Privacy Policy

Your privacy is important to us. This privacy policy explains what to expect of us when it comes to personally identifiable information (PII) that is collected of Site visitors and Members of (the "Site).

PII about a Site visitor and a Site Member includes any information that might be used to identify that person and that is recorded in a database.

This policy along with our Terms and Conditions on our Site set out the basis for PII we might collect from Site visitors and Members, how the information is processed or used, and how you may make changes to information that is collected.

If you do not want - or dislike - any of the terms of use or any terms of the privacy policy related to the handling personally identifiable data then you should cease using the Site immediately.

Information Collected from Site Visitors

The information collected from visitors to the site may include the IP address, the type of device or software in use, the type of browser in use, the geographic location of the connection, the pages viewed, and the type of device being used to connect to the Site.

The Site also uses reCaptcha technology to prevent the use of bots and reCaptcha technology captures digital fingerprints of the devices and interactions of people using digital devices to avoid digital traffic from bots.

The information collected from Site visitors is normally collected as part of the act of visitors connecting web browser to websites. This Site employs numerous third party vendors deliver a wide variety of Cloud web-hosting services for complete operation of the Site. The Site has no control over connection-related information collected by web-hosting vendors, third party processors, and their partners.

Processing and Handling of Site Visitor Information

Site visitor information may be stored in system logs, databases, and analytics systems operated by our third parties operating the hosting services for the Site. From time to time we will analyze such connection-related information to make changes to the web services we deliver through the Site to improve and optimize the experience for Site visitors.

We may aggregate connection related information and provide this information as non-identifiable aggregate information - such as number of connections by region of the world - for our vendors and business affiliates in the performance of their duties but in no case do we provide unique IP addresses of any connection to the Site unless and as required by law or statute.

Other information we may collect from Site visitors is information you provide to us in Surveys we may operate from time to time, information that is publicly available, and information you consent to provide to use via third-parties.

Collection and Use Personally Identifiable Information

In addition to Site visitors, we request and collect information of Members of the Site who are provided with privileged access to research publications made available through the Site.

The information we request, collect and store in databases operated by our third party web-hosting providers includes: a member selected user name and password, an email address, a registration date, the name of the Member's organization, the approximate number of employees of the Member's organization, the job function of a Site Member, and the approximate organizational position of a Site Member.

The primary purpose for which this information is collected of Site Members is to provide privileged access to Research publications that are of relevance for Site Members, issue Newsletters and conduct surveys.

The Site stores and collects non-personal identification information of Members through the use of “cookie” technology and/or Internet Protocol (“IP”) addresses.

Cookies are small text files the Site uses to recognize repeat users and facilitate the user’s ongoing access to and use of the Site with privileged access to Research publications. Non-personal identification information might include the browser used by you, the type of computer, the operating systems, the Internet service providers and other similar information.

The Site gathers information about the areas you visit on the Site. The Site cannot control the use of cookies by third parties displaying data on the web site or on web sites you visit using links from the Site.

Most browsers are set to accept cookies. You can set yours to refuse cookies, or to alert you when cookies are being sent, but doing so may degrade or prevent access to Research publications or portions of the Site.

Processing and Handling of Site Member Information

We use the information of Site visitors and Members to provide services to each, to deliver useful content to Site visitors and Members, to improve the editorial calendar of the Site to address topics that will better meet the needs of Members, to improve operations of the Site, to diagnose problems with the Site, to administer the Site, to communicate to Members via email newsletters, and to deliver a personalized experience while visiting the Site. We may use PII of members to communicate via Newsletters or request participation in a survey. We also use PII data in aggregate anonymized forms to produce reports about anonymous Site traffic and statistics.

Sharing of Site Visitor and Member Information

The Site may from time to time use the services of third party providers to distribute email newsletters to Members regarding new research reports or features available on the Site or to request participation in a survey.

The Site may share anonymized Site traffic statistics with third parties.

The Site will make PII available as required by law and statute, such as a court-ordered subpoena, search warrant, a court order, or as required by exigent circumstances.

Contracts with our third party providers limit their use of Member PII for the purposes for which it is being used.

The Site will share the PII of Members in connection with a sale, acquisition or corporate reorganization involving the Site.

Data Protection and Breach Notification

We take every precaution to protect personally identifiable data of Members but cannot guarantee Members personally identifiable data will never be hacked, compromised, or used by a hired third party for a purpose other than stated in this privacy policy. The Site uses Secure Socket Layer (“SSL”) encryption technology to enhance data privacy and help prevent loss, misuse or alteration of Member information transmitted to the Site.

Despite the use of encryption technology and other measures we cannot guarantee your personal information will always be secure and safe from harm, compromise or misuse.

We rely on the security and data protection controls of our third party vendors that are delivering hosted web-site, newsletter and survey services for any PII stored or operated beyond the SSL connection that occurs between a Member and the Site.

We will notify Members once we discover personally identifiable data has been compromised or misused, especially as required by applicable law and statue.

Data Transfer

For us to deliver the services to you through the Site, your data will be transferred to, stored, and processed at third party web hosting processing, email newsletter and survey processing sites headquartered in the United States. Our third party providers take all reasonable steps to ensure your PII is treated securely and in accordance with this policy. Transfer of said information will either (i) fall under the European Commission's model contracts for the transfer of personal data to third countries, pursuant to Decision 2004/915/EC and 2010/87/EU; or (ii) rely on the EU-US Privacy Shield Framework.

Member Center

We maintain a Member Center for the exclusive use of Members to see, update, and change their PII. The member center is intended to provide you with applicable access, portability, correction, erasure, processing, objection, and withdrawal of consent rights you may be entitled to by law or statute. If the member center is not operational, you can also contact us by sending an email regarding the nature of your inquiry to "info at wellingtonresearch dot com" or use the contact form at the bottom of this page.

Links to Third Party Sites

Site visitors and Members may find content on the Site that enables linking to other third party Web-sites. These third party web-sites may have their own privacy policies and should be consulted directly. This Site’s Privacy Policy does not apply to third party web-sites. This Site has no control over the content displayed on third party web-sites, nor over the measures, if any, that are taken by other sites to protect the privacy of your information.

Opt-out and Removal Procedures

If you wish to not receive newsletters, please unsubscribe at any time when you receive a newsletter. If you wish to have your Member account and your PII forgotten and expunded, please send us an email note to "info at wellingtonresearch dot com" or use the contact form at the bottom of this page informing us that you wish to be forgotten and have your account and PII deleted.

We will need any and all such removal requests to include mention of both the Member Name (the User ID), and the email address to which the account is registered. We will issue a final email notification to the email address listed in your request to use to verify the identity of the Member before removing the account and all of its PII.

Marketing Uses of PII

The Site does not sell or share Members PII with third parties and only uses Member PII to communicate with Members via Newsletters and Surveys.

Changes to the Privacy Policy

Please refer back to this Privacy Policy regularly because your continued use of the Site signifies that you agree to be bound by the terms and conditions of this Privacy Policy, as amended from time to time.

Contacting Us

We welcome your comments regarding this privacy policy. If you have questions, please contact us using the form below.

We look forward to hearing from you.

Last updated: July 6, 2018

Contact Us

Cyber’s Three Organizing Principles

Cyber’s three organizing principles for most people are the common value disciplines used in operations of the enterprise. In fact, “cyber most often – but not always – reflects the value drivers of the organization for which it is being directed. This research identifies the three common value disciplines of cyber and explores their uses

Featured Research

2018 Cyber Security Spend Report

The 2018 Cyber Security Spend Report focuses on global spend today through the coming five years. Did you know that global spend on cyber security is: More than $103 billion today Will exceed $130 billion by or before 2022 Today’s top two spend categories account for almost 50 percent of spend by enterprises today. The

Innovative Digital Business Models

Is your company making money using some of the innovative digital business models of the future, today? If not, it is important to understand what some of the new digital business models are, what they are best used for, who should consider using them, why they are important, and when they should be used. Not