intended to address the specific circumstances of any particular individual or entity. It should not be relied on in the particular context of enforcement or similar regulatory action. It does not prejudge the position that the relevant authorities might decide to take on the same matters if developments, including Court rulings, were to lead it to revise some of the views expressed in the program.</p> <p class="text-left">50% of the cost of each training program (including 50% of the total estimated expenses) is billable in advance and is payable at least 45 days prior to the course delivery date. The remaining 50% of the cost (including the remaining expenses) is due up to 30 days after the last day of the training.</p> <p class="text-left">Cancellation from the client less than 45 days before the scheduled start date will be subject to a cancellation fee of 50% of the cost of the training program.</p> <p class="text-left">Cancellation from the client 46 days or more before the scheduled start date will be subject to a cancellation fee of 20% of the cost of the training program.</p> <p class="text-left">Force Majeure: Neither the client nor Cyber Risk GmbH shall be liable to any penalty should courses be delayed or cancelled due to war, fire, strike lock-out, industrial action, accident / illness of the instructor, civil disturbance, or any other cause whatsoever beyond their control.</p> <p class="text-left">In the unlikely event of a cancellation by Cyber Risk GmbH, any payment made for the cancelled class will be fully refunded. The client understands and agrees that Cyber Risk GmbH shall not, in any way, be held responsible for any costs, including loss of airfare or other transportation costs, hotel expenses or other damages, which the client may suffer if Cyber Risk GmbH cancels a class.</p> <p class="text-left">Cyber Risk GmbH processes and stores data in compliance with both, the Swiss Federal Act on Data Protection (FADP) and the EU General Data Protection Regulation (GDPR). The service provider is Hostpoint (the servers are in the interxion data center in Zurich, the data is saved exclusively in Switzerland, and support, development and administration activities are also based entirely in Switzerland).</p> <p class="text-left">Cyber Risk GmbH is willing to sign a confidentiality or nondisclosure agreement, shall maintain confidential information in trust and confidence, and shall not disclose or use confidential information for any unauthorized purpose. Cyber Risk GmbH may use confidential information of the client only to the extent required to accomplish the purposes of the training program.</p> <p class="text-left">Cyber Risk GmbH will neither take any photos of the audience, nor publish any names, photos, or details of the training agreement on social media, web sites or catalogs, for marketing or for any other purpose.</p> <p class="text-left">Any controversy in relation to the terms of this agreement shall be governed and interpreted in accordance with the law of the Canton of Zürich, Switzerland.</p> <br> <br> <p class="text-left"><b>Part 5. General Terms and Conditions for Video-Recorded Training programs provided by Cyber Risk GmbH.</b></p> <p class="text-left"><b>Cost, Terms and Conditions, Cancellation Policy.</b></p> <p class="text-left">Unless otherwise agreed, the training services shall be provided at a fixed price, plus VAT. It will be pre-approved by the Client.</p> <p class="text-left">Payments shall only be made against an invoice.</p> <p class="text-left">The copyright and all intellectual property rights relating to the training material are solely owned by and hereby reserved to Cyber Risk GmbH. Under no circumstances may the whole or any part of the training material be produced or copied in any form or by any means or translated into another language without the prior written permission of Cyber Risk GmbH.</p> <p class="text-left">The training material, including any subsequent updates, is licensed by Cyber Risk GmbH to the purchasers ("clients") for training purposes only. The clients are provided with non-exclusive rights to use the training material to educate their company's or their organisation's employees. </p> <p class="text-left">Placing the material (including any and all derivative works) on a marketplace and sharing the material (including any and all derivative works) with any third party outside the client company or organisation is strictly forbidden. The owner of the training material remains Cyber Risk GmbH.</p> <p class="text-left">The clients have the right to translate and/or overwrite the subtitles of the video-recorded training in the language(s) they deem necessary. Cyber Risk is not responsible legally, or otherwise, for any modifications made on the video recordings after their delivery to the client.</p> <p class="text-left">Cyber Risk GmbH expressly disclaims all warranties, either expressed or implied, including any implied warranty of fitness for a particular purpose, and neither assumes nor authorizes any other person to assume for it any liability in connection with the information or training programs provided. </p> <p class="text-left">Cyber Risk GmbH, its directors, managers, employees, or contractors shall not be held liable for any direct or indirect damages resulting from the use of any training material. By agreeing to this license agreement, the client agrees to indemnify, defend, and hold harmless Cyber Risk GmbH from and against all claims.</p> <p class="text-left">The training program is not legal advice for a specific legal entity. Although it is tailored to each client, it is still of a general nature only and is not intended to address the specific circumstances of any particular individual or entity. It should not be relied on in the particular context of enforcement or similar regulatory action. It does not prejudge the position that the relevant authorities might decide to take on the same matters if developments, including Court rulings, were to lead it to revise some of the views expressed in the program.</p> <p class="text-left">The client is responsible for the storage and distribution of the video-recorded training files.</p> <p class="text-left">A down payment of 50% of the total payment is due at least 45 days before the date that the training material must be delivered to the client. The remaining 50% of the total payment will be paid within 30 days after the delivery of the training material to the client.</p> <p class="text-left">Cancellation from the client less than 45 days before the scheduled start date will be subject to a cancellation fee of 50% of the cost of the training program.</p> <p class="text-left">Cancellation from the client 46 days or more before the scheduled start date will be subject to a cancellation fee of 20% of the cost of the training program.</p> <p class="text-left">Force Majeure: Neither the client nor Cyber Risk GmbH shall be liable to any penalty should courses be delayed or cancelled due to war, fire, strike lock-out, industrial action, accident / illness of the instructor, civil disturbance, or any other cause whatsoever beyond their control.</p> <p class="text-left">In the unlikely event of a cancellation by Cyber Risk GmbH, any payment made for the cancelled video-recorded class will be fully refunded.</p> <p class="text-left">Cyber Risk GmbH processes and stores data in compliance with both, the Swiss Federal Act on Data Protection (FADP) and the EU General Data Protection Regulation (GDPR). The service provider is Hostpoint (the servers are in the interxion data center in Zurich, the data is saved exclusively in Switzerland, and support, development and administration activities are also based entirely in Switzerland).</p> <p class="text-left">Cyber Risk GmbH is willing to sign a confidentiality or nondisclosure agreement, shall maintain confidential information in trust and confidence, and shall not disclose or use confidential information for any unauthorized purpose. Cyber Risk GmbH may use confidential information of the client only to the extent required to accomplish the purposes of the training program.</p> <p class="text-left">Any controversy in relation to the terms of this agreement shall be governed and interpreted in accordance with the law of the Canton of Zürich, Switzerland.</p> <br> <br> <p class="text-left"><b>Part 6. General Terms and Conditions for Distance Learning with Certificate of Completion, provided by Cyber Risk GmbH.</b></p> <p class="text-left">Each Distance Learning with Certificate of Completion program (hereinafter referred to as “distance learning program”) is provided at a fixed price, that includes VAT. There is no additional cost, now or in the future, for each program.</p> <p class="text-left">Each distance learning program consists of: </p> <p class="text-left">a. The official presentations, sent via email,</p> <p class="text-left">b. Up to 3 online exams, important for the measurement of the training effectiveness, </p> <p class="text-left">c. The certificate of completion.</p> <p class="text-left">Clients must carefully read the “What is included in the program” section at the registration page (the web page where they can make the payment), where they can find all information for each distance learning program. </p> <p class="text-left">Clients can purchase each distance learning program with a card, QR payment, or PayPal. Cyber Risk GmbH has no access to the financial information of Clients (card numbers, bank accounts, or other confidential information related to a payment). Only the Payment Service Providers (Banks, Payrexx, PayPal etc.) have access to financial information.</p> <p class="text-left">Cyber Risk GmbH will ask all Clients or Recipients of the distance learning programs two questions:</p> <p class="text-left">a. Which is your full name, as it will appear on the certificate?</p> <p class="text-left">b. Which is your email address?</p> <p class="text-left">The answers to these questions, provided directly by Clients or Recipients (collectively “Personal Information”) will be kept by Cyber Risk GmbH in compliance with the Swiss Act on Federal Data Protection (nFADP) and the EU General Data Protection Regulation (GDPR). </p> <p class="text-left">After the payment, Clients will receive information from the Payment Service Providers (Payrexx, PayPal etc.). “Payment completed” means that the Payment Service Providers have received all the necessary information to process the transaction. “Payment cleared” means that the Payment Service Providers have received the funds. Cleared funds are money that has been fully transferred from one account to another.</p> <p class="text-left">Cyber Risk GmbH will send the training programs via email up to 24 hours after it has been informed by the Payment Service Providers that the transaction is completed. Clients must check the spam folder of their email client too, as emails with attachments are often landed in the spam folder.</p> <p class="text-left">Clients have the option to ask for a full refund up to 60 days after the payment. If they do not want one of the distance learning programs for any reason, Clients must only send an email with title “Please refund the payment”, and Cyber Risk GmbH will refund the payment, no questions asked.</p> <p class="text-left">Clients must study their program, and when they are ready for the online exam, they must send an email to Cyber Risk GmbH, to receive their credentials. Credentials are the username and the password required for the online exam. Clients are responsible for maintaining the secrecy and security of their Credentials, and they must not disclose them to any third party. If the Credentials are compromised, Clients must notify Cyber Risk GmbH via email as soon as possible.</p> <p class="text-left">Only when Clients pass the exam, they will receive the certificate of completion, according to the terms at the registration page of the program. </p> <p class="text-left">Clients can take the exam online from their home or office, in all countries. It is an open book exam. Risk and compliance management is something Clients must understand and learn, not memorize. Clients must acquire knowledge and skills, not commit something to memory.</p> <p class="text-left">Clients will be given 90 minutes to complete a 35-question exam. They must score 70% or higher. The exam contains only questions that have been clearly answered in the official presentations.</p> <p class="text-left">All exam questions are multiple-choice, composed of two parts:</p> <p class="text-left">a. A stem (a question asked, or an incomplete statement to be completed).</p> <p class="text-left">b. Four possible responses.</p> <p class="text-left">TIME LIMIT - This exam has a 90-minute time limit. You must complete this exam within this time limit, otherwise the result will be marked as an unsuccessful attempt.</p> <p class="text-left">BACK BUTTON - When taking this exam you are NOT permitted to move backwards to review/change prior answers. Your browser back button will refresh the current page instead of moving backward.</p> <p class="text-left">RESTART/RESUME – You CANNOT stop and then resume the exam. If you stop taking this exam by closing your browser, your answers will be lost, and the result will be marked as an unsuccessful attempt.</p> <p class="text-left">SKIP - You CANNOT skip answering questions while taking this exam. You must answer all the questions in the order the questions are presented.</p> <br> <p class="text-left"><b>Additional Terms and Conditions for Distance Learning with Certificate of Completion programs.</b></p> <p class="text-left">The copyright and all intellectual property rights relating to the training material are solely owned by and hereby reserved to Cyber Risk GmbH. Under no circumstances may the whole or any part of the training material be produced or copied in any form or by any means or translated into another language without the prior written permission of Cyber Risk GmbH.</p> <p class="text-left">Placing the material (including any and all derivative works) on a marketplace and sharing the material (including any and all derivative works) with any third party outside the client company or organisation is strictly forbidden.</p> <p class="text-left">Cyber Risk GmbH expressly disclaims all warranties, either expressed or implied, including any implied warranty of fitness for a particular purpose, and neither assumes nor authorizes any other person to assume for it any liability in connection with the information or training programs provided. </p> <p class="text-left">Cyber Risk GmbH, its directors, managers, employees, or contractors shall not be held liable for any direct or indirect damages resulting from the use of any training material. By agreeing to this license agreement, the client agrees to indemnify, defend, and hold harmless Cyber Risk GmbH from and against all claims.</p> <p class="text-left">The training program is not legal advice for a specific legal entity. Although it is tailored to each client, it is still of a general nature only and is not intended to address the specific circumstances of any particular individual or entity. It should not be relied on in the particular context of enforcement or similar regulatory action. It does not prejudge the position that the relevant authorities might decide to take on the same matters if developments, including Court rulings, were to lead it to revise some of the views expressed in the program.</p> <p class="text-left">Cyber Risk GmbH processes and stores data in compliance with both, the Swiss Federal Act on Data Protection (FADP) and the EU General Data Protection Regulation (GDPR). The service provider is Hostpoint (the servers are in the interxion data center in Zurich, the data is saved exclusively in Switzerland, and support, development and administration activities are also based entirely in Switzerland).</p> <p class="text-left">Cyber Risk GmbH is willing to sign a confidentiality or nondisclosure agreement, shall maintain confidential information in trust and confidence, and shall not disclose or use confidential information for any unauthorized purpose. Cyber Risk GmbH may use confidential information of the client only to the extent required to accomplish the purposes of the training program.</p> <p class="text-left">Cyber Risk GmbH will not publish any names, photos, or details of the Client on social media, web sites or catalogs, for marketing or for any other purpose. Cyber Risk GmbH will only post information on social media, if it is invited by the Client to do so.</p> <p class="text-left">Clients and Recipients may not, and may not attempt to, directly or indirectly: (a) transfer, sublicense, loan, sell, assign, lease, rent, act as a service bureau, distribute or grant rights to the training material to any person or legal entity. (b) remove, obscure, or alter any notice of any Trademark, or other intellectual property or proprietary right appearing on or contained within the training material. (c) modify, alter, tamper with, repair, or otherwise create derivative works of any training material without written permission from Cyber Risk GmbH. All rights granted to Clients are conditional on their continued compliance with this GTC and will immediately and automatically terminate if they do not comply with any term or condition of this GTC. </p> <br> <p class="text-left"><b>Precedence.</b></p> <p class="text-left">In the event of any conflicts between the GTC and the Specific Terms for a specific training program at the Cyber Risk GmbH websites, the Specific Terms will prevail. </p> <br> <p class="text-left"><b>Amendments.</b></p> <p class="text-left">Cyber Risk GmbH reserves the right to change these GTC at any time. The modifications will become effective upon posting them to the Cyber Risk GmbH websites and will only apply to training programs sold after the modification. </p> <br> <br> <p class="text-left"><b>Part 7. Governing Law, Jurisdiction.</b></p> <p class="text-left">Any controversy in relation to the terms of this GTC shall be governed, interpreted and construed in accordance with the laws of Switzerland. The Parties shall endeavor to settle any dispute by amicable arrangement. In the event of continuing disagreement, the Parties shall refer the dispute to the courts of the Canton of Zürich in Switzerland.</p> <p class="text-left">If sections or individual terms of the GTC are decided by the courts or authorities as not legal or correct, the content or validity of the other parts remain uninfluenced by this fact.</p> <br> <hr> <br> </div> </div> </div> </div> </div> </div> </div> </div> <!--<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js"></script> --> <script src="js/bootstrap.js"></script> <script> $(document).ready(function() { var owl = $('.cliend-logo'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 6 }, 1000: { items: 6 } } }) }) $(document).ready(function() { var owl = $('.testimonialstext'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 1 }, 1000: { items: 1 } } }) }) </script> <script> $(window).scroll(function() { if ($(document).scrollTop() > 50) { $('nav').addClass('shrink'); $('.add').hide(); } else { $('nav').removeClass('shrink'); $('.add').show(); } }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10