Privacy Policy for icass-conf.com
We are staunchly committed to protecting and meticulously safeguarding the privacy, confidentiality, and security of personal information relating to our website visitors and service users. This commitment extends across all our operations, systems, and processes.
This policy applies where we are acting as a data controller with respect to the personal data of our website visitors and service users; in other words, where we determine the purposes and means of the processing of that personal data. In this role, we are responsible for maintaining comprehensive oversight of how your personal information is collected, used, and protected throughout our systems.
We may process usage data (“usage data”), which comprehensively includes browser type and version, operating system details, page view timestamps, time spent on pages, navigation paths, referral sources, and interaction patterns. This information is collected through automated logging systems, cookies, and analytics tools and may include session duration, features accessed, and download activities. The source of this data is our analytics software and server logs. We process this information for several important purposes, including improving website performance, analyzing user behavior patterns, enhancing security monitoring, and optimizing user experience, which enables us to deliver better service, prevent technical issues, and personalize content delivery. The legal basis for this processing is our legitimate interests in monitoring and improving our website services.
We may process account data (“account data”), which comprehensively includes name, email address, telephone number, billing address, and account settings preferences. This information is collected through registration forms, account updates, and direct user input and may include communication preferences, subscription status, and account security settings. The source of this data is the user’s direct input during account creation and management. We process this information for account administration, service provision, security verification, and communication purposes, which enables us to maintain secure user accounts, process transactions, and provide support services. The legal basis for this processing is the performance of a contract between you and us and/or taking steps, at your request, to enter into such a contract.
We may process profile data (“profile data”), which comprehensively includes professional interests, academic background, research areas, publication history, and institutional affiliations. This information is collected through profile creation forms, user submissions, and profile updates and may include professional achievements, research interests, and collaboration preferences. The source of this data is your direct input and professional activity on our platform. We process this information for networking facilitation, research collaboration, content personalization, and community engagement purposes, which enables us to connect relevant participants, customize experiences, and facilitate academic collaboration. The legal basis for this processing is our legitimate interests in providing and improving our services.
Your Rights:
Right to Access: You have the right to access your personal data that we process. This includes obtaining confirmation of whether we process your personal data and receiving copies of all personal information we hold about you. You can request a comprehensive report of your personal data by submitting a written request through our contact form or email. We will respond within 30 days and may require government-issued identification, proof of address, and account verification details to verify your identity.
Right to Rectification: You have the right to have inaccurate or incomplete personal data corrected or completed. This includes the ability to update account information, correct profile details, and modify any incorrect data entries. To exercise this right, you can either use our account settings interface or submit a formal correction request through our support channels. We will process valid requests within 15 business days and may require account credentials, supporting documentation, and identity verification to process your request.
Right to Erasure: You have the right to request the deletion of your personal data when there is no compelling reason for its continued processing. This includes removing account information, usage history, and profile content. To initiate this process, you must submit a formal deletion request through our designated data protection channels. We will complete the erasure within 30 days and may require written confirmation, account password verification, and two-factor authentication to proceed with the deletion.
Right to Restrict Processing: You have the right to limit how we use your personal data when you have legitimate grounds for doing so. This includes the ability to pause data processing, limit data usage, and temporarily suspend account activities. You can submit a processing restriction request through our privacy management interface or contact form. We will implement restrictions within 7 days and may require account verification, written explanation of grounds for restriction, and identity confirmation documents.
Right to Data Portability: You have the right to receive your personal data in a structured, commonly used, and machine-readable format and transmit it to another controller. This includes the ability to download your data, transfer information between services, and receive data exports. To exercise this right, you can use our data export tool or submit a portability request through our support system. We will provide the data within 30 days and may require account ownership verification, specific format preferences, and security credentials to process your request.Data Processing and Security
We process Service Data which includes user account details, login credentials, profile information, and service preferences. This processing involves automated collection, storage, and analysis, enabling us to provide account management, personalized services, and technical support. For example, in the context of conference management, this includes attendee registration details and presentation submissions. The legal basis for this processing is contractual necessity and legitimate interests, specifically to maintain user accounts and deliver requested services.
We process Technical Data which includes device information, IP addresses, browser type, system logs, and usage patterns. This processing involves automated collection and analysis, enabling us to optimize website performance and ensure security. For example, this includes monitoring site traffic patterns and detecting potential security threats. The legal basis for this processing is legitimate interests, specifically to maintain system security and improve service delivery.
We process Communication Data which includes email correspondence, support tickets, chat logs, and feedback submissions. This processing involves storage, analysis, and response management, enabling us to provide customer support and maintain service quality. For example, this includes handling conference inquiries and managing speaker communications. The legal basis for this processing is contractual necessity and legitimate interests.
We process Transaction Data which includes payment details, purchase history, and billing information. This processing involves secure payment processing and record-keeping, enabling us to process conference registrations and maintain financial records. The legal basis for this processing is contractual necessity and legal obligations, specifically to complete transactions and comply with financial regulations.
We process Preference Data which includes notification settings, communication preferences, and customization choices. This processing involves storage and application of user preferences, enabling us to provide personalized experiences and relevant communications. The legal basis for this processing is consent and legitimate interests, specifically to respect user choices and enhance service delivery.
Security Measures
Our comprehensive encryption protocols ensure end-to-end protection of your data, incorporating industry-standard algorithms and regular security updates to maintain data integrity. This includes regular security assessments and penetration testing by qualified professionals.
We implement multi-layered security infrastructure, including advanced firewalls and intrusion detection systems that continuously monitor for and prevent unauthorized access attempts. This infrastructure undergoes regular updates and enhancements.
Access to personal data is strictly controlled through role-based permissions, multi-factor authentication, and detailed access logs. We maintain comprehensive audit trails of all data access and modifications.
Our continuous monitoring systems provide real-time threat detection and automated response protocols, ensuring immediate action against potential security threats.
We maintain comprehensive backup procedures with encrypted offsite storage and regular recovery testing, ensuring data availability and integrity.
All staff undergo regular security awareness training and must comply with detailed data protection protocols, including specific training for handling sensitive data.
International Transfers
We may transfer your personal data to countries outside your jurisdiction. These transfers are protected by appropriate safeguards, including Standard Contractual Clauses, Binding Corporate Rules, and Privacy Shield certifications. Each international transfer is conducted under strict protocols that ensure:
– Adequate data protection standards
– Compliant processing procedures
– Enforceable data subject rights
– Effective legal remedies
International transfers are protected by ISO 27001, GDPR standards, and regional data protection regulations, ensuring compliance with international privacy laws. We implement additional measures including:
– Regular compliance audits
– Data protection impact assessments
– Documented transfer mechanisms
– Continuous monitoring procedures
Regarding international transfers, you maintain specific rights including:
– Right to information about transfers
– Right to object to transfers
– Right to withdraw consent
– Right to data protection guarantees
Data Retention
We maintain specific retention periods for different data categories:
Account Information: Retained for the duration of active account plus 2 years for account recovery and security purposes
Usage Data: Retained for 12 months to analyze usage patterns and improve services
Transaction Records: Retained for 7 years to comply with financial regulations
Communication History: Retained for 3 years to maintain service continuity
Technical Logs: Retained for 6 months for security and performance analysis
These retention periods are determined by:
– Legal requirements
– Business purposes
– Technical necessities
– User preferences
Special circumstances affecting retention:
– Legal obligations
– Dispute resolution
– Security investigationsCookie Policy for icass-conf.com
Essential cookies serve fundamental functions necessary for website operation. These cookies process authentication tokens, security parameters, and session data to maintain basic site functionality. For example, they manage user login states, protect against unauthorized access, and ensure proper page loading.
Essential cookies are fundamental to website functionality. These cookies enable secure user authentication, maintain session integrity, and ensure technical stability. We use them specifically for:
– User authentication
– Security measures
– Basic site operations
– Session management
– Technical stability
Functional cookies enhance your experience by remembering your preferences. They process user-specific settings and interface choices to provide a personalized browsing experience. These cookies enable:
– Language preferences
– Region-specific content
– User interface customization
– Feature optimization
– Personalized settings
Analytics cookies help us understand user behavior on icass-conf.com. They collect aggregated data about site interactions and usage patterns to improve our services. They monitor:
– Page interactions
– Navigation patterns
– Feature usage
– Session duration
– User preferences
Performance cookies assess and improve website operation by:
– Monitoring site speed
– Identifying technical issues
– Optimizing content delivery
– Analyzing user experience
– Tracking system performance
Cookie Management
You can control cookie preferences through:
– Browser settings
– Cookie consent tools
– Privacy preferences
– Account settings
GDPR Compliance
For EU residents, we ensure:
– Explicit consent mechanisms
– Data minimization
– Purpose limitation
– Storage limitations
– Processing transparency
CCPA Compliance
California residents have additional rights:
– Right to know about personal information collected
– Right to delete personal data
– Right to opt-out of data sales
– Right to non-discrimination
– Right to access collected information
COPPA Compliance
Regarding users under 13:
– Age verification requirements
– Parental consent procedures
– Limited data collection
– Special protection measures
– Parental access rights
Updates and Changes
Policy updates involve:
– Regular review procedures
– User notifications
– Consent renewal when required
– Clear change documentation
– Continuous compliance monitoring
Contact Information
For privacy-related inquiries:
– Primary Contact: [email protected]
– Response Time: Within 48 hours
– Verification Required: For data-related requests
– Available Support: Privacy concerns, data requests, rights exercise
This policy was created specifically for icass-conf.com and covers all associated services within the industry.