May 5, 2022

20 Top Artificial Intelligence Trends Leading Malaysia Into The Future

The popularity of Artificial intelligence (AI) is growing at a rapid pace, especially after the pandemic. Hence, disruptive technologies such as robotics, Virtual Reality (VR), Virtual Worlds, or Artificial Intelligence (AI) are completely changing the way we used to live! Though AI is yet to touch the sky.

However, you might have come across AI technologies even today. A perfect example of AI technology is virtual assistants like Alexa, Cortana, or Siri. In Malaysia, almost all industries are able to incorporate AI for their own benefit.

McKinsey reported that around 50% of the work time in Malaysia is spent on doing tasks that are highly automatable. Therefore, the impact of AI is evident.

In Malaysia, AI alone is able to create 6 million new jobs by 2030. Thus, there is a need for long-term planning in order to execute AI technologies and to create new skill sets so that they are inculcated as the demand arises!

So, let’s have a look at the top 20 AI trends leading Malaysia into the future. Here we go!

  1. Collaboration of AI and Cloud

AI is all set to play a very important role in the adoption of cloud services in the coming years. Through AI technology, it will become easier to monitor the cloud applications and keep a thorough check on the available amount of data, no matter how big it might be. AI and the cloud will collaborate even more.

  1. IT and AI Solutions

AI solutions for the field of IT would increase in the coming years. AI solutions through which identifying the IT problem becomes easy while rectifying it thereby will see a surge in development. It will help in reducing downtime. Moreover, the organization would be able to spend most of its time in activities that are actually quite complex and require human intervention.

  1. AIOps Solutions to become extremely Popular

Due to the growth in the IT industry, the complexities of the systems have increased a lot. Therefore, the vendors are asking for platform solutions that would combine more than one monitoring discipline, for example, infrastructure, applications, or networks. IT teams would be able to redefine their processes in a better way through AIOps solutions. As AIOps solutions are incorporated, more and more cross-team coordination would be there to be seen!

  1. AI to Assist in Structuring of Data

Structuring of data is always an issue, especially when you are dealing with a large amount of data. So, machine learning processes or robotics would definitely delve in here to make the lives of Malaysians easier than ever. With the help of AI, you will forever forget the hassle of unstructured data.

  1. AI and the Growing Need for Workers

As AI is rapidly growing in terms of popularity, the skillset is missing from Malaysia. Although universities are introducing courses for AI. Yet there is a huge gap to fill due to excessive demand for skillful workers. Therefore, the government of Malaysia should launch several programs to help curb the need for an AI workforce.

  1. IT Industry and Adoption of AI

Within the IT industry, there has been rapid adoption of AI technology. In the near future, AI will be used on a large scale in the IT industry. Through AI, a company would be able to generate ROI in real-time. Hence, the companies would be able to see their progress in real-time which is one of the biggest successes for AI technology.

  1. AI Ethics on Focus

In the coming few years, AI would be used to fight against major worldwide problems, ensure economic growth, and stimulate diversity. As AI ethics are in focus, the major problems for the companies are transparency of data and fairness of algorithms.

  1. Augmented Processes to become a Reality

Augmented processes have already shown a glimpse of it. However, there is still a bigger picture out there. Hence, companies would go one step ahead in optimizing their augmented businesses. Through AI, software development processes could be made easier as well. Fostering a data-driven culture is very important for sustainable AI practices. Moreover, this trend is here to rule!

  1. AI to Become More Clear

Though AI has seen its heights. Yet a few people find it quite hard to understand the diverse subject of AI. Nonetheless, in the coming future, AI would become more explainable through a variety of modules and theories. As more and more universities would offer courses related to AI, the subject would become easier to acknowledge.

  1. Voice-Oriented and Language-Oriented AI

Voice-oriented and language-oriented AI is seen in the form of customer care. It is bound to increase its depth, delivering high-quality solutions regarding a wide variety of issues without the need of any human.

  1. AI and Security

Security issues have been increasing like a wildfire. AI is the answer to all the worries. AI technologies have been implemented on voice and face recognition methods in order to make the technology more and more secure. AI security is able to eliminate all sorts of security breaches.

  1. AI and Real-Time Video Processing

AI ensures minimum latency and high-speed video processing through which streaming achieves a whole different level. In times to come, AI would surely improve here! Real-time video processing takes a lot of time and errors occur quite often. But now all the pains related to real-time video processing would vanish. Just rely on AI technology and you will never be disappointed.

  1. AI for Content Creation

There have been a number of AI tools through which you are able to gather ideas for your next content strategy. Moreover, there have been AI tools through which you get an entire piece of content, fully customized according to your needs and requirements.

  1. AI and Chatbots

Chatbots have partially eliminated the need for humans, thanks to such powerful response of the AI. Modern AI models are able to generate text, speech, and even video. Chatbots are designed in such a way that they try to understand the problems of the people and supply an apt answer. In most cases, the chatbots correctly answer the question. Nonetheless, the technology will improve.

  1. AI and Inspection

The latest trend in AI in Malaysia is computer vision inspection. The AI technology ensures to check the products in order to find any minor or major faults in them in terms of quality standards and security compliance. The task of inspection is quite hard for human beings. Therefore, you must take advantage of the technology and give the credit where it is due!

  1. AI changing the Medical Industry

The medical industry is rapidly developing and AI is coming into play. AI-driven solutions help a lot in CT scans, lab scans, tests, prescribing medications, and in a number of other important objectives. During covid-19, AI worked flawlessly in assisting the on-site doctors. It analyzed threats and rendered quality solutions to make things work!

  1. Diversity in AI

AI has become extremely diverse. Still, there is a long way to go. There is no such gender or racial bias in AI. Every person from every part of the world is equally contributing their best efforts to AI. Moreover, the diversity in AI would only increase as the impact of AI would cross different borders.

  1. No-Coding AI Platforms

No-coding AI platforms have enabled small companies to acquire powerful technologies that were earlier only available to big companies. Developing a code takes a lot of time in writing it and then rechecking it in case of any error. However, no-code platforms have made life easier as everything happens fairly quicker than ever without any hassles. Moreover, the cost is also quite meager.

  1. AI and Cybersecurity

Cybersecurity has become a huge issue as technology is maximizing. Hacking is an inevitable problem that grows more and more. AI is playing a huge role in eliminating cyber threats by constantly analyzing the traffic, recognizing patterns, and developing smart algorithms to tackle all the cybersecurity issues. However, the problem is not fully resolved. But in times to come, the hope will only grow!

  1. AI and Autonomous Vehicles

Vehicles are also becoming smart and powerful as they no longer require the need of any human driver. cars are now becoming autonomous, thanks to AI technology. Earlier you needed a driver to drive the car and concentrate on the road. Meanwhile, he/she was not able to do anything else.

Nonetheless, nowadays there has been an influx of autonomous vehicles that are driven on their own.

And don’t worry, such cars would also save you from accidents, all thanks to AI technology.

The Bottom Line

Such AI trends have been coming into play in Malaysia and in every other part of the world. There is no stopping it. The AI trends would only increase with time and there is no doubt about that. So, while having a look at all these current trends, do let us know if you are already looking forward to the future or not?

Cybersecurity Insurance Market: Opportunities and Challenges in Malaysia

Cybersecurity is a huge concern for companies as sensitive data could be breached. Customer’s data is very important and should be kept with extreme care and protection. Technology is becoming more and more complex with each passing day. Therefore, the task of keeping the data protected becomes even harder.

In Malaysia, cyber-attacks have inflicted a huge cause of concern as identity theft has made Malaysians’ life a living hell. Every other person in Malaysia goes through a security breach once in their lifetime and it is definitely a worrisome thing to consider!

Therefore, due to the major cybersecurity issues in the country, the cybersecurity insurance market is definitely a ray of hope in times of skepticism. For Risk Management, the companies need to consider cybersecurity insurance in order to minimize the cybersecurity threats.

What is Cybersecurity Insurance?

Cybersecurity insurance or cyber liability insurance is similar to all the other types of insurance. It would protect you against the damages incurred due to the cybersecurity attacks. Within cybersecurity insurance, you will be offered with several types of packages that you can choose according to your needs.

A simple cybersecurity insurance would cover first-party, third-party, and cyber extortion. However, many other cybersecurity insurance companies would provide you with cell phone protection coverage that would constantly keep a check on cell phones or on-the-spot threat management.

Nowadays software and hardware insurance are also getting popular, considering that the hackers are always looking for one open door to make an entry.

Insurance policies vary according to the size of the company. For SMBs (Small and Medium Businesses), the policies would be different. Similarly, for mid-size and large operational businesses, the policies would be different. Hence, you need to be clearly aware regarding such things while applying for a policy.

Before getting cybersecurity insurance in Malaysia, make sure you have studied your business model in full detail. You need to think about how vulnerable your business is. Plus, you need the policy to be tailor-made according to your industry. Otherwise, there is no use getting cybersecurity insurance.

Cybersecurity Opportunities and Challenges in Malaysia

As mentioned above, there are a number of challenges faced by Malaysia in terms of cybersecurity. However, when there are challenges, there are opportunities as well for the cybersecurity insurance companies. The major challenges in cybersecurity for Malaysia are given below:

  • Bank Card Fraud: Around 88 percent of the people in Malaysia are concerned regarding their bank card being used fraudulently or other people obtaining bank card details.
  • Identity Theft: Around 87 percent are worried regarding unauthorized access to personal information.
  • Hacking/Virus: Hacking and viruses are quite common in Malaysia with 77 percent of Malaysians are concerned about unsolicited emails, viruses, phishing attacks, and hacking.

Unisys Asia conducted a survey in which it was highlighted that during 2014, the main concern for Malaysia was threats of war, terrorism, or natural disasters such as floods or earthquakes. However, now the concern for Malaysians has shifted to cybersecurity. The fear of consumers about cyber attacks is quite real. They fear their personal data being stolen and sold on the dark web or getting trapped into phishing scams. Hence, cybersecurity insurance is an opportunity to safeguard the data.

Dr. Haji Amirudin Abdul Wahab, CEO of Cybersecurity Malaysia shared that the cybersecurity concerns for Malaysia are a part of economic and national security challenges created through an online environment where everything is shared online, eliminating borders. However, being aware about the challenges provides an opportunity to tackle them in the right way and take a proactive approach to get the job done.

Therefore, Cybersecurity Malaysia always remains one step ahead in reporting cyber attacks in advance so that the companies could protect them beforehand.

Moreover, cybersecurity insurance is also a great way of nullifying the cyber threats as soon as possible!

Dr. Haji also mentioned that Malaysia lags behind in production of experts, despite a huge growth in the cybersecurity sector. During the last year, Malaysia reported a shortage of 7,917 experts. However, the country is looking forward to producing around 20,000 experts till 2025.

Also, there would be around 9,020 cybersecurity positions that would need to be filled till 2026. Thus, there is a lot of scope around the cybersecurity sector. Nonetheless, there will be a huge demand for cybersecurity graduates who are able to render quality work and fulfill the needs at this point in time.

There are a lot of vacancies within the cybersecurity insurance market that need to be filled immediately.

Nonetheless, there is still a huge vacuum left due to the unavailability of quality graduates that would be sufficient for the cybersecurity insurance market. As the technology is getting updated each day, the requirement is shifting towards producing experts that have practical knowhow rather than theory work.

The attention is given to students to work in an open environment. Rather than working to acquire skills in closed rooms. The ability to harness skills is only possible through hands-on work and applications.

Sectors in Malaysia that require Cybersecurity Insurance

As mentioned above, not every company in Malaysia would want to opt for cybersecurity insurance. However, a few important sectors that should opt for cybersecurity insurance are SMEs (Small and Medium Enterprises). SMEs are responsible for a large chunk of production of gross products in Malaysia. Hence, they are the real targets of the cyber attackers who are willing to get a single chance.

Moreover, SMEs lack a full-proof plan to tackle such attacks. Therefore, cybersecurity insurance is a MUST in such sectors. According to a study conducted by Malaysia Digital Economy Corporation (MDEC) in 2020, 79% of SMEs in Malaysia faced more than one cyber attack which is a serious cause of concern.

In Malaysia, the digital economy is boosting every other day. With the growing digital economy, the threats on the cyber environment are pretty accurate. On the other hand, SMEs are constantly adopting digital technology in order to render the best of their services. Hence, they come under a lot of scanner due to this move.

SMEs can’t be overlooked in Malaysia as they are the main source of boosting the economy. So, safe measures need to be taken through cybersecurity insurance in order to keep the economy growing.

Cybersecurity insurance sector is flourishing with each passing day. A lot of investment is being pumped into this sector as of now. The spending on the cybersecurity insurance market in 2019 was around RM10.4bil. Nonetheless, the figure is only going to increase in the upcoming years.

Benefits of acquiring Cybersecurity Insurance

There are a number of benefits that you can get through cybersecurity insurance. Especially, in Malaysia, the task is to solidify SMEs in order to create a strong network that is nearly impossible to breach. Let’s have a look at the benefits:

  • Legal Expenses

Cybersecurity insurance would assist you in covering the legal expenses. In case of a cyber-attack, you and your employees would get full coverage for the legal expenses. Often companies do not have funds to open legal cases. But a cybersecurity insurance policy would help you here so that you can offer a legal battle.

  • Loss Reimbursement

In case of a data breach, the operations of your business would be disrupted. Hence, causing you the loss of time and money. So, a cybersecurity insurance policy would reimburse the loss of income during such times. Plus, all sorts of added costs would be covered in the policy as well that are incurred due to the aftermath of the incident.

  • Defense against Cyber Extortion

As important data is stolen from the organizations, the hackers demand a huge amount of money in return for the data. Such cyber-attacks are increasing day by day. So, companies must seek to get a cyber insurance policy for their own good and to protect themselves against cyber extortion.

  • Forensic Help

While your company is under-attack, you will need to identify the root cause of the attack as well as the amount of damage done to your organization. So, the right information would make sure that your funds are quickly generated. While a few companies also offer to stay in touch with you 24/7 for constant support.

  • Coverage apart from General Cybersecurity Insurance Policy

A general cybersecurity insurance policy would provide you with several other benefits apart from a written agreement. If you ask them to provide your company with cyber coverage, you will have peace of mind for a greater part of time. In case of an attack, your company’s data would be protected as data is always worth more than physical assets or money. So, plan ahead and apply for a cybersecurity insurance policy to save yourself from huge hassles.

The Bottom Line

In Malaysia, the digital economy is booming and so are the intentions of cyber criminals. They are always looking to breach into the systems for making a fortune of their own. Never let them get away with your precious data and information. A cybersecurity insurance policy does a great job.

How Hyperscale Data Centers Move Billions of Bits of Data Every Second: A Look into Malaysia’s Hyperscale Data Centers

Hyperscale data centers are known to move billions of bits of data in a single second, making the connectivity flawless and super-fast. Talking about Malaysia, tech giants are making it clear to build humongous hyperscale data centers in Malaysia. Malaysia’s population is 32 billion with land 35% bigger than the United Kingdom. Hence, opportunities for cloud hyperscale galore here!

Already, data center providers and cloud operators such as Alibaba Cloud and Microsoft Azure are established here and are planning to expand even further.

One of the Malaysia Data Center Market Report stated that the market for data centers in Malaysia is likely to increase by $800 million in 2025. Hence, there have been constant talks regarding making Malaysia the main hub for data centers, replacing the neighbor Singapore.

However, it is yet to find out whether Malaysia is a good spot for hyperscale companies!

Is Malaysia worth it for hyperscale companies?

Henrick Choo, CEO of NTT Ltd. in Malaysia explained the importance of Malaysia in terms of making it a data center hub. He said that Malaysia is an excellent location in Southeast Asia for data centers. With abundant resources available here and relaxed governmental policies, the country seems a perfect fit for the data center infrastructure.

Apart from that, Malaysia holds another bunch of advantages such as low electricity costs, an abundance of skilled workers, cheaper construction costs, and a low price of land as compared to the other countries in Southeast Asia.

Malaysia is also a great location for NTT without any single doubt. Its data center campus has grown to five more data centers in Cyberjaya. Another data center, CBJ5 was launched just last year.

Choo also stated that the development of Multimedia Super Corridor (MSC Malaysia) and Cyberjaya especially have made an open ecosystem for the business community to grow more and more. Cyberjaya in Malaysia was developed with the thought to replicate Silicon Valley in the US.

Hyperscale & Renewable Energy

Hyperscale is definitely a demanding technology to play rightfully as it would require huge power to operate in the right manner. Hence, Chiew Kok Hin who is the CEO of AIMS highlighted the increasing number of data centers and their potential impact on the power grid.

So, he identified that hyperscalers are the main reason why companies must tap into renewable energy in order to shed the burden off the power grid. Growing power demands are not ideal for an environment.

Therefore, Malaysia’s efforts in projects of renewable energy are quite satisfying and make Malaysia a perfect place for hyperscale data centers. Currently, renewables are contributing around 18 percent to fulfilling the country’s power demands. Moreover, the authorities are planning to move the number to a whopping 31 percent by 2025 and 40 percent by 2030. Such an aggressive move will very much push the data center providers to invest in Malaysia even more.

Nonetheless, Chiew also said that Malaysia’s initiatives regarding renewable energy do look promising. But directly piping renewable energy to data centers is not an easy task.

He further added that the data center power demands increase at a rapid pace as the IT requirements are increased or colocation project activation. However, renewable energy is mostly used for pre-designed load management.

Considering these shortcomings of renewable energy, it is important to source accurate renewable energy power farms to extract energy for the data centers. While giving an example, Chiew said that solar energy varies constantly, sometimes due to rain and sometimes due to excessive cloud cover.

In order to deliver energy to the data center optimally and when it is needed, it is vital to understand that huge energy storage systems would be required to deliver when the demand is there. In this regard, hydroelectric power plants are less affected. But the locations that are fine might not be close to cities or industrial areas.

So, another solution for it is to obtain renewable energy certificates. Chiew said that they are working on obtaining certificates. He said that they are currently studying the feasibility of renewable energy by acquiring solar energy systems or by acquiring renewable energy certification that would be globally recognized in order to promote the growth and usage of renewable energy.

Malaysia Proving its Worth against its Counterpart Singapore

Singapore’s data center moratorium is responsible for the growth in the construction of data centers in Malaysia, according to both Choo and Chiew. For example, Singapore-based Bridge Data Center highlighted its intention to build a Singapore Data Center, in 2018. After 3 years of having no Singapore facility as of now, it made an announcement to build a Greenfield Facility in Malaysia in order to express approval for the two facilities that it had acquired already in Malaysia.

Choo mentioned that Singapore, undoubtedly, has been an ICT and financial hub in Southeast Asia for the past 30 years. It has been the main front for the industry. However, the demand has been constantly increasing. Cost to market, labor demands, data recovery, and network diversity, all are increasing due to which there is a need for an alternate hyperscale data center hub.

Hence, Malaysia proved its worth and ticked all the boxes to become an alternate gateway.

The welcoming environment and cost-effectiveness here in Malaysia are the primary indicators for the ability to hyperscale in Malaysia. Therefore, it is actually a good location for hyperscale data center providers to further expand their operations.

That being said, Malaysia will remain to be an alternate location in Southeast Asia and will not replace any geo-location. The goal would be to make Malaysia a complementary piece to improve a company’s overall architecture plan. Choo said.

On the other hand, Chiew praised the connectivity power of Malaysia with the rest of Southeast Asia. He said that Malaysia would complement Singapore by providing regional connections in order to meet the growing local needs.

Problems in the Connectivity

Previously, in Malaysia, the complaints about slow internet were pretty regular. The slow internet connectivity was due to a small number of submarine cables landing in Malaysia. However, the complaints regarding slow internet have been resolved to a great extent. Nonetheless, a new problem is looking to threaten the popularity of data centers in Malaysia. The problem is “Cabotage exemption”.

The problem was identified in November 2020.

Cabotage is basically the right to operate by sea, air, or other transportation in a particular territory.

States always apply cabotage in their own waters in order to safeguard their local locations. But in 2019, Malaysia applied for exemption from cabotage. Hence, foreign-flagged vessels were then allowed to repair undersea cables. It allowed us to speed up the undersea fiber projects. Plus, options and capacity were also increased beyond a single local provider to carry on the repairs every time.

Canceling the cabotage exemption would take the time back to the previous status quo. Plus, there would be a requirement for the telecoms to apply for a domestic shipping license before they start working and it can take up to 100 days.

The repeal is forced by the government as mentioned by the detractors. They said that it is Malaysia’s revenge for the exclusion from a number of subsea cables. However, the Malaysian shipowners’ Association highlighted that Malaysia’s exclusion from various subsea projects was due to the little or no investment by the local telecommunication players as they were not fully participating.

Nonetheless, the decision is yet to be taken and nothing is finalized.

A Triumph for the Region

Though Covid-19 was actually lethal in taking lives. Yet, it made clear that going digital would be the future for consumers as well as for businesses. As everyone witnessed, the digital demand increased dramatically during the pandemic. Hence, data centers started to grow in popularity.

Chinese tech giants entered Malaysia and were always looking to expand their operations worldwide.

The battle for a regional digital hub has already started. The government of Malaysia created and showcased a blueprint known as “MyDigital” to highlight itself as the regional leader in the fresh digital era.

The blueprint is all about increasing local data centers in Malaysia in order to support hyperscale cloud computing and a government-driven cloud-first strategy. Considering this fact, tech giants like Microsoft, Google, Amazon, and Telekom Malaysia were given permission to build hyperscale data centers in Malaysia.

The bottom Line

Nevertheless, considering the amazing growth in the hyperscale data centers, we can surely say that Malaysia would do extremely well in the race. Chiew stated that as Singapore’s and Malaysia’s data center capabilities would improve, so will the human resources and other technical abilities would increase. Therefore, the interconnection of skills and capabilities would make Southeast Asia grow further.

Moreover, such growth would accelerate the strength of Southeast Asia to become one of the fastest-growing markets for hyperscale data centers in the whole world. So, data would easily be handled, thanks to the hyperscale culture!

How to Secure Your Supply Chain for Cybersecurity in Malaysia?

The rising growth of technology in Malaysia has brought along cybersecurity threats that have kept on increasing with each passing day. Malaysia has gone through so much trouble in terms of cybersecurity that this concern has surpassed the concern of physical threats. Malaysians are now quite skeptical about sharing their personal information through the mediums of the internet.

Accenture Malaysia conducted a survey in which it was highlighted that around 40% of security breaches are indirect. Such breaches take place due to weak links in the supply chain and in the overall business world.

The main problem regarding supply chain attacks is that they are often overlooked. However, if enough time is given to the hackers, there could be massive destruction. Such attacks target vendors and suppliers instead of targeting the whole business.

Therefore, it becomes quite hard to detect and eliminate such attacks, especially when the vendors or the suppliers have not adopted promising cybersecurity practices, completely annulling the use of modern tools to fight cyber-attacks.

One of the examples of a supply chain cyber attack is the SITA data breach in which more than 580,000 records were exposed from Malaysia Airlines’ Frequent Flyer program. Finnair, Air New Zealand, and many other airlines reported similar attacks, exposing a large number of records of the consumers.

Singapore Airlines shared data with a company known as Star Alliance. It was the place from where the cyber-attack on the supply chain originated, making the entire supply chain vulnerable.

There are a number of similar supply chain cyber-attacks that have wreaked havoc on businesses.

What is a Supply Chain Cyber-Attack?

There are quite a few names of a supply chain attack such as a third-party attack, value-chain attack, or backdoor breach. Having said that, a supply chain attack is when an attacker is able to access a certain business through indirect channels such as vendors or suppliers or the supply chain.

Sometimes, supply chains could be quite huge. Therefore, it becomes difficult to trace the attackers.

In the past, an unsecured supplier or the vendor in a supply chain was the main culprit that was the reason for the initiation of a supply chain cyber-attack. Nonetheless, today, software supply chain cyber-attacks pose the greatest concern. The software supply chains are quite susceptible to attacks because modern software is not written from scratch.

Instead, open-source code or third-party APIs are taken into account in order to save time. But it can prove to be very dangerous for an entire supply chain.

Today, a single software project consists of around 203 dependencies. So, if any of the apps consist of even one of the compromised dependencies, then any business who would download the app from that vendor will be exposed to a cyber-attack. Hence, the number of victims grows like this!

Moreover, the software is reused. Therefore, the vulnerability would exist till the lifecycle of the software.

How Do You Detect and Stop a Supply Chain Cyber-Attack?

In December 2021, a total of 10,016 cases of cyber-attacks were reported to Cyber999. Cyber999 is a cyber security incident response center that is operated by MyCERT (Malaysia Computer Emergency Response Team). According to another study, it was highlighted that Malaysia could lose around RM51 billion from 2020-to 2024 due to cybersecurity threats. Such a huge figure makes up around 4% of the total GDP of Malaysia.

It is actually quite concerning to witness cyber-attackers spread everywhere, especially within businesses.

Ubaid Mustafa Qadri, Head of Technology Risk & Cyber Security at KPMG in Malaysia said that persistent threats, ransomware attacks, supply chain cyber-attacks, or anything new can come in with which one could struggle to emerge. So, lack of foresightedness and being reactive to the cyber-threat is actually way more dangerous than the actual threat.

Thus, it is important to have a plan ready so that it could be tested against a variety of scenarios in order to understand the impact of the attack on your business.

Having said that, let’s understand how to detect and stop the supply chain cyber-attack through a few handy measures. Here we go!

  • Consider Speed as the Primary Factor

Speed matters! It does matter a lot! If the speed is enough to anticipate, detect, and stop the supply chain cyber-attack then no one can stop you from becoming the best in business in the whole globe!

Speed is that X-factor that separates your business from other players in the game. While a few of the supply chain cybersecurity policies term strength as the major factor, the majority of the practices would always put speed on number one. According to Accenture Malaysia, the cybersecurity leaders take around 15 days or less in order to identify and plug the security breaches.

Visibility, focus, and agility are the main indicators of rapid threat detection.

Moreover, through these indicators, both the buyers and the vendors can measure their abilities in a good manner.

The approach should always be proactive rather than reactive so that vulnerabilities are identified and eliminated thereby. While businesses that rely on a reactive approach are fairly slow and ineffective.

  • Put Focus on Value

Now, Malaysian businesses are quite scared of cybersecurity threats. However, they should be smart enough to find out the value of money. Rather than investing with close eyes. When businesses make cyber investments without thinking twice, they automatically increase their hopes and are left shattered.

Hiscox indicated that businesses around the world have witnessed an increase in cyber security spending of 39% between 2019 and 2020.

With investments increasing rapidly, the businesses need to ensure whether their spent money was worth it or not.

Accenture Malaysia reported that 69% of the businesses feel that the growth in costs would be unsustainable in the long term. Achieving targeted results is more vital than investing money here and there.

The task should be to create effective tools that are able to identify the vulnerabilities in prior throughout the entire supply chain so that applicable measures are taken to safeguard the supply chain.

  • Set a Momentum

When everything goes right, there is always a desire to add more and more tools to the arsenal. Nonetheless, the leading organizations always focus on maintaining momentum. They do not tend to go with the flow. Instead, they focus on their budget to make sure that they are aligned with it.

It is the art of doing the basics right when the time is right! The supply chain cyber-attacks have become more sophisticated. Therefore, the need of the hour is to understand the fundamentals because solutions always lie within the fundamentals, for example, securing the customer database.

It is very important to address the consequences of cybersecurity within the supply chain. If you ignore them, you are likely to come across prolonged damage. Moreover, if a supply chain data breach is ignored, your business would lose a huge amount of money.

  • Get in touch with the Suppliers within the Supply Chain

Within the supply chain, the main entity is the supplier. So, working in coordination with the supplier at key levels would make sure to achieve the goals without any major hiccups. Coming across anyone who produces, manufactures, organizes, or supplies the goods is a vital step in getting to know more about the supply chain.

Businesses in Malaysia are ensuring to meet the suppliers physically. Hence, the auditing has been quite strict so that the suppliers are taking quality measures in terms of cybersecurity to prevent any minor or major cyber-attacks.

Businesses in Malaysia are in constant talks with the suppliers to demonstrate the results themselves.

Sometimes, even supply chains are not obvious. If your HVAC system consists of embedded IoT devices, then the vendor would have been refreshing the firmware on a regular basis. So, the vendor and the refreshes also become a part of your supply chain, even if you don’t consider it that way!

  • Make it a Priority to Identify Vulnerabilities

The priority should be to identify the vulnerabilities within a supply chain. The first and foremost task is to identify and then eliminate immediately without wasting any more time. Make sure that you have a separate staff to look over the supply chain every once in a while.

The staff must be funded and trained specifically to eliminate the vulnerabilities right when they are in their infancy. Otherwise, delaying cyber-attacks could prove to be worse than anything!

Today, cybersecurity is a very important domain that can’t be overlooked in any case. So, make sure to prioritize where it is necessary and give your due time and effort.

The Bottom Line

In the end, it is important to note that Malaysia is growing immensely in digitizing businesses, all thanks to the pandemic. However, with the growth in the digital economy of the country, the focus should be on securing the supply chain in the best manner possible. The business owners in Malaysia should take active measures to learn about cybersecurity challenges and make it their habit to control the system in an optimal manner.

TERMS AND CONDITIONS

This Agreement was last revised on Oct 15th, 2020.

Contents

Introduction

https://edxevents.com/ welcomes you.

We offer you access to our services through our “Website” (defined below) subject to the following Terms of this agreement, which may be updated by us from time to time with or without notice to you.  By accessing and using this Website, you acknowledge that you have read, understood, and agree to be lawfully bound by these terms and conditions and our Privacy Policy, which are hereby incorporated by reference (collectively, this “Agreement”). In case you do not agree with any of these terms, then please do not use the Website. 

Definitions

  • Agreement” denotes to this Terms and Conditions and the Privacy Policy and other documents provided to you by the Website; 
  • User”, “You” and “your” denotes the person who is accessing it to take any service from us. User shall include the company, partnership, sole trader, person, body corporate or association taking services of this Website;
  • Customer” refers to the user who accesses the website and makes the payment for purchasing services or availing services;
  • We”, “us”, “our” and “Company” are references to EDX PTE LTD;   
  • Website” shall mean and include “https://edxevents.com/“, and any successor Website of the Company or any of its affiliates;
  • Customer Account” shall mean an electronic account opened for the customer for availing various services offered on the website;

Interpretation

  • All references to the singular include the plural and vice versa and the word “includes” should be construed as “without limitation”.
  • Words importing any gender shall include all the other genders.
  • Reference to any statute, ordinance, or other law includes all regulations and other instruments and all consolidations, amendments, re-enactments or replacements for the time being in force.
  • All headings, bold typing, and italics (if any) have been inserted for convenience of reference only and do not define, limit or affect the meaning or interpretation of the terms of this Agreement.

Introduction and Scope

  • Scope. These Terms govern your use of the Website and the Services. Except as otherwise specified, these Terms do not apply to Third-Party Products or Services, which are governed by their terms of service.
  • Eligibility: Certain Service of the Website is not available to minors under the age of 13 or to any users suspended or removed from the system by us for any reason.
  • Electronic Communication:When you use this Website or send e-mails and other electronic communications from your desktop or mobile device to us, you are communicating with us electronically. By sending, you agree to receive a reply from us electronically in the same format and you can keep copies of these communications for your records.

Services

At https://edxevents.com/, we offer a meticulously designed website where we are offering cooperate events company for senior decision-makers.

Modifications to the Service

We reserve the right, in our discretion, to change, modify, add to, or remove portions of the Terms (collectively, “Changes”), at any time. We may notify you of changes by sending an email to the address identified in your Account or by posting a revised version of the Terms incorporating the changes to its Website.

Account

For accessing the website and using certain Resources, you may be required to provide specific information and to create a user ID and password to establish an account.

You accept that the details you provide about establishing an account are correct and that you will keep your details up-to-date. You are responsible for the security of all of your user names, passwords, and registration information (such as unique account identifiers or historical billing information), and you are solely responsible for any use (authorized or not) of your accounts. You agree to notify us immediately about any unauthorized activity regarding any of your accounts or other breaches of security. We may at our discretion suspend or terminate any of your usernames and passwords at any time with or without notice.

User Content

Content Responsibility.

The website permits you to post comments, feedback, etc. but you are solely responsible for the content posted by you. You represent that you have required permission to use the content.

When posting content to the website, please do not post content that:

  • contains ill-mannered, profane, abusive, racist or hateful language or expressions, text, photographs or illustrations that are pornographic or in poor taste, inflammatory attacks of a personal, racial or religious nature;
  • is defamatory, threatening, disparaging, grossly inflammatory, false, misleading, fraudulent, inaccurate, unfair, contains gross exaggeration or unsubstantiated claims;
  • violates the privacy rights of any third party, is unreasonably harmful or offensive to any individual or community;
  • discriminates on the grounds of race, religion, national origin, gender, age, marital status, sexual orientation or disability, or refers to such matters in any manner prohibited by law;
  • violates or inappropriately encourages the violation of any municipal, state, federal, or international law, rule, regulation, or ordinance;
  • uses or attempts to use another’s account, password, service or system except as expressly permitted by the Terms of use uploads or transmits viruses or other harmful, disruptive, or destructive files;
  • sends repeated messages related to another user and/or makes derogatory or offensive comments about another individual or repeats prior posting of the same message under multiple emails or subjects.
  • Any submitted content will be refused by us. If repeated violations occur, we reserve the right to cancel user access to the website without advanced notice.

General Conditions

  • We do not guarantee the accuracy, completeness, validity, or timeliness of products listed by us.
  • We make material changes to these terms of service from time to time, we may notify you either by prominently posting a notice of such changes or via email communication.
  • The website is licensed to you on a limited, non-exclusive, non-transferrable, non-sublicensable basis, solely to be used in connection with the Service for your private, personal, non-commercial use, subject to all the terms and conditions of this Agreement as they apply to the Service.

Geographic Restriction

  • We reserve the right, to limit the usage or supply of any service to any person, geographic region, or jurisdiction. We may use this right as per the necessity. We reserve the right to suspend any Service at any time. Any offer to provide any Service made on this Website is invalid where banned.

User Responsibilities

    • You shall use the Service and Website for a lawful purpose and comply with all the applicable laws while using the Website;
    • You shall not use or access the Website for collecting any market research for some competing business;
    • You shall not misrepresent or personate any person or entity for any false or illegal purpose;
    • You shall not use any virus, hacking tool for interfering in the operation of the Website or data and files of the Website;
    • You will not use any device, scraper, or any automated thing to access the Website for any means without taking permission.
    • You will inform us about anything that is inappropriate or  you can inform us if you find something illegal;
    • You will not interfere with or try to interrupt the proper operation of the Website through the use of any virus, device, information collection or transmission mechanism, software or routine, or access or try to gain access to any data, files, or passwords connected to the Website through hacking, password or data mining, or any other means;
    • You will not cover, obscure, block, or in any way interfere with any advertisements and/or safety features (e.g., report abuse button) on the Website;   
    • You will not take any action that levies or may levy (in our sole decision) an unreasonable or unreasonably big load on our technical arrangement; and
    • You will let us know about the unsuitable content of which you become aware.  If you discover something that infringes any law, please let us know, and we’ll review it.

    We reserve the right, in our sole and absolute discretion, to deny you access to the Website or any service, or any portion of the Website or service, without notice, and to remove any content.

No Responsibility

We are not responsible to you for:

      • any reliance that you may place on any material or commentary posted on our website. Please note that nothing contained in our website or the material published on it is intended to amount to advice on which you should rely; or
      • any losses you suffer because the information you put into our website is inaccurate or incomplete; or
      • any losses you suffer because you cannot use our website at any time; or
      • any errors in or omissions from our website; or
      • any losses you may suffer by relying on any commentary, postings, or reviews (of our services or that of our partners) on our website; or
      • any unauthorized access or loss of personal information that is beyond our control.

Third-Party Links

The Website may comprise links to external or third-party Websites (“External Sites”).  These links are provided exclusively as ease to you and not as an authorization by us of the content on such External Sites.  The content of such External Sites is created and used by others.  You can communicate with the site administrator for those External Sites.  We are not accountable for the content provided in the link of any External Sites and do not provide any representations about the content or correctness of the information on such External Sites.  You should take safety measures when you are downloading files from all these Websites to safeguards your computer from viruses and other critical programs.  If you agree to access linked External Sites, you do so at your own risk.

Personal Information & Privacy Policy

By accessing or using this Website, you approve us to use, store, or otherwise process your personal information as per our Privacy Policy.

Copyrigth and Trademark

The Website may contain material, such as software, text, graphics, images, designs, sound recordings, audiovisual works, and other the material provided by or on behalf of us (collectively referred to as the “Content”).  The Content may be possessed by us or third parties.   Unauthorized use of the Content may infringe copyright, trademark, and other laws.  You have no rights in or to the Content, and you will not take the Content except as allowed under this Agreement.  No other use is allowed without prior written consent from us.  You must recollect all copyright and other proprietary notices contained in the original Content on any copy you make of the Content.  You may not transfer, provide license or sub-license, sell, or modify the Content or reproduce, display, publicly perform, make a derivative version of, distribute, or otherwise use the Content in any way for any public or commercial purpose.  The use or posting of the Content on any other Website or in a networked computer environment for any purpose is expressly prohibited.

If you infringe any part of this Agreement, your permission to access and/or use the Content and the Website automatically terminates and you must immediately destroy any copies you have made of the Content.

Our trademarks, service marks, and logos used and displayed on the Website are registered and unregistered trademarks or service marks of us.  Other company, product, and service names located on the Website may be trademarks or service marks owned by others (the “Third-Party Trademarks,” and, collectively with us, the “Trademarks”).  Nothing on the Website should be construed as granting, by implication, estoppel, or otherwise, any license or right to use the Trademarks, without our prior written permission specific for each such use.    None of the Content may be retransmitted without our express, written consent for every instance.

MISCELLANEOUS

SEVERABILITY

If any provision of these Terms is found to be unenforceable or invalid, that provision will be limited or eliminated to the minimum extent necessary so that the Terms will otherwise remain in full force and effect and enforceable.

TERMINATION

Term. The Services provided to you can be canceled or terminated by us. We may terminate these Services at any time, with or without cause, upon written notice. We will have no liability to you or any third party because of such termination. Termination of these Terms will terminate all of your Services subscriptions.

Effect of Termination. Upon termination of these Terms for any reason, or cancellation or expiration of your Services: (a) We will cease providing the Services; (b) you will not be entitled to any refunds or usage fees, or any other fees, pro-rata or otherwise; (c) any fees you owe to us will immediately become due and payable in full, and (d) we may delete your archived data within 30 days. All sections of the Terms that expressly provide for survival, or by their nature should survive, will survive termination of the Terms, including, without limitation, indemnification, warranty disclaimers, and limitations of liability.

ENTIRE AGREEMENT

This Agreement constitutes the entire agreement between the parties hereto concerning the subject matter contained in this Agreement.

GOVERNING LAW AND JUDICIAL RECOURSE

The terms herein will be governed by and construed following the Law of Singapore without giving effect to any principles of conflicts of law. The Courts of Singapore shall have exclusive jurisdiction over any dispute arising from the use of the Website.

CONTACT INFORMATION

If you have any questions about these Terms, please contact us at hello@edxevents.com.

Privacy Policy

Last updated [Oct 16th, 2020]

Our Privacy Policy forms part of and must be read in conjunction with, website Terms and Conditions. We reserve the right to change this Privacy Policy at any time.

We respect the privacy of our users and every person who visits our sites https://edxevents.com/ and https://dxleadersseries.com/. Here, (“we”, “us”, or “our”) We are committed to protecting your personal information and your right to privacy in accordance with the General Data Protection Regulation (GDPR – European regulation) and the Personal Data Protection Act (PDPA – Singapore Regulation). If you have any questions or concerns about our policy or our practices with regards to your personal information, please contact us at hello@edxevents.com.

When you visit our websites https://edxevents.com/ and https://dxleadersseries.com/ (“websites”) and use our services, you trust us with your personal information. We take your privacy very seriously. In this privacy notice, we describe our privacy policy. We seek to explain to you in the clearest way possible what information we collect, how we use it, and what rights you have in relation to it. We hope you take some time to read through it carefully, as it is important. If there are any terms in this privacy policy that you do not agree with, please discontinue the use of our sites and our services.

This Privacy Policy has been developed and is maintained in accordance with all applicable federal and international laws and regulations and specifically with the GDPR (General Data Protection Regulation – European regulation) and the Personal Data Protection Act (PDPA – Singapore Regulation).

This privacy policy applies to all information collected through our websites, and/or any related services, sales, marketing, or events (we refer to them collectively in this privacy policy as the “websites”).

ABOUT US

Based in Singapore. EDX (Enterprise Digital Transformation) was founded by a group og B2B event professionals with more than 10 years of industry experience. They wanted to prove that vents are not just about learning and networking – that senior level events can also be creative, purposeful, and more fun than just listening to presentations.

EDX creates not only corporate events but also business intelligence and customized platforms ti convert leads and contacts into real deals. EDX believes that a perfect mix of event solutions that suit the client’s needs could impact not only its bottom line, but also the brand experience.

Please read this privacy policy carefully as it will help you make informed decisions about sharing your personal information with us.  

  1. WHAT INFORMATION DO WE COLLECT?

The personal information you disclose to us

We collect personal information that you voluntarily provide to us when expressing an interest in obtaining information about us or our products and services when participating in activities on the websites, or otherwise contacting us.

The personal information that we collect depends on the context of your interactions with us and the websites, the choices you make, and the products and features you use. The personal information we collect can include the following:

Personal Data 

We collect your first and last name, email address, company, job title, postal address, phone number (office number and mobile number), and other similar contact data.

Credentials. We collect passwords, password hints, and similar security information used for authentication and account access.

Information automatically collected

We automatically collect certain information when you visit, use, or navigate the websites. This information does not reveal your specific identity (like your name or contact information) but may include device and usage information, such as your IP address, browser, and device characteristics, operating system, language preferences, referring URLs, device name, country, location, information about how and when you use our websites and other technical information.  If you access our websites with your mobile device, we may automatically collect device information (such as your mobile device ID, model, and manufacturer), operating system, version information, and IP address. This information is primarily needed to maintain the security and operation of our websites, and for our internal analytics and reporting purposes.

Like many businesses, we also collect information through cookies and similar technologies. You can find out more about this in our Cookie Policy.

Information collected from other Sources

We may obtain information about you from other sources, such as public databases, joint marketing partners, social media platforms (such as Facebook, Instagram, Twitter), as well as from other third parties.

If you have chosen to subscribe to our newsletter, your first name, last name and email address will be shared with our newsletter provider. This is to keep you updated with information and offers for marketing purposes.

Payment information

Your credit/debit card information or payment information will be processed by the payment platforms available on the websites, which will treat and safeguard your data with total security and with the exclusive purpose of processing the purchase of the services. We reserve the right to contract any payment platform available in the market, which treats your data for the sole purpose of processing the purchase of services.

GOOGLE Analytics

We use Google Analytics provided by Google, Inc., USA (“Google”). These tool and technologies collect and analyze certain types of information, including IP addresses, device and software identifiers, referring and exit URLs, feature use metrics and statistics, usage and purchase history, media access control address (MAC Address), mobile unique device identifiers, and other similar information via the use of cookies. The information generated by Google Analytics (including your IP address) may be transmitted to and stored by Google on servers in the United States. We use the GOOGLE Analytics collection of data to enhance the websites and improve our service.

Please consult Google’s privacy policy here:

Social Media

On our websites you will find links and functions linked to different social networks, in which you can share your information.

It is advisable to consult the privacy policy and data protection of each social network used on our websites.

  1. HOW DO YOU GET MY CONSENT?

By using the services, accepting the checkboxes, communicating with us through the contact forms or our contact information, accepting the use of cookies by our websites and voluntarily providing us with personal information to communicate with you, you are providing your consent to our collection, storage and use of your information on the terms contained in this privacy policy. You consent to the use of cookies on our websites when you give your acceptance through the pop-up window shown on the home page when you enter the websites. You may withdraw your consent by sending us your request via the contact information or the contact page.

  1. HOW DO WE USE YOUR INFORMATION?

We use your personal information for these purposes in reliance on our legitimate business interests (“Business Purposes”), in order to enter into or perform a contract with you (“Contractual”), with your consent (“Consent”), and/or for compliance with our legal obligations (“Legal Reasons”). We indicate the specific processing grounds we rely on next to each purpose listed below.  

We use the information we collect or receive:  

  • To send administrative information to you for related to your account, our business purposes, and/or for legal reasons. We may use your personal information to send you the product, service, and new feature information and/or information about changes to our terms, conditions, and policies.
  • Deliver targeted advertising to you for our Business Purposes and/or with your Consent. We may use your information to develop and display content and advertising (and work with third parties who do so) tailored to your interests and/or location and to measure its effectiveness.
  • Request Feedback for our Business Purposes and/or with your Consent. We may use your information to request feedback and to contact you about your use of our websites.
  • To protect our websites for Business Purposes and/or Legal Reasons.  We may use your information as part of our efforts to keep our websites safe and secure (for example, for fraud monitoring and prevention).
  • To enable user-to-user communications with your consent. We may use your information in order to enable user-to-user communications with each user’s consent.
  • To enforce our terms, conditions, and policies for our business purposes and as legally required.
  • To respond to legal requests and prevent harm as legally required. If we receive a subpoena or other legal request, we may need to inspect the data we hold to determine how to respond.
  • For other Business Purposes. We may use your information for other Business Purposes, such as data analysis, identifying usage trends, determining the effectiveness of our promotional campaigns, and to evaluate and improve our websites, products, services, marketing, and your experience.
  1. WILL YOUR INFORMATION BE SHARED WITH ANYONE?

We only share and disclose your information in the following situations:

  • Compliance with Laws. We may disclose your information where we are legally required to do so in order to comply with applicable law, governmental requests, a judicial proceeding, court order, or legal processes, such as in response to a court order or a subpoena (including in response to public authorities to meet national security or law enforcement requirements).
  • Vital Interests and Legal Rights. We may disclose your information where we believe it is necessary to investigate, prevent, or take action regarding potential violations of our policies, suspected fraud, situations involving potential threats to the safety of any person and illegal activities, or as evidence in litigation in which we are involved.
  • Vendors, Consultants, and Other Third-Party Service Providers. We may share your data with third-party vendors, service providers, contractors, or agents who perform services for us or on our behalf and require access to such information to do that work.
  • Business Transfers. We may share or transfer your information in connection with, or during negotiations of, any merger, sale of company assets, financing, or acquisition of all or a portion of our business to another company.
  • Third-Party Advertisers. We may use third-party advertising companies to serve ads when you visit the websites. These companies may use information about your visits to our websites and other websites that are contained in web cookies and other tracking technologies in order to provide advertisements about goods and services of interest to you.
  • We may share your information with our affiliates, in which case we will require those affiliates to honor this privacy policy. Affiliates include our parent company and any subsidiaries, joint venture partners, or other companies that we control or that are under common control with us.
  • Business Partners. We may share your information with our business partners to offer you certain products, services, or promotions.
  • With your Consent. We may disclose your personal information for any other purpose with your consent.
  • Other Users. When you share personal information (for example, by posting comments, contributions, or other content to the websites) or otherwise interact with public areas of the websites, such personal information may be viewed by all users and may be publicly distributed outside the websites in perpetuity.
  1. DO WE USE COOKIES AND OTHER TRACKING TECHNOLOGIES?

We may use cookies and similar tracking technologies (like web beacons and pixels) to access or store information. Specific information about how we use such technologies and how you can refuse certain cookies is set out in our Cookie Policy.

  1. IS YOUR INFORMATION TRANSFERRED INTERNATIONALLY?

Our servers are located in the Singapore. We will not transfer your personal information to an overseas recipient.

  1. WHAT IS OUR STANCE ON THIRD-PARTY WEBSITES?

The websites may contain advertisements from third parties that are not affiliated with us and which may link to other websites, online services, or mobile applications. We cannot guarantee the safety and privacy of data you provide to any third parties. Any data collected by third parties is not covered by this privacy policy. We are not responsible for the content or privacy and security practices and policies of any third parties, including other websites, services, or applications that may be linked to or from the websites. You should review the policies of such third parties and contact them directly to respond to your questions.

  1. HOW LONG DO WE KEEP YOUR INFORMATION?

We will only keep your personal information for as long as it is necessary for the purposes set out in this privacy policy unless a longer retention period is required or permitted by law (such as tax, accounting, or other legal requirements). No purpose in this policy will require us to keep your personal information for longer than 90 days past the termination of your account.

When we have no ongoing legitimate business need to process your personal information, we will either delete or anonymize it, or, if this is not possible (for example, because your personal information has been stored in backup archives), then we will securely store your personal information and isolate it from any further processing until deletion is possible.

  1. HOW DO WE KEEP YOUR INFORMATION SAFE?

We work to protect the security of your information during transmission by using Secure Sockets Layer (SSL) software, which encrypts information you input. If transactions are processed on the websites, transaction information is transmitted to and from the websites in encrypted form using industry-standard SSL connections to help protect such information from interception. We restrict authorized access to your personal information to those persons who have a legitimate purpose to know that information to provide products or services to you and those persons you have authorized to have access to such information.

We follow generally accepted industry standards to protect the personal information you provide to us. No method of transmission over the Internet, or method of electronic storage, is 100% secure. Therefore, while we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security.

We will not sell, distribute, or lease your personal information to third parties unless we have your permission or are required by law to do so.

  1. DO WE COLLECT INFORMATION FROM MINORS?

We are in compliance with the requirements of the “GDPR” (General Data Protection Regulation – European regulation) and the Personal Data Protection Act (PDPA – Singapore Regulation) regarding the protection of the personal data of minors. We do not knowingly solicit data from or market to children under 16 years of age.  By using the websites, you represent that you are at least 16 or that you are the parent or guardian of such a minor and consent to such minor dependent’s use of the websites. If we learn that personal information from users less than 16 years of age has been collected, we will deactivate the account and take reasonable measures to promptly delete such data from our records.  If you become aware of any data, we have collected from children under age 16, please contact us at hello@edxevents.com.

  1. WHAT ARE YOUR PRIVACY RIGHTS?

Personal Information

You may at any time review or change the information in your account or terminate your account by:

  • Logging into your account settings and updating your account
  • Contacting us using the contact information provided below

Upon your request to terminate your account, we will deactivate or delete your account and information from our active databases. However, some information may be retained in our files to prevent fraud, troubleshoot problems, assist with any investigations, enforce our Terms of Use, and/or comply with legal requirements.

Cookies and similar technologies: Most Web browsers are set to accept cookies by default. If you prefer, you can usually choose to set your browser to remove cookies and to reject cookies. If you choose to remove cookies or reject cookies, this could affect certain features or services of our websites.

  1. GDPR ENTITLEMENT

Users who provide information through our websites, as data subjects and data owners, have the right to access, rectify, download or delete their information, as well as to restrict and object to certain processing of their information. While some of these rights apply generally, others apply only in certain limited circumstances. We describe these rights below:

  • Access and portability: to access and know what information is stored in our servers, you can send us your request through our contact information.
  • Rectify, Restrict, Limit, Delete: You can also rectify, restrict, limit or delete much of your information.
  • Right to be informed: Users of our websites will be informed, upon request, about what data we collect, how it is used, how long it is retained and whether it is shared with third parties.
  • Object: When we process your information based on our legitimate interests as explained above, or in the public interest, you may object to this processing in certain circumstances. In such cases, we will stop processing your information unless we have compelling legitimate reasons to continue processing it or where it is necessary for legal reasons.
  • Revoke consent: Where you have previously given your consent, such as to allow us to process and store your personal information, you have the right to revoke your consent to the processing and storage of your information at any time. For example, you may withdraw your consent by updating your settings. In certain cases, we may continue to process your information after you have withdrawn your consent if we have a legal basis for doing so or if your withdrawal of consent was limited to certain processing activities.
  • Complaint: If you wish to file a complaint about our use of your information (and without prejudice to any other rights you may have), you have the right to do so with your local supervisory authority. Users can exercise all these rights by contacting us through the contact information or the contact page.
  • Rights related to automated decision-making, including profiling: website users may request that we provide a copy of the automated processing activities we conduct if they believe that data is being unlawfully processed.

Additionally, if you are a European resident, we note that we are processing your information in order to fulfil contracts we might have with you or otherwise to pursue our legitimate business interests listed above. Additionally, please note that your information will be transferred outside of Europe.

EU residents can exercise these rights by raising a request directly at hello@edxevents.com.

  1. DO WE MAKE UPDATES TO THIS POLICY?

We may update this privacy policy from time to time. The updated version will be indicated by an updated “Revised” date and the updated version will be effective as soon as it is accessible. If we make material changes to this privacy policy, we may notify you either by prominently posting a notice of such changes or by directly sending you a notification. We encourage you to review this privacy policy frequently to be informed of how we are protecting your information.

  1. DATA PROTECTION OFFICER

We have appointed a Data Protection Officer (“DPO”) who is responsible for overseeing questions in relation to this privacy notice. If you have any questions about this privacy notice, including any requests to exercise your legal rights, please contact the Data Protection Officer, at our e-mail hello@edxevents.com.

  1. HOW CAN YOU CONTACT US ABOUT THIS POLICY?

If you have questions or comments about this policy, email us at hello@edxevents.com.

Request an Appointment

"We're in the midst of creating something awesome for you!"

____________________________________
By clicking above button I agree to your site's Terms of Use and Privacy Policy and consent to receiving SMS messages and emails.