Last Updated: September 29 2022
Our terms of service is backed by our policy framework, including our privacy and cookies policy. This document will be updated as the site and services it provides access to are changed.
By using this site and choosing to register for the Cyber FastTrack program, you agree to these terms and associated policies referred to above. If you break the rules outlined below and in the detailed policies referred to above, we may suspend your access to the program and its associated third-party services, and, in severe cases, refer information to the relevant legal authorities.
We may make changes to these terms.
We may amend these terms and our policies from time to time. If the changes are significant, we will notify you by email if you have already registered for the Cyber FastTrack program.
To participate in Cyber FastTrack as a student:
When you register, you are required to give accurate information about yourself for purposes of safeguarding and to validate your eligibility for the program.
As part of the program, you will be provided with access to software and training content. You agree that this material will be used solely by you, the registered user, and not shared with other parties.
By registering an account and agreeing to these terms, we will provide you with a licence to access CyberStart, a third-party online service which contains training material, challenges and games.
Post-registration and using your CyberStart account to access the service and materials, you will be provided with material and tools that, applied unethically or without consideration, could result in violation of (amongst others) the Computer Fraud and Abuse Act of the United States or the Computer Misuse Act 1990 of the United Kingdom. By registering for this program, you agree that you will not use any of the information provided, tools or techniques against other individuals or organizations without consent to do so.
By registering for Cyber FastTrack, you agree that you will comply with our Policies and Terms & Conditions, and that failure to do so could result in termination of your access, or sharing of your information with the relevant legal authorities. Examples of abuse include, but are not limited to, launching a denial of service, or purposeful attempts to disrupt the service.
By registering for the program and providing accurate details, you will be given access to this material free of charge, and you must agree to comply with the Terms and Policies of CyberStart.
By registering for the program and providing accurate details, you will be given access to this material free of charge, and you must agree to comply with the Terms and Policies of the CyberStart product.
In order to participate in and be eligible for the program, you must agree to receive essential program communication via our selected provider, Active Campaign. If you opt out of these emails or unsubscribe from them, you will not receive essential program communication and will become ineligible to participate and ineligible to be considered for prizes and awards.
By registering for the program, you may be assigned a license to the CyberStart product. The license you are issued is for the purposes of the program and bound by the timeframes, eligibility criteria and scholarship or award criteria. Your license may be revoked for failure to comply with these terms, or otherwise at the end of your interaction with the program. CyberStart operates under a commercial license, and your right to access and use the licensed material on the platform or any other expressions based on the product end with your license termination. You may continue to access your CyberStart account and the non-licensed content in accordance with the Terms and Policies of CyberStart.
As part of this program, subject to eligibility criteria, you may be granted a temporary licence to CyberStart. CyberStart provides educational material and security related puzzles or challenges. As part of these challenges you may be required to apply unusual tools or use patterns to services to uncover logic flaws or issues. With your licence, you are provided permission to undertake the activities covered in each of the 'briefings' against the defined targets. As covered in the product-specific licences and user guides, it is not acceptable to attempt denial of service attacks, or to purposefully attempt to cause damage to the infrastructure or data. It is also deemed a violation of acceptable use to identify flaws and to purposefully attempt to damage or disrupt other platform users, or their data.
Uncovering security flaws and learning about cybersecurity vulnerabilities will require use of certain tools that can only be used in a context where permission has been given by the target party, as is provided here. In severe circumstances where error cannot be blamed, violation of these terms could result in rejection from the program, or prosecution. If you are unsure of the activity you are undertaking at any time please contact firstname.lastname@example.org.
We are the owner or the licensee of all intellectual property rights in the Cyber FastTrack website, and in the material published on it. Those works are protected by copyright laws and treaties around the world. All such rights are reserved.
You may print off one copy, and may download extracts, of any page(s) from our site for your personal use and you may draw the attention of others within your organization to content posted on our site.
You must not modify the paper or digital copies of any materials you have printed off or downloaded in any way, and you must not use any illustrations, photographs, video or audio sequences or any graphics separately from any accompanying text.
Our status (and that of any identified contributors) as authors of content on our site must always be acknowledged.
You must not use any part of the content on our site for commercial purposes without obtaining a licence to do so from us or our licensors.
If you have any questions about these terms or any associated policy, please contact email@example.com.
Last Updated: September 29 2022
Cyber FastTrack is committed to protecting your privacy and complies with the principles of the relevant data protection regulations, including the General Data Protection Regulation (GDPR). We commit to holding the minimum amount of data that we can from you, and we are committed to ensuring that your data is handled properly and any information we hold is stored securely and used in a lawful and ethical way.
Your information is being collected by Cyber FastTrack to help run and deliver information security talent assessment and training programs. The program is delivered by the National Cyber Scholarship Foundation, a charitable foundation based in the United States of America at 8300 Douglas Avenue, Suite 800, Dallas, TX 75225, and Helical Levity Ltd, based in the United Kingdom at The Old Bull Pens, Sezincote, Moreton-In-Marsh, Gloucestershire, GL56 9AW. Helical Levity Ltd acts as the controller of your data, and the National Cyber Scholarship Foundation acts as a processor of your data.
This program and the prior mentioned parties will maintain information that you provide to us, and data collected during your interaction with the provided services. This is collected for the operational purposes of security and safeguarding, but primarily for the running of the talent identification and training outlined on this website.
We use a company called Active Campaign to send you important information about the program. This is information that you need to participate in Cyber FastTrack.
Other organizations, such as cybersecurity employers, may offer prizes which you could be eligible for. In the event that these become available and applicable to you, you will be contacted by email with a link to complete an application form, on which you will be asked for your consent to provide your data for you to receive your prize.
We will always ask for your permission before sending your information to any other organization, or for any use case other than what is outlined above. We may on occasion offer you invitations to access or join third party services and/or platforms that may be of interest to you as a participant of Cyber FastTrack. Your use of these services is entirely optional and will not affect your access to or eligibility for Cyber FastTrack. We may send you information related to our programs and further suitable opportunities for you, which you may terminate at your discretion.
The types of information we hold about you include:
When you register with Cyber FastTrack, we will share your name and email address with CyberStart in order to create your account and provide you with a licence to the content on the CyberStart product.
If you ask to join one of our communities as part of your registration, we will share your name and email address with our community platform service, Tribe. Your details will be shared only if you ask to join a community, and you can leave the community and ask Tribe to remove your data at any time without changing your eligibility for Cyber FastTrack.
We use a tool called Fathom to better understand how people are using this website so we can improve the experience for all users. This tool collects and stores your IP address and anonymous/pseudonymised information about your interactions with our website.
Facebook Lookalike & Custom Audiences
Facebook Lookalike & Custom Audiences enables us to use existing datasets of users over the age of 18 to compile groups and lists of users based on certain criteria in order to provide users with similar interests and preferences with relevant information on Facebook’s services. Before transmission to Facebook, the data is irreversibly encrypted in the form of hash values (encrypted numeric values) on our computers. The data of minors is not used for this purpose.
When your data such as your IP address is collected by a third party such as Fathom we rely on legitimate interests to provide a lawful basis for processing.
We get your information from your registration form, from your use of the website and materials, and from details of your progress in the program. For us to process your data we need to get your consent or permission to use your information on behalf of all those involved. We can't enrol you in the program and keep you up to date without your registration information, and we also need to monitor your progress.
Whether you choose to join or leave the program is entirely up to you. The only effect of asking us to delete your information would be that you are no longer able to be a member of the program. You are entitled to do this at any point in support of your GDPR right to be forgotten.
You must meet the program eligibility criteria in order to register, including the criteria that you are of an age which can consent to provide your data. For this reason, we ask for your date of birth.
We've tried to make this notice easy to read, but you can always contact the Data Protection Officer via firstname.lastname@example.org who will help explain things further and will answer your questions.
If you change your mind about allowing us to use your information, you simply need to tell us by emailing email@example.com. We will then take you through a couple of quick steps to confirm you want to delete your information and leave the program.
We'll update you when this has been done, or in exceptional circumstances if we can't do this.
We need it to run the program outlined on this site. The National Cyber Scholarship Foundation and Helical Levity Ltd will need your data to run the program and to assess eligibility.
If you don't want us to hold your information, you will no longer be able to participate in the program, and we will delete your records from the system.
We carry out regular security assessments to make sure your information is secure. We follow all the standard industry practices to make sure we hold your information as securely as possible.
As per GDPR standards, we will always inform you as quickly as possible if we discovery any security incidence that has affected your data. We will take all action that we can to reduce risks and we will let you know if you need to take any action to protect yourself as a result.
We keep your information for five years or until you ask us to delete it, if this is sooner, and you wish to leave the program. If the circumstances arise where we need to keep the data longer, we will tell you and explain why.
You have a right to have a copy of the information which Cyber FastTrack holds on you or to transfer your information. You can make a request for a copy of your data through support by emailing firstname.lastname@example.org.
If at any time you want further information, or you need help understanding what you can and cannot request, or if you want to make a complaint, the Data Protection Officer can help you with this.
You can be asked to be put in contact with our Data Protection Officer via our support channels. Please email email@example.com and ask to be put in contact with the Data Protection Officer.
If you still aren't happy with our response you can complain to the Information Commissioners Office.