Wolfram Alpha |
info given about security practices |
|
disputed |
user 428 |
Xiaomi |
"All your personal information is stored on secure servers, and protected in controlled facilities.
We classify your information based on importance and sensitivity, and ensure that your personal information has the required level of security.
We have special access controls for cloud-based data storage, and we regularly review our information collection, storage and processing practices, including physical security measures, to guard against any unauthorized access and use." |
|
approved |
Agnes de Lion Curator |
DuckDuckGo |
"" |
|
declined |
import script Bot |
WhatsApp |
"" |
|
declined |
import script Bot |
WhatsApp |
"" |
|
declined |
import script Bot |
RapidShare |
"" |
|
draft |
import script Bot |
Facebook |
Facebook |
|
declined |
import script Bot |
Flattr |
flattr terms updated 29 aug |
|
declined |
import script Bot |
Steam |
Steam - users defend and indemnify Valve |
|
declined |
import script Bot |
La Centrale |
"Ainsi, nous utilisons des mesures de sécurisation (et notamment d'authentification des personnels) de nos locaux, de nos outils informatiques, de notre réseau informatique interne et des serveurs, de sauvegarde des données, de journalisation des activités, de sécurisation des données lors des développements informatiques et des opérations de maintenance, des anomalies et des évènements liés à la sécurité des données, des mesures d'archivage, et de protection en cas d'échange de données (par exemple le protocole " https ").</p" |
|
pending |
Agnes de Lion Curator |
Tartle |
"TARTLE secures your personal information from unauthorized access, use, or disclosure.
TARTLE uses the following methods for this purpose:</p>
<p>– SSL Protocol</p>
<p>– AES-256bit Military Grade VPN Connecti" |
|
approved |
Geographyisdestiny |
PayPal |
paypal |
|
declined |
import script Bot |
Facebook |
Article: What Facebook knows (data mining, etc;) |
|
declined |
import script Bot |
livejournal |
LiveJournal terms of service |
|
declined |
import script Bot |
Dropbox |
[Good] Dropbox can cancel your account without notice but they'll try to avoid it |
|
declined |
import script Bot |
Dropbox |
[Bad] Dropbox uses cookies to track users |
|
declined |
import script Bot |
couchsurfing |
Couchsurfing TOS |
|
declined |
import script Bot |
Twitter |
Regarding Twitter |
|
declined |
import script Bot |
Delicious |
Delicious previous terms |
|
draft |
import script Bot |
Facebook |
Unofficial ToS;DR Facebook Page |
|
declined |
import script Bot |
TwitPic |
a good article with real life examples with broad copyright licenses from Twitpic, twitter |
|
draft |
import script Bot |
ToS;DR |
"Passwords are hashed in our database with the bcrypt algorithm" |
|
approved |
Michael Curator |
WhatsApp |
WhatsApp doesn't collect personal information besides the phone number |
|
draft |
import script Bot |
Wordfeud |
Wordfeud |
|
declined |
import script Bot |
Facebook |
[Bad] Facebook UI induces oversharing |
|
declined |
import script Bot |
FastMail |
"How we protect and store your information
Security" |
|
approved |
lemmings |
Akshit's Blog |
"If you have any questions about the security of your personal information, you can contact me at questions@akshit.me.</p>" |
|
draft |
akshitk |
WhatsApp |
[Bad] WhatsApp may use your phone number for non-marketing or administrative purposes |
|
declined |
import script Bot |
ISODME |
"You are solely responsible for the activity that occurs on your Account, whether authorized by you or not, and you must keep your Account information secure, including without limitation your customer number/login, password.
For security purposes, ISODME recommends that you change your password at least once every six (6) months for each Account .
" |
|
changes-requested |
jonathanlei |
Minds |
info given about security practices |
|
approved |
Therapy Snek Curator |
TopTree.cc (discontinued?) |
"How we protect your data" |
|
approved-not-found |
metacoz Curator |
App.net |
"" |
|
draft |
import script Bot |
GitHub |
"We use a number of third party analytics and service providers to help us evaluate our users' use of GitHub.
compile statistical reports on activity.
and improve our content and website performance.
We only use these third party analytics providers on certain areas of our website, and all of them have signed data protection agreements with us that limit the type of personal information they can collect and the purpose for which they can process the information." |
|
draft |
import script Bot |
Liberapay |
"<p>All network connections are encrypted, except for some communications between machines located in the same datacenter.</p>
<p>As a precaution against identity theft in case of data leak, the identity information of Liberapay account owners is stored encrypted in our database.</p>" |
|
approved |
ArloJamesBarnes Curator |
Fotocommunity |
"" |
|
declined |
import script Bot |
(NONE) |
"" |
|
declined |
import script Bot |
chromewebstore |
"" |
|
declined |
import script Bot |
JoinDiaspora.com |
"" |
|
declined |
import script Bot |
WhatsApp |
"<p> <strong>Address Book.</strong> You provide us the phone numbers of WhatsApp users and your other contacts in your mobile phone address book on a regular basis. You confirm you are authorized to provide us such numbers to allow us to provide our Services. </p>" |
|
changes-requested |
Photon Curator |
Kink.com |
"We employ technical and organizational measures such as firewalls and encryption that are designed to appropriately protect your information that is under our control and that we process on your behalf from unauthorized access collection, use, disclosure, copying, modification or disposal, both during transmission and once we receive it.
We store all information that you provide to us on secure servers.
" |
|
approved-not-found |
alison Curator |
RightsStatements |
"We take all steps necessary to ensure that your data is stored securely and used only in accordance with the preferences you have requested." |
|
approved |
ArloJamesBarnes Curator |
PrivacyTools |
"How do we protect your information? <p>We implement a variety of security measures to maintain the safety of your personal information when you enter, submit, or access your personal information.
Among other things, your browser session, as well as the traffic between your applications and the API, are secured with SSL, and your password is hashed using a strong one-way algorithm.
" |
|
approved-not-found |
(deactivated) |
Associação de Defesa da Privacidade Digital |
"1 – Nós iremos tomar todas as providências possíveis para evitar a perda de seus dados, investindo na segurança do site;" |
|
declined |
victorrms |
Associação de Defesa da Privacidade Digital |
"2 – Seus dados estão protegidos em um servidor seguro, com Firewall e senha;</p>" |
|
declined |
victorrms |
Associação de Defesa da Privacidade Digital |
"1 – Nós iremos tomar todas as providências possíveis para evitar a perda de seus dados, investindo na segurança do site;</p>
<p>2 – Seus dados estão protegidos em um servidor seguro, com Firewall e senha;</p>
<p>3 – Você está ciente que mesmo a segurança na internet está suscetível a falhas, e não podemos nos assegurar de todos os dados enviados pela internet." |
|
declined |
victorrms |
CCleaner |
"11.
Data Security <p>11.1 Safeguards for protection of personal information
We maintain administrative, technical, and physical safeguards for the protection of your personal data.
" |
|
approved |
user 104 Curator |
mastodon.social |
"How do we protect your information? <p>We implement a variety of security measures to maintain the safety of your personal information when you enter, submit, or access your personal information.
Among other things, your browser session, as well as the traffic between your applications and the API, are secured with SSL, and your password is hashed using a strong one-way algorithm.
" |
|
approved |
mikwee |
Turnitin |
"<strong>Cyber Essentials <br>(certified November 2019)</strong>
</p>
<p>
</p> Cyber Essentials accredits a company's IT infrastructure ensuring that its firewalls, secure configurations, user access control, malware protection, and patch management are of a high enough standard to protect any data within the company.
Turnitin obtained the Cyber Essentials certification at the request of several international customers.
Turnitin successfully completed a third-party audit of the effectiveness of our basic security controls.
<p>
<strong>SOC 2 Compliance</strong>
</p>
<p>
</p> SOC2 is an audit of a company's readiness to protect their user's privacy and the security of their data.
The company must show protections for both the data itself and the physical security of the locations it is stored.
Turnitin obtained the SOC2 certification to demonstrate our commitment to security, privacy, and availability.
To obtain this certification, over 160 controls aligned to the SOC2 criteria were designed for Turnitin and audited for effectiveness.
Turnitin successfully satisfied 100% of the controls audited." |
|
declined |
AD59 |
repl.it |
"Unfortunately, no security measures are 100% foolproof, and as such no network or system (including ours) can be guaranteed to be 100% secure against destruction, loss, alteration, unauthorized disclosure of, or access to information we collect and store." |
|
changes-requested |
Esmooth Curator |
VK |
"To reduce the probability of third parties gaining unauthorized access, if you login to your account from an unusual server (in particular, from a server located in a foreign country), we will block entry to your personal page.
You will then receive a message asking you to provide certain digits indicated in SMS sent to your mobile phone number.
After three unsuccessful attempts to enter these digits, we will block access from that server for 4 hours." |
|
approved |
Agnes de Lion Curator |
Pixel8Earth |
"We may employ procedural and technological measures, consistent with industry practice, to help protect your personally identifiable information from loss, unauthorized access, disclosure, alteration or destruction.
Pixel8Earth may use password protection and place internal restrictions on who in the company may access your data to help prevent unauthorized access to your personally identifiable information." |
|
approved |
ArloJamesBarnes Curator |
InfoSec Handbook |
"No logging by default – ✅ Minimal data processing</p>
<p>We decided to choose the best protection for your personal data: We simply do not collect it.
You don’t have to trust us, because you keep your data.
By default, we do not log anything, and we concluded a data processing agreement according to Article 28 GDPR with our server provider (see our privacy policy).</p>
<p>✅ Single-purpose server – ✅ No databases</p>
<p>For security, we provide our blog using a dedicated virtual server.
There aren’t any other public services on this server (e.g., no database server, no mail server, no messaging server).
For instance, the decentralized Dat version of our blog runs on another virtual server.</p>
<p>✅ Security monitoring – ✅ Strong authentication – ✅ Defined processes</p>
<p>Our server is permanently monitored to check for modified files and login attempts.
Two-factor authentication is needed to access our server.
The core of our server is a hardened Linux installation.
This means that we removed unnecessary packages and applied strict configuration at kernel level.
Finally, we implemented processes to ensure installation of security updates within a narrow time frame and quick reaction to reported potential security vulnerabilities.</p>
<p>✅ 100% static content – ✅ No CMS, PHP, or JavaScript – ✅ No 3rd party content</p>
<p>Our blog consists of 100% static content.
There is no content management system (CMS) installed and there is no dynamically-served content like PHP or JavaScript.
We do not embed any third-party content, and all links to third-party websites are marked.
Actually, third-party websites, which you access from our blog, run in a separate process in your web browser, and we strip any Referrer information.</p>" |
|
approved-not-found |
komo |
Signal |
The user is informed about security practices |
|
draft |
Agnes de Lion Curator |
Patreon |
"We use reasonable and appropriate physical, technical, and administrative industry safeguards to protect information from unauthorized access, use, loss, misuse or unauthorized alteration.</p>" |
|
approved |
ArloJamesBarnes Curator |
WeMod |
"We take reasonable steps to maintain the security of the personally-identifiable information that we collect, including utilizing SSL certificates for data encryption, PCI Scanning, S-HTTP and management-only password-secured access limited to two (2) managers." |
|
approved |
Dr_Jeff ToS;DR |
AliExpress |
"If you share a computer with others, you should not choose to save your log-in information (e.g., user ID and password) on that shared computer.
Remember to sign out of your account and close your browser window when you have finished your session.</p>" |
|
declined |
ProjectELP |
Blizzard |
"Blizzard has taken steps to assure that all information collected will remain secure and in its original form, i.e.
free from any alteration.
As such, access to all personal information is strictly controlled.
When credit card information is transmitted, for example, we use industry standard, SSL (secure sockets layer) encryption.
We follow generally accepted standards to protect the personal information submitted to us, both during transmission and once it is received.</p>
<p>In addition, we will take reasonable steps to assure that third parties to whom we transfer any data will provide sufficient protection of personal information.</p>" |
|
approved-not-found |
Dr_Jeff ToS;DR |
BitDefender |
"As a leader in information security services, confidentiality and data protection are of vital importance for us.
Access to the collected personal data is restricted only to Bitdefender employees and data processors that need access to this information.
All Bitdefender information security policies are ISO 27001 certified." |
|
declined |
Dr_Jeff ToS;DR |
ExpoBeds |
"Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems and are required to keep the information confidential.
In addition, all sensitive information you supply is encrypted via Secure Socket Layer (SSL/TLS) technology." |
|
approved-not-found |
oxeno |
420A3.com |
"<li>Email Address, Stored Encrypted.
Never shown onscreen, or shared, unless you otherwise allow it.</li>
<li>Passwords are NEVER sent in emails or displayed onscreen.
Passwords ARE stored in our database, encrypted via a 1-way salted hash.</li>
<li>We will NEVER store Credit Card data on our servers or database" |
|
approved |
ken@kensblog.com |
ToS;DR |
"We must not store your passwords unencrypted.
We undertake to review our security technologies from time to time, for example if our encryption or hash functions are not considered good enough any more.</p>" |
|
approved |
Esmooth Curator |
ToS;DR |
"When cancelling your account, we scramble your data in our database so you cannot recover your account and we don't lose your contributions" |
|
declined |
(deactivated) |
Signal |
"Technical information Specifications Encryption in messaging environments integrates many ideas which often need to be composed separately in different applications.
We make an effort to break out ideas into independent specifications so that they can be integrated as appropriate for different projects." |
|
declined |
user 104 Curator |
ProtonMail |
"<p>In order to pursue our legitimate interest of preventing the creation of accounts by spam bots or human spammers, ProtonMail uses a variety of human verification methods.
You may be asked to verify using either reCaptcha, Email, or SMS.
IP addresses, email addresses, and phone numbers provided are saved temporarily in order to send you a verification code and to determine if you are a spammer.
If this data is saved permanently, it is always saved as a cryptographic hash, which ensures that the raw values cannot be deciphered by us." |
|
declined |
denishdk Curator |
iCloud |
"iCloud security overview" |
|
declined |
omhqit Curator |
The Button Box |
"Technology <p>Security" |
|
draft |
bboxjon |
keybase |
"SECURITY
<p>Keybase takes reasonable security measures such as password protection and client-side encryption as we deem appropriate to protect the information we collect from misuse, unauthorized access, disclosure, alteration and destruction.
Some hosting details for the technically-minded:</p>
<ul>
<li>(a) The Service is currently hosted on Amazon’s AWS;</li>
<li>(b) All data is transferred with industry standard TLS during transmission.
and</li>
<li>(c) Keybase’s website does not serve any 3rd party hosted JavaScript." |
|
changes-requested |
Joe |
Dendreo |
"Dendreo recommande aux Utilisateurs de modifier régulièrement leurs mots de passe et de choisir des mots de passe complexes comprenant des lettres, chiffres et caractères spécifiques." |
|
approved |
|
Dendreo |
"ses informations puissent être transférées de manière non cryptée" |
|
approved |
|
Dendreo |
"Dendreo emploie le protocole TLS-SSL qui permet de crypter n'importe quelle information" |
|
approved |
|
Bitwarden |
"Bitwarden enforces a written security information program.
Our program:</p>
<ul>
<li>aligns with industry recognized frameworks;</li>
<li>includes security safeguards reasonably designed to protect the confidentiality, integrity, availability, and resilience of our users' data;</li>
<li>is appropriate to the nature, size, and complexity of Bitwarden's business operations;</li>
<li>includes incident response and data breach notification processes.
and</li>
<li>complies with applicable information security related laws and regulations in the geographic regions where Bitwarden does business.</li>" |
|
approved-not-found |
(deactivated) |
Planio |
"Methods of processing <p>The Owner takes appropriate security measures to prevent unauthorized access, disclosure, modification, or unauthorized destruction of the Data.<br>The Data processing is carried out using computers and/or IT enabled tools, following organizational procedures and modes strictly related to the purposes indicated." |
|
declined |
Dr_Jeff ToS;DR |
Artspace |
"<p>We use reasonable physical, electronic, and administrative safeguards to help us protect the security, integrity and confidentiality of data stored on our system.
The Site encrypts your credit card number and other Personal Information using secure socket layer (SSL) technology to provide for the secure transmission of the information from your PC to our servers.
SSL is an industry-standard protocol for encryption over the Internet.
While no system is 100% secure, we believe that the measures we have implemented minimize the risk of security breach to an appropriate level given the types of information involved.
Please note that any information you provide us by email is unencrypted.</p>" |
|
approved |
Agnes de Lion Curator |
ToS;DR Phoenix |
"Passwords are hashed in our database with the bcrypt algorithm." |
|
approved |
Dr_Jeff ToS;DR |
Tutanota |
"Your password is salted and hashed with Bcrypt on your device before being transmitted to Tutanota.
Bcrypt is the most reliable method because brute-force attacks need much more time in comparison to conventional methods such as MD5 or SHA. With this method we guarantee an integrated confidentiality and we allow you to access and decrypt your emails from desktops and mobile devices instantly.</p" |
|
approved |
(deactivated) |
ControlC.com |
"We may protect personal information by reasonable security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
" |
|
approved |
tosreader |
AnonAddy |
"All information you provide to us is stored on our secure servers in the Netherlands (Greenhost.net).
Sensitive data in our database such as your recipient email addresses are encrypted using OpenSSL and the AES-256-CBC cipher.
Furthermore, all encrypted values are signed with a message authentication code (MAC) to detect any modifications to the encrypted string.
" |
|
approved |
TOS_editor_02 |
nikitin.photo |
The user is informed about security practices |
|
changes-requested |
NN |
La Girafe Extraordinaire |
"<p>Les renseignements personnels que nous collectons sont conservés dans un environnement sécurisé.
Les personnes travaillant pour nous sont tenues de respecter la confidentialité de vos informations.<br>Pour assurer la sécurité de vos renseignements personnels, nous avons recours aux mesures suivantes :</p>
<ul>
<li>Protocole SSL (Secure Sockets Layer)</li>
<li>Gestion des accès – personne autorisée</li>
<li>Gestion des accès – personne concernée</li>
<li>Logiciel de surveillance du réseau</li>
<li>Sauvegarde informatique</li>
<li>Identifiant / mot de passe</li>
<li>Pare-feu (Firewalls)</li>
</ul>
<p>
<strong>Nous nous engageons à maintenir un haut degré de confidentialité</strong> en intégrant les dernières innovations technologiques permettant d’assurer la confidentialité de vos transactions.
" |
|
approved |
Frankie |
Pole-Emotion |
"<p>Chez nous, vos données personnelles sont transmises en toute sécurité grâce à un codage.
À cette occasion, nous utilisons le système de codage SSL (Secure Socket Layer).
Personne ne peut garantir une protection absolue.
Cependant, nous protégeons notre site web et nos autres systèmes par des mesures techniques et organisationnelles contre la perte, la destruction, l’accès, la modification et la diffusion de vos données par des personnes non autorisées.</p>" |
|
approved |
PoleEmotion |
SecuriSend |
"We try our best to limit the amount of personal information that is collected, but when we have to, we ensure that your data is securely encrypted in our databases.
" |
|
approved |
Dr_Jeff ToS;DR |
Pinterest |
"We care about the security of our users.
While we work to protect the security of your content and account, Pinterest cannot guarantee that unauthorized third parties will not be able to defeat our security measures.
Please notify us immediately of any compromise or unauthorized use of your account.</p> More simply put: <p>You can help us fight spammers by keeping these security tips in mind" |
|
declined |
(deactivated) |
Amazon Prime Video |
"How Secure Is Information About Me? <p>We design our systems with your security and privacy in mind.</p>
<ul>
<li>
We work to protect the security of your personal information during transmission by using encryption protocols and software.
</li>
<li>
We follow the Payment Card Industry Data Security Standard (PCI DSS) when handling credit card data.
</li>
<li>
We maintain physical, electronic, and procedural safeguards in connection with the collection, storage, and disclosure of personal customer information.
Our security procedures mean that we may occasionally request proof of identity before we disclose personal information to you.
</li>
<li>
Our devices offer security features to protect them against unauthorized access and loss of data." |
|
approved |
Dr_Jeff ToS;DR |
ProtonMail |
" Data Storage <p>All servers used in connection with the provisioning of the Service are located in Switzerland and wholly owned and operated by the Company.
Only employees of the Company have physical or other access to the servers.
Data is ALWAYS stored in encrypted format on our servers.
Offline backups may be stored periodically, but these are also encrypted.
We do not possess the ability to access any user encrypted message content on either the production servers or in the backups." |
|
approved |
Agnes de Lion Curator |
Prezi |
"Here’s a quick look at the strict principles we live by in order to earn your trust and keep it." |
|
approved |
ArloJamesBarnes Curator |
likee |
"We take appropriate administrative, technical and physical security measures to safeguard your personal information from unauthorized access and disclosure.
For example, only authorized employees are permitted to access personal information, and they may do so only for permitted business functions.
In addition, we use encryption in the transmission of certain your personal information between your system and ours, and we use firewalls to help prevent unauthorized persons from gaining access to your personal information.
" |
|
approved |
Agnes de Lion Curator |
Chilliapps - Abandonment Protector |
"5.4 “Chilliapps” will maintain an information security program (including the adoption and enforcement of internal policies and procedures) against accidental or unlawful loss, access or disclosure.
Accordingly, we are committed to identifying reasonably foreseeable and internal risks to security and unauthorized access to the “Chilliapps” services and minimize security risks, including through risk assessment and regular testing.
</p>" |
|
approved |
ArloJamesBarnes Curator |
NextDNS |
"We protect our users from privacy exposure to other services that we must interact with in order to operate properly.For example, we enforce Query Name Minimisation and we do not forward our users IP subnets to the authoritative name servers when EDNS Client Subnet has been disabled." |
|
approved-not-found |
alostengineer |
Turnitin |
"Our data is stored in the EU or USA with robust physical, digital, and procedural safeguards in place to protect your personal data, including the use of SSL encryption, redundant servers and data centers, and sophisticated perimeter security.
We continuously audit for security vulnerabilities and make software patching a priority." |
|
approved |
AD59 |
mastodon.social |
"How do we protect your information? <p>We implement a variety of security measures to maintain the safety of your personal information when you enter, submit, or access your personal information.
Among other things, your browser session, as well as the traffic between your applications and the API, are secured with SSL, and your password is hashed using a strong one-way algorithm.
You may enable two-factor authentication to further secure access to your account." |
|
approved |
Vincent |
DeepL |
"Data Security <p> Your connections to our website are protected with encryption techniques in line with the current state of the art.
The level of protection also depends on which encryption your Internet browser supports.
You can tell whether an individual page of our website is transmitted in encrypted form by looking at the closed key or lock symbol in the status bar of your browser.
We also use suitable technical and organizational security measures to protect your data against accidental or intentional manipulation, partial or complete loss, destruction or unauthorized access by third parties.
Our security measures are continuously improved in line with technological developments." |
|
approved |
ArloJamesBarnes Curator |
Qwant |
"How does Qwant protect your privacy?
<p>When you use Qwant as a search engine, <strong>we do not set any advertising cookie</strong> on your browser, nor do we look at what you personally searched for previously.
When you make a query, it is immediately pseudonymized using the methods set forth in this Privacy Policy.</p>
<p>We also undertake to make every effort to guarantee the security and confidentiality of our users’ personal data and in particular to prevent such data from being altered, deleted or accessed by unauthorized third parties.
The URL of Qwant begins with “HTTPS”, which indicates to users that they are communicating their data securely through the TLS protocol.
Technically, the TLS guarantees visitors that their data cannot be intercepted while in transit over the network in a fraudulent or accidental manner.
In addition, the padlock that appears in front of the Qwant URL on most browsers certifies that you are browsing a secure site." |
|
approved |
Dr_Jeff ToS;DR |
Qwant |
"We commit to do anything we can to ensure the security and confidentiality of our users personal data, including by preventing data damage, loss, or access by unauthorized third parties.
Qwant’s URL has the HTTPS header that shows users they communicate with Qwant through a secure channel using the TLS protocol.
Technically, TLS ensures users that their data can’t be intercepted by fraud.
Moreover, the green lock that you see on most browsers when using Qwant certifies that you are browsing a secure website." |
|
declined |
user 435 Curator |
Hinterland Games |
"We protect personal information by implementing reasonable security arrangements to prevent against risks such as unauthorized access, collection, use, disclosure, copying, modification or disposal of personal information.
We will use reasonably secure methods whenever destroying personal information.
 .
</p>
<p> The protection and security of personal information cannot be guaranteed when it is submitted via email or other wireless communication." |
|
declined |
Dr_Jeff ToS;DR |
Smartmessages |
"We have extensive security measures in place in order to keep your data safe.
This includes using strong encryption wherever feasible, enforcing strong passwords, using 2-factor authentication, using servers in secure data centres, and ensuring that only authorised staff can access data" |
|
changes-requested |
Synchro |
Adobe |
"We employ administrative, technical, and physical security controls where appropriate, such as encryption," |
|
approved |
Agnes de Lion Curator |
GitHub |
"Transmission of data on GitHub is encrypted using SSH, HTTPS (TLS), and git repository content is encrypted at rest.
We manage our own cages and racks at top-tier data centers with high level of physical and network security, and when data is stored with a third-party storage provider, it is encrypted.</p>
<p>No method of transmission, or method of electronic storage, is 100% secure.
Therefore, we cannot guarantee its absolute security.
For more information, see our security disclosures." |
|
approved |
Dr_Jeff ToS;DR |
Fiverr |
"<p>We take great care in maintaining the security of the Site and your information and in preventing unauthorized access, loss, misuse, alteration, destruction or damage to it through industry standard technologies and internal procedures.
Among other things, we regularly maintain a PCI DSS (Payment Card Industry Data Security Standards) certification (with respect to payment by credit cards).
In addition, we contractually ensure that any third party processing your personal information equally provides for confidentiality and integrity of your data in a secure way.
" |
|
pending |
Agnes de Lion Curator |
LBRY |
"How do we protect your information?</strong>
</p>
<p>Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.</p>
<p>We use regular Malware Scanning." |
|
approved |
Agnes de Lion Curator |
ProtonVPN |
"We take data security very seriously.
Only our employees have physical or other access to our infrastructure and Secure Core servers.
Data is usually stored in encrypted format on our servers.
Offline backups may be stored periodically, but these are also secured." |
|
approved |
Agnes de Lion Curator |
Khan Academy |
"Once we receive your transmission of information, Khan Academy makes commercially reasonable efforts to ensure the security of our systems.
When you enter sensitive information, we encrypt the transmission of that information using secure socket layer technology (SSL) or similar technologies.
However, please note that this is not a guarantee that such information may not be accessed, disclosed, altered, or destroyed by breach of any of our physical, technical, or managerial safeguards." |
|
approved |
Dr_Jeff ToS;DR |
Vivaldi |
"
<p>We are committed to safeguarding and protecting your personal data and will implement and maintain appropriate technical and organisational measures to ensure a level of security appropriate to protect your personal data from accidental or unauthorised destruction, loss, alteration, disclosure or access.</p>
<p>Procedures are reviewed regularly to ensure that the policies are followed.
Any non-conformance regarding the policies will be corrected without unnecessary delay.</p>
" |
|
pending |
Agnes de Lion Curator |