How do we store the data #16
|
@ -32,4 +32,30 @@ This privacy policy applies to all services hosted on **Disroot.org** and its su
|
||||||
- **User** or **you**: any person or third party that access and uses the services provided by **Disroot.org**.
|
- **User** or **you**: any person or third party that access and uses the services provided by **Disroot.org**.
|
||||||
- **Disroot, Disroot.org, we** or **us**: Stichting Disroot.org
|
- **Disroot, Disroot.org, we** or **us**: Stichting Disroot.org
|
||||||
- **Platform**: is the set of services provided by **Disroot.org** and that are hosted on our servers.
|
- **Platform**: is the set of services provided by **Disroot.org** and that are hosted on our servers.
|
||||||
- **Federated services**: Services that operates on the basis of so-called **Federation Protocols** which enables users signed up at different services providers to interact with each other. Examples of these services are **Nextcloud**, **Email**, **Hubzilla** and **XMPP**.
|
- **Federated services**: Services that operates on the basis of so-called **Federation Protocols** which enables users signed up at different services providers to interact with each other. Examples of these services are **Nextcloud**, **Email**, **Hubzilla** and **XMPP**.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
# 1. What data do we collect?
|
||||||
|
|
||||||
|
## What do we do with your data?
|
||||||
|
|
||||||
|
# 2. What we do not do with your data
|
||||||
|
|
||||||
|
## How do we store your data?
|
||||||
|
To protect your data we use the following security measures:
|
||||||
|
|
||||||
|
* a. We use disk encryption on all data to prevent data leak in case the servers are stolen, confiscated, or in any way physically tampered with.
|
||||||
|
|
||||||
|
* b. We provide and require SSL/TLS encryption on all provided services.
|
||||||
|
|
||||||
|
|||||||
|
# 3. Where the data is stored?
|
||||||
|
We store all data in our own servers located in the Netherlands.
|
||||||
|
|
||||||
|
# 4. Per service detailed privacy notices
|
||||||
|
|
||||||
|
# 5. Your rights
|
||||||
|
|
||||||
|
## Access to your information
|
||||||
|
|
||||||
|
# 6. Changes on this Privacy Policy
|
||||||
|
|
Loading…
Reference in New Issue
perhaps we should add:
c. We utilize "end to end" and/or "servcer-side" encryption whenever possible in software used to provide maximum security for the users.