• White Papers
  • Case Studies
  • Regulations
  • Frameworks
  • Blog
  • Glossary
Flank
  • Services
      • Back
      • Back
      • Federal Services
      • FISMA
      • FedRAMP
      • CFPB
      • GLBA
      • FFIEC
      • SEC
      • FBI CJIS
      • FINRA
      • More Federal Services
      • DEFENSE SERVICES
      • DFARS 800-171
      • ITAR
      • 10 CFR Part 810
      • DoD/FAR Regulations
      • More Defense Services
      • CIP
      • Infrastructure & Grid Compliance
      • CIP Cyber Security Consulting
      • More CIP Services
      • Back
      • ISO 27000 SERVICES
      • ISO 27001
      • ISO 27002
      • ISO 27005
      • ISO 27017
      • ISO 27032
      • More ISO 27000 Services
      • NIST SP 800 SERVICES
      • NIST SP 800-37
      • NIST SPĀ 800-53
      • NIST SP 800-171
      • More NIST SP 800 & 1800 Services
      • GDPR SERVICES
      • GDPR - EU Businesses
      • GDPR - U.S. Businesses
      • GDPR Project Plan
      • GDPR Action Plan
      • GDPR Services
      • GDPR Documents & Toolkits
      • Back
      • CLOUD SERVICES
      • Amazon AWS
      • Microsoft Azure
      • More Cloud Services
      • HEALTHCARE SERVICES
      • HIPAA/HITECH
      • CMSR
      • CMS
      • EHNAC
      • More Healthcare Services
      • Outsourced Services
      • Small Business Compliance
      • Outsourced PCI DSS Compliance
      • Outsourced SOC Audit Compliance
      • Outsourced HIPAA/Healthcare Compliance
      • Outsourced Cybersecurity Compliance
      • Outsourced GDPR Data Protection Officer
      • Back
      • Cybersecurity Services
      • Vendor Due Diligence
      • Pen Testing
      • Incident Response Plans
      • Risk Assessments
      • Governance & Compliance
      • Security Awareness Training
      • BCDRP/CP
      • 23 NYCRR PART 500
      • More Cybersecurity Services
      • Additional Services
      • Policy Writing
      • I.T. Due Diligence
      • EU-U.S. Privacy Shield
      • SBIR & STTR Information Security
      • FIPS Compliance
      • Experian Precise IDSM Personal Protection Alerts (PIPPA)
      • ALTA Best Practices Assessment Consulting
      • Back
  • Products
  • About Us
      • Back
      • Our Expertise
  • FAQs
      • Back
      • How were your Documents Developed?
      • What is ISO 27001?
      • What is ISO 27002?
      • What is ISO 27005?
      • What is ISO 27032?
      • What are the NIST SP 800 Series Publications?
      • What is NIST SP 800-53?
      • What is NIST SP 800-30?
      • What is NIST SP 800-37?
      • What is NIST SP 800-125?
      • What is FINRA?
      • What is COBIT?
      • What is COSO?
      • What is NACHA?
      • What is the Cloud Security Alliance (CSA)?
      • What is the Cloud Industry Forum (CIF)?
      • What is the Open Web Application Security Project (OWASP)?
      • What is the SANS Institute?
      • What is FedRAMP?
      • What are the CMS Minimum Security Requirements (CMSR)?
      • What is FIPS?
      • What are the Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs)?
      • What is the AICPA Service Organization Control (SOC) reporting framework?
      • What is SOC 1 SSAE 18 Reporting?
      • What is SOC 2 Reporting?
      • What is SOC 3 Reporting?
      • What are the Trust Services Principles?
      • What is the Title 21 CFR Part 11?
      • What is US-CERT?
      • What is the U.S. CIP?
      • What is FERC and NERC?
      • What is NERC CIP?
      • What is ES-C2M2?
      • What is the CIS Security Benchmarks Division?
      • What is the Open Source Vulnerability Database?
      • What is the Common Configuration Enumeration (CCE)?
      • What is the Common Vulnerabilities and Exposures (CVE)?
      • What are the NSA Security Configuration Guides?
      • What is the Security Content Automated Protocol (SCAP)?
      • What is the Common Platform Enumeration (CPE)?
      • What is the Common Weakness Enumeration (CWE)?
      • What is Malware (MAEC)?
      • What is Cyber Observables (CyboX)?
      • What is Structured Threat Information Expression (STIX)?
      • What is Trusted Automated Exchange of Indicator Information (TAXII)?
      • What is Making Security Measurable (MSM)?
      • What is Open Vulnerability and Assessment Language (OVAL)?
      • What is Common Attack Pattern Enumeration and Classification (CAPEC)?
      • What is Software Assurance (SwA) concept?
      • What are the Consensus Audit Guidelines (CAG) | SANS | 20 Critical Security Controls?
      • What is Defense in Depth?
      • What is Layered Security?
      • What is the Concept of CIA?
      • What is AAA?
      • What is Cyber Security?
      • What is Cloud Computing?
      • What is Patch Management?
      • What is Vulnerability Management?
      • What is Configuration Management?
      • What is Change Management?
      • What is Data Loss Prevention (DLP)?
      • What is Role Based Access Control (RBAC)?
      • What is Software as a Service (SaaS)?
      • What is Virtualization?
      • What is Encryption?
      • What are Audit Trails & Audit Logs?
      • What is Baseline Security?
      • What is Boundary Protection?
      • What is Buffer Overflow?
      • What is Contingency Plan?
      • What is Business Impact Analysis (BIA)?
      • What is Continuous Monitoring?
      • What is a DMZ?
      • What are Zero-Day Exploits, Attacks?
      • What is Personally Identifiable Information (PII)?
      • What is Protected Health Information (PHI)?
      • What is ePHI?
      • What is PIFI?
  • Contact Us

Get in Touch with FLANK

  • You are here:  
  • Home
  • Privacy Policy

Privacy Policy

This privacy policy sets out how FLANK (owners of flank.org) uses and protects any information that you give FLANK when you use this website. FLANK is committed to ensuring that your privacy is protected. Should we ask you to provide certain information by which you can be identified when using this website, then you can be assured that it will only be used in accordance with this privacy statement.

FLANK may change this policy from time to time by updating this page. You should check this page from time to time to ensure that you are happy with any changes. This updated and revised policy is effective as of January 1, 2018.

What We Collect

We may collect the following information:

  • Name and job title
  • Contact information including email address
  • Demographic information such as postcode, preferences and interests
  • Other information relevant to customer surveys and/or offers
What We do With the Information We Gather

We require this information to understand your needs and provide you with a better service, and in particular for the following reasons:

  • Internal record keeping.
  • We may use the information to improve our products and services.
  • We may periodically send promotional emails about new products, special offers or other information which we think you may find interesting using the email address which you have provided.

From time to time, we may also use your information to contact you for market research purposes. We may contact you by email, phone, fax or mail. We may use the information to customize the website according to your interests.

Security and How We Use Cookies

We are committed to ensuring that your information is secure. In order to prevent unauthorized access or disclosure, we have put in place suitable physical, electronic and managerial procedures to safeguard and secure the information we collect online.

A cookie is a small file which asks permission to be placed on your computer's hard drive. Once you agree, the file is added and the cookie helps analyze web traffic or lets you know when you visit a particular site. Cookies allow web applications to respond to you as an individual. The web application can tailor its operations to your needs, likes and dislikes by gathering and remembering information about your preferences.

We use traffic log cookies to identify which pages are being used. This helps us analyze data about web page traffic and improve our website in order to tailor it to customer needs. We only use this information for statistical analysis purposes and then the data is removed from the system.

Overall, cookies help us provide you with a better website, by enabling us to monitor which pages you find useful and which you do not. A cookie in no way gives us access to your computer or any information about you, other than the data you choose to share with us.

You can choose to accept or decline cookies. Most web browsers automatically accept cookies, but you can usually modify your browser setting to decline cookies if you prefer. This may prevent you from taking full advantage of the website.

Links to other websites

Our website may contain links to other websites of interest. However, once you have used these links to leave our site, you should note that we do not have any control over that other website. Therefore, we cannot be responsible for the protection and privacy of any information which you provide whilst visiting such sites and such sites are not governed by this privacy statement. You should exercise caution and look at the privacy statement applicable to the website in question.

Controlling your personal information

You may choose to restrict the collection or use of your personal information in the following ways:

Whenever you are asked to fill in a form on the website, look for the box that you can click to indicate that you do not want the information to be used by anybody for direct marketing purposes.

If you have previously agreed to us using your personal information for direct marketing purposes, you may change your mind at any time by writing to or emailing us at This email address is being protected from spambots. You need JavaScript enabled to view it.

We will never sell, distribute or lease your personal information to third parties unless we have your permission or are required by law to do so. We may use your personal information to send you promotional information about third parties which we think you may find interesting if you tell us that you wish this to happen.

If you believe that any information we are holding on you is incorrect or incomplete, please write to or email us as soon as possible, at the above address. We will promptly correct any information found to be incorrect.

Related Articles

  • About Us
  • Contact Us
  • Demilitarized Zone (DMZ) | Overview | the Importance of Information Security Policies
  • Federal Compliance Starter Toolkit
  • Home

Save Time and Money on Security & Compliance with FLANK.

World-Class Compliance Toolkits for your Business


Request A Consultation


Services
  • Federal
  • Defense
  • CIP
  • ISO 27000
  • NIST SP 800
  • GDPR
  • Cloud
  • Healthcare
  • ORC
  • Cybersecurity
  • Additional Services
Resources
  • White Papers
  • Blog
  • FAQs
  • Glossary
  • Case Studies
Legal
  • Privacy Policy
  • Terms of Use
© 2017 by Flank.
Top