Terms of Use, Policy and Intellectual Property

1. Introduction

Welcome to the Innovative Management and Technology Services, LLC (IMTS) Training Catalog and E-Commerce platform. By accessing or using any of our services, you agree to comply with the following terms and conditions (“Terms of Use”) and acknowledge our practices regarding the collection, use, and sharing of your information, as described in our Privacy Policy.

These Terms apply to all users of the catalog and visitors to IMTS.US and Training.IMTS.Store.

2. Terms of Use

2.1. Service Availability

·         Course offerings, schedules, and prices are subject to change without prior notice.

·         IMTS reserves the right to modify, suspend, or discontinue any service at any time.

2.2. Registration and Enrollment

·         Users must provide accurate and complete information during registration.

·         IMTS reserves the right to deny or revoke access if false or incomplete information is provided.

·         By enrolling in a course, users agree to follow any specific policies related to attendance, conduct, and assessment.

2.3. Intellectual Property

·         All materials provided in this catalog and associated courses, including course content, logos, and trademarks, are the intellectual property of IMTS (and the ITI) and/or our partners.

·         Unauthorized reproduction, distribution, or use of course materials is prohibited.

2.4. Liability and Disclaimer

·         IMTS makes every effort to ensure the accuracy of the information in this catalog, but does not guarantee it to be error-free or comprehensive.

·         IMTS is not responsible for any technical issues, course cancellations, or disruptions in service that may affect your learning experience.

3. Privacy Policy

3.1. Information We Collect

·         Personal Information: Name, email address, phone number, and other contact details during registration or enrollment.

·         Payment Information: When purchasing a course through our e-commerce platform, we may collect billing information, including credit card details, which will be processed securely by our payment partners.

·         Technical Information: IP address, browser type, and cookies used to enhance your browsing experience on our website.

3.2. How We Use Your Information

·         To process course registrations and payments.

·         To communicate with users regarding course updates, announcements, or cancellations.

·         To improve our website and catalog offerings.

3.3. Information Sharing

·         We do not sell your information to third parties. However, we may share your information:

o    With trusted partners to facilitate course delivery (e.g., Cyber Defense Solutions, CompTIA, EC-Council).

o    With payment processors to complete transactions securely.

o    If required by law or to protect the legal rights of IMTS.

3.4. Cookies and Tracking

·         Our website may use cookies to enhance the user experience. Users can adjust their browser settings to limit cookie tracking, though this may affect site functionality.

3.5. Your Rights and Choices

·         You have the right to access, correct, or delete your personal information.

·         To make such requests, contact us at [insert contact email/phone number].

4. Changes to Terms and Privacy Policy

IMTS may update these Terms of Use and Privacy Policy from time to time. Changes will be posted on our website and will take effect immediately. Continued use of our services indicates acceptance of the updated policies.

5. Contact Information

For any questions regarding these Terms or our Privacy Policy, please contact:

·         IMTS

·         Email: [Insert email]

·         Phone: [Insert phone number]

6. Copyright Notice

Copyright © 2024 IMTS. All Rights Reserved.

7. Use of IMTS Trademarks (TM) and Intellectual Property

Permitted Uses

IMTS Training Institute trademarks, including logos and certification titles, may only be used:

1.      By candidates who have successfully completed and earned IMTS certifications, to accurately represent their credentials.

o    Certification logos may be displayed on resumes, LinkedIn profiles, business cards, and other professional materials to indicate certification achievement.

o    Trademarked certification titles (e.g., Certified Cybersecurity Expert™) may be used in written communications and professional profiles to describe the credential earned.

2.      By authorized licensees, partners, or affiliates, in accordance with specific terms outlined in their agreements with IMTS.

3.      To accurately refer to or describe the certifications or programs offered by IMTS, without misrepresentation.

Prohibited Uses

IMTS Training Institute trademarks, including logos and certification titles, may not be used:

1.      Without express written permission from IMTS for purposes other than representing earned certifications.

2.      In any way that could mislead, confuse, or imply endorsement or affiliation with any non-IMTS entity, product, or service.

3.      To claim certifications not earned or to misrepresent one’s qualifications.

4.      In a derogatory, defamatory, or otherwise harmful manner that could damage the reputation of IMTS or its offerings.

5.      As part of any unauthorized certification title, program, or course name.

Intellectual Property Rights

All IMTS trademarks, logos, course titles, and associated intellectual property remain the exclusive property of IMTS. Unauthorized use, reproduction, or distribution of these assets is strictly prohibited and subject to legal enforcement.

Revocation of Use

IMTS reserves the right to revoke the use of its trademarks, logos, or certification titles if:

1.      A candidate or organization is found to misuse these assets.

2.      The certification associated with the trademark is revoked due to non-compliance with IMTS certification requirements or policies.

Current Trademarks

The current trademarks of IMTS and the ITI include, but are not limited to:

1.      Certified COMSEC Manager™ (CCM™)

2.      Certified Cyber Policy and Strategy Planner™ (CCPSP™)

3.      Certified Cyber Workforce Developer and Manager™ (CCWDM™)

4.      Certified Cyber Curriculum Developer™ (CCCD™)

5.      Certified Cyber Instructor™ (CCI™)

6.      Certified Cyber Legal Advisor™ (CCLA™)

7.      Certified Executive Cyber Leader™ (CECL™)

8.      Certified Privacy Compliance Manager™ (CPCM™)

9.      Certified Product Support Manager™ (CPSM™)

10.  Certified Program Manager™ (CPM™)

11.  Certified IT Project Manager™ (CITPM™)

12.  Certified Security Control Assessor™ (CSCA™)

13.  Certified Cyber Authorizing Official™ (CCAO™)

14.  Systems Certified Security Manager™ (SCSM™)

15.  Certified IT Portfolio Manager™ (CITPM™)

16.  Certified IT Program Auditor™ (CITPA™)

17.  Certified Security Architect™ (CSA™)

18.  Certified Enterprise Security Architect™ (CESA™)

19.  Certified Secure Development Professional™ (CSSDP™)

20.  Certified Systems Security Developer™ (CSSD™)

21.  Certified Secure Software Assessor™ (CSSA™)

22.  Certified Systems Requirements Planner™ (CSRP™)

23.  Certified System Testing and Evaluation Specialist™ (CSTES™)

24.  Certified Research & Development Specialist™ (CRDS™)

25.  Certified Data Analyst Professional™ (CDAP™)

26.  Certified Database Admin Professional™ (CDAP™)

27.  Certified Secure Knowledge Manager™ (CSKM™)

28.  Certified Network Operations Specialist™ (CNOS™)

29.  Certified Secure System Administrator™ (CSSA™)

30.  Certified Systems Security Analyst™ (CSSA™)

31.  Certified Technical Support Technician™ (CTST™)

32.  Certified Cyber Defense Analyst™ (CCDA™)

33.  Certified Cyber Forensics Analyst™ (CCFA™)

34.  Certified Cyber Incident Responder™ (CCIR™)

35.  Certified Infrastructure Support Specialist™ (CISS™)

36.  Certified Threat Warning Analyst™ (CTWA™)

37.  Certified Insider Threat Program™ – Insider Threat Core

38.  Certified Insider Threat Professional – Investigative Analyst™ (CITP-IGA™)

39.  Certified Insider Threat Professional – Cyber Analytics™ (CITP-CA™)

40.  Certified Insider Threat Professional – Infrastructure Engineer™ (CITP-IE™)

41.  Certified Insider Threat Professional – Data Analytics™ (CITP-DA™)

42.  Certified Insider Threat Professional – Infrastructure Operator™ (CITP-IO™)

43.  Certified Insider Threat Professional – Program Manager™ (CCITP-PM™)

44.  Certified Insider Threat Professional – Hub Chief™ (CITP-HC™)

45.  Certified Insider Threat Professional – Senior Official™ (CITP-SO™)

46.  Certified Insider Threat Professional – Incident Responder™ (CITP-IR™)

47.  Certified Insider Threat Professional – Cyber Leader (CITP-CL™)

48.  Certified Insider Threat Professional – ICS-SCADA Analyst™ (CITP-ICS™)

49.  Certified Insider Threat Professional – Data Scientist™ (CITP-DS™)

50.  Certified Insider Threat Professional – User Activity Monitoring™ (CITP-UAM™)

51.  Vulnerability Assessor Certified™ (VAC™)

52.  Certified Intrusion Forensics Analyst™ (CIFA™)

53.  Certified Cyber Crime Forensic Investigator™ (CCCFI™)

54.  Certified All-Source Analyst™ (CASA™)

55.  Certified All-Source Collection Manager™ (CASCM™)

56.  Certified All-Source Requirements Manager™ (CASRM™)

57.  Certified Cyber Intel Planner Professional™ (CCIPP™)

58.  Certified Cyberspace Operator™ (CCO™)

59.  Certified Cyber Operations Planner™ (CCOP™)

60.  Certified Exploitation and Penetration Analyst™ (CEPA™)

61.  Certified Mission Assurance Specialist™ (CMAS™)

62.  Certified Joint Targeting Analyst™ (CJTA™)

63.  Certified Target Developer™ (CTD™)

64.  Certified Target Digital Network Analyst™ (CTDNA™)

65.  Certified AI Adoption Specialist™ (CAIAS™)

66.  Certified AI Innovation Leader™ (CAIL™)

67.  Certified AI Risk & Ethics Specialist™ (CARES™)

68.  Certified AI Test & Evaluation Specialist™ (CATES™)

69.  Certified AI/ML Specialist™ (CAIMLS™)

70.  Certified Control Systems Security Specialist™ (CCSSS™)

71.  Certified Digital Network Exploitation Analyst™ (CDNEA™)

72.  Certified Data Architect™ (CDA™)

73.  Certified Data Officer™ (CDO™)

74.  Certified Data Operations Specialist™ (CDOS™)

75.  Applied Data Scientist Certified Professional (ADSCP)

76.  Certified Data Steward Analyst™ (CDSA™)

77.  DevSecOps Specialist Certified™ (DevSC™)

78.  Certified Secure Host Configuration Analyst™ (CSHCA™)

79.  Certified Network Monitoring Analyst™ (CNMA™)

80.  Certified Network Technician™ (CNT™)

81.  Certified User Interface Designer™ (CUID™)

82.  Certified Product Manager Professional™ (CPMP™)

83.  Certified User Experience Service Designer™ (CUXSD™)

84.  Certified Software Test & Evaluation Specialist™ (CSTES™)

85.  Certified Software & Cloud Architect™ (CSCA™)

86.  Certified Information Systems Developer™ (CISD™)

87.  Certified Target Analyst Reporter™ (CTAR™)

88.  Certified Site Reliability Engineer™ (CSRE™)

89.  Certified Malware Reverse Engineer™ (CMRE™)

90.  Chief Information Officer Certified™ (CIOC™)

91.  Defensive Cyber Operations Expert – Cybersecurity (Defense) ™ (DCOE-CD™)

92.  Defensive Cyber Operations Expert – Cybersecurity (Infrastructure) ™ (DCOE-CI™)

93.  Defensive Cyber Operations Expert – Cybersecurity (Management™) (DCOE-CM™)

94.  Defensive Cyber Operations Expert – Cybersecurity (Assessments) ™ (DCOE-CA™)

95.  Defensive Cyber Operations Expert – Intelligence (Cyberspace)™ (DCOE-IC™)

96.  Defensive Cyber Operations Expert – Cyber Enabler (Leaders)™ (DCOE-CL™)

97.  Defensive Cyber Operations Expert – Cyber Enabler (Legal/LE) ™ (DCOE-CLE™)

98.  Defensive Cyber Operations Expert – Cyber Enabler (Training)™ (DCOE-TR™)

99.  Offensive Cyber Operations Expert (OCOE) – Cyber Effects (CE)™ (OCOE-CE™)

100.  Technical Support Operations Expert – IT (Cyberspace)™ (TSOE-IT™)

101.  Technical Support Operations Expert – Software Engineering™ (TSOE-SE™)

102.  Technical Support Operations Expert – Data/AI™ (TSOE-DA™)

103.  Critical Infrastructure Certified Expert™ (CICE™)

104.  Certified Insider Threat Expert – Cyber™ (CITE-C™)

105.  Certified Insider Threat Expert – Infrastructure™ (CITE-I™)

106.  Certified Insider Threat Expert – Data™ (CITE-D™)

107.  Defensive Cyber Operations Expert – Cyber Enabler (Program Management)™ (DCOE-PM™)

8. Policy for Candidates with Existing Certifications and ITI Certifications

Replacement Certification Policy:
If a candidate already holds one or more certifications included in an IMTS Training Institute certification course bundle or micro degree, they are required to complete alternative IMTS Training Institute certifications to fulfill the program requirements.

·         Certification Validation

o   Candidates must provide proof of their existing certifications during the enrollment process.

o   Accepted forms of proof include certification ID numbers, digital badges, or official certificates.

·         Replacement Certifications

o   IMTS Training Institute will recommend alternative certifications of equal or higher value from its catalog of certifications that align with the program’s objectives and the candidate’s professional development.

o   Replacement certifications will only be selected from IMTS Training Institute offerings.

·         Program Fee

o   The total program fee remains unchanged, regardless of certification replacements.

·         Customized Learning Path

o   Replacement certifications are selected to ensure that candidates gain equivalent value and expertise within the IMTS Training Institute framework, maintaining the program’s rigor and comprehensiveness.

·         Program Completion

o   Candidates must complete all required certifications, including any replacements, to earn the designation associated with the program.