Information Collection & Use

Personal data is data that can be used to identify or contact you, such as your name, email address, telephone number or similar information. When registering for this event you will be asked to provide contact information and other details needed to provide services and necessary to comply with our legal obligations, resolve disputes, and enforce our agreements. We may also collect information about your profession, specialist area, and role within your organization.

How we use the information we collect

  • We will use the data you provide for event logistics and services.
  • We will create a record of your attendance at this event which will be stored as a record within our database.
  • We use your information as necessary to comply with our legal and compliance obligations, resolve disputes, and enforce our agreements.
  • Specifically, regarding your event registration, CBIS will share necessary information within CBIS group and affiliate staff to ensure that the relevant team members are aware of your attendance at this event, to help with your travel arrangements etc.
  • CBIS will also share some of this data: (name, date of birth, passport number, address, email address and telephone number) with our external service providers to facilitate flight bookings, airport transfers, accommodations, and other event logistics as needed.
  • Where mandated to do so by law (e.g. due to legal enquiries or subject to subpoena) CBIS may have to disclose data to competent authorities. If you are a registered user, we may use your Usage Data with or without your personal data, in order to measure the Site’s performance and improve the Site’s design and functionality.

We may also collect the following voluntarily from you.

  • Information about your business such as company name, company size, business type or your position in the company.
  • Medical condition
  • Demographic information such as age, education, gender, interests and location
  • Contact information such as email address and phone number
  • Testimonials
  • Site survey responses
  • Respond to your questions
  • Administer your account
  • Conduct surveys or other research and analysis
  • Identify you as a possible future event attendee

Data Sharing & Onward Transfers

We may also collect from you the following personal data about your contacts: Email Address, to share information or messages when you provide us with personal data about your contacts, we will only use it for the specific reason for which it is provided. If you believe one of your contacts has provided us with your personal data and you want to submit a removal request

CBIS won’t sell or lease your personal data to a third party; however, there are certain circumstances where we may share your personal data without additional notice to you. In addition to the disclosures described throughout this Policy, and subject to applicable law, we and our third parties may disclose your personal data:

To affiliates and subsidiaries for purposes consistent with this Policy; To unaffiliated third parties that are under contract to perform services for or on behalf of CBIS (e.g., to maintain computer database, perform marketing activities, or conduct surveys).

To law enforcement personnel and agencies, including to meet national security requirements, or as part of a legal process, to protect our property or in furtherance of an investigation regarding a breach of the Site rules and policies, unauthorized access to or use of the Site or any other illegal activities.

Data Retention

We retain your information while your account is active or as needed to provide you services. We also retain and use your information as necessary to comply with our legal obligations, resolve disputes, and enforce our agreements. This includes creating a record of training that CBIS has provided to you in relation to our products for a period of 5 years or as long as required by locally country requirements.


CBIS takes security seriously. We use reasonable and appropriate data protection measures, such as robust technologies, security policies, and procedures, to reduce the risk of misuse, alteration, accidental destruction or loss, and unauthorized disclosure or access to our systems and data. Unfortunately, no security method is 100% secure; therefore, we cannot guarantee absolute security.