Building a Strong Cybersecurity Strategy for Your Organization

Building a strong cybersecurity strategy is no longer optional for organizations operating in today’s digital landscape. Whether you are a financial institution in Panama City, a manufacturing operation in San Pedro Sula, a technology company in San José, or a professional services firm in Miami, the threats targeting your organization are real, sophisticated, and growing in frequency. At GLADiiUM Technology Partners, we have spent over 20 years helping organizations across Latin America and the United States build cybersecurity strategies that protect their assets, support their operations, and satisfy their regulatory requirements. This guide provides the comprehensive framework our clients use to strengthen their security posture.

What Is a Cybersecurity Strategy?

A cybersecurity strategy is an organization’s high-level plan for protecting its information assets, technology infrastructure, and business operations from cyber threats. It defines the organization’s security objectives, establishes the framework for achieving those objectives, allocates resources appropriately, and creates accountability for security outcomes.

A cybersecurity strategy is distinct from a security policy (which defines rules and requirements) or a security architecture (which defines the technical design of security controls). The strategy is the overarching document that explains why the organization is investing in security, what outcomes it is seeking to achieve, and how it intends to get there — connecting business objectives to security investment decisions in a way that executives, boards, and regulators can understand and evaluate.

Organizations that operate without a documented cybersecurity strategy consistently make security investments reactively — purchasing tools in response to incidents, implementing controls to satisfy immediate audit findings, and making decisions based on vendor recommendations rather than their own risk profile. The result is a fragmented security posture that is both less effective and more expensive than a strategically designed program.

Element 1: Establishing Your Information Security Policy

Every cybersecurity strategy begins with a formal Information Security Policy — the foundational document that establishes management’s commitment to security, defines the scope and objectives of the security program, assigns roles and responsibilities, and establishes the minimum-security requirements that apply across the organization.

A strong Information Security Policy for organizations in Latin America should:

  • Define security objectives in terms that connect to business outcomes — protecting customer trust, enabling regulatory compliance, and ensuring operational continuity — rather than purely technical terms.
  • Establish clear accountability, designating a senior leader (CISO or equivalent) responsible for the security program and defining security responsibilities for every organizational role.
  • Reference the specific regulatory frameworks applicable in your jurisdiction — CNBS in Honduras, SBP in Panama, SUGEF in Costa Rica, SSF in El Salvador, CNBV in Mexico, HIPAA and GLBA in the United States.
  • Require regular review and update — the policy should be a living document that evolves with the threat landscape and regulatory environment, not a static artifact updated only when an audit requires it.

Element 2: Understanding Your Threat Landscape

An effective cybersecurity strategy cannot be generic — it must be calibrated to the specific threats facing your organization based on your industry, your geography, your technology environment, and your business model. Understanding your threat landscape requires both external intelligence and internal assessment.

External threat intelligence provides context on the threat actors targeting organizations in your sector and region, the attack techniques they use, and the indicators of compromise that suggest their presence. For organizations in Latin America, relevant intelligence sources include regional cybersecurity agencies, industry-specific information sharing communities, and MSSP partners like GLADiiUM that maintain threat intelligence relevant to each territorial market.

Internal risk assessment identifies your organization’s specific vulnerabilities and the business assets that are most critical to protect. A formal risk assessment process should evaluate the likelihood of each relevant threat scenario against your current control environment, estimate the business impact of successful attacks, and prioritize security investment based on the combination of likelihood and impact — ensuring that resources address your highest actual risks rather than generic concerns.

Element 3: Adopting a Security Framework

Security frameworks provide structured methodologies for organizing and evaluating cybersecurity programs. Rather than building your strategy from scratch, adopting an established framework ensures completeness, enables benchmarking against peer organizations, and demonstrates maturity to regulators and auditors.

The most relevant frameworks for organizations in GLADiiUM’s markets include:

  • NIST Cybersecurity Framework (CSF) — The most widely adopted framework globally, organized around five functions: Identify, Protect, Detect, Respond, and Recover. Highly adaptable to organizations of all sizes and sectors. Required or referenced in numerous US regulatory contexts.
  • ISO/IEC 27001 — The international standard for information security management systems. Provides a comprehensive control framework and a certification pathway that is increasingly required for enterprise contracts and government procurement across Latin America.
  • CIS Controls — A prioritized set of 18 security controls that represent the most effective defenses against the most common attack patterns. Particularly valuable for organizations beginning to build or mature their security programs — the prioritization helps direct limited resources to the highest-impact controls first.
  • PCI-DSS — For organizations processing payment card data, PCI-DSS is both a framework and a compliance requirement. Its specific technical controls provide a concrete implementation roadmap for payment security.

Element 4: Keeping Systems Current — Patch Management

Unpatched software vulnerabilities are the most commonly exploited attack vector in enterprise environments. The WannaCry ransomware, which caused billions of dollars in global damage, exploited a vulnerability for which a patch had been available for two months. The majority of successful ransomware attacks exploit known vulnerabilities — meaning organizations that patch promptly and consistently avoid a significant percentage of the attacks that compromise their peers.

An effective patch management program includes:

  • Complete asset inventory — You cannot patch what you do not know exists. A comprehensive, continuously updated inventory of all software, operating systems, and firmware is foundational to patch management.
  • Vulnerability scanning — Regular scanning identifies which assets have known vulnerabilities and prioritizes remediation based on exploitability and business criticality.
  • Defined SLAs for patching — Critical vulnerabilities (CVSS score 9.0+) should be patched within 24–72 hours. High vulnerabilities within 7–14 days. Other vulnerabilities within 30 days. Organizations without defined SLAs consistently leave critical vulnerabilities open for months.
  • Testing and validation — Patches should be tested in non-production environments before deployment to production systems, particularly for critical business applications where patch-induced failures would have operational impact.

Element 5: Multi-Factor Authentication and Identity Security

Identity is the new perimeter. In a world where employees work remotely, applications run in the cloud, and the traditional network boundary no longer exists, controlling access through verified identity is the most fundamental security control available. Multi-factor authentication (MFA) should be implemented across every system that contains sensitive data or provides administrative access to infrastructure.

Beyond MFA, a comprehensive identity security program includes:

  • Privileged Access Management (PAM) — Controlling, monitoring, and auditing all administrative access to critical systems. Privileged credentials are the most valuable target for attackers seeking to escalate from initial access to full system control.
  • Least privilege access — Users should have the minimum access required to perform their job functions — nothing more. Excessive access privileges expand the potential damage of any compromised account.
  • Regular access reviews — Quarterly review and recertification of user access rights ensures that access granted for temporary needs or previous roles does not persist indefinitely.
  • Service account management — Non-human accounts used by applications and automated processes are frequently overlooked but represent significant risk if compromised.

Element 6: Network Segmentation and Defense Architecture

Network segmentation divides your environment into isolated zones that require explicit authorization to cross — limiting the lateral movement that characterizes advanced persistent threats and enterprise ransomware deployments. Key segmentation priorities include:

  • Separating OT/ICS systems from corporate IT networks with strict controls at the boundary
  • Isolating payment processing systems in a dedicated, tightly controlled network segment (required by PCI-DSS)
  • Creating a dedicated zone for internet-facing systems (DMZ) that is isolated from internal networks
  • Segmenting administrative networks from general user networks to protect privileged access pathways

Application-aware firewalls, VLANs, micro-segmentation technologies, and Zero Trust Network Access (ZTNA) solutions all contribute to an effective segmentation architecture appropriate for different environments and threat profiles.

Element 7: Ransomware Preparedness and Backup

Given the frequency and severity of ransomware attacks across Latin America, ransomware preparedness deserves specific attention in every organization’s cybersecurity strategy. A ransomware-resilient organization has three layers of defense:

  • Prevention — MFA, EDR, email security, and employee training to block the phishing and credential-based attacks that serve as ransomware’s primary entry vectors.
  • Containment — Network segmentation that limits how far ransomware can spread if it does execute, reducing the blast radius and the scope of recovery required.
  • Recovery — Tested, encrypted, immutable backups stored in locations that ransomware cannot reach — separate from production systems and protected against the backup-targeting behavior that modern ransomware employs. Recovery time objectives (RTO) and recovery point objectives (RPO) should be defined and regularly tested.

Element 8: Incident Response Planning

Security incidents are not a question of if but when. Organizations that have documented, tested incident response plans consistently contain incidents faster, limit damage more effectively, and recover more quickly than those that respond ad hoc. An effective incident response plan defines:

  • Who is responsible for each role in the response (Incident Commander, technical lead, communications lead, legal counsel, executive sponsor)
  • How incidents are detected, classified, and escalated
  • Specific playbooks for the most likely incident types — ransomware, data breach, account compromise, DDoS
  • External communication procedures for customers, regulators, and media
  • Regulatory notification obligations and timelines applicable in each jurisdiction
  • Post-incident review process to incorporate lessons learned

Element 9: Threat Monitoring and Detection

A cybersecurity strategy is only effective if you know when it is being tested. Continuous monitoring provides the visibility needed to detect attacks in progress before they result in successful breaches. Core monitoring components include:

  • Endpoint Detection and Response (EDR) — Continuous behavioral monitoring across all managed endpoints with automated and analyst-driven response capabilities.
  • Security Information and Event Management (SIEM) — Centralized collection and correlation of security events from across the environment, enabling detection of attack patterns that span multiple systems.
  • Network Traffic Analysis — Monitoring of network communications to detect lateral movement, data exfiltration, and command-and-control traffic.
  • User and Entity Behavior Analytics (UEBA) — Baseline modeling of normal user behavior with alerting on anomalies that may indicate compromised accounts or insider threats.

Element 10: Building a Security-Aware Culture

The most technically sophisticated cybersecurity strategy is undermined if the people who operate within it are unaware of threats or untrained in secure practices. Security culture — the degree to which security-conscious behavior is embedded in how people work — is both a risk factor and a risk control that must be actively managed.

Building security culture requires consistent, relevant communication about security — not just annual compliance training, but regular engagement that connects security behaviors to real-world examples relevant to employees’ roles and responsibilities. Security awareness programs, phishing simulations, security-by-design in product development processes, and leadership modeling of secure behaviors all contribute to an organizational culture where security is everyone’s responsibility, not just the IT department’s.

Building Your Cybersecurity Strategy with GLADiiUM

GLADiiUM Technology Partners works with organizations across Honduras, Panama, Costa Rica, El Salvador, Mexico, Miami, and Puerto Rico to develop, implement, and continuously improve cybersecurity strategies that address their specific threat landscape, regulatory obligations, and business requirements. Our approach begins with a comprehensive security assessment that establishes your current posture across all ten elements described above, then develops a prioritized roadmap that delivers measurable improvement at each phase.

As your MSSP partner, we provide the ongoing management, monitoring, and continuous improvement that keeps your strategy effective as the threat landscape evolves — ensuring that your cybersecurity investment produces consistent, measurable results over time.

Start Building Your Strategy Today

A strong cybersecurity strategy does not need to be implemented overnight — but it does need to start. Contact GLADiiUM Technology Partners for a free cybersecurity strategy assessment for your organization.

Email: [email protected] | [email protected]

PRIVACY NOTICE

 
Last updated October 27, 2022
 
 
 
This privacy notice for GLADiiUM Technology Partners, Inc (“Company,” “we,” “us,” or “our), describes how and why we might collect, store, use, and/or share (“process“) your information when you use our services (“Services“), such as when you:
 
  • Engage with us in other related ways, including any sales, marketing, or events
Questions or concerns? Reading this privacy notice will help you understand your privacy rights and choices. If you do not agree with our policies and practices, please do not use our Services. If you still have any questions or concerns, please contact us at [email protected].
 
 
SUMMARY OF KEY POINTS
 
This summary provides key points from our privacy notice, but you can find out more details about any of these topics by clicking the link following each key point or by using our table of contents below to find the section you are looking for. You can also click here to go directly to our table of contents.
 
What personal information do we process? When you visit, use, or navigate our Services, we may process personal information depending on how you interact with GLADiiUM Technology Partners, Inc and the Services, the choices you make, and the products and features you use. Click here to learn more.
 
Do we process any sensitive personal information? We do not process sensitive personal information.
 
Do we receive any information from third parties? We do not receive any information from third parties.
 
How do we process your information? We process your information to provide, improve, and administer our Services, communicate with you, for security and fraud prevention, and to comply with law. We may also process your information for other purposes with your consent. We process your information only when we have a valid legal reason to do so. Click here to learn more.
 
In what situations and with which parties do we share personal information? We may share information in specific situations and with specific third parties. Click here to learn more.
 
How do we keep your information safe? We have organizational and technical processes and procedures in place to protect your personal information. However, no electronic transmission over the internet or information storage technology can be guaranteed to be 100% secure, so we cannot promise or guarantee that hackers, cybercriminals, or other unauthorized third parties will not be able to defeat our security and improperly collect, access, steal, or modify your information. Click here to learn more.
 
What are your rights? Depending on where you are located geographically, the applicable privacy law may mean you have certain rights regarding your personal information. Click here to learn more.
 
How do you exercise your rights? The easiest way to exercise your rights is by filling out our data subject request form available here, or by contacting us. We will consider and act upon any request in accordance with applicable data protection laws.
 
Want to learn more about what GLADiiUM Technology Partners, Inc does with any information we collect? Click here to review the notice in full.
 
 
TABLE OF CONTENTS
 
 
1. WHAT INFORMATION DO WE COLLECT?
 
Personal information you disclose to us
 
In Short: We collect personal information that you provide to us.
 
We collect personal information that you voluntarily provide to us when you express an interest in obtaining information about us or our products and Services, when you participate in activities on the Services, or otherwise when you contact us.
 
 
Personal Information Provided by You. The personal information that we collect depends on the context of your interactions with us and the Services, the choices you make, and the products and features you use. The personal information we collect may include the following:
  • names
 
  • phone numbers
 
  • email addresses
 
  • mailing addresses
 
Sensitive Information. We do not process sensitive information.
 
 
All personal information that you provide to us must be true, complete, and accurate, and you must notify us of any changes to such personal information.
 
 
2. HOW DO WE PROCESS YOUR INFORMATION?
 
In Short: We process your information to provide, improve, and administer our Services, communicate with you, for security and fraud prevention, and to comply with law. We may also process your information for other purposes with your consent.
 

We process your personal information for a variety of reasons, depending on how you interact with our Services, including:

 
  • To deliver and facilitate delivery of services to the user. We may process your information to provide you with the requested service.
 
  • To respond to user inquiries/offer support to users. We may process your information to respond to your inquiries and solve any potential issues you might have with the requested service.
 
  • To send administrative information to you. We may process your information to send you details about our products and services, changes to our terms and policies, and other similar information.
  • To enable user-to-user communications. We may process your information if you choose to use any of our offerings that allow for communication with another user.
 
  • To save or protect an individual’s vital interest. We may process your information when necessary to save or protect an individual’s vital interest, such as to prevent harm.
 
 
3. WHAT LEGAL BASES DO WE RELY ON TO PROCESS YOUR INFORMATION?
 
In Short: We only process your personal information when we believe it is necessary and we have a valid legal reason (i.e., legal basis) to do so under applicable law, like with your consent, to comply with laws, to provide you with services to enter into or fulfill our contractual obligations, to protect your rights, or to fulfill our legitimate business interests.
 
If you are located in the EU or UK, this section applies to you.
 
The General Data Protection Regulation (GDPR) and UK GDPR require us to explain the valid legal bases we rely on in order to process your personal information. As such, we may rely on the following legal bases to process your personal information:
  • Consent. We may process your information if you have given us permission (i.e., consent) to use your personal information for a specific purpose. You can withdraw your consent at any time. Click here to learn more.
 
  • Performance of a Contract. We may process your personal information when we believe it is necessary to fulfill our contractual obligations to you, including providing our Services or at your request prior to entering into a contract with you.
 
  • Legal Obligations. We may process your information where we believe it is necessary for compliance with our legal obligations, such as to cooperate with a law enforcement body or regulatory agency, exercise or defend our legal rights, or disclose your information as evidence in litigation in which we are involved.
 
  • Vital Interests. We may process your information where we believe it is necessary to protect your vital interests or the vital interests of a third party, such as situations involving potential threats to the safety of any person.
 
 
If you are located in Canada, this section applies to you.
 
We may process your information if you have given us specific permission (i.e., express consent) to use your personal information for a specific purpose, or in situations where your permission can be inferred (i.e., implied consent). You can withdraw your consent at any time. Click here to learn more.
 
In some exceptional cases, we may be legally permitted under applicable law to process your information without your consent, including, for example:
  • If collection is clearly in the interests of an individual and consent cannot be obtained in a timely way
 
  • For investigations and fraud detection and prevention
 
  • For business transactions provided certain conditions are met
 
  • If it is contained in a witness statement and the collection is necessary to assess, process, or settle an insurance claim
 
  • For identifying injured, ill, or deceased persons and communicating with next of kin
 
  • If we have reasonable grounds to believe an individual has been, is, or may be victim of financial abuse
 
  • If it is reasonable to expect collection and use with consent would compromise the availability or the accuracy of the information and the collection is reasonable for purposes related to investigating a breach of an agreement or a contravention of the laws of Canada or a province
 
  • If disclosure is required to comply with a subpoena, warrant, court order, or rules of the court relating to the production of records
 
  • If it was produced by an individual in the course of their employment, business, or profession and the collection is consistent with the purposes for which the information was produced
 
  • If the collection is solely for journalistic, artistic, or literary purposes
 
  • If the information is publicly available and is specified by the regulations
 
 
4. WHEN AND WITH WHOM DO WE SHARE YOUR PERSONAL INFORMATION?
 
In Short: We may share information in specific situations described in this section and/or with the following third parties.
 
 
We may need to share your personal information in the following situations:
  • Business Transfers. We may share or transfer your information in connection with, or during negotiations of, any merger, sale of company assets, financing, or acquisition of all or a portion of our business to another company.
 
  • Affiliates. We may share your information with our affiliates, in which case we will require those affiliates to honor this privacy notice. Affiliates include our parent company and any subsidiaries, joint venture partners, or other companies that we control or that are under common control with us.
 
 
5. DO WE USE COOKIES AND OTHER TRACKING TECHNOLOGIES?
 
In Short: We may use cookies and other tracking technologies to collect and store your information.
 
We may use cookies and similar tracking technologies (like web beacons and pixels) to access or store information. Specific information about how we use such technologies and how you can refuse certain cookies is set out in our Cookie Notice: https://gladiium.com/.
 
6. HOW LONG DO WE KEEP YOUR INFORMATION?
 
In Short: We keep your information for as long as necessary to fulfill the purposes outlined in this privacy notice unless otherwise required by law.
 
We will only keep your personal information for as long as it is necessary for the purposes set out in this privacy notice, unless a longer retention period is required or permitted by law (such as tax, accounting, or other legal requirements).
 
When we have no ongoing legitimate business need to process your personal information, we will either delete or anonymize such information, or, if this is not possible (for example, because your personal information has been stored in backup archives), then we will securely store your personal information and isolate it from any further processing until deletion is possible.
 
7. HOW DO WE KEEP YOUR INFORMATION SAFE?
 
In Short: We aim to protect your personal information through a system of organizational and technical security measures.
 
We have implemented appropriate and reasonable technical and organizational security measures designed to protect the security of any personal information we process. However, despite our safeguards and efforts to secure your information, no electronic transmission over the Internet or information storage technology can be guaranteed to be 100% secure, so we cannot promise or guarantee that hackers, cybercriminals, or other unauthorized third parties will not be able to defeat our security and improperly collect, access, steal, or modify your information. Although we will do our best to protect your personal information, transmission of personal information to and from our Services is at your own risk. You should only access the Services within a secure environment.
 
8. DO WE COLLECT INFORMATION FROM MINORS?
 
In Short: We do not knowingly collect data from or market to children under 18 years of age.
 
We do not knowingly solicit data from or market to children under 18 years of age. By using the Services, you represent that you are at least 18 or that you are the parent or guardian of such a minor and consent to such minor dependent’s use of the Services. If we learn that personal information from users less than 18 years of age has been collected, we will deactivate the account and take reasonable measures to promptly delete such data from our records. If you become aware of any data we may have collected from children under age 18, please contact us at [email protected].
 
9. WHAT ARE YOUR PRIVACY RIGHTS?
 
In Short: In some regions, such as the European Economic Area (EEA), United Kingdom (UK), and Canada, you have rights that allow you greater access to and control over your personal information. You may review, change, or terminate your account at any time.
 
In some regions (like the EEA, UK, and Canada), you have certain rights under applicable data protection laws. These may include the right (i) to request access and obtain a copy of your personal information, (ii) to request rectification or erasure; (iii) to restrict the processing of your personal information; and (iv) if applicable, to data portability. In certain circumstances, you may also have the right to object to the processing of your personal information. You can make such a request by contacting us by using the contact details provided in the section “HOW CAN YOU CONTACT US ABOUT THIS NOTICE?” below.
 
We will consider and act upon any request in accordance with applicable data protection laws.
 
If you are located in the EEA or UK and you believe we are unlawfully processing your personal information, you also have the right to complain to your local data protection supervisory authority. You can find their contact details here: https://ec.europa.eu/justice/data-protection/bodies/authorities/index_en.htm.
 
If you are located in Switzerland, the contact details for the data protection authorities are available here: https://www.edoeb.admin.ch/edoeb/en/home.html.
 
Withdrawing your consent: If we are relying on your consent to process your personal information, which may be express and/or implied consent depending on the applicable law, you have the right to withdraw your consent at any time. You can withdraw your consent at any time by contacting us by using the contact details provided in the section “HOW CAN YOU CONTACT US ABOUT THIS NOTICE?” below.
 
However, please note that this will not affect the lawfulness of the processing before its withdrawal nor, when applicable law allows, will it affect the processing of your personal information conducted in reliance on lawful processing grounds other than consent.
 
Opting out of marketing and promotional communications: You can unsubscribe from our marketing and promotional communications at any time by clicking on the unsubscribe link in the emails that we send, or by contacting us using the details provided in the section “HOW CAN YOU CONTACT US ABOUT THIS NOTICE?” below. You will then be removed from the marketing lists. However, we may still communicate with you — for example, to send you service-related messages that are necessary for the administration and use of your account, to respond to service requests, or for other non-marketing purposes.
 
Cookies and similar technologies: Most Web browsers are set to accept cookies by default. If you prefer, you can usually choose to set your browser to remove cookies and to reject cookies. If you choose to remove cookies or reject cookies, this could affect certain features or services of our Services. To opt out of interest-based advertising by advertisers on our Services visit http://www.aboutads.info/choices/. For further information, please see our Cookie Notice: https://gladiium.com/.
 
If you have questions or comments about your privacy rights, you may email us at [email protected].
 
10. CONTROLS FOR DO-NOT-TRACK FEATURES
 
Most web browsers and some mobile operating systems and mobile applications include a Do-Not-Track (“DNT”) feature or setting you can activate to signal your privacy preference not to have data about your online browsing activities monitored and collected. At this stage no uniform technology standard for recognizing and implementing DNT signals has been finalized. As such, we do not currently respond to DNT browser signals or any other mechanism that automatically communicates your choice not to be tracked online. If a standard for online tracking is adopted that we must follow in the future, we will inform you about that practice in a revised version of this privacy notice.
 
11. DO CALIFORNIA RESIDENTS HAVE SPECIFIC PRIVACY RIGHTS?
 
In Short: Yes, if you are a resident of California, you are granted specific rights regarding access to your personal information.
 
California Civil Code Section 1798.83, also known as the “Shine The Light” law, permits our users who are California residents to request and obtain from us, once a year and free of charge, information about categories of personal information (if any) we disclosed to third parties for direct marketing purposes and the names and addresses of all third parties with which we shared personal information in the immediately preceding calendar year. If you are a California resident and would like to make such a request, please submit your request in writing to us using the contact information provided below.
 
If you are under 18 years of age, reside in California, and have a registered account with Services, you have the right to request removal of unwanted data that you publicly post on the Services. To request removal of such data, please contact us using the contact information provided below and include the email address associated with your account and a statement that you reside in California. We will make sure the data is not publicly displayed on the Services, but please be aware that the data may not be completely or comprehensively removed from all our systems (e.g., backups, etc.).
 
CCPA Privacy Notice
 
The California Code of Regulations defines a “resident” as:
 
(1) every individual who is in the State of California for other than a temporary or transitory purpose and
(2) every individual who is domiciled in the State of California who is outside the State of California for a temporary or transitory purpose
 
All other individuals are defined as “non-residents.”
 
If this definition of “resident” applies to you, we must adhere to certain rights and obligations regarding your personal information.
 
What categories of personal information do we collect?
 
We have collected the following categories of personal information in the past twelve (12) months:
 
CategoryExamplesCollected
A. Identifiers
Contact details, such as real name, alias, postal address, telephone or mobile contact number, unique personal identifier, online identifier, Internet Protocol address, email address, and account name
 
NO
 
B. Personal information categories listed in the California Customer Records statute
Name, contact information, education, employment, employment history, and financial information
 
NO
 
C. Protected classification characteristics under California or federal law
Gender and date of birth
 
NO
 
D. Commercial information
Transaction information, purchase history, financial details, and payment information
 
NO
 
E. Biometric information
Fingerprints and voiceprints
 
NO
 
F. Internet or other similar network activity
Browsing history, search history, online behavior, interest data, and interactions with our and other websites, applications, systems, and advertisements
 
NO
 
G. Geolocation data
Device location
 
NO
 
H. Audio, electronic, visual, thermal, olfactory, or similar information
Images and audio, video or call recordings created in connection with our business activities
 
NO
 
I. Professional or employment-related information
Business contact details in order to provide you our Services at a business level or job title, work history, and professional qualifications if you apply for a job with us
 
YES
 
J. Education Information
Student records and directory information
 
NO
 
K. Inferences drawn from other personal information
Inferences drawn from any of the collected personal information listed above to create a profile or summary about, for example, an individual’s preferences and characteristics
 
NO
 
 
 
We may also collect other personal information outside of these categories through instances where you interact with us in person, online, or by phone or mail in the context of:
  • Receiving help through our customer support channels;
 
  • Participation in customer surveys or contests; and
 
  • Facilitation in the delivery of our Services and to respond to your inquiries.
How do we use and share your personal information?
 
More information about our data collection and sharing practices can be found in this privacy notice and our Cookie Notice: https://gladiium.com/.
 
You may contact us by email at [email protected], or by referring to the contact details at the bottom of this document.
 
If you are using an authorized agent to exercise your right to opt out we may deny a request if the authorized agent does not submit proof that they have been validly authorized to act on your behalf.
 
Will your information be shared with anyone else?
 
We may disclose your personal information with our service providers pursuant to a written contract between us and each service provider. Each service provider is a for-profit entity that processes the information on our behalf.
 
We may use your personal information for our own business purposes, such as for undertaking internal research for technological development and demonstration. This is not considered to be “selling” of your personal information.
 
GLADiiUM Technology Partners, Inc has not disclosed or sold any personal information to third parties for a business or commercial purpose in the preceding twelve (12) months. GLADiiUM Technology Partners, Inc will not sell personal information in the future belonging to website visitors, users, and other consumers.
 
Your rights with respect to your personal data
 
Right to request deletion of the data — Request to delete
 
You can ask for the deletion of your personal information. If you ask us to delete your personal information, we will respect your request and delete your personal information, subject to certain exceptions provided by law, such as (but not limited to) the exercise by another consumer of his or her right to free speech, our compliance requirements resulting from a legal obligation, or any processing that may be required to protect against illegal activities.
 
Right to be informed — Request to know
 
Depending on the circumstances, you have a right to know:
  • whether we collect and use your personal information;
 
  • the categories of personal information that we collect;
 
  • the purposes for which the collected personal information is used;
 
  • whether we sell your personal information to third parties;
 
  • the categories of personal information that we sold or disclosed for a business purpose;
 
  • the categories of third parties to whom the personal information was sold or disclosed for a business purpose; and
 
  • the business or commercial purpose for collecting or selling personal information.
In accordance with applicable law, we are not obligated to provide or delete consumer information that is de-identified in response to a consumer request or to re-identify individual data to verify a consumer request.
 
Right to Non-Discrimination for the Exercise of a Consumer’s Privacy Rights
 
We will not discriminate against you if you exercise your privacy rights.
 
Verification process
 
Upon receiving your request, we will need to verify your identity to determine you are the same person about whom we have the information in our system. These verification efforts require us to ask you to provide information so that we can match it with information you have previously provided us. For instance, depending on the type of request you submit, we may ask you to provide certain information so that we can match the information you provide with the information we already have on file, or we may contact you through a communication method (e.g., phone or email) that you have previously provided to us. We may also use other verification methods as the circumstances dictate.
 
We will only use personal information provided in your request to verify your identity or authority to make the request. To the extent possible, we will avoid requesting additional information from you for the purposes of verification. However, if we cannot verify your identity from the information already maintained by us, we may request that you provide additional information for the purposes of verifying your identity and for security or fraud-prevention purposes. We will delete such additionally provided information as soon as we finish verifying you.
 
Other privacy rights
 
  • You may object to the processing of your personal information.
 
  • You may request correction of your personal data if it is incorrect or no longer relevant, or ask to restrict the processing of the information.
 
  • You can designate an authorized agent to make a request under the CCPA on your behalf. We may deny a request from an authorized agent that does not submit proof that they have been validly authorized to act on your behalf in accordance with the CCPA.
 
  • You may request to opt out from future selling of your personal information to third parties. Upon receiving an opt-out request, we will act upon the request as soon as feasibly possible, but no later than fifteen (15) days from the date of the request submission.
To exercise these rights, you can contact us by email at [email protected], or by referring to the contact details at the bottom of this document. If you have a complaint about how we handle your data, we would like to hear from you.
 
12. DO WE MAKE UPDATES TO THIS NOTICE?
 
In Short: Yes, we will update this notice as necessary to stay compliant with relevant laws.
 
We may update this privacy notice from time to time. The updated version will be indicated by an updated “Revised” date and the updated version will be effective as soon as it is accessible. If we make material changes to this privacy notice, we may notify you either by prominently posting a notice of such changes or by directly sending you a notification. We encourage you to review this privacy notice frequently to be informed of how we are protecting your information.
 
13. HOW CAN YOU CONTACT US ABOUT THIS NOTICE?
 
If you have questions or comments about this notice, you may email us at [email protected] or by post to:
 
GLADiiUM Technology Partners, Inc
95 Merrick Way, 3rd Floor
Coral Gables, FL 33134
United States
 
14. HOW CAN YOU REVIEW, UPDATE, OR DELETE THE DATA WE COLLECT FROM YOU?
 
You have the right to request access to the personal information we collect from you, change that information, or delete it. To request to review, update, or delete your personal information, please submit a request form by clicking here.
This privacy policy was created using Termly’s Privacy Policy Generator.