Terms and Conditions Content
TERMS AND CONDITIONS for all students We undertake to offer the courses and services described within.
These Terms and Conditions apply both to the students of the ICT College (the person who signs the Application Form).Your application
1. Once your application has been received and we have confirmed the enrolment, a binding contract exists between you and ICT College. Once a contract exists, all fees are due for the full period of your course.
2. The person signing the application takes responsibility for paying all required fees.
3. Fees must be received by ICT College.
4. If we are unable to accept your application for enrolment, we will offer you an alternative course or course start date, or we will suggest a similar course at a comparable school. If these are not acceptable to you, we will refund all fees paid.
5. We reserve the right not to accept any application for enrolment of any student at any stage of the application or booking process. In the event that your application is declined, all fees received will be refunded in full, but we shall be under no obligation to give reasons for the decision.Payment
6. We guarantee a place on a course or program at ICT College only after we have received your full payment.
7. Online payments may not be made in instalments. If you want to pay partial, print your assessment form and show it to the cashier.
8. Any change which results in additional charges must be paid for before the change is implemented.
This Data Privacy Statement, which has been prepared in relation to R.A. 10173, otherwise known as Data Privacy Act of 2012, and it’s implementing rules and regulations, describes how personal information are collected, processed, disclosed, and stored by International Computer Technology College (“ICT College”) and is applicable to all persons who apply for or avail of any ICT College’s services, or who has established or propose to establish an account with ICT College, or who have provided or propose to provide third party security to ICT College (“Client”).
WHAT WE GET?
To provide the client with ICT College’s enrollment for educational services, ICT College may collect personal information from the client which may include, but are not limited to:
WHAT WE WILL USE THEM FOR
ICT College may request client’s personal information in connection with any of the following purposes:
METHOD OF PROCESSING PERSONAL DATA
Processing refers to the collection, recording, organization, storage, updating or modification, retrieval, use, blocking of personal information.
ICT College may collect personal information through, but not limited to, any of the following:
WHEN DO WE COLLECT
ICT College collects information upon the client’s application for availment of and/or usage of ICT College’s products and services. This includes to account opening/ signing in to Online Enrollment for ICT College.
RECIPIENTS OF INFORMATION
Personal information may be processed within the whole administration of the ICT College to any of the purposes herein declared, to save registration and to process payment transactions.
DATA PROTECTION OFFICER
Any inquiry or request for information regarding this statement may be addressed to the following:
Data Protection Officer
DATA PRIVACY BY DESIGN
“Privacy by Design” and “Privacy by Default” have been frequently-discussed topics related to data protection. The first thoughts of “Privacy by Design” were expressed in the 1970s and were incorporated in the 1990s into the RL 95/46/EC data protection directive. According to recital 46 in this Directive, technical and organisational measures (TOM) must be taken already at the time of planning a processing system to protect data safety.
The term “Privacy by Design” means nothing more than “data protection through technology design.” Behind this is the thought that data protection in data processing procedures is best adhered to when it is already integrated in the technology when created. Nevertheless, there is still uncertainty about what “Privacy by Design” means, and how one can implement it. This is due, on the one hand, to incomplete implementation of the Directive in some Member States and, on the other hand, that the principle “Privacy by Design” which is in the General Data Protection Regulation, that the current approach in the data protection guidelines, which requires persons responsible already to include definitions of the means for processing TOMs at the time that they are defined in order to fulfil the basics and requirements of “Privacy by Design”. Legislation leaves completely open which exact protective measures are to be taken. As an example, one only need name pseudonymisation. No more detail is given in recital 78 of the regulation. At least in other parts of the law, encryption is named, as well as anonymisation of data as possible protective measures. Furthermore, user authentication and technical implementation of the right to object must be considered.
In addition, when selecting precautions, one can use other standards, such as ISO standards. When selecting in individual cases, one must ensure that the state of the art as well as reasonable implementation costs are included. In addition to the named criteria, the type, scope, circumstances and purpose of the processing must be considered. This must be contrasted with the various probability of occurrence and the severity of the risks connected to the processing. The text of the law leads one to conclude that often several protective measures must be used with one another to satisfy statutory requirements. In practice, this consideration is already performed in an early development phase when setting technology decisions. Recognised certification can serve as an indicator to authorities that the persons responsible have complied with the statutory requirements of “Privacy by Design”.