Welcome to 1600 Cyber
These terms and conditions outline the rules and regulations for the use of 1600 Cyber's Website and Cybersecurity Training Services.1600 Cyber GmbH, 1600 Cyber London Limited, 1600 Cyber America hereby doing business as 1600 Cyber (the “Company”) provides Cyber consultancy, Cyber solution and Cyber training for users all over the world.
​
1600 Cyber GmbH is located at: Friedrich-Ebert-Anlage 36, Frankfurt, Germany 60325, Germany, and 1600 Cyber Ltd is located at: 160 Kemp House, City Road, London, EC1V 2NX, and 1600 Cyber America located at 355 S. Grand Avenue, Los Angeles, CA 90071.
​
Throughout the website (www.1600cyber.com), the terms “we”, “us” and “our” refer to 1600 Cyber.
By visiting our website and/or purchasing something from us, you engage in our “service” and agree to be bound by the following Terms (the “Terms”). These Terms apply to all users of the website, including without limitation users who are browsers and/or customers.
​
Please read these Terms carefully before accessing or using our website. By accessing or using any part of the website, you agree to be bound by these Terms. If you do not agree to all the terms of this agreement, then you may not access the website or use any service.
​
Any new features or tools which are added to the current platform shall also be subject to the Terms. You can review the most current version of the Terms at any time on this page. We reserve the right to update, change or replace any part of these Terms by posting updates and/or changes to our website. It is your responsibility to check this page periodically for changes. Your continued use of or access to the website following the posting of any changes constitutes acceptance of those changes.
​
DEFINITIONS
Company: When the terms mention “Company,” “we,” “us,” or “our,” it refers to 1600 Cyber that is responsible for the information under this Agreement.
User: Means any person who accesses 1600 Cyber Platform.
Service: Refers to the service provided by 1600 Cyber and Third-party service as described in the relative Agreement.
Customer Refers to the User who accesses our platform (The “Website”) and purchases any products or service with us.
​
Intellectual Property Rights: Means (without limitation) any patents, rights to inventions, copyright and related rights, trade-marks and service marks, goodwill and the right to sue for passing off, rights in designs, rights in computer software, database rights, rights to use, in each case whether registered or unregistered and including all applications and rights to apply for and be granted, renewals or extensions of, and rights to claim priority from, such rights and all similar or equivalent rights or forms of protection which subsist or will subsist now or in the future in any part of the world.
Terms: This agreement set out in this document.
Platform: Computing framework on which applications may be run.
System: Is a collection of entities (hardware, software and liveware) that are designed to receive, process, manage and present information in a meaningful format.
Personal Information: Personal data, also known as personally identifiable information (PII) is any information relating to an identifiable person. For example, an individual’s name, signature, address, phone number or date of birth.
Notification: The email/push sent from 1600 Cyber to a customer.
Website: www.1600cyber.com
​
GENERAL RESTRICTIONS
You represent, warrant, and agree that you will not use the Website, interact with the service, in a manner that:
(a) Infringes or violates the intellectual property rights or any other rights of anyone else;
(b) Violates any law;
(c) Is harmful, fraudulent, deceptive, threatening, harassing, defamatory, obscene, or otherwise objectionable;
(d) Jeopardizes the security of your 1600 Cyber account or anyone else’s (such as allowing someone else to log in to the service as you);
(e) Attempts, in any manner, to obtain the password, account, or other security information from any other user;
(f) Violates the security of any computer network, or cracks any passwords or security encryption codes;
(g) Runs Mail list, Listserv, any form of auto-responder or “spam” on the service, or any processes that run or are activated while you are not logged into the service, or that otherwise interfere with the proper working of the service (including by placing an unreasonable load on the service’ infrastructure);
(h) “Crawls,” “scrapes,” or “spiders” any page, data, or portion of or relating to the service or Content (through use of manual or automated means);
(i) Copies or stores any significant portion of the Content; or
(j) Decompiles, reverse engineers, or otherwise attempts to obtain the source code or underlying ideas or information of or relating to the service.
A VIOLATION OF THE FOREGOING IS GROUNDS FOR TERMINATION OF YOUR RIGHT TO USE OR ACCESS THE SERVICE.
​
GENERAL CONDITIONS
We reserve the right to refuse service to anyone for any reason at any time. You understand that your content (not including credit card information), may be transferred unencrypted and involve (a) transmissions over various networks; and (b) changes to conform and adapt to technical requirements of connecting networks or devices.
Credit card information is always encrypted during transfer over networks. You agree not to reproduce, duplicate, copy, sell, resell or exploit any portion of the service, use of the service, or access to the service or any contact on the website through which the service is provided, without express written permission by us. You agree not to reproduce, duplicate, copy, sell, resell or exploit any of the products on the websites, the designs, brand trademarks, registered trademarks, or brand campaigns through which the service is provided, without express written permission by us. 1600 Cyber is protected under UK Copyright Law Designs and Patents Act 1988. The headings used in this agreement are included for convenience only and will not limit or otherwise affect these Terms.
​
COMPLIANCE WITH LAW
In using the Platform, you shall comply with all applicable laws, including laws governing the protection of personally identifiable information and other laws applicable to the protection of your content.
​
LICENSE AND ACCESS
Subject to your compliance with these Terms and any Service Terms, and your payment of any applicable fees, 1600 Cyber or its content providers grant you a limited, non-exclusive, non-transferable, non-sublicensable license to access the 1600 Cyber Website and make personal and non-commercial use of the 1600 Cyber Services and only for intended purpose.
This license does not include any resale or commercial use of any 1600 Cyber Service, or its contents, or any Customer Content; any collection and use of any product listings, descriptions, or prices; any derivative use of any 1600 Cyber Service or its contents, or any Customer Content; any downloading, copying, or other use of account information for the benefit of any third party; or any use of data mining, robots, or similar data gathering and extraction tools.
All rights not expressly granted to you in these Terms or any Service Terms are reserved and retained by 1600 Cyber or its licensors, suppliers, publishers, rightsholders, or other content providers. No 1600 Cyber Service and Website, nor any part of any 1600 Cyber Service and Website, may be reproduced, duplicated, copied, sold, resold, visited, or otherwise exploited for any commercial purpose without express written consent of 1600 Cyber.
You may not frame or utilize framing techniques to enclose any trademark, logo, or other proprietary information (including images, text, page layout, or form) of 1600 Cyber without express written consent. You may not use any meta tags or any other “hidden text” utilizing 1600 Cyber’s name or trademarks without the express written consent of 1600 Cyber. You may not misuse the 1600 Cyber Services. You may use the 1600 Cyber Services only as permitted by law. The licenses granted by 1600 Cyber terminate if you do not comply with these Terms.
​
USE OF THIRD PARTY PLATFORM
You may connect with us via social media or other online accounts which may be connected with 1600 Cyber. If you log into 1600 Cyber via social media or another third party platform or service such as Facebook, Instagram, LinkedIn, Twitter, Reed (1600 cyber Courses & Training | reed.co.uk), you are bound by the terms and conditions of such third-party platform.
​
Notwithstanding you agree that you will not (or assist others in using) use the third party platform in ways that: (a) violate, misappropriate, or infringe the privacy, publicity, intellectual property, or other proprietary rights of any other member and/or users; (b) are illegal, obscene, defamatory, threatening, intimidating, harassing, hateful, racially, or ethnically offensive, or instigate or encourage conduct that would be illegal, or otherwise inappropriate, including promoting crimes; (c) involve publishing falsehoods, misrepresentations, or misleading statements; (d) impersonate someone; (e) involve sending illegal or impermissible communications such as bulk messaging, auto-messaging, auto-dialing, and the like; or (f) involve any non-personal use of 1600 Cyber Services unless otherwise authorized by us.
​
INTELLECTUAL PROPERTY
Ownership of 1600 Cyber Materials; Restrictions. All Intellectual Property Rights in 1600 Cyber Materials, Products, Deliverables, Documentation, and Subscriptions belong exclusively to 1600 Cyber and its licensors.
​
Customer will not (and will not allow any third party to): (i) disassemble, decompile, reverse compile, reverse engineer or attempt to discover any source code or underlying ideas or algorithms of any 1600 Cyber Materials (except to the limited extent that applicable law prohibits reverse engineering restrictions); (ii) sell, resell, distribute, sublicense or otherwise transfer, the 1600 Cyber Materials, or make the functionality of the 1600 Cyber Materials available to any other party through any means (unless otherwise 1600 Cyber has provided prior written consent), (iii) without the express prior written consent of 1600 Cyber, conduct any benchmarking or comparative study or analysis involving the 1600 Cyber Materials (“Benchmarking”) for any reason or purpose except, to the limited extent absolutely necessary, to determine the suitability of Products or Subscriptions to interoperate with Customer’s internal computer systems; (iv) disclose or publish to any third party any Benchmarking or any other information related thereto; (v) use the 1600 Cyber Materials or any Benchmarking in connection with the development of products, services or subscriptions that compete with the 1600 Cyber Materials; or (vi) reproduce, alter, modify or create derivatives of the 1600 Cyber Materials.
Between Customer and 1600 Cyber, 1600 Cyber shall retain all rights and title in and to any Indicators of Compromise 1600 Cyber developed by or for 1600 Cyber in the course of providing Subscriptions or performing Services. 1600 Cyber may audit Customer’s use of Offerings to ensure compliance with the terms of this Agreement.
​
Third Party Materials. Customer acknowledges that Products and Subscriptions may include Third Party Materials. 1600 Cyber represents that these Third Party Materials will not diminish the license rights provided herein or limit Customer’s ability to use the Products and Subscriptions in accordance with the applicable Documentation, and neither the inclusion of Third Party Materials in any Product or Subscription or use of Third Party Materials in performance of Services will create any obligation on the part of Customer to license Customer’s software or products under any open source or similar license.
​
DISCLAIMER OF LIABILITY
We are not liable, and you agree not to hold us (owners, founder, co-founders, executive team, employees, subsidiaries, affiliates, agents) responsible for any: DAMAGES FOR LOSS OF REVENUES, PROFITS, GOODWILL, USE, DATA OR OTHER INTANGIBLE LOSSES ARISING OUT OF OR RELATED TO YOUR USE OF THE WEBSITE OR THE SERVICE, REGARDLESS OF WHETHER SUCH DAMAGES ARE BASED ON CONTRACT, TORT (INCLUDING NEGLIGENCE AND STRICT LIABILITY), WARRANTY, STATUTE OR OTHERWISE.
​
The service and all products and service delivered to you through the service are (except as expressly stated by us) provided 'as is' and 'as available' for your use, without any representation, warranties or conditions of any kind, either express or implied, including all implied warranties or conditions of merchantability, merchantable quality, fitness for a particular purpose, durability, title, and non-infringement. In no case shall 1600 Cyber, our directors, officers, employees, affiliates, agents, contractors, interns, suppliers, service providers or licensors be liable for any injury, loss, claim, or any direct, indirect, incidental, punitive, special, or consequential damages of any kind, including, without limitation lost profits, lost revenue, lost savings, loss of data, replacement costs, or any similar damages, whether based in contract, tort (including negligence), strict liability or otherwise, arising from your use of any of the service or any products procured using the service, or for any other claim related in any way to your use of the service or any product, including, but not limited to, any errors or omissions in any content, or any loss or damage of any kind incurred as a result of the use of the service or any content (or product) posted, transmitted, or otherwise made available via the service, even if advised of their possibility. Because some states or jurisdictions do not allow the exclusion or the limitation of liability for consequential or incidental damages, in such states or jurisdictions, our liability shall be limited to the maximum extent permitted by law.
​
DISCLAIMER OF WARRANTIES
We disclaim all warranties, express or implied regard to this service. We do not make representations of any kind or warranties available to you through the Platform.
No oral advice or written information given by 1600 Cyber or any of its affiliates, employees, officers, directors, agents, or the like will create a warranty.
​
WITHOUT LIMITATING THE GENERALITY OF THE FOREGOING: (a) WE HAVE NO OBLIGATION TO INDEMNIFY OR DEFEND YOU AGAINST CLAIMS RELATED TO INFRINGMENT OF INTELLECTUAL PROPERTY; (b) WE DO NOT REPRESENT OR WARRANT THAT THE SYSTEM WILL PREFORM WITHOUT INTERRUPTION OR ERROR; (c) WE DO NOT REPRESENT OR WARRANT THAT THE SYSTEM IS SECURE FROM HACKING OR OTHER UNAUTHORIZED INTRUSION OR THAT YOUR CONTENT WILL REMAIN PRIVATE OR SECURE; AND (d) WE DISCLAIM ANY REPRESENTATION OR WARRANTY CONCERNING PRODUCTS OR SERVICE PROVIDED BY OTHER USERS OF THE SYSTEM OR OTHER THIRD PARTIES.
​
RISK OF EXPOSURE
You understand and agree that using/sharing content online involves risks of unauthorized disclosure or exposure and that, in submitting your content, data to or transmitting it through the system, you assume the risks. We offer no representation, warranty, or guarantee that your data will not be exposed or disclosed through the System or through errors or the actions of third parties.
The Risks exist and are dangerous in the online environment. It is important to be aware of the risks that subsist on the internet and how to minimize them:
-
Exposure to inappropriate material
-
Illegal activities
-
Harassment
-
Legal and financial risks
-
Identity theft
-
Cyberattack
-
Invasion of privacy
-
Data breach
-
Scams
​
CYBERSECURITY AND ONLINE PLATFORM DISCLAIMER
-
Cyber Security is technologies, processes, procedures and controls that are designed to protect Digital Environments from Cyber Security Incidents;
-
Cyber Security Incident is the loss or unauthorised destruction, alteration, disclosure of, access to, or control of a Digital Environment;
-
Digital Environment is information technology systems, operational technology systems, networks, internet-enabled applications or devices and the data contained within such systems.
​
We have implemented administrative, physical and technical safeguards to protect Client’s Personal information. We shall ensure that all such safeguards, including the manner in which Personal Information is collected, accessed, used, stored, processed, disposed of and disclosed, comply with applicable data protection and privacy laws, as well as the terms and conditions of this Agreement.
​
You understand and agree that sharing content online involves risks of unauthorised disclosure or exposure and that, in submitting your content to or transmitting it through the system, you assume the risks. We offer no representation, warranty, or guarantee that your content will not be exposed or disclosed through the System or through errors or the actions of third parties.
​
We are not liable, and you agree not to hold us responsible for any damages or losses arising out of or in connection with this Agreement, including, but not limited to:
-
Your use of or your inability to use our website or Site Service;
-
Delays or disruptions in our website or Site Service;
-
Viruses or other malicious software got by accessing, or linking to, our website or Site Service;
-
Glitches, bugs, errors, or inaccuracies of any kind in our website or Site Service;
-
Damage to your hardware device from the use of the Website or Site Service;
-
The content, actions, or inactions of third parties’ use of the Website or Site Service;
-
A suspension or other action taken regarding your Account;
​
INFORMATION SECURITY EXPERTS
-
Regularly we consult with our developers if urgent issues arise with the Website or if there are scheduled feature releases or upgrades.
-
Hosting company will only be asked to access the data in the Website's event being down or server issues.
-
We may consult with security experts to ensure continuous Website safety and compliance.
​
CYBERATTACK DISCLAIMER
A cyberattack is where an attacker tries to gain unauthorized access to an IT system for the purpose of theft, extortion, disruption on other nefarious reasons. Normally, a cyberattack is carried out by someone who is not, or was not, a member of your organization.
1600 Cyber strives to protect Customers against Cyberattacks. We have implemented our system with security experts; we take different types of security measures to protect our users. We are not liable for any Cyberattack, damage, or loss on the World Wide Web. You expressly agree and acknowledge that the use of the 1600 Cyber Platform is at your sole risk.
In no event will 1600 Cyber, 1600 Cyber professionals or their officers, employees, directors, parents, subsidiaries, affiliates, agents or licensors be liable for any indirect, incidental, special, consequential or exemplary damages, including but not limited to, damages for loss of revenues, profits, goodwill, use data or other intangible losses arising out of or related to your use of the Website or the service.
​
Types of Cyberattacks
-
Malware: is a type of application that can perform a variety of malicious tasks – spy on the user in other to obtain credentials or other valuable data or to cause disruption.
-
Phishing: is where the attacker tries to trick an unsuspecting victim into handing over valuable information, such as passwords, credit card details, intellectual property, and so on.
-
MITM - Man-in-the-middle-attack is where an attacker intercepts the communications between two parties in an attempt to spy on the victims, steal personal information or credentials, or perhaps alter the conversation in some way.
-
DDoS – Distributed Denial-of-Service attack – is where an attacker essentially floods a target server with traffic in an attempt to disrupt, and perhaps even bring down the target. A DDoS attack is able to leverage multiple compromised devices to bombard the target with traffic.
-
SQL injection: is a type of attack which is specific to SQL databases. The attacker can exploit the HTML form to execute queries that will create, read, modify, or delete the data stored in the database.
-
Zero-day exploit: is where cyber-criminals learn of a vulnerability that has been discovered in certain widely-used software applications and operation systems, and then target organizations who are using that software in order to exploit the vulnerability before a fix becomes available.
-
DNS tunnelling: is a sophisticated attack vector that is designed to provide attackers with persistent access to a given target. Attacker are able to insert or tunnel malware into DNS queries. The malware is used to create a persistent communication channel that most firewalls are unable to detect.
-
BEC – Business Email Compromise: is where the attacker targets specific individuals, usually an employee who has the ability to authorize financial transactions, in order to trick into transferring money into an account controlled by the attacker. BEC attacks usually involve planning and research in order to be effective.
-
Cryptojacking: is where cyber criminals compromise a user’s computer or device and use it to mine cryptocurrencies, such as Bitcoin. Organizations don’t have great visibility when it comes to this type of attack, which means that a hacker could use valuable network resources to mine a cryptocurrency without the organization having any knowledge of it.
-
Drive by Attack: A drive by download’ attack is where an unsuspecting victim visits a website which in turn infects their device with malware. The website in question could be one that is directly controlled by the attacker, or one that has been compromised. In some cases, the malware is served in content such as banners and advertisements.
-
Cross-site scripting (XSS) attacks: Cross-site scripting attacks are quite similar to SQL injection attacks, although instead of extracting data from a database, they are typically used to infect other users who visit the Website. It can happen on the comment section on a webpage.
-
Password attack: is a type of cyberattack where an attacker tries to guess or cracks a user’s password. Some examples: Brute-force attack, Dictionary attack, Rainbow table attack, Credential stuffing, Password spraying and Keylogger attack.
-
Eavesdropping attack: Sometimes referred as “snooping” or “sniffing”, an eavesdropping attack is where the attacker looks for unsecured network communications to intercept and access data that is being sent across the network.
-
AI-Powered attack: AI-powered software is able to slave machines to perform a huge DDoS attack. Also, can learn what kinds of approaches work best and adapt their attack methods accordingly. They can use intelligence feeds to quickly identify software vulnerabilities, as well as scan systems themselves for potential vulnerabilities. AI-powered attacks can work around the clock, they are fast, efficient, affordable and adaptable.
-
IOT-Based attacks: is a type of attack where an attacker goes through an IOT (internet-of-things) device and exploit target such as medical devices, security systems, smart thermometers in order to launch large-scale DDoS attacks.
​
PRIVACY POLICY
You acknowledge the collection, use, disclosure and other handling of information described in our Privacy Policy www.1600cyber.com/privacy-policy which we may update from time to time.
​
CONDUCT AND BEHAVIOUR
Without limitation other remedies, we may limit, suspend, or terminate your user account and/or access to our service, restrict or prohibit access to, and your activities on, our service, remove or demote, delay or remove hosted content, remove any special status associated with the account, reduce or eliminate any discounts, and take technical and legal steps to keep you from using our service if:
​
-
we think that you are creating problems or possible legal liabilities for us, our users, suppliers or other third parties;
-
we think that such restrictions will improve the security of the 1600 Cyber community or reduce our or another 1600 Cyber User's exposure to financial liabilities;
-
we think that you are infringing the rights of third parties;
-
we think that you are acting inconsistently with the letter or spirit of these Terms or our policies or abuse our employees or users.
​
ACCURACY, COMPLETENESS AND TIMELINESS OF INFORMATION
We are not responsible if information made available on this website is not accurate, complete or current. Any reliance on the material on this website is at your own risk. This website may contain certain historical information. Historical information, necessarily, is not current and is provided for your reference only. We reserve the right to modify the contents of this website at any time, but we have no obligation to update any information on our website. You agree that it is your responsibility to monitor changes to our website.
​
MODIFICATIONS TO THE SERVICE AND PRICES
Prices for our products are subject to change without notice. We reserve the right at any time to modify or discontinue the service (or any part or content thereof) without notice at any time. We shall not be liable to you or to any third-party for any modification, price change, suspension or discontinuance of the service.
​
ERRORS, INACCURACIES AND OMISSIONS
Occasionally there may be information on our website or in the service that contains typographical errors, inaccuracies or omissions that may relate to product descriptions, pricing, promotions, offers, product shipping charges, transit times and availability. We reserve the right to correct any errors, inaccuracies or omissions, and to change or update information or cancel orders if any information in the service or on any related website is inaccurate at any time without prior notice (including after you have submitted your order). We undertake no obligation to update, amend or clarify information in the service or on any related website, including without limitation, pricing information, except as required by law. No specified update or refresh date applied in the service or on any related website, should be taken to indicate that all information in the service or on any related website has been modified or updated.
​
INDEMNIFICATION
You agree to indemnify, defend and hold us harmless and our parent, subsidiaries, affiliates, partners, officers, directors, agents, contractors, licensors, service providers, subcontractors, suppliers, interns and employees, harmless from any claim or demand, including reasonable attorneys’ fees, made by any third-party due to or arising out of your breach of these Terms or the documents they incorporate by reference, or your violation of any law or the rights of a third-party.
​
SEVERABILITY
In the event that any provision of these Terms is determined to be unlawful, void or unenforceable, such provision shall nonetheless be enforceable to the fullest extent permitted by applicable law, and the unenforceable portion shall be deemed to be severed from these Terms, such determination shall not affect the validity and enforceability of any other remaining provisions.
​
ENTIRE AGREEMENT
The failure of us to exercise or enforce any right or provision of these Terms shall not constitute a waiver of such right or provision. These Terms and any policies or operating rules posted by us on this Website or in respect to the service constitutes the entire agreement and understanding between you and us and govern your use of the service, superseding any prior or contemporaneous agreements, communications and proposals, whether oral or written, between you and us (including, but not limited to, any prior versions of the Terms). Any ambiguities in the interpretation of these Terms shall not be construed against the drafting party.
​
GOVERNING LAW AND VENUE
Any dispute arising from these Terms and your use of the Services will be governed by and construed and enforced in accordance with the following:
-
if you are located in the United Kingdom, the laws of the United Kingdom will apply and any dispute will be resolved in the courts of London, England;
-
if you are located in the European Union, the laws of Germany will apply and any dispute will be resolved in the courts of Berlin; and
-
for all other users, the laws of the State of California (USA) will apply.
​
CHANGES TO TERMS
You can review the most current version of the Terms at any time at this page. We reserve the right, at our sole discretion, to update, change or replace any part of these Terms by posting updates and changes to our website. It is your responsibility to check our website periodically for changes. Your continued use of or access to our website or the service following the posting of any changes to these Terms constitutes acceptance of those changes.
​
CONTACT INFORMATION
Questions about this Agreement should be sent to us at info@1600cyber.com