Commit 4e2a8d80 authored by sub's avatar sub

from e' meglio di against in un botto di casi

parent e18812a3
Pipeline #6498 passed with stages
in 2 minutes and 35 seconds
......@@ -65,9 +65,9 @@ meant to protect all data with automated anonymization applied before we start p
that constitute a breach of our Terms of Services (spamming, DDoS and others), we will only be
able to recover from our servers an anonymized IP address possibly relatable to a user’s account
but not to a certain physical subject. We store logs of user activity for a period up to 15 days
(unless specified otherwise per service).
Data regarding users’ activity helps us diagnose software issues, maintain security of the
systems against intrusion, and monitor the health of the platform.
(unless otherwise specified per service).
Data regarding users’ activity helps us diagnose software issues, preserve security of the
systems from intrusion, and monitor the health of the platform.
We use disk encryption on all data to mitigate the risk of data leaks in cases where
servers might be stolen, seized, or in any way physically tampered with.
......@@ -159,9 +159,9 @@ us to disable and delete unused or abandoned accounts.
We keep track of the users’ activity on our Services, but the logs we store never
contain any personally identifying information, and do not include information
related to activities outside of our platform. A/I uses this data to help diagnose
software issues, protect the system against intrusion, and monitor the health of
software issues, protect the system from intrusion, and monitor the health of
the services. We store anonymized logs of the Services' operation for a period up
to 15 days, unless specified otherwise.
to 15 days, unless otherwise specified.
### Data storage and use
......@@ -169,7 +169,7 @@ Data is stored only inside of the EU or within GDPR abiding countries;
we have direct and exclusive access to all the dedicated servers where the data
is stored. The processing of data takes place exclusively within EU territory
and GDPR abiding countries. Communication between all servers is encrypted
with “state of the art” protocols in order to protect any information against
with “state of the art” protocols in order to protect any information from
unauthorized access, unauthorized alteration, destruction or disclosure of data.
We do not use any public cloud providers (as AWS, Google cloud, Digital Ocean
or the like).
......@@ -252,7 +252,7 @@ of the Services offered by A/I is under your control.
We do not access your data, emails, files etc. stored on our servers unless needed for
troubleshooting purposes, or under suspicion of breaking our policy. In the case of
troubleshooting, we ask for your permission previously to the act of accessing your
data and inform you afterwards of all actions taken against the account in the
data and inform you afterwards of all actions taken on the account in the
transparency report addressed to account holder.
Some of the Services provided by A/I such as Email and Jabber are operating based on
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment