Please note that this Policy does not apply to information collected by:
B. Information We Collect About You and How We Collect It.
We collect several types of information from and about users of our Site, as described below.
Information You Provide to Us. We encourage all visitors to register with Blue Ridge. Registration is not required, except for access to certain of our content areas. The registration form requires users to give us the following User Information:
In the event that you contact us for customer support through the Site, we may request that you provide additional User Information relevant to the support requested by you. Users are under no obligation to provide such information. However, we cannot guarantee that we can provide customer support in the event that relevant information related to the use of our products or services is withheld.
In the event that you decide to participate in any of our user forums, any personal, private and/or confidential information that you elect to disclose to other users on the forum shall be disclosed at your own risk. Such disclosures shall not be considered User Information, and we are not responsible for maintaining the security of any information so disclosed.
Information We Collect Through Automatic Data Collection Technologies. As you navigate through and interact with our Site, we may use automatic data collection technologies to collect certain information about your equipment, browsing actions and patterns, including: Cookies, user data for sales tools, tracking codes in coordination with offers made on social media sites, and visitor IP addresses and domain names for reporting and site usage analysis. This information is reported internally and then purged periodically.
Information from Third Parties. Third parties may provide us with information about you from online and offline sources. We may combine such information with the information we already have about you in order to provide you with a better experience, determine your interest in our products or improve the quality of our offerings.
C. How We Use User Information. User Information may be compiled into user profiles that are maintained by Blue Ridge (or by third party services used by Blue Ridge to manage customer information), and may be used for the following purposes:
User Information will only be shared with assurances from such third party that it (1) will not use or disclose User Information for purposes of solicitation or direct marketing, and (2) will keep User Information secure using methods comparable to, or more secure than, the security methods used by Blue Ridge. To the extent that you provide User Information to us concerning third parties, including information regarding your company, that information will be subject to the same conditions as set forth above.
In addition, we may share User Information with:
If we believe disclosure is necessary or appropriate to protect the rights, property, or safety of Blue Ridge, our customers or others. This may include exchanging information with other companies and organizations for the purposes of fraud protection
Right to Review, Correct and Delete User Information. If you provide us with User Information, you have the following rights with respect to that information:
E. Security Measures. No method of safeguarding information is 100% secure. We have implemented and will maintain appropriate policies, procedures, and technical safeguards to protect User Information from unauthorized and improper access, use, disclosure, modification, and destruction. The safety and security of your User Information also depends on you. Where we have given you (or where you have chosen) a password for access to certain parts of our Site, you are responsible for keeping this password confidential. We ask you not to share your password with anyone. Unfortunately, the transmission of information via the internet is not completely secure. Although we do our best to protect your personal information, we cannot guarantee the security of information transmitted to our Site. Any transmission of personal information is at your own risk. We are not responsible for circumvention of any privacy settings or security measures contained on the Site.
G. Your California Privacy Rights. California Civil Code Section 1798.83 permits California residents to request a notice from us describing which categories of personal information we have shared with third parties or corporate affiliates for those third parties or corporate affiliates’ direct marketing purposes within the last calendar year, and the name and address of such parties. If you are a California resident and would like a copy of this notice, please send an email to privacy@BlueRidgeNetworks.com with “California Privacy Rights Request” in the subject line.
H. Children Under the Age of 13. Our Website is not intended for children under 13 years of age. No one under age 13 may provide any information to or on the Site. We do not knowingly collect personal information from children under 13. If you are under 13, do not use or provide any information on this Site or on or through any of its features/register on the Site, use any of the interactive or public comment features of this Site or provide any information about yourself to us, including your name, address, telephone number, e-mail address or any screen name or user name you may use. If we learn we have collected or received personal information from a child under 13 without verification of parental consent, we will delete that information. If you believe we might have any information from or about a child under 13, please contact us at contact@BlueRidgenetworks.com.
J. Dispute Resolution
Last updated: June 20, 2018
According to a report by IBM, data breach incident costs rose from $3.86 million to $4.24 million USD—the highest average total cost in 17 years. These rising costs—and the expansion of remote work—have placed cybersecurity as a top priority for organizations in 2022.
Segmentation limits scope of a security breach and risk of unauthorized access to sensitive data.
Hide critical assets to create more resilient environments.
Ensure that data transmitted across unknown or hostile networks is uncompromised and remains confidential.
Add an extra layer of security to networks and devices, making it harder for attackers to gain unauthorized access.