top of page
A group of women at a business meeting

Diversity, Equity, and Inclusion


At the Global Counter-Terrorism Institute, we are committed to creating a diverse, equitable, and inclusive environment for all of our employees, partners, and stakeholders. We recognize that diversity is not only a strength, but a necessity in the fight against terrorism. We strive to create a workplace culture that values and respects differences in race, ethnicity, gender identity, sexual orientation, age, religion, and ability.

We believe in the importance of equity, and are committed to creating fair and just policies and practices that ensure everyone has equal opportunities for success and advancement. We also recognize the need for inclusion, and are dedicated to creating an environment where everyone feels valued, heard, and supported.

We understand that our mission to counter terrorism requires a global and collaborative effort, and we are committed to building strong partnerships with individuals and organizations that share our commitment to diversity, equity, and inclusion. We believe that by working together and embracing our differences, we can achieve our shared goal of creating a safer and more secure world for all.


Formal Pledge: 

As a member of the Global Counter-Terrorism Institute, I pledge to uphold and promote diversity, equity, and inclusion in all aspects of my work. I recognize that diversity is not only a strength, but a necessity in the fight against terrorism. I will work to create a workplace culture that values and respects differences in race, ethnicity, gender identity, sexual orientation, age, religion, and ability.

I understand that equity is essential for ensuring that everyone has equal opportunities for success and advancement, and I commit to supporting fair and just policies and practices. I also recognize the importance of inclusion and will strive to create an environment where everyone feels valued, heard, and supported.

I recognize that our mission to counter terrorism requires a global and collaborative effort, and I pledge to work with individuals and organizations that share our commitment to diversity, equity, and inclusion. I believe that by working together and embracing our differences, we can achieve our shared goal of creating a safer and more secure world for all.

Todd M Price MBA

CEO and Co-Founder

Global CT Institute


You can Download a copy of our General Data Privacy Policy: Click Here

We receive, collect and store any information you enter on our website or provide us in any other way. In addition, we collect the Internet protocol (IP) address used to connect your computer to the Internet; login; e-mail address; password; computer and connection information and purchase history. We may use software tools to measure and collect session information, including page response times, length of visits to certain pages, page interaction information, and methods used to browse away from the page. We also collect personally identifiable information (including name, email, password, communications); payment details (including credit card information), comments, feedback, product reviews, recommendations, and personal profile.

Institute Vetting 


Staff are considered "Agents" of the School and require background check and does not disqualify a person but we maintain a data  base for purposes to assist with hiring


In the context of the Institutes Mission Statement and its commitment to the care and protection of its students and of all who work in the school, the board of management has adopted the policy set out hereunder to govern its application of vetting as part of its recruitment practice.

The policy has been framed in compliance with:


Admission requires Identification for enrollment in Diploma and Masters programs. Each case is based on SDN and OFAC list. 

Privacy and Information Management Privacy Policy

Policy elements

Confidential data

Confidential data is secret and valuable. Common examples are:

  • Unpublished financial information

  • Data of customers/partners/vendors

  • Patents, formulas or new technologies

  • Customer lists (existing and prospective)

All employees are obliged to protect this data. In this policy, we will give our employees instructions on how to avoid security breaches.

Protect personal and company devices

When employees use their digital devices to access company emails or accounts, they introduce security risk to our data. We advise our employees to keep both their personal and company-issued computer, tablet and cell phone secure. They can do this if they:

  • Keep all devices password protected.

  • Choose and upgrade a complete antivirus software.

  • Ensure they do not leave their devices exposed or unattended.

  • Install security updates of browsers and systems monthly or as soon as updates are available.

  • Log into company accounts and systems through secure and private networks only.

  •  Illicit sites, torrent sites, deep/dark web links[E1] [TP2] [TP3]  can expose serious risk to our networks please refrain going


  • When in doubt use the private/incognito mode of the browsers during the 1st visit to an unknown website

We also advise our employees to avoid accessing internal systems and accounts from other people’s devices or lending their own devices to others.

When new hires receive company-issued equipment they will receive instructions for:

  • [Disk encryption setup]

  • [Password management tool setup]

  • [Installation of antivirus/ anti-malware software]

They should follow instructions to protect their devices and refer to our [Security Specialists/ Network Engineers] if they have any questions.

Keep emails safe

Emails often host scams and malicious software (e.g., worms.) To avoid virus infection or data theft, we instruct employees to:

  • Avoid opening attachments and clicking on links when the content is not adequately explained (e.g., “watch this video, it’s amazing.”)

  • Be suspicious of clickbait titles (e.g., offering prizes, advice.)

  • Check email and names of people they received a message from to ensure they are legitimate.

  • Look for inconsistencies or giveaways (e.g., grammar mistakes, capital letters, excessive number of exclamation marks.)

If an employee isn’t sure that an email, they received is safe, they can refer to our [IT Specialist.]


Manage passwords properly

Password leaks are dangerous since they can compromise our entire infrastructure. Not only should passwords be secure so they won’t be easily hacked, but they should also remain secret. For this reason, we advise our employees to:

  • Choose passwords with at least eight characters (including capital and lower-case letters, numbers and symbols) and avoid information that can be easily guessed (e.g. birthdays.)

  • Remember passwords instead of writing them down. If employees need to write their passwords, they are obliged to keep the paper or digital document confidential and destroy it when their work is done.

  • Exchange credentials only when absolutely necessary. When exchanging them in-person isn’t possible, employees should prefer the phone instead of email, and only if they personally recognize the person they are talking to.

  • Change their passwords every two months.

Remembering a large number of passwords can be daunting. We will purchase the services of a password management tool which generates and stores passwords. Employees are obliged to create a secure password for the tool itself, following the abovementioned advice.

Transfer data securely

Transferring data introduces security risk. Employees must:

  • Avoid transferring sensitive data (e.g., customer information, employee records) to other devices or accounts unless absolutely necessary. When mass transfer of such data is needed, we request employees to ask our [Security Specialists] for help.

  • Share confidential data over the company network/ system and not over public Wi-Fi or private connection.[E4] 

  • Ensure that the recipients of the data are properly authorized people or organizations and have adequate security policies.

  • Report scams, privacy breaches and hacking attempts

Our [IT Specialists/ Network Engineers] need to know about scams, breaches and malware so they can better protect our infrastructure. For this reason, we advise our employees to report perceived attacks, suspicious emails or phishing attempts as soon as possible to our specialists. Our [IT Specialists/ Network Engineers] must investigate promptly, resolve the issue and send a companywide alert when necessary.

Our Security Specialists are responsible for advising employees on how to detect scam emails. We encourage our employees to reach out to them with any questions or concerns.


Additional measures

To reduce the likelihood of security breaches, we also instruct our employees to:

  • Turn off their screens and lock their devices when leaving their desks.

  • Report stolen or damaged equipment as soon as possible to [HR/ IT Department].

  • Change all account passwords at once when a device is stolen.

  • Report a perceived threat or possible security weakness in company systems.

  • Refrain from downloading suspicious, unauthorized or illegal software on their company equipment.

  • Avoid accessing suspicious websites.

We also expect our employees to comply with our social media and internet usage policy.

Our [Security Specialists/ Network Administrators] should:

  • Install firewalls, anti-malware software and access authentication systems.

  • Arrange for security training to all employees.

  • Inform employees regularly about new scam emails or viruses and ways to combat them.

  • Investigate security breaches thoroughly.

  • Follow this policies provisions as other employees do.

  • Install ad block plus

Our company will have all physical and digital shields to protect information.

Remote employees

Remote employees must follow this policy’s instructions too. Since they will be accessing our company’s accounts and systems from a distance, they are obliged to follow all data encryption, protection standards and settings, and ensure their private network is secure.

We encourage them to seek advice from our [Security Specialists/ IT Administrators.]

Disciplinary Action

We expect all our employees to always follow this policy and those who cause security breaches may face disciplinary action:

  • First-time, unintentional, small-scale security breach: We may issue a verbal warning and train the employee on security.

  • Intentional, repeated or large-scale breaches (which cause severe financial or other damage): We will invoke more severe disciplinary action up to and including termination.
    We will examine each incident on a case-by-case basis.

Additionally, employees who are observed to disregard our security instructions will face progressive discipline, even if their behavior hasn’t resulted in a security breach.

Take security seriously

Everyone, from our customers and partners to our employees and contractors, should feel that their data is safe. The only way to gain their trust is to proactively protect our systems and databases. We can all contribute to this by being vigilant and keeping cyber security top of mind.


Policy brief & purpose

Our Company Data Protection Policy refers to our commitment to treat information of employees, customers, stakeholders and other interested parties with the utmost care and confidentiality.

With this policy, we ensure that we gather, store and handle data fairly, transparently and with respect towards individual rights.


This policy refers to all parties (employees, job candidates, customers, suppliers etc.) who provide any amount of information to us.

Who is covered under the Data Protection Policy?

Employees of our company and its subsidiaries must follow this policy. Contractors, consultants, partners and any other external entity are also covered. Generally, our policy refers to anyone we collaborate with or acts on our behalf and may need occasional access to data.

Policy elements

As part of our operations, we need to obtain and process information. This information includes any offline or online data that makes a person identifiable such as names, addresses, usernames and passwords, digital footprints, photographs, social security numbers, financial data etc.

Our company collects this information in a transparent way and only with the full cooperation and knowledge of interested parties. Once this information is available to us, the following rules apply.

Our data will be:

  • Accurate and kept up-to-date

  • Collected fairly and for lawful purposes only

  • Processed by the company within its legal and moral boundaries

  • Protected against any unauthorized or illegal access by internal or external parties


Our data will not be:

  • Communicated informally

  • Stored for more than a specified amount of time

  • Transferred to organizations, states or countries that do not have adequate data protection policies

  • Distributed to any party other than the ones agreed upon by the data’s owner (exempting legitimate requests from law enforcement authorities)

In addition to ways of handling the data the company has direct obligations towards people to whom the data belongs. Specifically,

we must:

  • Let people know which of their data is collected

  • Inform people about how we’ll process their data

  • Inform people about who has access to their information

  • Have provisions in cases of lost, corrupted or compromised data

  • Allow people to request that we modify, erase, reduce or correct data contained in our databases



To exercise data protection, we’re committed to:

  • Restrict and monitor access to sensitive data

  • Develop transparent data collection procedures

  • Train employees in online privacy and security measures

  • Build secure networks to protect online data from cyberattacks

  • Establish clear procedures for reporting privacy breaches or data misuse

  • Include contract clauses or communicate statements on how we handle data

  • Establish data protection practices (document shredding, secure locks, data encryption, frequent backups, access authorization etc.)

Our data protection provisions will appear on our website.

Disciplinary Consequences

All principles described in this policy must be strictly followed. A breach of data protection guidelines will invoke disciplinary and possibly legal action.



bottom of page