Privacy Policy

Information We Collect

We do not collect personally identifiable information (e.g., name, address, phone number, email address) unless you provide it to us. No other attempts are made by the Identity Defined Security Alliance to identify individual users or their personal usage habits. We collect only aggregate information about the numbers of individuals who visit our web site and what those individuals look at. This website uses industry-standard software to create summary statistics, which are used for such things as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.

When you click on our site’s Twitter, LinkedIn or YouTube icons, your browser will open a new window linking you to the associated website and you are subject to that website’s privacy policy. Each platform posts a Privacy Policy for you to review regarding their service, the types of information they collect and how they use and share it. We highly recommend you understand the privacy policies of the services you use.

Information You Willingly Provide

When you subscribe to communications from the IDSA (newsletters, emails, etc.) you can expect you will receive updates from IDSA about free resources and upcoming events; we do not share our contact lists, unless you register for a webinar presented by an IDSA member; you can expect to hear from the IDSA on average a couple of times per month and, in the ramp-up to Identity Management Day more frequently; you can opt out at any time.

How We Protect Information

For site security purposes and to ensure that this service remains available to all users, this website employs industry-standard methods to monitor network traffic to identify unauthorized attempts to upload or change information or otherwise cause damage. Unauthorized attempts to upload information or change information on this web site are strictly prohibited and may be punishable by law, including the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.