Who we are
Self Defense Certified located at https://www.selfdefensecertified.com is engaged in providing services to services to the self-defense and fitness professionals across the globe looking for a business growth opportunity. Professionals choosing to market COBRA Defense Systems courses pay a license fee in exchanged for a turnkey business system and become a certified trainer. The site is controlled by C.O.B.R.A. ™ Self-Defense ("C.O.B.R.A. ™ Self-Defense"). Our physical address is
C.O.B.R.A.™ Headquarters & Training Facility
24103 US19 N.
Clearwater, FL 33763
What personal data we collect and why we collect it
We collect information in a number of ways.
Try It Free Sign Up
Parties interested in trying the COBRA System at Self Defense Certified are allowed the opportunity to try the system for free. This creates a user account on the site and enables limited access to the COBRA material. You become a WordPress user and we also collect additional information and store it securely on Self Defense Certified. The information we collect is –
- First Name
- Last Name
- Email Address
- Business Name
- Business Address
- Zip and
At no time will we ever ask for or attempt to collect any information related to your religious or political affiliation, or your sexual preferences or any personal information that is outside the scope of our core business model.
Payments and Transactions:
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
We do not provide any means for users to upload media in the form of pictures, or video. Hence we will not collect, or store any of your information associated with media
We do not use a contact form on Self Defense Certified. No data is collected, or stored.
Only registered users can leave a comment on Self Defense Certified and these are only for what are called “Library” pages. Library Pages are the pages that contain instructional and marketing material. Since comments are only for registered users we do not use a cookie driven system to check for spam, or for persisting user information.
Embedded content from other websites
We do not embed 3rd party content on our site. Hence there is no persistence of any information to a 3rd party hosted URL.
We use Google Analytics for visibility into non-identifiable information pertaining to the location of visitors, and any visitor preferential information as stored and collected by Google.
We use this information to analyze trends, administer our website, track visitors' movements around our website, and gather demographic information about our visitors as a whole. We do link this automatically collected data to other information we collect about our website visitors.
In no way is any of this data identifiable to you and is completely anonymous. This data is retained by Google However since your data it is not identifiable with you we have no way of removing this data.
We may occasionally advertise through Google, Facebook, or Yelp. This will often set a cookie on your computer so that we may remarket to you. This data is not collected or stored on our website and there is no personal information stored.
Who we share your data with
The data we collect and retain on our website is not ever shared with anyone for any reason. Data related to 3rd party services such as payment processors, or email management services is stored securely and any data we have access to is never shared by us.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us.
You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
- You may ask Self Defense Certified to take the following actions in relation to your personal data that we hold:
- Provide you with information about our processing of your personal data and give you access to your personal data.
- Update or correct inaccuracies in your personal data.
- Delete your personal data.
Where we send your data
Your contact information
Your contact information is only stored if you use have created an account requesting a free trial, or if you have actually joined the program. Other contact information to credit card processing information is stored by 3 parties as previously indicated.
We are extreme advocated of personal privacy. It’s our personal philosophy because like you we don’t want any of our information stored without or knowledge, consent and the ability to remove it at our discretion. Any information be it personal or non- personal is strictly used to enhance users website experience and in the case of personal information is something that guard zealously.
We post customer testimonials on our website, which may contain personal information. We do obtain our Clients' consent to post their name along with their testimonial via email prior to posting the testimonial on our website. However, if you wish to request the removal of your testimonial, please contact us.
Social Media Features
Self Defense Certified does not use or is linked to any social media outlets.
How we protect your data
Self Defense Certified is protected with SSL. All data you provide and or that gets sent to any 3rd party is encrypted. As well Self Defense Certified is not open to general registration and only those with a sincere and serious interest in our program can create our business oriented registration process. As well we protect our website against malware and spam by using a 3rd party real time protection service called Wordfence, which has been configured to do weekly scans to detect any new vulnerabilities that we respond to as soon as we become aware of them.
We also keep our website current and up to date. This includes WordPress core software s well as any 3rd party software known as Plug In.
In addition we only use high quality plug-ins that comply with best known practices for data protection and or in compliance with GDPR.
Lastly we also adhere to and enforce for all administrator level users the use of strongly encrypted passwords as recommended by WordPress.
What data breach procedures we have in place?
If a breach of our website occurs, we will immediately change all administrator level login credentials and then notify all subscribers and members who have a username and password on our site of the breach. We will then work to ascertain the means and method of the breach and work to remedy the situation.
Once we have ascertained the means and method and scope of the breach we will broadcast a message to all subscribers as well as post a notice on our website regarding the results of the investigation the cause and the ramifications of the breach.
What third parties we receive data from
We do not receive any 3rd party data.
What automated decision making and/or profiling we do with user data
Industry regulatory disclosure requirements
Provisions for Mobile Users
Designated Data Protection Officer
We have designated a data protection officer whom you can direct any and all inquiries directly to at email firstname.lastname@example.org. Our data protection officer is tasked with
- Keeping our site current with all versions of WordPress and 3rd party layered software.
- Scanning our site every week with Word Fence to determine and address security vulnerabilities.
- Deactivating or removing any plug-ins indicated as having a vulnerability.
- Making weekly secure backups of all data.
- Making sure that admin users are using strongly encrypted and secured passwords.