Security Management Resources® (SMR) is the sole and legal owner of all information collected on this website.

Your privacy is important to us. To better protect your privacy we provide this notice explaining our online information practices and the choices you can make about the way your information is collected and used. We are fully committed to protecting the privacy of your personal data.

This document summarizes our website’s policies regarding the collection, use and transfer of your personal data and the security policy measures SMR employs to protect such data and your right to access.

Personal Information We Collect

Security Management Resources® is an executive search and recruitment firm. As such we collect a variety of personal data necessary to provide such services in a proprietary and highly confidential database accessible only by SMR.  Personal identifiable data includes but is not limited to: career history, education history, compensation, professional experience, resume and contact information.

By submitting your information to Security Management Resources®, by whatever means, you are indicating your willingness to disclose this information to Security Management Resources® and to be considered, when appropriate, for one of our current and/or future recruitment engagements.

Should you not wish to disclose your personal information, we will be unable to provide you the services offered to potential candidates by this website, since employment, educational and other personal information is necessary in order to assess your potential for employment opportunities.

Security Management Resources® will not seek any sensitive information through our website unless legally required for recruitment purposes.  If you object to your information being shared and transferred in such manner, or if you do not wish to be considered for one of our search engagements, please do not enter your personal information into the website.,

Use, Purpose and Disclosure

To enable us to assess and present you as a potential candidate to Security Management Resources®’ clients, your personal information may be shared with clients and/or transferred between Security Management Resources®’ worldwide companies. Each Security Management Resources® entity is committed to implementing the appropriate data integrity and security measures required in order to protect your information.

By providing Security Management Resources® with your personal information you indicate your authorization and consent to share and have your information stored by Security Management Resources®, transferred between Security Management Resources®’ worldwide companies for the purposes of, when appropriate, being considered for one of our current and/or future recruitment engagements. A list of our offices can be found on our website at or

Your personal information may also be used anonymously and in the aggregate in order to put together industry, marketing and employment statistics. Your personal information used in this manner will be non-identifying to an individual. Security Management Resources® also monitors IP addresses for security purposes, trend analysis, website administration, user movement tracking relevant to our website and broad demographic information gathering for aggregate use.

IP Addresses

SMR may collect information about your computer including where available your IP address, operating system and browser type for system administration and to analyze visitor trends and traffic on our website. This information is collected in aggregate form and does not identify individuals. It is not passed on to third parties.

Security and Integrity of Your Information

To prevent unauthorized access, maintain accuracy of data and ensure proper use of information, SMR has put in place appropriate physical, electronic and managerial security procedures to safeguard all information collected online. In addition to requiring all users to sign in with a unique username and password (used for user authentication only), all sections of the website in which personal information is submitted or exchanged employ industry-standard SSL encryption and are authenticated by an SSL Certification Authority (CA).

We will not process your personal information in a way that is incompatible with what is outlined in this Privacy Policy, and will use our best efforts to ensure that data is accurate, complete, current and reliable for its intended use. We also will use our best efforts to protect your information from loss, misuse, unauthorized access, disclosure, alteration and destruction.

Access to Information

If you need assistance accessing, updating, correcting or removing your personal information from our systems, or if you no longer desire our services, please email Security Management Resources® at:


Please be aware that this website may contain links to third-party websites. This Privacy Policy applies exclusively to information collected through this website. This Privacy Policy does not apply to, nor is Security Management Resources® responsible for, any content, privacy practices, or conduct of such websites not owned or controlled by SMR. We encourage our users to be aware when they leave our website and they should read the privacy policies of each and every website, particularly those that collect personally identifiable information.


Security Management Resources® may use browser cookies on this website. Cookies are text files containing small amounts of information which are downloaded to your computer or mobile device when you visit a website. We use these cookies to provide a higher quality, more relevant, user experience by storing user preferences and monitoring user trends, as well as to deliver services requested by you. By using our website  or you accept the use of cookies in accordance with this Cookie Policy.

If you do not accept the use of these cookies please disable them by following the instructions in or by changing your browser settings as indicated below so that cookies from this website cannot be placed on your computer or mobile device.

Automated Tools

Security Management Resources® may also collect information during your visit to the SMR website through automated tools, which include Web beacons, cookies, embedded Web links, and other commonly used information-gathering tools. These tools collect certain standard information that your browser sends to our website such as your browser type and language, access times, and the address of the website from which you arrived at SMR’s website

We may use customized and proprietary JavaScript code provided by third-party integrated platforms including, but not limited to, Google Analytics, Google Tag Manager, to collect and transmit visitor information to their servers. When a user visits our site, this code contacts the respective third-party platforms’ servers and sends the aforementioned data. This data is stored, devoid of personally identifiable information, on the third-party server for the purposes of analysis that will be used to improve and provide contextual experiences to site visitors.

Necessary cookies – These cookies are essential in order to enable you to move around the website and use its features, such as accessing secure areas of the website. Use of cookies may also allow us to automate entry into password protected portions of the site so that you will not need to re-enter your password each time you visit our site.

Functionality cookies – These cookies allow the website to remember choices you make and provide enhanced, more personalized features. They may also be used to provide services in the way you have specified, such as collating data in a report.

Performance cookies – These cookies collect information about how you use our website, for instance which pages you visit and how often. These cookies do not collect information that identifies you. All information these cookies collect is aggregated and therefore anonymous. It is only used to improve our website and the service we provide to you.

We may also perform IP lookups to determine which domain you are coming from to more accurately gauge our users' demographics.

How to control cookies?

Most internet browsers allow you to erase cookies from your computer hard drive, block all cookies, or receive a warning before a cookie is stored on your computer. Please refer to your browser instructions (usually located within the “Help”, “Tools” or “Edit” facility) or a help screen to learn more about these functions and how to use them. Please be advised that certain sections or functionalities of the site may be inaccessible to you if your browser does not accept cookies.

For further information on cookies, including how to see what cookies have been set on your device and how to manage and delete them, visit

Material Changes to the Privacy Policy

Security Management Resources® reserves the right to modify or amend the Privacy Policy at any time and for any reason. If there are material changes to the Privacy Policy, we will post those changes here and may email them to you so that you can keep informed. Please check back to this Privacy Policy from time to time to stay informed. If you do not wish to continue using this website after reading the revised Privacy Policy, you may opt-out by leaving the site.

If you have any questions about your personal information, please e-mail Security Management Resources® at

Copyright © 2018 Security Management Resources®, Inc. All rights reserved.