Last Updated: October 22 2021
This document provides a readable summary of our terms of service. It is backed by our policy framework, including our privacy and cookies policy. This document will be updated as the site and services it provides access to are changed.
By using this site and choosing to register for the Cyber FastTrack program, you agree to these terms and associated policies referred to above. If you break the rules outlined below and in the detailed policies referred to above, we may suspend your access to the program and its associated third-party services, and, in severe cases, refer information to the relevant legal authorities.
To participate in Cyber FastTrack as a student:
When you register, you are required to give accurate information about yourself for purposes of safeguarding and to validate your eligibility for the program.
As part of the program, you will be provided with access to software and training content. You agree that this material will be used solely by you, the registered user, and not shared with other parties.
By registering an account and agreeing to these terms, we will provide you with a licence to access CyberStart, a third-party online service which contains training material, challenges and games.
Post-registration and using your CyberStart account to access the service and materials, you will be provided with material and tools that, applied unethically or without consideration, could result in violation of (amongst others) the Computer Fraud and Abuse Act of the United States or the Computer Misuse Act 1990 of the United Kingdom. By registering for this program, you agree that you will not use any of the information provided, tools or techniques against other individuals or organizations without consent to do so.
By registering for Cyber FastTrack, you agree that you will comply with our Policies and Terms & Conditions, and that failure to do so could result in termination of your access, or sharing of your information with the relevant legal authorities. Examples of abuse include launching a denial of service, or purposeful attempts to disrupt the service.
By registering for the program and providing accurate details, you will be given access to this material free of charge, and you must agree to comply with the Terms and Policies of CyberStart.
In order to participate in and be eligible for the program, you must agree to receive essential program communication via our selected provider, Active Campaign. If you opt out of these emails or unsubscribe from them, you will not receive essential program communication and will become ineligible to participate.
By registering for the program, you may be assigned sub licenses to a selection of the CyberStart products. The license you are issued is for the purposes of the program and bound by the timeframes, eligibility criteria and scholarship or award criteria. Your license may be revoked for failure to comply with these terms, or otherwcyber-fasttrack.org at the end of your interaction with the program. CyberStart products operate under a commercial license, and your right to access and use material, the platforms or any other expressions based on the product end with your license termination.
As part of this program, subject to eligibility criteria, you may be granted a temporary licence to CyberStart. CyberStart provides educational material and security related puzzles or challenges. As part of these challenges you may be required to apply unusual tools or use patterns to services to uncover logic flaws or issues. With your licence, you are provided permission to undertake the activities covered in each of the 'briefings' against the defined targets. As covered in the product-specific licences and user guides, it is not acceptable to attempt denial of service attacks, or to purposefully attempt to cause damage to the infrastructure or data. It is also deemed a violation of acceptable use to identify flaws and to purposefully attempt to damage or disrupt other platform users, or their data.
Uncovering security flaws and learning about cybersecurity vulnerabilities will require use of certain tools that can only be used in a context where permission has been given by the target party, as is provided here. In severe circumstances where error cannot be blamed, violation of these terms could result in rejection from the program, or prosecution. If you are unsure of the activity you are undertaking at any time please contact firstname.lastname@example.org.
If you have any questions about these terms or any associated policy, please contact email@example.com.
Last Updated: October 22 2021
Cyber FastTrack supports your privacy rights and we commit to holding the minimum amount of data that we can from you.
Your information is being collected by Cyber FastTrack to help run and deliver information security talent assessment and training programs. The program is delivered by the National Cyber Scholarship Foundation, a charitable foundation based in the United States of America at 8300 Douglas Avenue, Suite 800, Dallas, TX 75225, and Helical Levity Ltd, based in the United Kingdom at The Old Bull Pens, Sezincote, Moreton-In-Marsh, Gloucestershire, GL56 9AW. These parties respectively act as a processor and controller of your data, which means storing your provided data, analyzing it or deleting it.
This program and the prior mentioned parties will maintain information that you provide to us, and data collected during your interaction with the provided services. This is collected for the operational purposes of security and safeguarding, but primarily for the running of the talent identification and training outlined on this website.
Sometimes we use a company called Active Campaign to send you important information about the program. This is information that you need to participate in Cyber FastTrack.
Other organizations, such as cybersecurity employers, may offer prizes which you could be eligible for. In the event that these become available and applicable to you, we will contact you to ask for your consent to provide your data for you to receive your prize.
We will always ask for your permission before sending your information to any other organization, or for any use case other than what is outlined above. We may on occasion offer you invitations to access or join third party services and/or platforms that may be of interest to you as a participant of Cyber FastTrack. Your use of these services is entirely optional and will not affect your access to or eligibility for Cyber FastTrack. We may send you information related to our programs and further suitable opportunities for you, which you may terminate at your discretion.
The types of information we hold about you include:
When you register with Cyber FastTrack, we will share your name and email address with CyberStart in order to create your account and provide you with a licence to the content on the CyberStart product.
If you ask to join one of our communities as part of your registration, we will share your name and email address with our community platform service, Tribe. Your details will be shared only if you ask to join a community, and you can leave the community and ask Tribe to remove your data at any time without changing your eligibility for Cyber FastTrack.
We use a tool called Fathom to better understand how people are using this website so we can improve the experience for all users. This tool collects and stores your IP address and anonymous/pseudonymised information about your interactions with our website.
Facebook Lookalike & Custom Audiences
Facebook Lookalike & Custom Audiences enables us to use existing datasets of users over the age of 18 to compile groups and lists of users based on certain criteria in order to provide users with similar interests and preferences with relevant information on Facebook’s services. Before transmission to Facebook, the data is irreversibly encrypted in the form of hash values (encrypted numeric values) on our computers. The data of minors is not used for this purpose.
When your data such as your IP address is collected by a third party such as Fathom we rely on legitimate interests to provide a lawful basis for processing.
We get your information from your registration form, from your use of the website and materials, and from details of your progress in the program. For us to process your data we need to get your consent or permission to use your information on behalf of all those involved. We can't enrol you in the program and keep you up to date without your registration information, and we also need to monitor your progress.
Whether you choose to join or leave the program is entirely up to you. The only effect of asking us to delete your information would be that you are no longer able to be a member of the program. You are entitled to do this at any point in support of your right to be forgotten.
You must meet the program eligibility criteria in order to register, including the criteria that you are of an age which can consent to provide your data. For this reason, we ask for your date of birth.
We've tried to make this notice easy to read, but you can always contact the Data Protection Officer via firstname.lastname@example.org who will help explain things further and will answer your questions.
If you change your mind about allowing us to use your information, you simply need to tell us by emailing email@example.com. We will then take you through a couple of quick steps to confirm you want to delete your information and leave the program.
We'll update you when this has been done, or in exceptional circumstances if we can't do this.
We need it to run the program outlined on this site. The National Cyber Scholarship Foundation and Helical Levity Ltd will need your data to run the program and to assess eligibility.
If you don't want us to hold your information, you will no longer be able to participate in the program, and we will delete your records from the system.
We carry out regular security assessments to make sure your information is secure. We follow all the standard industry practices to make sure we hold your information as securely as possible.
We will always inform you as quickly as possible if we discovery any security incidence that has affected your data. We will take all action that we can to reduce risks and we will let you know if you need to take any action to protect yourself as a result.
We keep your information for five years or until you ask us to delete it, if this is sooner, and you wish to leave the program. If the circumstances arise where we need to keep the data longer, we will tell you and explain why.
You have a right to have a copy of the information which we hold on you or to transfer your information. You can make a request for a copy of your data through support by emailing firstname.lastname@example.org.
If at any time you want further information, or you need help understanding what you can and cannot request, or if you want to make a complaint, the Data Protection Officer can help you with this.
You can be asked to be put in contact with our Data Protection Officer via our support channels. Please email email@example.com and ask to be put in contact with the Data Protection Officer.
If you still aren't happy with our response you can complain to the Information Commissioners Office.