Our data collection promisesWe collect as little data as possible. Nonetheless this is sometimes necessary to make sure our software systems are functionally complete. We take great care of your data and make sure your privacy is guaranteed.
This is why we promise you the four following things:
- We will protect your data.
- We will not to store data longer than necessary.
- We will never share your data with third parties.
Which data do we process?To make sure our software systems are functionally complete we need to process the following data categories.
Name, email and address dataWe need your name, email and address data to make sure we can contact you properly and promptly.
Login credentialsYour login credentials are stored to make sure your account is safe and only you can login into your account.
IP addressWe need to store your IP address temporarily as a security measure to make sure that malicious users do not attempt to brute-force your login credentials.
CookiesCookies are an essential technical bit to make sure the systems are functioning properly. Without cookies you would need to login on every page again and again as the current web protocol is stateless. Cookies contain a random session identification number that we use to recognize you when you open a new web page.
Other data we processWe also collect data that might seem irrelevant for proper functioning of our software systems, however they have other purposes as presented below.
Server logsWhile interacting with our software systems our servers automatically create log files that contain information relevant for debugging, such as browser version, IP, timestamp, etc. Aside from debugging we actively leverage this data to implement a number of quality- and security-related products, such Codana® and Secure Patrol®.
Codana® is a qualitative tool developed by Codific to make sure that programming errors are actively followed up by our team of engineers and solved before they escalate.
Secure Patrol® is a complete security solution targeted towards real-time monitoring and protection of software systems.
Server logs are rotated and eventually cleared within a couple of months.
Audit logsAs opposed to server logs audit logs contain more context-related information such as, which user has done what action within the system. Audit logs are firstly used to spot potential access control violations. Furthermore, audit logs can be leveraged to debug issues.
Audit logs are cleared every 2 months.
Data processing purposesWe need to process your data with a very specific purpose in mind, such as:
* providing you with access to our software systems,
* depending on your contractual information deciding what level of access you should get,
We will not use your data for purposes other than defined here.