NINJIO Legal Disclaimer:

THE FOLLOWING NINJIO EPISODE IS INSPIRED BY REAL COMPANIES AND ACTUAL EVENTS. THE EPISODE PRESENTS A HYPOTHETICAL VERSION OF WHAT LED TO A PARTICULAR DATA SECURITY BREACH AS A WAY TO EDUCATE YOU ABOUT DATA SECURITY PRACTICES, BUT IT IS NOT, AND IS NOT INTENDED TO BE, AN ACCURATE PORTRAYAL OF REAL PEOPLE, REAL COMPANIES, REAL INCIDENTS OR HISTORICAL EVENTS AS THEY ACTUALLY OCCURRED.

 

THIS CONTENT IS OWNED BY NINJIO, LLC. ANY COPYING, DISTRIBUTION, OR UNAUTHORIZED VIEWING IS PROHIBITED WITHOUT THE EXPRESS WRITTEN CONSENT OF THE OFFICERS OF NINJIO, LLC.

 

ALTHOUGH WE BELIEVE THE TECHNOLOGY AND DATA SECURITY-RELATED INFORMATION IN THIS PRESENTATION TO BE ACCURATE AND TIMELY, BECAUSE OF THE RAPID ADVANCE I.T. SECURITY AND OUR RELIANCE ON INFORMATION PROVIDED BY OUTSIDE SOURCES, WE MAKE NO WARRANTY OR GUARANTEE CONCERNING THE ACCURACY OR RELIABILITY OF THAT CONTENT OR OTHER MATERIAL WHICH WE MAY REFERENCE.

 

THE MATERIAL DISCUSSED ON THE EPISODE IS NOT INTENDED TO PRESENT THE ONLY OR NECESSARILY THE BEST METHOD OR PROCEDURE OF DEALING WITH AN I.T. SECURITY ISSUE, BUT RATHER PRESENTS THE APPROACH OR OPINION OF THE DISCUSSANT. THIS PRESENTATION IS PROVIDED IN AN “AS IS” FORMAT WITHOUT WARRANTIES OF ANY KIND, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF TITLE, NON-INFRINGEMENT OR IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.