Skip to content

Privacy policy

Threatologist (“we,” “us,” “our”) care about your privacy. This policy outlines the personal data we collect, how we use it, and why. It also tells you how you can update any of your personal data in accordance with General Data Protection Regulation (GDPR).

Our core privacy principles

At Threatologist, we adhere to the following principles:

  • We do not ask for your personal data unless it directly helps us provide you with the best quality service.
  • We do not share your personal data with anyone, unless it is required by law, helps us develop or deliver our services, or protects our rights.
  • We do not store personal data on our servers unless required for the ongoing operation of the website.

“Personal data” (also known as personal information) is information that can help identify you as an individual. It is defined by GDPR as “any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person” (GDPR Art.4.1).

What information we collect through our website

Like most website operators, Threatologist collects non-personal data of the sort that web browsers and servers typically make available, such as the browser type, language preference, referring site, and the data and time of each visitor request.

A cookie is a string of information that a website stores on a visitor’s computer, and that the visitor’s browser provides to the website each time the visitor returns. Threatologist uses essential and analytic cookies to help us identify and track visitors. Essential cookies enable core functionality. The website cannot function properly and securely without them. Analytical cookies help us to improve our website by collecting and reporting information on its usage, such as which pages you visit and how long you spend on a page. Analytic tools collect internet log and visitor behaviour information in an anonymous form. If you would like to learn more about cookies generally and how to manage them, please visit allaboutcookies.org.

Some of the cookies we use are temporary and remain in your browser until the end of your session. Others will remain in you browser until they expire or you clear your browser’s history. If you do not want to have a cookie placed on your computer, you should configure your browser to refuse cookies. Please be aware that some features of the website may not work if you do not accept cookies.

If any of our articles embed content from other pages, please also be aware that this behaves in the exact same way as if you had visited the other website. These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content.

What information we collect from members and newsletter subscribers

When you sign up for an account on the website or subscribe to our newsletter, we ask you to provide some basic information: First name, surname, email, job title and employer. The last two are optional. We ask for this information so that we can gain a better understanding of our audience and adjust our service offering to meet your needs – and we only collect such information that helps us achieve that goal.

When you log in to or leave comments on our webpages, Threatologist collects potential personal data like Internet Protocol (IP) addresses.

If you sign up to one of our paid membership services, payment information will be collected by the third party payment processing service (e.g. Stripe or PayPal). Threatologist does not collect or store your financial information.

Why we collect personal data

We collect data about how visitors use the website, how they move between pages, how long they spend on pages, etc. so that we can better understand what content is of interest, adjust our service offering to meet that interest, and improve visitor’s general experience of using the website. We collect data on employment so that we can better understand our customer base and generate customer profiles that will enable use to improve our service offering.

How we treat personal data

Threatologist discloses potential and actual personal data only to its employees and contractors that (a) need to know that information in order to process it on Threatologist’s behalf or provide Threatologist services and (b) have agreed not to disclose it to others. Some of those employees and contractors may be located outside of your home country; by using Threatologist’s websites, you consent to the transfer of information to them. Threatologist will not rent or sell your personal data to anyone. Other than to its employees and contractors, Threatologist will only reveal your personal data in response to a court order, or when Threatologist believes in good faith that disclosure is reasonably necessary to protect the property or rights of Threatologist, third parties, or the public at large.

Your data protection rights

Every visitor, member and subscriber is entitled to the following:

  • The right to access: You have the right to request the personal data that we hold about you.
  • The right to rectification: You have the right to request that we correct any personal data that we hold on you.
  • The right to deletion: You have the right to request that we erase any personal data that we hold on you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

You can make a request relating to your personal data using the details at the end of this policy. If you make a request, we will respond within 30 days.

Business Transfers

If Threatologist, or substantially all of its assets were acquired, or in the unlikely event that Threatologist goes out of business or enters bankruptcy, user information would be one of the assets that is transferred or acquired by a third party. You acknowledge that such transfers may occur, and that any acquirer of Threatologist may continue to use your personal information as set forth in this policy.

Updates to this policy

Threatologist regularly reviews our privacy policy and updates this page. This page was last updated on 9 January 2023.

Contact us

If you have any queries or comments about our privacy policy, or need to contact us about any issues covered by this policy, please email enquiries@threatologist.com.