Information Stewardship Statement
Understanding how Hazardousex handles the details you share when exploring investment education
Financial education involves trust. When someone visits our platform seeking clarity about investment theory, they bring questions, goals, and personal context. We recognize that offering meaningful guidance requires us to receive certain information — and that receipt creates responsibility.
This document explains what happens to the information you provide when you interact with hazardousex.com. We've structured it around the stages of your relationship with us, starting from your first visit and extending through ongoing learning experiences.
For details about how cookies and similar mechanisms function on this website, please refer to our separate Cookie Policy. This statement focuses exclusively on the information itself: what arrives, why it matters, where it travels, and how you maintain control over it.
Information Emergence and Collection Mechanisms
Details arrive through several distinct pathways. Some you deliberately submit. Others emerge from how you navigate the educational materials. Each type serves a different function in our ability to deliver coherent investment education.
Registration and Enrollment
When you decide to enroll in our learning program, we request foundational identifiers. Your name allows us to personalize course correspondence. Your email address becomes the channel through which lesson materials, progress updates, and educational resources reach you. If you choose to provide a phone number, it offers an alternative contact method, particularly useful for time-sensitive course information or technical support.
- Full legal name for account creation and certificate issuance
- Email address for course delivery and platform communications
- Phone number (optional) for enrollment verification and support escalation
- Mailing address when requesting physical course materials or certificates
Interaction and Learning Behavior
As you progress through investment theory modules, the platform captures your learning patterns. Which lessons you complete, how long you spend on complex topics, which resources you download — these behavioral signals help us understand whether our educational approach resonates or requires adjustment. This isn't surveillance; it's pedagogical feedback.
If you submit questions through our contact form or reach out for clarification about specific investment concepts, those communications become part of your learner profile. We retain correspondence to ensure continuity when multiple team members support your educational journey.
Technical and Navigational Data
Your device communicates technical details automatically when connecting to our servers. IP addresses reveal general geographic location, which helps us understand regional interest in particular investment topics. Browser specifications and device types inform how we optimize course material presentation across different platforms. Time stamps show when you engage with content, helping us identify peak learning periods.
Financial education attracts sensitive attention. We do not ask about your current investment portfolio, account balances, net worth, or specific securities holdings. Our courses teach theory and concepts — not portfolio management services requiring such disclosure.
Purpose and Operational Justification
Information doesn't sit idle. Each category we collect serves specific operational needs tied to delivering coherent investment education.
Educational Delivery and Customization
Your contact details make it possible to send lesson materials, schedule updates, and course announcements. Without an email address, we cannot deliver the curriculum you enrolled to access. Your learning behavior data helps us identify which topics might benefit from supplementary resources or alternative explanations. When many learners struggle with the same concept, that pattern suggests we need to refine how we present that material.
Platform Functionality and Technical Operation
Technical data keeps the learning platform operational. IP addresses help detect unusual access patterns that might indicate security concerns. Device information ensures lesson materials display correctly whether you're on a phone, tablet, or desktop computer. Session data allows you to pause a lesson and resume from the same point later.
Communication and Support
When you contact us with questions about bond valuation methods or dividend discount models, we retain that exchange to provide consistent support. If you reach out twice about related concepts, we want our team to see the earlier conversation and build on that foundation rather than starting from scratch each time.
Compliance and Record Retention
Educational service providers face certain record-keeping expectations. If a learner later claims they never received course access after payment, enrollment records and communication logs help resolve that dispute. If regulatory authorities question whether we adequately disclosed course limitations, we need documentation showing what information we provided during enrollment.
We do not analyze your learning patterns to market unrelated financial products or services. The behavioral data we collect serves educational improvement — nothing more.
External Disclosure and Third-Party Involvement
Some information moves beyond our direct control out of necessity. We limit these transfers to situations where external involvement directly supports your educational experience or satisfies legal obligations.
Essential Service Providers
Our email delivery system requires a specialized platform that can handle bulk course material distribution while maintaining high deliverability rates. That provider receives your email address and name to send lesson content on our behalf. Our course hosting infrastructure resides on cloud servers managed by a technical services company; they process the technical data your device transmits when accessing course materials. Payment processing for course enrollment involves financial transaction services that handle billing details according to their own security protocols.
Each external provider operates under contractual terms that restrict how they can handle information received through our platform. They cannot use your details for their own marketing or sell access to other companies.
Legal Requirements and Protective Disclosures
Courts sometimes issue orders demanding records related to specific individuals. Regulatory investigators may request information when examining potential securities education violations. We comply with valid legal demands while seeking to limit disclosure scope to precisely what the law requires.
If someone uses our platform to engage in fraud or criminal activity — perhaps claiming our course credentials they never earned — we may disclose relevant records to law enforcement. If we detect activity suggesting an account has been compromised and is being used without the legitimate user's knowledge, we may share details with security authorities.
Business Continuity Scenarios
Should Hazardousex merge with another educational provider or transfer operations to a successor organization, learner records would transition to that entity. We would notify affected individuals and ensure the receiving organization commits to privacy protections at least as strong as those outlined here. You would receive information about how to access your records or request removal under the new structure.
We do not sell learner lists to marketing companies. We do not rent access to student databases. We do not exchange contact information with other educational providers for promotional purposes.
Security Practices and Inherent Limitations
Protecting information means acknowledging that absolute security doesn't exist while implementing robust defenses against realistic threats.
Technical Safeguards
All data transmission between your device and our servers occurs through encrypted connections. Stored information resides on servers with restricted access, protected by authentication systems requiring multiple verification factors. We segment different data types so a breach of one system doesn't automatically compromise all records. Regular security audits identify vulnerabilities before attackers can exploit them.
Administrative Controls
Team members access learner information based on job necessity. An instructor reviewing submitted questions sees different data than an enrollment coordinator processing registrations. We maintain logs tracking who accessed which records when, creating accountability and helping detect unauthorized internal access attempts.
Staff receive training on handling sensitive information appropriately. We enforce policies against casual discussion of learner details and require secure disposal of physical records when no longer needed.
Realistic Threat Assessment
Sophisticated attackers sometimes penetrate even well-defended systems. Large-scale data breaches affect major corporations with security budgets exceeding our entire operating budget. We implement protections appropriate to our size and the sensitivity of information we handle, recognizing we cannot eliminate all risk.
Your own security practices matter significantly. If you use a weak password or access your account from a compromised device, our server security becomes less relevant. If you share login credentials with others, you've bypassed our access controls.
In the event of a security incident affecting learner information, we commit to prompt notification explaining what happened, what information was involved, and what steps we're taking in response. Transparency serves as damage control.
Individual Control and Data Rights
You maintain authority over information you've provided, though practical constraints and legal requirements sometimes limit that control.
Access and Review
You can request a copy of the information we maintain about you. This includes contact details, enrollment records, course progress data, and communications history. We provide this in a readable electronic format within a reasonable timeframe, typically two weeks from request receipt.
Correction and Updates
If your contact information changes or we've recorded something incorrectly, you can request corrections. For simple updates like a new email address, you can make changes directly through your account settings. More complex corrections might require verification to prevent unauthorized account modifications.
Restriction and Objection
You can object to certain uses of your information, particularly those not strictly necessary for course delivery. If we plan to use learning behavior data for a new purpose beyond educational improvement, you could decline participation in that initiative. You cannot, however, restrict uses essential to providing the service you enrolled to receive — like sending course materials to your registered email address.
Deletion and Account Closure
You can request account deletion and removal of associated information. We will comply except where retention is legally required or necessary to resolve pending disputes. For example, if you're disputing a charge, we need transaction records until that matter resolves. If you completed a course and received a certificate, we maintain enrollment verification records to confirm credential authenticity if future employers or institutions inquire.
Some information persists in backup systems for a period after deletion from active databases. These backups exist for disaster recovery, not ongoing operational use, and cycle out according to our retention schedule.
Exercising These Rights
Submit requests regarding your information through the contact methods listed at the end of this document. Include sufficient details for us to locate your records and verify your identity. We may ask clarifying questions to ensure we're responding to the legitimate account holder rather than someone impersonating you.
Canadian residents benefit from specific privacy rights under federal and provincial legislation. We honor those rights regardless of where you're located, applying the strongest applicable protections to all learners.
Retention Duration and Disposal
Different information types remain in our systems for different periods based on operational needs and legal requirements.
Active Learner Records
While you maintain an active account, we retain your contact information and course progress data to support ongoing educational delivery. This persists as long as you continue accessing materials or remain enrolled in program updates.
Post-Completion Retention
After course completion, we retain core enrollment records for seven years. This allows us to verify credential authenticity if you later need to prove you completed our investment theory program. It also satisfies standard educational record-keeping practices.
Communications history typically purges three years after the last interaction unless it relates to an unresolved dispute or legal matter. Technical logs and behavioral data aggregate and anonymize after two years, making it impossible to connect patterns back to specific individuals.
Financial Transaction Records
Payment processing records follow accounting retention requirements — generally seven years to satisfy tax authority expectations and support financial audits.
Disposal Methods
When retention periods expire, we remove information from active systems and mark it for permanent deletion from backups during the next cycle. Electronic records undergo secure deletion that prevents recovery. Physical documents, if any exist, are shredded or incinerated.
Questions, Concerns, and Formal Inquiries
For matters related to how we handle your information, reach out directly:
Email: help@hazardousex.com
Phone: +1 613-546-6573
Mail: Hazardousex Privacy Inquiries
1005 Wellings Road
Regina, SK S4K 0A2
Canada
If you believe we've mishandled your information or violated applicable privacy regulations, you may file a complaint with the Office of the Privacy Commissioner of Canada or the privacy authority in your jurisdiction. We prefer the opportunity to address concerns directly before escalation, but you have the right to pursue formal channels.
This stewardship statement became effective January 15, 2026, and reflects our current information handling practices.
