PRIVACY POLICY

Our commitment to protecting your personal information and maintaining the highest standards of data security throughout your cybersecurity training journey.

Data Protection Commitment

At Funopengame Academy, we understand that privacy and security are fundamental to building trust in cybersecurity education. This privacy policy outlines how we collect, use, protect, and manage your personal information in accordance with the General Data Protection Regulation (GDPR) and other applicable data protection laws.

We implement enterprise-grade security measures and follow industry best practices to ensure your personal data remains secure throughout your training experience. This policy applies to all interactions with our academy, including website usage, course enrollment, and ongoing communication.

Last Updated: July 18, 2025. We regularly review and update this policy to ensure continued compliance with evolving privacy regulations and our commitment to transparency.

Data Collection Information

Personal Data We Collect

Contact Information: Name, professional titles, work experience, educational background, and preferred communication methods for course coordination and career support.

Technical Information: Device information, browser type, operating system, IP addresses, and usage patterns to optimize our training platform and ensure security.

Training Data: Course progress, assessment results, certification achievements, lab activity logs, and skill development metrics for personalized learning experiences.

Communication Records: Messages, support tickets, feedback submissions, and consultation notes to provide ongoing assistance and improve our programs.

Data Collection Methods

Direct Collection: Information you provide through contact forms, enrollment applications, consultation requests, and ongoing communication with our team.

Automated Collection: Technical data collected through cookies, analytics tools, and security monitoring systems during your use of our website and training platforms.

Third-Party Sources: Professional background verification through legitimate sources for advanced certification programs requiring security clearance levels.

Legal Basis for Processing

Legitimate Interest: Providing cybersecurity education, improving our training programs, and maintaining security of our systems and participants.

Consent: Marketing communications, optional analytics participation, and enhanced personalization features that you explicitly agree to.

Contractual Necessity: Processing required to deliver training services, issue certifications, and provide career support as outlined in our training agreements.

Legal Obligations: Compliance with certification body requirements and applicable regulations in the cybersecurity and education sectors.

Data Retention Periods

Active Training Data: Retained during your enrollment period and for 3 years after course completion to support ongoing career development and reference requests.

Certification Records: Maintained for 10 years to support credential verification and continuing education requirements as mandated by certification bodies.

Communication History: Support and consultation records kept for 2 years to ensure continuity of service and resolve any subsequent questions or issues.

Technical Logs: Security and usage logs retained for 12 months for system optimization and threat detection purposes.

Data Usage and Sharing

How We Use Your Personal Data

Training Delivery: Personalizing your learning experience, tracking progress, providing feedback, and ensuring you receive appropriate support throughout your cybersecurity education journey.

Career Support: Connecting you with relevant job opportunities, providing reference verification, and maintaining relationships with industry partners for placement assistance.

Program Improvement: Analyzing training effectiveness, identifying areas for curriculum enhancement, and developing new programs based on industry needs and student outcomes.

Communication: Sending course updates, industry insights, certification reminders, and optional marketing communications about advanced training opportunities.

Data Sharing with Third Parties

Certification Bodies: Sharing required information with official certification organizations for credential issuance and verification purposes.

Partner Companies: With your explicit consent, sharing relevant professional information with hiring partners for career placement opportunities.

Service Providers: Secure data processing by trusted technology partners who provide infrastructure, analytics, and communication services under strict confidentiality agreements.

Legal Requirements: Disclosure only when required by law, court order, or regulatory compliance obligations, with advance notice whenever legally permissible.

Marketing Communications

Opt-In Basis: All marketing communications require your explicit consent and can be unsubscribed from at any time through simple one-click mechanisms.

Relevant Content: Marketing messages focus on advanced training opportunities, industry updates, and career development resources aligned with your interests and professional goals.

Frequency Control: You can adjust communication frequency and topic preferences through your student portal or by contacting our support team directly.

Analytics and Performance

Learning Analytics: Analyzing your progress patterns to identify optimal learning strategies and provide personalized recommendations for skill development.

Platform Optimization: Using aggregated, anonymized data to improve website performance, training platform functionality, and overall user experience.

Research Participation: Optional participation in anonymized research studies to advance cybersecurity education methodologies and industry best practices.

Data Protection Measures

Technical Security Measures

Encryption Standards: All personal data is encrypted using AES-256 encryption at rest and TLS 1.3 for data in transit, ensuring maximum protection against unauthorized access.

Access Controls: Multi-factor authentication, role-based access permissions, and regular access reviews ensure only authorized personnel can access student data on a need-to-know basis.

Infrastructure Security: ISO 27001 certified data centers with 24/7 monitoring, intrusion detection systems, and regular security audits to maintain the highest protection standards.

Data Segregation: Student data is isolated in dedicated environments with strict network segmentation to prevent cross-contamination and unauthorized access attempts.

Organizational Safeguards

Staff Training: All team members receive comprehensive data protection training and sign confidentiality agreements before accessing any student information.

Privacy by Design: Data protection principles are integrated into all system designs, process developments, and organizational policies from the ground up.

Regular Audits: Quarterly internal reviews and annual third-party security assessments ensure continuous compliance and identify areas for improvement.

Incident Response: Established procedures for detecting, containing, and responding to potential data breaches with notification protocols as required by law.

Data Transfer Protections

International Transfers: When data crosses borders, we use Standard Contractual Clauses and adequacy decisions to ensure equivalent protection levels.

Partner Agreements: All third-party service providers must demonstrate GDPR compliance and undergo security assessments before processing any student data.

Data Minimization: We limit data transfers to the minimum necessary for specific purposes and regularly review transfer arrangements for continued necessity.

Breach Notification Procedures

Detection Systems: Automated monitoring tools and manual processes ensure rapid identification of potential security incidents or data breaches.

Response Timeline: We are committed to notifying relevant authorities within 72 hours and affected individuals promptly when required by applicable regulations.

Remediation Actions: Comprehensive incident response includes immediate containment, impact assessment, remediation measures, and process improvements to prevent recurrence.

Your Rights and Data Control

Data Subject Rights

Right of Access: Request a copy of all personal data we hold about you, including processing purposes and retention periods.
Right to Rectification: Correct inaccurate information or complete incomplete data in your student records.
Right to Erasure: Request deletion of your personal data when no longer necessary for the original purposes or when you withdraw consent.
Right to Data Portability: Receive your personal data in a structured, machine-readable format for transfer to another service provider.
Right to Object: Object to processing based on legitimate interests, including marketing communications and analytics participation.
Right to Restrict Processing: Limit how we use your data while disputes are resolved or accuracy is verified.

Exercising Your Rights

Contact Methods

Submit data requests through our secure contact form, clearly indicating which rights you wish to exercise and providing verification information.

Response Timeline

We respond to all data subject requests within 30 days, with extensions communicated in advance for complex requests requiring additional verification.

Identity Verification

We may request additional information to verify your identity before processing data requests, ensuring your personal information remains secure.

Supervisory Authority

You have the right to lodge complaints with your local data protection authority if you believe we have not addressed your concerns appropriately.

Questions or Concerns?

If you have questions about this privacy policy, need assistance exercising your rights, or have concerns about how your data is being processed, please contact our data protection team through our main contact form. We are committed to addressing all privacy-related inquiries promptly and transparently.

Our data protection officer is available to provide guidance and ensure your privacy rights are fully respected throughout your cybersecurity training experience.