Privacy Policy
Who We Are
Cybernexus ("we", "us", or "our") is an IT and cybersecurity services company. This Privacy Policy explains how we handle any personal information that may be shared with us through this website. This is an informational website with no user accounts, no e-commerce, and no marketing automation.
What Information We Collect
We collect only the information you voluntarily provide when contacting us directly by email. This may include your name, your work email address, the name of your organization, and any details you choose to include in your message.
We do not use contact forms, lead capture tools, or third-party CRM systems. We do not collect any information passively through tracking pixels, advertising networks, or behavioral analytics platforms.
How We Use Your Information
- To respond to your enquiry and communicate with you about our services
- To assess whether and how we may be able to assist your organization
- To fulfil any contractual obligations if we enter into a service agreement
- To comply with applicable legal and regulatory requirements
Legal Basis for Processing
Where applicable under the General Data Protection Regulation (GDPR) or similar legislation, our legal basis for processing your personal data is your consent (by contacting us) and, where a contract exists, the necessity of processing to fulfil that contract.
Data Retention
Email correspondence is retained for as long as is necessary for the purpose for which it was collected - typically the duration of an active client relationship plus a reasonable administrative period thereafter. If no engagement results from an initial enquiry, we do not retain correspondence beyond what is operationally necessary.
Your Rights
Depending on your jurisdiction, you may have the right to access, correct, or request deletion of personal data we hold about you. To exercise any of these rights, please contact us at cybernexus-systems@outlook.com. We will respond within 30 days.
Data Security
Given the nature of our business, data security is something we take with the utmost seriousness. Email communications are handled through secure, access-controlled accounts. We apply the same rigorous standards to our own internal data handling that we advise our clients to adopt.
Terms of Service
Acceptance of Terms
By accessing and using the Cybernexus website, you confirm that you have read, understood, and agree to be bound by these Terms of Service. If you do not agree, please refrain from using this website. These terms apply to all visitors regardless of location.
Nature of This Website
This website is informational in nature. It provides an overview of Cybernexus services and serves as a means for prospective and existing clients to make contact. No services are purchased, subscribed to, or delivered through this website directly. All service engagements are governed by separate written agreements.
Intellectual Property
All content on this website - including text, design, graphics, and code - is the intellectual property of Cybernexus or its licensors, and is protected by applicable copyright and intellectual property law. You may not reproduce, distribute, or create derivative works from any content on this site without our prior written permission.
Accuracy of Information
We make reasonable efforts to ensure the accuracy and currency of information on this website. However, we make no warranties, express or implied, as to the completeness or accuracy of any content. Information is provided for general purposes only and does not constitute professional advice. Specific security, legal, or technical recommendations require a formal engagement with our team.
Limitation of Liability
To the fullest extent permitted by law, Cybernexus shall not be liable for any direct, indirect, incidental, or consequential damages arising from your use of, or inability to use, this website or its content. This includes but is not limited to loss of data, loss of profits, or business interruption.
Third-Party Links
This website may contain links to external websites for reference purposes. We do not endorse, control, or accept responsibility for the content or privacy practices of any third-party site. Visiting external links is entirely at your own risk.
Governing Law
These Terms of Service are governed by and construed in accordance with applicable law. Any disputes arising in connection with this website or these terms shall be subject to the exclusive jurisdiction of the relevant courts.
Changes to These Terms
We reserve the right to update these Terms of Service at any time. Changes will be reflected by an updated effective date at the top of this section. Continued use of the website following any changes constitutes your acceptance of the revised terms.
Security Disclosure
Our Commitment
As a cybersecurity company, we hold ourselves to a higher standard when it comes to responsible security practices. We are committed to working with the security research community to identify and address vulnerabilities in a timely, transparent, and professional manner.
Scope
This disclosure policy applies to the Cybernexus public website and any digital assets directly operated by Cybernexus. It does not apply to client systems, third-party infrastructure, or services operated by our partners.
Reporting a Vulnerability
If you believe you have discovered a security vulnerability affecting our website or infrastructure, we ask that you report it to us responsibly before disclosing it publicly. Please send your findings to:
Please include "SECURITY DISCLOSURE" in the subject line. We treat all reports confidentially and will acknowledge receipt within 2 business days.
What to Include in Your Report
- A clear description of the vulnerability and the potential impact
- The URL or asset affected
- Step-by-step reproduction instructions
- Any supporting evidence such as screenshots or proof-of-concept code
- Your contact details, if you are comfortable sharing them
Our Response Process
Upon receiving a valid vulnerability report, we will acknowledge it within 2 business days, provide an initial assessment within 5 business days, work to remediate confirmed issues as promptly as possible, and keep you informed of our progress throughout the process.
Responsible Disclosure Guidelines
We ask that security researchers refrain from accessing, modifying, or deleting data that does not belong to them; disrupting our services or infrastructure; conducting social engineering or phishing against our staff; and disclosing the vulnerability publicly before we have had a reasonable opportunity to address it.
In return, we commit to not pursuing legal action against researchers who act in good faith and adhere to these guidelines. We appreciate the important role the security research community plays in keeping the internet safer for everyone.
Out of Scope
- Denial-of-service attacks of any kind
- Automated vulnerability scanning without prior agreement
- Reports generated entirely by automated tools without manual verification
- Issues affecting outdated browsers or operating systems no longer in mainstream support