Making error-free and effective business decisions

A special program has been developed to minimize the risks associated with the human factor. Training takes place online 🔴

According to the definition of Stanford University, the human factor is the collective influence of employees on the short-term and long-term success of an enterprise.

homan factor

The goal of the program

Is to meet the global demand in Western European and US markets for specialists who can counteract and prevent systemic problems associated with the human factor. During the training, interested self-employed individuals and subject matter professionals will be provided with a basic level of the program.

The best graduates will have the opportunity to join the Institute of Information Security team and work in the markets of USA, Germany, Italy and other EU countries.

Each certified participant, thanks to a special program, will receive competitive advantages in the market, which he will be able to monetize on his own many times over.

Who created the program?

The program was created by scientists and experts of the Information Security Institute (ISI) as a response to current challenges in the field of information security of financial institutions. The methodologists included specialists in the field of security, psychology, economics and finance, criminal justice, criminology, information security, as well as specialists in human rights and the human mentality component.

The program consists only of those approaches, tools and methods that have been repeatedly tested in practice in various business sectors over the past nine years and have proven to be extremely effective.

Why was the program created?

For many years, Western security professionals have accepted as an axiom the primacy of technology over the human factor. However, over the past two years, the situation has changed dramatically. Actual practice indicates that without solving the problem of the human factor, technological solutions are not able to provide security.

Today we are at a unique historical point when representatives of the largest consulting companies (McKinsey & Co), the “big four” audit companies (Deloitte, PWC, KPMG, EY), and a number of specialized structures (Merrill Lynch, Information Security Media
Group, Proofpoint, Cyber Security Hub) are forced to admit this fact.

This public consensus was the result of a series of reports that were initiated not only by government agencies, but also by leading cybersecurity organizations, financial institutions, CISOs, as well as analytical and expert companies.

The main conclusion boils down to the need to resolve a key problem in the field of security, namely, the human factor.

Human factor
Human factor line

Why are human factor experts in demand?

The demand for skills in managing risks associated with the human factor is becoming more acute every day. At the same time, there is a total shortage of trained personnel who are able to comprehensively approach problem solving in the insourcing or outsourcing mode and successfully achieve results.

According to the latest expert reports:

The cause of 95% of security breaches worldwide is the human factor.

WEF report"The Global Risks Report 2022"

82% of registered cyber attacks are related to the human factor.

Proofpoint report "Cybersecurity: The 2022 Board Perspective"

The number of incidents related to insider threats increased by 44%.

Proofpoint report "Cybersecurity: The 2022 Board Perspective"

$4.24 million is the average cost of a data breach.

Ponemon Institute report "2022 COST of Insider Threats"

human factors experts are in demand in companies such as:

How the training happens?

The training program takes place online in small groups of 5 to 7 people

Only suchan approach can provide the necessary level of attention from instructors for each participant and create conditions for the effective transfer of intellectual assets.

In the expert version, the program consists of 10 levels

However, in the basic version, for self-employed persons and specialized specialists, the first two levels will be enough.

Human Factor line
Human Factor

During the training program, each participant will be provided with a certain amount of data:

Video materials

PDF presentations

Methodological books (DSP)

Analysis of cases

A package of methods and tools

Practical tasks

Validation tests

01

First level

Tasks of the first level of the training program

The central task of the first level is to build an orientation system, a deep understanding of the human factor as an integral system and cause-and-effect relationships, without which it is impossible to analyze business structures or apply certain tools to minimize risks as intended.

At the stage of preparation for the international expert round table “A New Security Paradigm for Financial Institutions”, a group of experts from the USA, Germany, Italy, Great Britain and Ukraine came to a consensus on the approach to working with the human factor.

We are dealing with a system consisting of 4 elements that give life to the human factor in any business:

It is with the device and the logic of this system that you will have to get acquainted in detail at the first level of the training program.

02

Second level

Tasks of the second level of the training program

The key task of the second level of the program is to get acquainted and master the basic tools that will allow you to identify, diagnose and significantly influence the risks associated with the human factor in any business.

These are just some of the tools that will be introduced at the second level and, most importantly, integrated into business practice.

Human factor
Human factor line

Curriculum details

To the astute reader, it is quite obvious that the first two basic levels of the tutorial are parts of one whole system. They are inextricably linked and dependent on each other.

The geometric model of the curriculum at the basic level is a spiral. At the first level, the ecessary logic of the system operation appears in the form of moving in a circle:

All 4 elements are interconnected and directly affect the short and long term success of any company.

At the second level, we spiral up from logic to tools, but we still continue to work with the circle:

By learning to apply tools at the second level, program participants will be able to extract data, cross-check from several points, structure it according to the 4 elements of the circle described above, but most importantly, they will be able to draw certain conclusions, diagnose and identify the most vulnerable elements of the human factor system in business .

Such skills, as we said earlier, guarantee competitive advantages in the market. And the ability to influence the human factor through recommendatory instructions for business based on the results of appropriate diagnostics turns such a specialist into an indispensable and highly paid professional.

The cost of the training program

The demand for skills in managing risks associated with the human factor is becoming more acute every day. At the same time, there is a total shortage of trained personnel who are able to comprehensively approach problem solving in the insourcing or outsourcing mode and successfully achieve results.

As we have already said, these two levels are inextricably linked with each other, therefore the cost is estimated in a similar way – it is impossible to purchase these two levels separately. At the same time, in order to become a participant in the training program at the first level, it is enough to deposit 30% of the total cost – in the amount of $ 600.

After the end of the first level of the program, the participant contributes the remaining 70% – in the amount of $ 1400. After that, the instructors of the institute register the participant at the second level and begin to work according to the standard scheme.

All the above conditions are current as of 04/03/2023

The first steps

30% payment for start

Full program the first level

The first and second steps.

Only one payment

Why can we teach it?

Thanks to the academic advisor Dr. Oleg Maltsev, The ISI Institute has a unique scientific and research base, as well as the opportunity to test methods in practice in various business structures.

Over the past 3 years, more than 300 cases have been implemented in the field of professional selection

Over the past year alone, the Institute’s specialists have identified more than 50 insider threats in companies in Eastern and Western Europe

Over the past 3 years, the scientific director of the Institute has written more than 15 scientific papers on the topic of the human factor, including closed works such as “Business Sniper” and the “Noise” methodological guide, which are the foundation of this training program

Separate blocks of the program were the subject of a series of scientific meetings and symposiums in Palermo (Sicily), in which experts from the Institute and the “European Academy of Sciences of Ukraine” took part

Over the past 3 years, more than 300 cases have been implemented in the field of professional selection

This is what allowed us to present the model of the program at the closed international round table "A New Security Paradigm for Financial Institutions", which was highly appreciated by experts from the USA, Great Britain, Italy, Germany and Ukraine.

What will you receive at the end of the program?

The program includes a block of skills (soft skills & hard skills) that will be in demand for at least the next 10 years. For advisors, consultants, HDR and self-employed individuals, this is not only an opportunity to gain competitive advantages in the market for solving current problems, but also to minimize the human factor when creating their own projects.

Besides this:

Uniqueness

Most of the existing courses are aimed, at best, at resolving the consequences or one of the 4 elements that collectively give life to the problems of the human factor (Employee selection, Insider threats, Behavioral stress, Human error).

Our program currently has no analogues. This is confirmed by our friends and colleagues who took an active part in the creation of the program: Professor Harvey Wolf Kushner (USA), Andrew Hoskins (Great Britain), Oliver Pahnecke (Germany), Ranieri Razzante (Italy), Vitaly Lunev (Ukraine).

Access to our training program is possible only through the official representatives of our institute or through the official website.

homan factor

Leave your contacts

Privacy Policy

This Application collects some Personal Data from its Users.

This document can be printed for reference by using the print command in the settings of any browser.

Owner and Data Controller 

Information Security Institute

Owner contact email: info@isi.euasu.org

Types of Data collected 

Among the types of Personal Data that this Application collects, by itself or through third parties, there are: Cookies; Usage Data. 

Complete details on each type of Personal Data collected are provided in the dedicated sections of this privacy policy or by specific explanation texts displayed prior to the Data collection.
Personal Data may be freely provided by the User, or, in case of Usage Data, collected automatically when using this Application.
Unless specified otherwise, all Data requested by this Application is mandatory and failure to provide this Data may make it impossible for this Application to provide its services. In cases where this Application specifically states that some Data is not mandatory, Users are free not to communicate this Data without consequences to the availability or the functioning of the Service.
Users who are uncertain about which Personal Data is mandatory are welcome to contact the Owner.
Any use of Cookies – or of other tracking tools – by this Application or by the owners of third-party services used by this Application serves the purpose of providing the Service required by the User, in addition to any other purposes described in the present document and in the Cookie Policy, if available.

Users are responsible for any third-party Personal Data obtained, published or shared through this Application and confirm that they have the third party’s consent to provide the Data to the Owner.

Mode and place of processing the Data

Methods of processing

The Owner takes appropriate security measures to prevent unauthorized access, disclosure, modification, or unauthorized destruction of the Data.
The Data processing is carried out using computers and/or IT enabled tools, following organizational procedures and modes strictly related to the purposes indicated. In addition to the Owner, in some cases, the Data may be accessible to certain types of persons in charge, involved with the operation of this Application (administration, sales, marketing, legal, system administration) or external parties (such as third-party technical service providers, mail carriers, hosting providers, IT companies, communications agencies) appointed, if necessary, as Data Processors by the Owner. The updated list of these parties may be requested from the Owner at any time.

Legal basis of processing

The Owner may process Personal Data relating to Users if one of the following applies:

  • Users have given their consent for one or more specific purposes. Note: Under some legislations the Owner may be allowed to process Personal Data until the User objects to such processing (“opt-out”), without having to rely on consent or any other of the following legal bases. This, however, does not apply, whenever the processing of Personal Data is subject to European data protection law;
  • provision of Data is necessary for the performance of an agreement with the User and/or for any pre-contractual obligations thereof;
  • processing is necessary for compliance with a legal obligation to which the Owner is subject;
  • processing is related to a task that is carried out in the public interest or in the exercise of official authority vested in the Owner;
  • processing is necessary for the purposes of the legitimate interests pursued by the Owner or by a third party.

In any case, the Owner will gladly help to clarify the specific legal basis that applies to the processing, and in particular whether the provision of Personal Data is a statutory or contractual requirement, or a requirement necessary to enter into a contract. 

Place

The Data is processed at the Owner’s operating offices and in any other places where the parties involved in the processing are located.
Depending on the User’s location, data transfers may involve transferring the User’s Data to a country other than their own. To find out more about the place of processing of such transferred Data, Users can check the section containing details about the processing of Personal Data.

Users are also entitled to learn about the legal basis of Data transfers to a country outside the European Union or to any international organization governed by public international law or set up by two or more countries, such as the UN, and about the security measures taken by the Owner to safeguard their Data.
If any such transfer takes place, Users can find out more by checking the relevant sections of this document or inquire with the Owner using the information provided in the contact section.

Retention time

Personal Data shall be processed and stored for as long as required by the purpose they have been collected for.

Therefore:

  • Personal Data collected for purposes related to the performance of a contract between the Owner and the User shall be retained until such contract has been fully performed.
  • Personal Data collected for the purposes of the Owner’s legitimate interests shall be retained as long as needed to fulfill such purposes. Users may find specific information regarding the legitimate interests pursued by the Owner within the relevant sections of this document or by contacting the Owner.

The Owner may be allowed to retain Personal Data for a longer period whenever the User has given consent to such processing, as long as such consent is not withdrawn. Furthermore, the Owner may be obliged to retain Personal Data for a longer period whenever required to do so for the performance of a legal obligation or upon order of an authority.
Once the retention period expires, Personal Data shall be deleted. Therefore, the right of access, the right to erasure, the right to rectification and the right to data portability cannot be enforced after expiration of the retention period.

The purposes of processing

The Data concerning the User is collected to allow the Owner to provide its Service, comply with its legal obligations, respond to enforcement requests, protect its rights and interests (or those of its Users or third parties), detect any malicious or fraudulent activity, as well as the following: Analytics, Displaying content from external platforms and Interaction with external social networks and platforms. 

For specific information about the Personal Data used for each purpose, the User may refer to the section “Detailed information on the processing of Personal Data”.

Detailed information on the processing of Personal Data

Personal Data is collected for the following purposes and using the following services:

Analytics

The services contained in this section enable the Owner to monitor and analyze web traffic and can be used to keep track of User behavior.

Google Analytics with anonymized IP 

Google Analytics is a web analysis service provided by Google LLC or by Google Ireland Limited, depending on the location this Application is accessed from, (“Google”). Google utilizes the Data collected to track and examine the use of this Application, to prepare reports on its activities and share them with other Google services.
Google may use the Data collected to contextualize and personalize the ads of its own advertising network.
This integration of Google Analytics anonymizes your IP address. It works by shortening Users’ IP addresses within member states of the European Union or in other contracting states to the Agreement on the European Economic Area. Only in exceptional cases will the complete IP address be sent to a Google server and shortened within the US.

Personal Data processed: Cookies; Usage Data.

Place of processing: United States – Privacy Policy – Opt Out; Ireland – Privacy Policy – Opt Out

Displaying content from external platforms

This type of service allows you to view content hosted on external platforms directly from the pages of this Application and interact with them.
This type of service might still collect web traffic data for the pages where the service is installed, even when Users do not use it.

Google Fonts 

Google Fonts is a typeface visualization service provided by Google LLC or by Google Ireland Limited, depending on the location this Application is accessed from, that allows this Application to incorporate content of this kind on its pages.

Personal Data processed: Usage Data; various types of Data as specified in the privacy policy of the service.

Place of processing: United States – Privacy Policy; Ireland – Privacy Policy

Interaction with external social networks and platforms

This type of service allows interaction with social networks or other external platforms directly from the pages of this Application.
The interaction and information obtained through this Application are always subject to the User’s privacy settings for each social network.
This type of service might still collect traffic data for the pages where the service is installed, even when Users do not use it.
It is recommended to log out from the respective services in order to make sure that the processed data on this Application isn’t being connected back to the User’s profile.

The rights of Users

Users may exercise certain rights regarding their Data processed by the Owner.

In particular, Users have the right to do the following:

  • Withdraw their consent at any time. Users have the right to withdraw consent where they have previously given their consent to the processing of their Personal Data.
  • Object to processing of their Data. Users have the right to object to the processing of their Data if the processing is carried out on a legal basis other than consent. Further details are provided in the dedicated section below.
  • Access their Data. Users have the right to learn if Data is being processed by the Owner, obtain disclosure regarding certain aspects of the processing and obtain a copy of the Data undergoing processing.
  • Verify and seek rectification. Users have the right to verify the accuracy of their Data and ask for it to be updated or corrected.
  • Restrict the processing of their Data. Users have the right, under certain circumstances, to restrict the processing of their Data. In this case, the Owner will not process their Data for any purpose other than storing it. 
  • Have their Personal Data deleted or otherwise removed. Users have the right, under certain circumstances, to obtain the erasure of their Data from the Owner.
  • Receive their Data and have it transferred to another controller. Users have the right to receive their Data in a structured, commonly used and machine readable format and, if technically feasible, to have it transmitted to another controller without any hindrance. This provision is applicable provided that the Data is processed by automated means and that the processing is based on the User’s consent, on a contract which the User is part of or on pre-contractual obligations thereof.
  • Lodge a complaint. Users have the right to bring a claim before their competent data protection authority.

Details about the right to object to processing

Where Personal Data is processed for a public interest, in the exercise of an official authority vested in the Owner or for the purposes of the legitimate interests pursued by the Owner, Users may object to such processing by providing a ground related to their particular situation to justify the objection.

Users must know that, however, should their Personal Data be processed for direct marketing purposes, they can object to that processing at any time without providing any justification. To learn, whether the Owner is processing Personal Data for direct marketing purposes, Users may refer to the relevant sections of this document. 

How to exercise these rights

Any requests to exercise User rights can be directed to the Owner through the contact details provided in this document. These requests can be exercised free of charge and will be addressed by the Owner as early as possible and always within one month.

Cookie Policy

This Application uses Trackers. To learn more, the User may consult the Cookie Policy https://isi.euasu.org/ru/cookie/

Additional information about Data collection and processing

Legal action

The User’s Personal Data may be used for legal purposes by the Owner in Court or in the stages leading to possible legal action arising from improper use of this Application or the related Services.
The User declares to be aware that the Owner may be required to reveal personal data upon request of public authorities.

Additional information about User’s Personal Data

In addition to the information contained in this privacy policy, this Application may provide the User with additional and contextual information concerning particular Services or the collection and processing of Personal Data upon request.

System logs and maintenance

For operation and maintenance purposes, this Application and any third-party services may collect files that record interaction with this Application (System logs) use other Personal Data (such as the IP Address) for this purpose.

Information not contained in this policy

More details concerning the collection or processing of Personal Data may be requested from the Owner at any time. Please see the contact information at the beginning of this document.

How “Do Not Track” requests are handled

This Application does not support “Do Not Track” requests.
To determine whether any of the third-party services it uses honor the “Do Not Track” requests, please read their privacy policies.

Changes to this privacy policy

The Owner reserves the right to make changes to this privacy policy at any time by notifying its Users on this page and possibly within this Application and/or — as far as technically and legally feasible — sending a notice to Users via any contact information available to the Owner. It is strongly recommended to check this page often, referring to the date of the last modification listed at the bottom. 

Should the changes affect processing activities performed on the basis of the User’s consent, the Owner shall collect new consent from the User, where required.

Definitions and legal references 

Personal Data (or Data)

Any information that directly, indirectly, or in connection with other information — including a personal identification number — allows for the identification or identifiability of a natural person.

Usage Data

Information collected automatically through this Application (or third-party services employed in this Application), which can include: the IP addresses or domain names of the computers utilized by the Users who use this Application, the URI addresses (Uniform Resource Identifier), the time of the request, the method utilized to submit the request to the server, the size of the file received in response, the numerical code indicating the status of the server’s answer (successful outcome, error, etc.), the country of origin, the features of the browser and the operating system utilized by the User, the various time details per visit (e.g., the time spent on each page within the Application) and the details about the path followed within the Application with special reference to the sequence of pages visited, and other parameters about the device operating system and/or the User’s IT environment.

User

The individual using this Application who, unless otherwise specified, coincides with the Data Subject.

Data Subject

The natural person to whom the Personal Data refers.

Data Processor (or Data Supervisor)

The natural or legal person, public authority, agency or other body which processes Personal Data on behalf of the Controller, as described in this privacy policy.

Data Controller (or Owner)

The natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of Personal Data, including the security measures concerning the operation and use of this Application. The Data Controller, unless otherwise specified, is the Owner of this Application.

This Application

The means by which the Personal Data of the User is collected and processed.

Service

The service provided by this Application as described in the relative terms (if available) and on this site/application.

European Union (or EU)

Unless otherwise specified, all references made within this document to the European Union include all current member states to the European Union and the European Economic Area.

Cookie

Cookies are Trackers consisting of small sets of data stored in the User’s browser.

Tracker

Tracker indicates any technology — e.g Cookies, unique identifiers, web beacons, embedded scripts, e‑tags and fingerprinting — that enables the tracking of Users, for example by accessing or storing information on the User’s device.

Legal information

This privacy statement has been prepared based on provisions of multiple legislations, including Art. 13/14 of Regulation (EU) 2016/679 (General Data Protection Regulation).

This privacy policy relates solely to this Application, if not stated otherwise within this document.

Latest update: February 10, 2022

Cookie

This document informs Users about the technologies that help this Application to achieve the purposes described below. Such technologies allow the Owner to access and store information (for example by using a Cookie) or use resources (for example by running a script) on a User’s device as they interact with this Application. 

For simplicity, all such technologies are defined as “Trackers” within this document – unless there is a reason to differentiate.
For example, while Cookies can be used on both web and mobile browsers, it would be inaccurate to talk about Cookies in the context of mobile apps as they are a browser-based Tracker. For this reason, within this document, the term Cookies is only used where it is specifically meant to indicate that particular type of Tracker. 

Some of the purposes for which Trackers are used may also require the User’s consent. Whenever consent is given, it can be freely withdrawn at any time following the instructions provided in this document.

This Application uses Trackers managed directly by the Owner (so-called “first-party” Trackers) and Trackers that enable services provided by a third-party (so-called “third-party” Trackers). Unless otherwise specified within this document, third-party providers may access the Trackers managed by them.
The validity and expiration periods of Cookies and other similar Trackers may vary depending on the lifetime set by the Owner or the relevant provider. Some of them expire upon termination of the User’s browsing session.
In addition to what’s specified in the descriptions within each of the categories below, Users may find more precise and updated information regarding lifetime specification as well as any other relevant information – such as the presence of other Trackers — in the linked privacy policies of the respectiveф third-party providers or by contacting the Owner.

Activities strictly necessary for the operation of this Application and delivery of the Service

This Application uses so-called “technical” Cookies and other similar Trackers to carry out activities that are strictly necessary for the operation or delivery of the Service.

Other activities involving the use of Trackers

Experience enhancement

This Application uses Trackers to provide a personalized user experience by improving the quality of preference management options, and by enabling interaction with external networks and platforms.

Interaction with external social networks and platforms 

This type of service allows interaction with social networks or other external platforms directly from the pages of this Application.
The interaction and information obtained through this Application are always subject to the User’s privacy settings for each social network.
This type of service might still collect traffic data for the pages where the service is installed, even when Users do not use it.
It is recommended to log out from the respective services in order to make sure that the processed data on this Application isn’t being connected back to the User’s profile.

Measurement

This Application uses Trackers to measure traffic and analyze User behavior with the goal of improving the Service.

Anonymized analytics services 

The services contained in this section allow the Owner, through the use of third-party Trackers, to collect and manage analytics in an anonymized form.

Google Analytics with anonymized IP 

Google Analytics is a web analysis service provided by Google LLC or by Google Ireland Limited, depending on how the Owner manages the Data processing, (“Google”). Google utilizes the Data collected to track and examine the use of this Application, to prepare reports on its activities and share them with other Google services.
Google may use the Data collected to contextualize and personalize the ads of its own advertising network.
This integration of Google Analytics anonymizes your IP address. It works by shortening Users’ IP addresses within member states of the European Union or in other contracting states to the Agreement on the European Economic Area. Only in exceptional cases will the complete IP address be sent to a Google server and shortened within the US.

Personal Data processed: Cookies and Usage Data.

Place of processing: United States – Privacy Policy – Opt Out; Ireland – Privacy Policy – Opt Out

Storage duration: 

AMP_TOKEN: 1 hour

_ga: 2 years

_gac*: 3 months

_gat: 1 minute

_gid: 1 day

How to manage preferences and provide or withdraw consent

There are various ways to manage Tracker related preferences and to provide and withdraw consent, where relevant:

Users can manage preferences related to Trackers from directly within their own device settings, for example, by preventing the use or storage of Trackers.

Additionally, whenever the use of Trackers is based on consent, Users can provide or withdraw such consent by setting their preferences within the cookie notice or by updating such preferences accordingly via the relevant consent-preferences widget, if available.

It is also possible, via relevant browser or device features, to delete previously stored Trackers, including those used to remember the User’s initial consent.

Other Trackers in the browser’s local memory may be cleared by deleting the browsing history.

With regard to any third-party Trackers, Users can manage their preferences and withdraw their consent via the related opt-out link (where provided), by using the means indicated in the third party’s privacy policy, or by contacting the third party.

Locating Tracker Settings

Users can, for example, find information about how to manage Cookies in the most commonly used browsers at the following addresses:

Google Chrome

Mozilla Firefox

Apple Safari

Microsoft Internet Explorer

Microsoft Edge

Brave

Opera

Users may also manage certain categories of Trackers used on mobile apps by opting out through relevant device settings such as the device advertising settings for mobile devices, or tracking settings in general (Users may open the device settings and look for the relevant setting).

Consequences of denying consent

Users are free to decide whether or not to grant consent. However, please note that Trackers help this Application to provide a better experience and advanced functionalities to Users (in line with the purposes outlined in this document). Therefore, in the absence of the User’s consent, the Owner may be unable to provide related features.

Owner and Data Controller

Information Security Institute

Owner contact email: info@isi.euasu.org

Since the use of third-party Trackers through this Application cannot be fully controlled by the Owner, any specific references to third-party Trackers are to be considered indicative. In order to obtain complete information, Users are kindly requested to consult the privacy policies of the respective third-party services listed in this document.

Given the objective complexity surrounding tracking technologies, Users are encouraged to contact the Owner should they wish to receive any further information on the use of such technologies by this Application.

Definitions and legal references 

Personal Data (or Data)

Any information that directly, indirectly, or in connection with other information — including a personal identification number — allows for the identification or identifiability of a natural person.

Usage Data

Information collected automatically through this Application (or third-party services employed in this Application), which can include: the IP addresses or domain names of the computers utilized by the Users who use this Application, the URI addresses (Uniform Resource Identifier), the time of the request, the method utilized to submit the request to the server, the size of the file received in response, the numerical code indicating the status of the server’s answer (successful outcome, error, etc.), the country of origin, the features of the browser and the operating system utilized by the User, the various time details per visit (e.g., the time spent on each page within the Application) and the details about the path followed within the Application with special reference to the sequence of pages visited, and other parameters about the device operating system and/or the User’s IT environment.

User

The individual using this Application who, unless otherwise specified, coincides with the Data Subject.

Data Subject

The natural person to whom the Personal Data refers.

Data Processor (or Data Supervisor)

The natural or legal person, public authority, agency or other body which processes Personal Data on behalf of the Controller, as described in this privacy policy.

Data Controller (or Owner)

The natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of Personal Data, including the security measures concerning the operation and use of this Application. The Data Controller, unless otherwise specified, is the Owner of this Application.

This Application

The means by which the Personal Data of the User is collected and processed.

Service

The service provided by this Application as described in the relative terms (if available) and on this site/application.

European Union (or EU)

Unless otherwise specified, all references made within this document to the European Union include all current member states to the European Union and the European Economic Area.

Cookie

Cookies are Trackers consisting of small sets of data stored in the User’s browser.

Tracker

Tracker indicates any technology — e.g Cookies, unique identifiers, web beacons, embedded scripts, e‑tags and fingerprinting — that enables the tracking of Users, for example by accessing or storing information on the User’s device.

Legal information

This privacy statement has been prepared based on provisions of multiple legislations, including Art. 13/14 of Regulation (EU) 2016/679 (General Data Protection Regulation).

This privacy policy relates solely to this Application, if not stated otherwise within this document.

Latest update: February 10, 2022

Receive the latest news

Subscribe To Our Weekly Newsletter

Get notified about new articles

Terms and conditions

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer tristique eu magna condimentum maximus. Nulla facilisi. Vivamus sit amet sem id ligula congue sodales eu sed nibh. Integer eget tortor nunc. Sed ut ultrices sem. Integer hendrerit nulla ante, ut maximus augue finibus et. Etiam quis placerat quam. Sed aliquam convallis magna nec feugiat. Etiam pellentesque odio lorem, ac laoreet odio condimentum vitae. Donec venenatis eleifend semper. Orci varius natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Etiam at justo tincidunt magna pellentesque rutrum. Pellentesque pharetra dui lorem, sit amet pulvinar orci tincidunt eu. Morbi maximus mi a consequat venenatis. Aliquam nec dignissim quam, ut iaculis orci.

Donec ac eleifend augue, id condimentum lacus. Donec hendrerit velit eget ipsum condimentum, sed consequat magna condimentum. Integer eget augue tempus, hendrerit ex id, dapibus leo. Nunc ultricies leo dui, eget lobortis nibh dapibus quis. Curabitur efficitur pellentesque sapien, eget eleifend nisl. Curabitur ac mi vitae nisi dignissim volutpat. Suspendisse id ex sed lectus semper ornare eget id ex. Ut laoreet justo felis, et egestas lorem volutpat eu.

Fusce placerat commodo risus, vitae pretium mauris facilisis vel. Aliquam sollicitudin sed odio quis fermentum. Sed feugiat quam luctus scelerisque ullamcorper. Vestibulum fermentum tellus eu ante porta, ac bibendum augue vulputate. Sed vitae augue aliquam, convallis eros in, maximus turpis. In vel malesuada quam. Donec elementum, odio euismod bibendum pulvinar, mauris magna porta felis, vel finibus lectus turpis at velit. Nullam bibendum non dolor sed congue. Donec dignissim vitae massa sed pretium. Suspendisse nunc turpis, gravida quis condimentum eget, blandit eget ipsum.

Suspendisse non lobortis orci. Donec sed vehicula turpis, at pellentesque nisl. Integer volutpat ultricies bibendum. Pellentesque non tellus et ligula aliquet lacinia. Aliquam vel euismod augue, a auctor nulla. Phasellus libero augue, sodales quis ornare in, elementum a elit. Phasellus commodo placerat dui, id dictum enim sagittis et. Maecenas egestas imperdiet augue, facilisis porta ipsum lobortis non. Morbi tincidunt consequat aliquam. Suspendisse maximus ultricies purus dapibus tempor.

Vivamus placerat pharetra velit, quis semper tellus tristique sed. Ut quis tempus sem, nec congue purus. Morbi fringilla nisi ante, at bibendum neque tincidunt ut. Phasellus lobortis volutpat turpis nec porttitor. Pellentesque rhoncus porttitor risus nec auctor. Etiam vitae semper magna. Aliquam erat volutpat. Etiam maximus justo id dolor ornare eleifend. Nullam ligula quam, vulputate vitae tempus nec, sagittis a ligula. Integer varius mollis ligula, ut congue sem venenatis at. Pellentesque ut sapien pellentesque, rutrum diam et, interdum neque. Nam id libero fringilla, interdum dui ut, dapibus nisl. Nulla nibh quam, condimentum tempor sem eget, varius vehicula ex.