Wolfram Alpha |
info given about security practices |
|
disputed |
user 428 |
Xiaomi |
"All your personal information is stored on secure servers, and protected in controlled facilities.
We classify your information based on importance and sensitivity, and ensure that your personal information has the required level of security.
We have special access controls for cloud-based data storage, and we regularly review our information collection, storage and processing practices, including physical security measures, to guard against any unauthorized access and use." |
|
APPROVED |
AgnesDeLion Staff |
DuckDuckGo |
"" |
|
DECLINED |
import script Bot |
WhatsApp |
"" |
|
DECLINED |
import script Bot |
WhatsApp |
"" |
|
DECLINED |
import script Bot |
RapidShare |
"" |
|
DECLINED |
import script Bot |
Facebook |
Facebook |
|
DECLINED |
import script Bot |
Flattr |
flattr terms updated 29 aug |
|
DECLINED |
import script Bot |
Steam |
Steam - users defend and indemnify Valve |
|
DECLINED |
import script Bot |
Tartle |
"TARTLE secures your personal information from unauthorized access, use, or disclosure.
TARTLE uses the following methods for this purpose:</p>
<p>– SSL Protocol</p>
<p>– AES-256bit Military Grade VPN Connecti" |
|
APPROVED |
Geographyisdestiny |
PayPal |
paypal |
|
DECLINED |
import script Bot |
Facebook |
Article: What Facebook knows (data mining, etc;) |
|
DECLINED |
import script Bot |
LiveJournal |
LiveJournal terms of service |
|
DECLINED |
import script Bot |
Dropbox |
[Good] Dropbox can cancel your account without notice but they'll try to avoid it |
|
DECLINED |
import script Bot |
Dropbox |
[Bad] Dropbox uses cookies to track users |
|
DECLINED |
import script Bot |
CouchSurfing |
Couchsurfing TOS |
|
DECLINED |
import script Bot |
X |
Regarding Twitter |
|
DECLINED |
import script Bot |
Facebook |
Unofficial ToS;DR Facebook Page |
|
DECLINED |
import script Bot |
TwitPic |
a good article with real life examples with broad copyright licenses from Twitpic, twitter |
|
DECLINED |
import script Bot |
Delicious |
Delicious previous terms |
|
DECLINED |
import script Bot |
GitHub |
"We use a number of third party analytics and service providers to help us evaluate our users' use of GitHub.
compile statistical reports on activity.
and improve our content and website performance.
We only use these third party analytics providers on certain areas of our website, and all of them have signed data protection agreements with us that limit the type of personal information they can collect and the purpose for which they can process the information." |
|
DECLINED |
import script Bot |
ToS;DR |
"Passwords are hashed in our database with the bcrypt algorithm" |
|
APPROVED |
Michael Curator |
WhatsApp |
WhatsApp doesn't collect personal information besides the phone number |
|
DECLINED |
import script Bot |
Wordfeud |
Wordfeud |
|
DECLINED |
import script Bot |
Facebook |
[Bad] Facebook UI induces oversharing |
|
DECLINED |
import script Bot |
FastMail |
"How we protect and store your information
Security" |
|
APPROVED |
lemmings |
Akshit's Blog |
"If you have any questions about the security of your personal information, you can contact me at questions@akshit.me.</p>" |
|
DECLINED |
akshitk |
WhatsApp |
[Bad] WhatsApp may use your phone number for non-marketing or administrative purposes |
|
DECLINED |
import script Bot |
ISODME |
"You are solely responsible for the activity that occurs on your Account, whether authorized by you or not, and you must keep your Account information secure, including without limitation your customer number/login, password.
For security purposes, ISODME recommends that you change your password at least once every six (6) months for each Account .
" |
|
DECLINED |
jonathanlei |
Minds |
info given about security practices |
|
APPROVED |
Therapy Snek Curator |
TopTree.cc (discontinued?) |
"How we protect your data" |
|
DECLINED |
metacoz Curator |
App.net |
"" |
|
DECLINED |
import script Bot |
JoinDiaspora.com |
"" |
|
DECLINED |
import script Bot |
Fotocommunity |
"" |
|
DECLINED |
import script Bot |
(NONE) |
"" |
|
DECLINED |
import script Bot |
Chrome Webstore |
"" |
|
DECLINED |
import script Bot |
WhatsApp |
"<p> <strong>Address Book.</strong> You provide us the phone numbers of WhatsApp users and your other contacts in your mobile phone address book on a regular basis. You confirm you are authorized to provide us such numbers to allow us to provide our Services. </p>" |
|
DECLINED |
Photon Curator |
Kink.com |
"We employ technical and organizational measures such as firewalls and encryption that are designed to appropriately protect your information that is under our control and that we process on your behalf from unauthorized access collection, use, disclosure, copying, modification or disposal, both during transmission and once we receive it.
We store all information that you provide to us on secure servers.
" |
|
DECLINED |
alison Curator |
Associação de Defesa da Privacidade Digital |
"2 – Seus dados estão protegidos em um servidor seguro, com Firewall e senha;</p>" |
|
DECLINED |
victorrms |
Guilded |
"We seek to protect Personal Data using appropriate technical and organizational measures based on the type of Personal Data and applicable processing activity.
For example, sensitive user information is encrypted, and only stored when used as necessary to operate the service." |
|
APPROVED |
AgnesDeLion Staff |
iCloud |
"iCloud security overview" |
|
DECLINED |
omhqit Curator |
Associação de Defesa da Privacidade Digital |
"1 – Nós iremos tomar todas as providências possíveis para evitar a perda de seus dados, investindo na segurança do site;" |
|
DECLINED |
victorrms |
PrivacyTools |
"How do we protect your information? <p>We implement a variety of security measures to maintain the safety of your personal information when you enter, submit, or access your personal information.
Among other things, your browser session, as well as the traffic between your applications and the API, are secured with SSL, and your password is hashed using a strong one-way algorithm.
" |
|
DECLINED |
(deactivated) Suspended |
InfoSec Handbook (discontinued?) |
"No logging by default – ✅ Minimal data processing</p>
<p>We decided to choose the best protection for your personal data: We simply do not collect it.
You don’t have to trust us, because you keep your data.
By default, we do not log anything, and we concluded a data processing agreement according to Article 28 GDPR with our server provider (see our privacy policy).</p>
<p>✅ Single-purpose server – ✅ No databases</p>
<p>For security, we provide our blog using a dedicated virtual server.
There aren’t any other public services on this server (e.g., no database server, no mail server, no messaging server).
For instance, the decentralized Dat version of our blog runs on another virtual server.</p>
<p>✅ Security monitoring – ✅ Strong authentication – ✅ Defined processes</p>
<p>Our server is permanently monitored to check for modified files and login attempts.
Two-factor authentication is needed to access our server.
The core of our server is a hardened Linux installation.
This means that we removed unnecessary packages and applied strict configuration at kernel level.
Finally, we implemented processes to ensure installation of security updates within a narrow time frame and quick reaction to reported potential security vulnerabilities.</p>
<p>✅ 100% static content – ✅ No CMS, PHP, or JavaScript – ✅ No 3rd party content</p>
<p>Our blog consists of 100% static content.
There is no content management system (CMS) installed and there is no dynamically-served content like PHP or JavaScript.
We do not embed any third-party content, and all links to third-party websites are marked.
Actually, third-party websites, which you access from our blog, run in a separate process in your web browser, and we strip any Referrer information.</p>" |
|
DECLINED |
komo Suspended |
Associação de Defesa da Privacidade Digital |
"1 – Nós iremos tomar todas as providências possíveis para evitar a perda de seus dados, investindo na segurança do site;</p>
<p>2 – Seus dados estão protegidos em um servidor seguro, com Firewall e senha;</p>
<p>3 – Você está ciente que mesmo a segurança na internet está suscetível a falhas, e não podemos nos assegurar de todos os dados enviados pela internet." |
|
DECLINED |
victorrms |
CCleaner |
"11.
Data Security <p>11.1 Safeguards for protection of personal information
We maintain administrative, technical, and physical safeguards for the protection of your personal data.
" |
|
APPROVED |
user 104 Curator |
mastodon.social |
"How do we protect your information? <p>We implement a variety of security measures to maintain the safety of your personal information when you enter, submit, or access your personal information.
Among other things, your browser session, as well as the traffic between your applications and the API, are secured with SSL, and your password is hashed using a strong one-way algorithm.
" |
|
APPROVED |
mikwee |
Turnitin |
"<strong>Cyber Essentials <br>(certified November 2019)</strong>
</p>
<p>
</p> Cyber Essentials accredits a company's IT infrastructure ensuring that its firewalls, secure configurations, user access control, malware protection, and patch management are of a high enough standard to protect any data within the company.
Turnitin obtained the Cyber Essentials certification at the request of several international customers.
Turnitin successfully completed a third-party audit of the effectiveness of our basic security controls.
<p>
<strong>SOC 2 Compliance</strong>
</p>
<p>
</p> SOC2 is an audit of a company's readiness to protect their user's privacy and the security of their data.
The company must show protections for both the data itself and the physical security of the locations it is stored.
Turnitin obtained the SOC2 certification to demonstrate our commitment to security, privacy, and availability.
To obtain this certification, over 160 controls aligned to the SOC2 criteria were designed for Turnitin and audited for effectiveness.
Turnitin successfully satisfied 100% of the controls audited." |
|
DECLINED |
AD59 |
Replit |
"Unfortunately, no security measures are 100% foolproof, and as such no network or system (including ours) can be guaranteed to be 100% secure against destruction, loss, alteration, unauthorized disclosure of, or access to information we collect and store." |
|
DECLINED |
Esmooth Curator |
Pixel8Earth |
"We may employ procedural and technological measures, consistent with industry practice, to help protect your personally identifiable information from loss, unauthorized access, disclosure, alteration or destruction.
Pixel8Earth may use password protection and place internal restrictions on who in the company may access your data to help prevent unauthorized access to your personally identifiable information." |
|
APPROVED |
arlo Staff |
Patreon |
"We use reasonable and appropriate physical, technical, and administrative industry safeguards to protect information from unauthorized access, use, loss, misuse or unauthorized alteration.</p>" |
|
APPROVED |
arlo Staff |
eBuddy |
"The transmission of your phone address book will be done in an encrypted manner, and the names, phone numbers and email addresses will be stored in encrypted format.</p> " |
|
APPROVED |
AgnesDeLion Staff |
Bitwarden |
"Bitwarden enforces a written security information program.
Our program:</p>
<ul>
<li>aligns with industry recognized frameworks;</li>
<li>includes security safeguards reasonably designed to protect the confidentiality, integrity, availability, and resilience of our users' data;</li>
<li>is appropriate to the nature, size, and complexity of Bitwarden's business operations;</li>
<li>includes incident response and data breach notification processes.
and</li>
<li>complies with applicable information security related laws and regulations in the geographic regions where Bitwarden does business.</li>" |
|
DECLINED |
(deactivated) Suspended |
WeMod |
"We take reasonable steps to maintain the security of the personally-identifiable information that we collect, including utilizing SSL certificates for data encryption, PCI Scanning, S-HTTP and management-only password-secured access limited to two (2) managers." |
|
APPROVED |
Dr_Jeff Staff |
Speedtest by Ookla |
"Data Security" |
|
APPROVED |
private prawn Curator |
AliExpress |
"If you share a computer with others, you should not choose to save your log-in information (e.g., user ID and password) on that shared computer.
Remember to sign out of your account and close your browser window when you have finished your session.</p>" |
|
DECLINED |
ProjectELP |
ExpressVPN |
"When you correspond with us using these platforms, they will store your correspondence records—including your email address, as well as user and device attributes that help with troubleshooting, such as the country you are contacting us from and your device’s operating system.
Both platforms utilize modern security practices and HTTPS encryption.</p>
" |
|
APPROVED |
AgnesDeLion Staff |
Mega |
"
Every text message you send is stored as an encrypted binary large object (“<b>blob</b>”)." |
|
APPROVED |
AgnesDeLion Staff |
BitDefender |
"As a leader in information security services, confidentiality and data protection are of vital importance for us.
Access to the collected personal data is restricted only to Bitdefender employees and data processors that need access to this information.
All Bitdefender information security policies are ISO 27001 certified." |
|
DECLINED |
Dr_Jeff Staff |
ExpoBeds |
"Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems and are required to keep the information confidential.
In addition, all sensitive information you supply is encrypted via Secure Socket Layer (SSL/TLS) technology." |
|
DECLINED |
oxeno |
ToS;DR |
"When cancelling your account, we scramble your data in our database so you cannot recover your account and we don't lose your contributions" |
|
DECLINED |
(deactivated) Suspended |
Signal |
"Technical information Specifications Encryption in messaging environments integrates many ideas which often need to be composed separately in different applications.
We make an effort to break out ideas into independent specifications so that they can be integrated as appropriate for different projects." |
|
DECLINED |
user 104 Curator |
Proton AG |
"<p>In order to pursue our legitimate interest of preventing the creation of accounts by spam bots or human spammers, ProtonMail uses a variety of human verification methods.
You may be asked to verify using either reCaptcha, Email, or SMS.
IP addresses, email addresses, and phone numbers provided are saved temporarily in order to send you a verification code and to determine if you are a spammer.
If this data is saved permanently, it is always saved as a cryptographic hash, which ensures that the raw values cannot be deciphered by us." |
|
DECLINED |
denishdk Curator |
Le Monde |
"<p>Le paiement en ligne par l’une des cartes bancaires acceptées est réalisé par la solution sécurisée Sips - Worldline, qui intègre un procédé de cryptage en mode SSL (Secure Socket Layer).
Le protocole SSL (Secure Socket Layer) garantit la confidentialité des informations de paiement transmises.
La mention du protocole « https » dans l’adresse de navigation et l’icône du cadenas apparaissant dans la barre d’adresse sont le signe de la sécurité et confidentialité du paiement." |
|
APPROVED |
AgnesDeLion Staff |
The Button Box |
"Technology <p>Security" |
|
DECLINED |
bboxjon |
Keybase |
"SECURITY
<p>Keybase takes reasonable security measures such as password protection and client-side encryption as we deem appropriate to protect the information we collect from misuse, unauthorized access, disclosure, alteration and destruction.
Some hosting details for the technically-minded:</p>
<ul>
<li>(a) The Service is currently hosted on Amazon’s AWS;</li>
<li>(b) All data is transferred with industry standard TLS during transmission.
and</li>
<li>(c) Keybase’s website does not serve any 3rd party hosted JavaScript." |
|
DECLINED |
Joe |
Dendreo |
"Dendreo recommande aux Utilisateurs de modifier régulièrement leurs mots de passe et de choisir des mots de passe complexes comprenant des lettres, chiffres et caractères spécifiques." |
|
APPROVED |
|
Dendreo |
"ses informations puissent être transférées de manière non cryptée" |
|
APPROVED |
|
Dendreo |
"Dendreo emploie le protocole TLS-SSL qui permet de crypter n'importe quelle information" |
|
APPROVED |
|
Planio |
"Methods of processing <p>The Owner takes appropriate security measures to prevent unauthorized access, disclosure, modification, or unauthorized destruction of the Data.<br>The Data processing is carried out using computers and/or IT enabled tools, following organizational procedures and modes strictly related to the purposes indicated." |
|
DECLINED |
Dr_Jeff Staff |
ToS;DR Phoenix |
"Passwords are hashed in our database with the bcrypt algorithm." |
|
APPROVED |
Dr_Jeff Staff |
Tutanota |
"Your password is salted and hashed with Bcrypt on your device before being transmitted to Tutanota.
Bcrypt is the most reliable method because brute-force attacks need much more time in comparison to conventional methods such as MD5 or SHA. With this method we guarantee an integrated confidentiality and we allow you to access and decrypt your emails from desktops and mobile devices instantly.</p" |
|
APPROVED |
(deactivated) Suspended |
ControlC.com |
"We may protect personal information by reasonable security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
" |
|
APPROVED |
tosreader |
Le Parisien |
"Souscription par CB sécurisée (Visa, Master Card) Le paiement est assuré par une solution sécurisée qui intègre un procédé de cryptage en mode SSL (Secure Socket Layer).</li>
" |
|
APPROVED |
AgnesDeLion Staff |
AnonAddy |
"All information you provide to us is stored on our secure servers in the Netherlands (Greenhost.net).
Sensitive data in our database such as your recipient email addresses are encrypted using OpenSSL and the AES-256-CBC cipher.
Furthermore, all encrypted values are signed with a message authentication code (MAC) to detect any modifications to the encrypted string.
" |
|
APPROVED |
TOS_editor_02 |
nikitin.photo |
The user is informed about security practices |
|
DECLINED |
NN |
Blizzard |
"Blizzard has taken steps to assure that all information collected will remain secure and in its original form, i.e.
free from any alteration.
As such, access to all personal information is strictly controlled.
When credit card information is transmitted, for example, we use industry standard, SSL (secure sockets layer) encryption.
We follow generally accepted standards to protect the personal information submitted to us, both during transmission and once it is received.</p>
<p>In addition, we will take reasonable steps to assure that third parties to whom we transfer any data will provide sufficient protection of personal information.</p>" |
|
DECLINED |
Dr_Jeff Staff |
Tresorit |
" You understand that Tresorit uses strong cryptography algorithms to protect Customer Files and as a Customer, you are fully and solely responsible and accountable for the content of Customer Files.
" |
|
APPROVED |
AgnesDeLion Staff |
SecuriSend (discontinued?) |
"We try our best to limit the amount of personal information that is collected, but when we have to, we ensure that your data is securely encrypted in our databases.
" |
|
APPROVED |
Dr_Jeff Staff |
Pinterest |
"We care about the security of our users.
While we work to protect the security of your content and account, Pinterest cannot guarantee that unauthorized third parties will not be able to defeat our security measures.
Please notify us immediately of any compromise or unauthorized use of your account.</p> More simply put: <p>You can help us fight spammers by keeping these security tips in mind" |
|
DECLINED |
(deactivated) Suspended |
Prezi |
"Here’s a quick look at the strict principles we live by in order to earn your trust and keep it." |
|
APPROVED |
arlo Staff |
likee |
"We take appropriate administrative, technical and physical security measures to safeguard your personal information from unauthorized access and disclosure.
For example, only authorized employees are permitted to access personal information, and they may do so only for permitted business functions.
In addition, we use encryption in the transmission of certain your personal information between your system and ours, and we use firewalls to help prevent unauthorized persons from gaining access to your personal information.
" |
|
APPROVED |
AgnesDeLion Staff |
NextDNS |
"We protect our users from privacy exposure to other services that we must interact with in order to operate properly.For example, we enforce Query Name Minimisation and we do not forward our users IP subnets to the authoritative name servers when EDNS Client Subnet has been disabled." |
|
DECLINED |
alostengineer |
Turnitin |
"Our data is stored in the EU or USA with robust physical, digital, and procedural safeguards in place to protect your personal data, including the use of SSL encryption, redundant servers and data centers, and sophisticated perimeter security.
We continuously audit for security vulnerabilities and make software patching a priority." |
|
APPROVED |
AD59 |
mastodon.social |
"How do we protect your information? <p>We implement a variety of security measures to maintain the safety of your personal information when you enter, submit, or access your personal information.
Among other things, your browser session, as well as the traffic between your applications and the API, are secured with SSL, and your password is hashed using a strong one-way algorithm.
You may enable two-factor authentication to further secure access to your account." |
|
DECLINED |
Vincent |
Arch Linux |
"Our commitment to data security
<p>Arch staff and administrators are familiar with our privacy policy guidelines.
Our websites enforce Transport Layer Security (TLS) connections, which encrypts your personal data when you send your personal information on our website." |
|
APPROVED |
Dr_Jeff Staff |
DeepL |
"Data Security <p> Your connections to our website are protected with encryption techniques in line with the current state of the art.
The level of protection also depends on which encryption your Internet browser supports.
You can tell whether an individual page of our website is transmitted in encrypted form by looking at the closed key or lock symbol in the status bar of your browser.
We also use suitable technical and organizational security measures to protect your data against accidental or intentional manipulation, partial or complete loss, destruction or unauthorized access by third parties.
Our security measures are continuously improved in line with technological developments." |
|
APPROVED |
arlo Staff |
Qwant |
"We commit to do anything we can to ensure the security and confidentiality of our users personal data, including by preventing data damage, loss, or access by unauthorized third parties.
Qwant’s URL has the HTTPS header that shows users they communicate with Qwant through a secure channel using the TLS protocol.
Technically, TLS ensures users that their data can’t be intercepted by fraud.
Moreover, the green lock that you see on most browsers when using Qwant certifies that you are browsing a secure website." |
|
DECLINED |
user 435 Curator |
Avast |
"We store your personal information in our database using the protections described above.
In addition, we utilize up-to-date firewall protection for an additional layer of security.
We use high-quality antivirus and anti-malware software, and regularly update our virus definitions." |
|
APPROVED |
AgnesDeLion Staff |
Hinterland Games |
"We protect personal information by implementing reasonable security arrangements to prevent against risks such as unauthorized access, collection, use, disclosure, copying, modification or disposal of personal information.
We will use reasonably secure methods whenever destroying personal information.
 .
</p>
<p> The protection and security of personal information cannot be guaranteed when it is submitted via email or other wireless communication." |
|
DECLINED |
Dr_Jeff Staff |
Smartmessages |
"We have extensive security measures in place in order to keep your data safe.
This includes using strong encryption wherever feasible, enforcing strong passwords, using 2-factor authentication, using servers in secure data centres, and ensuring that only authorised staff can access data" |
|
DECLINED |
Synchro |
Adobe Services |
"We employ administrative, technical, and physical security controls where appropriate, such as encryption," |
|
APPROVED |
AgnesDeLion Staff |
Element |
"We never store password data in plain text.
instead they are stored hashed (with at least 12 rounds of bcrypt, including both a salt and a server-side pepper secret).
Passwords sent to the server are encrypted using SSL.<br><br>" |
|
APPROVED |
AgnesDeLion Staff |
GitHub |
"Transmission of data on GitHub is encrypted using SSH, HTTPS (TLS), and git repository content is encrypted at rest.
We manage our own cages and racks at top-tier data centers with high level of physical and network security, and when data is stored with a third-party storage provider, it is encrypted.</p>
<p>No method of transmission, or method of electronic storage, is 100% secure.
Therefore, we cannot guarantee its absolute security.
For more information, see our security disclosures." |
|
APPROVED |
Dr_Jeff Staff |
Fiverr |
"<p>We take great care in maintaining the security of the Site and your information and in preventing unauthorized access, loss, misuse, alteration, destruction or damage to it through industry standard technologies and internal procedures.
Among other things, we regularly maintain a PCI DSS (Payment Card Industry Data Security Standards) certification (with respect to payment by credit cards).
In addition, we contractually ensure that any third party processing your personal information equally provides for confidentiality and integrity of your data in a secure way.
" |
|
APPROVED |
AgnesDeLion Staff |
Surfshark |
"We have implemented various security measures, including SSL/TLS encryption for data transfers, hashed passwords, firewalls, and regular audits." |
|
APPROVED |
AgnesDeLion Staff |
LBRY |
"How do we protect your information?</strong>
</p>
<p>Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.</p>
<p>We use regular Malware Scanning." |
|
APPROVED |
AgnesDeLion Staff |
ProtonVPN |
"We take data security very seriously.
Only our employees have physical or other access to our infrastructure and Secure Core servers.
Data is usually stored in encrypted format on our servers.
Offline backups may be stored periodically, but these are also secured." |
|
DECLINED |
AgnesDeLion Staff |
Vivaldi |
"
<p>We are committed to safeguarding and protecting your personal data and will implement and maintain appropriate technical and organisational measures to ensure a level of security appropriate to protect your personal data from accidental or unauthorised destruction, loss, alteration, disclosure or access.</p>
<p>Procedures are reviewed regularly to ensure that the policies are followed.
Any non-conformance regarding the policies will be corrected without unnecessary delay.</p>
" |
|
APPROVED |
AgnesDeLion Staff |
STiBaRC |
"Information not publicly displayed is not accessible to anyone, even through the API, except to the associated user and us.<br> Your password is never stored in plain text.
As soon as it is sent to the server, it is quickly hashed and removed from memory before any other process begins handling the information.<br>" |
|
APPROVED |
Eiim |
United States Postal Service |
"<p>In those instances where we secure your personal information in transit to us and upon receipt, the Postal Service uses the industry standard encryption software, Secured Socket Layer (SSL).
The URL in your browser will change to "HTTPS" instead of "HTTP" when this security feature is invoked.
" |
|
APPROVED |
AgnesDeLion Staff |
PeerTube |
" PeerTube wants to deliver the best countermeasures possible, to give you more choice and render attacks less likely." |
|
APPROVED |
arlo Staff |
Signal |
The user is informed about security practices |
|
DECLINED |
AgnesDeLion Staff |
BitChute |
"Sensitive and private exchange between the Service and its Users happens over a SSL secured communication channel and is encrypted and protected with digital signatures.</p>" |
|
APPROVED |
AgnesDeLion Staff |
Bandcamp |
"</ul> Is Personal Data About You Secure?
<p>Bandcamp endeavors to protect user information to ensure that your Personal Data is kept private.
We use physical, managerial, and technical security measures to protect your Personal Data against accidental or unlawful destruction, loss, alteration, unauthorized disclosure or access.
In particular, we take steps to ensure that our employees and service providers who have access to your Personal Data only process it upon our instructions, unless otherwise required by law.</p>
" |
|
APPROVED |
AgnesDeLion Staff |
xda-developers |
"All information you provide to us is stored on secure servers.
Any payment transactions will be encrypted using Secure Sockets Layer (SSL) technology." |
|
APPROVED |
AgnesDeLion Staff |
Signal |
"Signal queues end-to-end encrypted messages on its servers for delivery to devices that are temporarily offline (e.g.
a phone whose battery has died).
Your message history is stored on your own devices.</p>" |
|
APPROVED |
AgnesDeLion Staff |
Ecosia |
"<li>We do not use unique event fingerprinting</li>
<li>We send all data collected from Ecosia services over an SSL-secured connection</li>
<li>We store all analytics data in an highly encrypted database</li>
<li>We only keep fully anonymised search data after 7 days</li>
" |
|
APPROVED |
CapoFantasma97 |
Affinity |
"How secure is your Personal Data?" |
|
APPROVED |
donno Curator |
Symplicity |
"We use our best efforts to protect the personally identifiable information submitted by users through the Site in a commercially reasonable manner." |
|
DECLINED |
Aayan |
Nslookup |
"NsLookup follows generally accepted industry standards and maintains reasonable safeguards to atempt to ensure the security, integrity and privacy of the information in NsLookup's possession.</p>" |
|
APPROVED |
ruurtjan |
El Mundo (El Salvador) |
"EDITORA EL MUNDO, S.A</strong>.
ha adoptado los niveles de seguridad de protección de los <strong>"DATOS PERSONALES"</strong> y de su <strong>"BASE DE DATOS"</strong> legalmente requeridos, que garanticen la seguridad de los datos de carácter personal y eviten la pérdida, mal uso, alteración, acceso no autorizado y robo de los <strong>"DATOS PERSONALES"</strong>" |
|
DECLINED |
Dr_Jeff Staff |
Surface Owl |
"
<p>We have implemented security safeguards designed to protect the information that you provide in accordance with industry standards.
Access to your data on our Services is password-protected, and data such as credit card information is protected by SSL encryption when it is exchanged between your web browser and the Services.
We also offer secure https access to the surfaceOwl.com website." |
|
APPROVED |
AgnesDeLion Staff |
Swiss Government |
"Data security <p>Website: When you visit our website, the Federal Administration uses encrypted data communication based on TLS in conjunction with the highest encryption level supported by your browser.
You can see whether a page on the website is being transmitted in encrypted form by checking whether the lock symbol displayed in the address bar of your browser is closed.</p>
<p>General data processing: In addition, the Federal Administration uses suitable technical and organisational security measures in its data processing in order to protect your data against accidental or wilful manipulation, partial or complete loss, destruction or unauthorised access by third parties." |
|
DECLINED |
welda Curator |
Swiss Government |
"When you visit our website, the Federal Administration uses encrypted data communication based on TLS in conjunction with the highest encryption level supported by your browser.
" |
|
APPROVED |
welda Curator |
European Commission |
"6.
HOW DO WE PROTECT AND SAFEGUARD YOUR PERSONAL DATA?
<p> All personal data in electronic format (databases) are stored on the servers of the European Commission.
All processing operations are carried out pursuant to the Commission Decision (EU, Euratom) 2017/46 of 10 January 2017 on the security of communication and information systems in the European Commission.
</p>
<p> In order to protect your personal data, the Commission has put in place a number of technical and organisational measures in place.
Technical measures include appropriate actions to address online security, risk of data loss, alteration of data or unauthorised access, taking into consideration the risk presented by the processing and the nature of the personal data being processed.
Organisational measures include restricting access to the personal data solely to authorised persons with a legitimate need to know for the purposes of this processing operation." |
|
APPROVED |
KnossosDomovoi Curator |
Microsoft Services |
"This includes using data to protect the security and safety of our products and customers, detecting malware and malicious activities, troubleshooting performance and compatibility issues to help customers get the most out of their experiences, and notifying customers of updates to our products" |
|
DECLINED |
lerichardson |
e-foundation |
"
<p>Your personal information is contained behind secured networks at our partners and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential.
In addition, all sensitive information you supply is encrypted via Secure Socket Layer (SSL) technology." |
|
APPROVED |
welda Curator |
Follow My Health |
"Allscripts uses both technical and procedural Security Measures to maintain the confidentiality, integrity, and security of the FollowMyHealth Universal Health Record and other databases, including the use of firewalls, complex passwords, dual-factor authentication, various audit trails, data loss prevention, regular penetration testing, risk assessments, and anti-virus software.
FollowMyHealth encrypts all PHR Data during transmission between your Provider and FollowMyHealth.
Within FollowMyHealth, all PHR Data is encrypted at three levels: each individual has a unique encryption key." |
|
DECLINED |
welda Curator |
CyberGhost |
" <p>We follow generally accepted industry standards to protect the Personal Data submitted to us, both during transmission and once we receive it.
In March 2012, CyberGhost had successfully passed an audit and verification conducted by QSCert for the implemented Information Safety Management System (ISMS) according to the international industrial standards ISO27001 and ISO9001.
The certification confirms the high quality of the internal safety processes and is renewed yearly ever since.
However, no method of transmission over the Internet, or method of electronic storage, is 100% secure." |
|
APPROVED |
welda Curator |
Pixelfed |
"We implement a variety of security measures to maintain the safety of your personal information when you enter, submit, or access your personal information.
Among other things, your browser session, as well as the traffic between your applications and the API, are secured with SSL, and your password is hashed using a strong one-way algorithm.
You may enable two-factor authentication to further secure access to your account." |
|
APPROVED |
donno Curator |
Trashmail |
"4.
SITE WEB
Le site web est uniquement utilisable par le protocole HTTPS (certificat en 2048 bits),
il a obtenu la note "A+" de l'entreprise de sécurité Qalys SSL Lab." |
|
APPROVED |
welda Curator |
Feedbin |
"Your password is stored as a bcrypt hash.
It's an industry standard for storing passwords.
It means that even in the event that someone did obtain the bcrypt value, it would be very hard to derive your actual password from it." |
|
APPROVED |
BlueMantis |
Revolut |
"13.
How do you protect my personal data?
<p>We recognise the importance of protecting and managing your personal data.
Any personal data we process will be treated with the utmost care and security.
This section sets out some of the security measures we have in place.
</p>
<p>We use a variety of physical and technical measures to keep your personal data safe and prevent unauthorised access to, or use or disclosure of it.
Electronic data and databases are stored on secure computer systems with control over access to information using both physical and electronic means.
Our staff receives data protection and information security training.
We have detailed security and data protection policies which staff are required to follow when they handle your personal data.</p>
<p>While we take all reasonable steps to ensure that your personal data will be kept secure from unauthorised access, we cannot guarantee it will be secure during transmission by you to our app, a website or other services.
We use HTTPS (HTTP Secure), where the communication protocol is encrypted through Transport Layer Security for secure communication over networks, for all our app, web and payment-processing services.</p>
<p>If you use a password for the Revolut app or our website, you will need to keep this password confidential.
Please do not share it with anyone.</p>
<p>When you use our services, which includes our social network accounts and the Revolut Community forum, do not share any personal data that you don't want to be seen, collected or used by other customers, as this personal data will become publicly available." |
|
APPROVED |
welda Curator |
MeWe |
"Security: HTTPS and Encryption<p>We maintain physical, electronic, and procedural safeguards to protect the confidentiality and security of your personal user data and other information transmitted to us.
For example, we encrypt your personally identifiable information, and most, if not all requests from you to the server are created over a secure connection (HTTPS)." |
|
APPROVED |
welda Curator |
Météo France |
"VI.
SÉCURITÉ
<p>Météo-France assure la protection de vos données personnelles en mettant en œuvres des mesures techniques et organisationnelles appropriées conformément aux dispositions légales applicables.
A cet effet, Météo-France a pris les dispositions suivantes :</p>
<ul>
<li>Informations sur le stockage des données</li>
<li>Informations sur l’accès informatique</li>
<li>Nomination d’un délégué à la protection des données</li>
</ul>
<p>
Ainsi que toutes les mesures qui ont pu être prises concernant la sécurité informatique, les politiques de sensibilisation s’il y a.</p>" |
|
APPROVED |
welda Curator |
ToS;DR Phoenix |
"Passwords are hashed in our database with the bcrypt algorithm.
" |
|
DECLINED |
JustinBack Staff |
Swisscows |
"We only allow connections to Swisscows over a secure HTTPS connection." |
|
APPROVED |
AgnesDeLion Staff |
Goose VPN |
"All servers of Goose are secured with Linux hardening, firewalls and software is installed against spam, viruses and DDOS-attacks to prevent third-parties from carrying out malicious attacks on the server network of Goose.
We maintain our servers and networks to offer as much privacy as possible.
" |
|
APPROVED |
AgnesDeLion Staff |
VPN Hamster |
Information is provided about security practices |
|
DECLINED |
welda Curator |
Apple Services |
"Apple takes the security of your personal information very seriously.
Apple online services such as the Apple Online Store and iTunes Store protect your personal information during transit using encryption such as Transport Layer Security (TLS).
When your personal data is stored by Apple, we use computer systems with limited access housed in facilities using physical security measures.
With the exception of iCloud Mail, iCloud data is stored in encrypted form including when we utilize third-party storage.</p>
" |
|
APPROVED |
AgnesDeLion Staff |
Briar |
"Feedback and crash reports are encrypted before being sent to us." |
|
APPROVED |
AgnesDeLion Staff |
OpenHAB |
"This site uses SSL or TLS encryption for security reasons and for the protection of the
transmission of confidential content, such as the inquiries you send to us as the site
operator.
You can recognize an encrypted connection in your browser's address line when
it changes from "http://" to "https://" and the lock icon is displayed in your browser's
address bar.</p>
<p>If SSL or TLS encryption is activated, the data you transfer to us cannot be read by
third parties.</p>" |
|
APPROVED |
AgnesDeLion Staff |
PureVPN |
"All PII, public and private keys and passwords are secured securely using strong cryptographic algorithms where necessary.</p>
<p>Appropriate security measures are taken for the protection of this information against unauthorized access, unauthorized alteration, destruction or disclosure of data.
Access to personal information by PureVPN employees, contractors and agents is restricted.
" |
|
APPROVED |
AgnesDeLion Staff |
Alibaba |
"SECURITY MEASURES" |
|
APPROVED |
private prawn Curator |
Disroot |
"To protect your data we use the following security measures:</p>
<ul>
<li>We use disk encryption on all servers to prevent data leak in case the servers are stolen, confiscated or in any way physically tampered with.</li>
<li>We provide and require SSL/TLS encryption on all "user-to-server" and "server-to-server" communications on all provided services.</li>
" |
|
APPROVED |
AgnesDeLion Staff |
Rofkin |
Information is provided about security practices |
|
DECLINED |
AgnesDeLion Staff |
Weblate |
"Password in hashed form</dt>
<dd>Used to authenticate the User, if configured</dd>
<dd>Passwords are stored hashed using Argon2.</dd>" |
|
APPROVED |
AgnesDeLion Staff |
Stingle Photos |
"<p>Transmission of data on Stingle Photos is encrypted using SSH, HTTPS, and SSL/TLS.
By design, your photos and videos information is encrypted prior to being transmitted to our servers and is therefore encrypted at rest." |
|
APPROVED |
AgnesDeLion Staff |
Firefox Cloud Services |
"For security purposes, we store the IP addresses used to access your Firefox Account in order to approximate your city and country.
We use this data to send you email alerts if we detect suspicious activity, such as account logins from other locations." |
|
APPROVED |
private prawn Curator |
Firefox Cloud Services |
"To help protect you from malicious downloads, Firefox sends basic information about unrecognized downloads to Google's SafeBrowsing Service, including the filename and the URL it was downloaded from." |
|
APPROVED |
private prawn Curator |
SourceHut |
"Your password is stored after
processing with bcrypt, from which the original password cannot be devised
without a computationally expensive process.
" |
|
APPROVED |
AgnesDeLion Staff |
Infomaniak |
"Our employees are trained every year and regularly made aware of best practices to guarantee the privacy of your personal data.
<br>
</li>
<li>We protect our company network using several layers of security.<br>
</li>
<li>We have access to physical protection measures to guarantee the security of our employees and their equipment.<br>
</li>
<li>We use an association of software and equipment to protect our network against possible intrusions or vulnerabilities.</li>
<li>
<br>
</li>Our dedicated team of security professionals supervises privacy practices for devices and applications.<li>
<br>
</li>We regularly have the security of our infrastructure tested by specialised companies to discover and strengthen against any vulnerabilities even before they can be detected.<br" |
|
DECLINED |
donno Curator |
Line Corporation |
"<br>For example, we are taking the following measures.</p>
<p>● Provision of encryption feature of messages<br>● Strict access control based on a need-to-know basis<br>● 24/7 security monitoring<br>● External authentication for objectively evaluating our security measures<br>● R&D of new security technologies</p>
<p>Furthermore, we will never provide any means for fraudulently accessing Personal Data to a third party.<br>For details regarding our security measures, please also read “Security &.
Privacy”" |
|
APPROVED |
AgnesDeLion Staff |
Porton Private Cloudstorage |
Information is provided about security practices |
|
APPROVED |
Hekkerman |
CodeSandbox |
"Here are some
examples of how we are securing your personal data:" |
|
APPROVED |
private prawn Curator |
Yello |
"We have implemented commercially reasonable, appropriate technical and organizational measures to protect the confidentiality, security and integrity of data stored" |
|
APPROVED |
serph Curator |
Wolfram Alpha |
"Security <p> We take appropriate measures to ensure the security of our Services.
These include precautions to safeguard your PI against loss, theft and misuse, as well as against unauthorized access, alteration, disclosure or destruction of data." |
|
APPROVED |
automateit Staff |
CITI Program |
"We endeavor to use reasonable organizational, technical, and administrative measures to protect personal data within our organization.
" |
|
APPROVED |
serph Curator |
Gruppo Guarino |
"Il trattamento dei dati avviene per il tempo strettamente necessario a conseguire le finalità, anche mediante l’utilizzo di strumenti automatizzati osservando le misure di sicurezza volte a prevenire la perdita dei dati, gli usi illeciti o non corretti e gli accessi non autorizzati." |
|
APPROVED |
guarinolab |
Gruppo Guarino |
"WPMU Defenderinclude un firewall endpoint ed un malware scanner.
Lo scanner Wordfence controlla file, indirizzi IP, URL non validi, backdoor, spam, reindirizzamenti dannosi e iniezioni di codice.</p>
<p>L’utilizzo del sistema Wordfence Security è soggetto alla privacy policy e ai termini di utilizzo di WPMU.</p>
<p>Anche per l’utilizzo di tali cookie e per i trattamenti di dati personali ad esso connessi non è necessario, in forza di quanto previsto dalla disciplina vigente in materia di privacy, il suo consenso." |
|
APPROVED |
guarinolab |
Simitless |
Information is provided about security practices |
|
APPROVED |
fafournier |
Common Application |
"Common Application offers suggestions through which users of its Properties may secure their information.</em>" |
|
APPROVED |
viking |
Overwolf |
"Security These cookies can help us identify and prevent security risks" |
|
APPROVED |
ishi_sama |
YNAB. (You Need a Budget) |
"Your YNAB account password is one-way salted and hashed using multiple iterations of a key derivation function for passwords.
" |
|
APPROVED |
yoharnu |
Craft |
Information is provided about security practices |
|
APPROVED |
fabien-jrt |
Notion |
Information is provided about security practices |
|
APPROVED |
fabien-jrt |
IRChelp Brasil |
https is used by default |
|
DECLINED |
campari |
Anime Music Quiz |
"How Does Anime Music Quiz Keep my Data Safe?" |
|
APPROVED |
MoeTsundere Suspended |
GlobaliD |
"Therefore, instead of transferring Personal Data to third parties, users only share access to theirPersonal Data" |
|
DECLINED |
Laffel |
GlobaliD |
"Security
<p>Our user’s Personal Data is encrypted, anonymized and backed up to the cloud.
The key required to decrypt that data is only held by the owner of the name" |
|
APPROVED |
Laffel |
Gap Creek Media |
"When you submit sensitive information via the website, your information is protected by an SSL.
" |
|
APPROVED |
AgnesDeLion Staff |
GlobaliD |
"<li>To protect your Personal Data from unauthorized access and use, we use security measures including computer safeguards.</li>
<li>We also maintain other physical, electronic and procedural safeguards to protect your Personal Data that you have Consented GlobaliD access to and we limit information access to employees for whom access is appropriate.</li>
" |
|
DECLINED |
Laffel |
DesignCrowd |
"The steps we take to protect personal data include:
</p>
<ul>
" |
|
APPROVED |
ThisIsLiz Curator |
Zoho |
"At Zoho, we take data security very seriously." |
|
APPROVED |
DavidPrivy |
Zoho |
"we encourage you to check our Security Policy" |
|
APPROVED |
DavidPrivy |
NovelAI |
Information is provided about security practices |
|
APPROVED |
ArrangedNoiseFan |
Odysee |
"How do we protect your information?</strong>
</p>
<p>Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.</p>
<p>We use regular Malware Scanning.</p>
<p>Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential.
In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology." |
|
APPROVED |
AgnesDeLion Staff |
Transit |
"<p>We are committed to securing your information and we take reasonable physical, organizational and technical measures to protect your information against unauthorized access, use, disclosure, modification or destruction.</p>
<p>These safeguards include, but are not limited to:</p>
<ul>
<li>Storage on secure servers;</li>
<li>Encryption of the communication channels;</li>
<li>Limited access to employees and contractors on a “need-to-know” basis.</li>
</ul>
<p>Although we take great efforts to protect your information, no security system can prevent all potential security breaches nor be immune from any wrongdoings or malfunctions.</p>" |
|
APPROVED |
sierra |
SCP Wiki |
"Wikidot.com User accounts are protected by user-created passwords.</p>
<p>Wherever required we use security measures to avoid <em>plain-text</em> transport of personal information between the browser and Wikidot.com servers.
In particular the login form data (email + password), all registration data, password-recovery forms and a few other that involve personal data use secure transport.</p>
<p>To ensure secure data transfer, pages with sensitive information use the <em>HTTPS</em> protocol with at least 128-bit SSL certificates when communicating with a web browser.
Areas protected by SSL include: My Account panel, login pages, create account pages, upgrade pages, AdSense panel and all user-created Sites with SSL enabled.</p>
<p>" |
|
APPROVED |
someone |
yelp |
"Other users may be able to identify you, or associate you with your account, if you include personal information in the content you post publicly.
You can reduce the risk of being personally identified by using the Service pseudonymously, though doing so could detract from the credibility of your contributions to the Service.
Yelp users can also use the Find Friends feature to find one another based on their names or email addresses (you can limit your visibility for this feature in your account settings).
Please also note that the messages you send or receive using the Service are only private to the extent that both you and the recipient(s) of your messages keep them private.
For example, if you send a message to another user, that user may choose to publicly post it." |
|
DECLINED |
viking |
AAX.com |
"4.2.We have adopted the following measures to protect the security and integrity of your Personal Information:" |
|
APPROVED |
welda Curator |
Binance |
"5.
HOW WE STORE AND PROTECT USER DATA<p>" |
|
APPROVED |
welda Curator |
miHoYo |
"Please note for security reasons, we store passwords in encrypted form.</p>" |
|
APPROVED |
AZ |
Moodle |
"We are committed to transparency in this. </p>
<p>Our legal bases for the processing of personal data are:</p>
<ul>
<li>Article 6.1(a), GDPR, Consent</li>
<li>Article 6.1(b), GDPR, Contract</li>
<li>Article 6.1 (c), GDPR, Legal Obligation</li>
<li>Article 6.1(f), GDPR, Legitimate Interest</li>
</ul>
<p>If you would like more details please refer to Annex 1.</p>
<p>" |
|
DECLINED |
carleto Curator |
Cover your Tracks |
"Security <p> EFF employs industry standard security measures to protect the loss, misuse, and alteration of the information under our control, including appropriate technical and organizational measures to ensure a level of security appropriate to the risk, such as the pseudonymization and encryption of personal data, data backup systems, and engaging security professionals to evaluate our systems effectiveness.
Although we make good faith efforts to store information collected by EFF in a secure operating environment, we cannot guarantee complete security." |
|
APPROVED |
wolfgang8741 |
Opera |
"We follow the Payment Card Industry Data Security Standards (PCI DSS) when handling credit card data." |
|
APPROVED |
ELP_JAPIS Curator |
Bio.Link |
"Personal information that we store or transmit is protected by security and access controls, including username and password authentication, two-factor authentication, and data encryption where appropriate." |
|
APPROVED |
(deactivated) Suspended |
Poke |
" Our servers are secured with SHA-384 Signature Algorithm.
meaning we cant see the videos you watching, things you search, or things you do.
" |
|
APPROVED |
Ashley |
FastestVPN |
"FastestVPN Does Not Store Any
Logs, Period!
<p>We do not store your logs in anyway.
Any information or logs related to your browsing history - the websites you visit, the content you download or stream, your traffic destinations, or your DNS queries - stays with you and you alone.</p>" |
|
DECLINED |
flww |
RethinkDNS |
"Crash logs, debug logs, and other non-personally identifiable information is stored encrypted with custom keys on Amazon S3" |
|
APPROVED |
AgnesDeLion Staff |
JMServices |
Information is provided about security practices |
|
DECLINED |
MaximKing |
MRichard333 |
Information is provided about security practices |
|
APPROVED |
MRichard333 |
Delta Math |
"We ensure passwords are stored and transferred securely using encryption, salted hashing and key stretching to prevent brute force password cracking.</p>" |
|
APPROVED |
AgnesDeLion Staff |
PrivacySpy |
"<p>To ensure security, all our data is encrypted at rest and in transit.</p>
<p>" |
|
APPROVED |
AgnesDeLion Staff |
E3 SPARK PLUGS |
Information is provided about security practices |
|
APPROVED |
Aayan |
Inkscape |
"security measures to protect against unauthorized access, alteration, disclosure or destruction of your personal information, username, password hash" |
|
APPROVED |
AgnesDeLion Staff |
AutismDate |
"Autism Date has implemented reasonable and appropriate security measures to protect and prevent the loss, misuse, and alteration of the information under our control, including your personal information." |
|
APPROVED |
Aayan |
Dealer |
"Cox Automotive has implemented reasonable security measures to protect the information, both during transmission and once it is received, including without limitation, use of firewalls, application controls and monitoring." |
|
APPROVED |
Aayan |
The Poster Database |
Information is provided about security practices |
|
DECLINED |
Aayan |
Talking Tom and Friends |
Information is provided about security practices |
|
DECLINED |
Aayan |
Ziff Davis |
"In certain instances we may use Secure Sockets Layer encryption and/or transfer certain User Information in a non-human readable format to provide protection.
" |
|
APPROVED |
AgnesDeLion Staff |
kik-messenger |
"HOW WE KEEP YOUR INFORMATION SECURE" |
|
APPROVED |
shiftydino |
Wolt |
"We use administrative, organizational, technical, and physical safeguards to protect the personal data we collect and process.
Measures include for example, where appropriate, encryption, pseudonymization, firewalls, secure facilities and access right systems.
Our security controls are designed to maintain an appropriate level of data confidentiality, integrity, availability, resilience and ability to restore the data.
We regularly test the Wolt Services, systems, and other assets for security vulnerabilities.
Furthermore, access to personal data by employees of Wolt is restricted and access is subject to what is necessary for purposes of the employee’s work assignments." |
|
APPROVED |
lr19_ |
Headspace |
"Personal Security and Privacy" |
|
DECLINED |
shiftydino |
Fedora |
"Our Commitment to Data Security" |
|
APPROVED |
shiftydino |
matrix.org |
"We never store password data in plain text.
instead they are stored hashed (with at least 4096 rounds of bcrypt, including both a salt and a server-side pepper secret).
Passwords sent to the server are encrypted using SSL." |
|
APPROVED |
AgnesDeLion Staff |
Monarch Money |
"We seek to protect your Personal Data from unauthorized access, use and disclosure using appropriate physical, technical, organizational and administrative security measures based on the type of Personal Data and how we are processing that data." |
|
APPROVED |
Aayan |
Ramsey Solutions |
"Ramsey Solutions is committed to keep your information private and secure." |
|
DECLINED |
Aayan |
Adblock |
Information is provided about security practices |
|
DECLINED |
Eugenio400 |
Adblock |
Information is provided about security practices in case of data breaches |
|
DECLINED |
Eugenio400 |
Bright Cellars |
Information is provided about security practices |
|
APPROVED |
AgnesDeLion Staff |
Snopyta |
"</p> Encryption <p> We try to encrypt things where it is possible.
Most machines have full disk encryption while some of them are not fully encrypted.
Next to this we encrypt as much as the respective services allow.
</p>" |
|
APPROVED |
AgnesDeLion Staff |
CounterMail |
"<li>We only use strong open source algorithms</li>" |
|
APPROVED |
EarldridgeJazzedPineda |
Le Figaro |
"Vos données à caractère personnel sont protégées par des mesures techniques et organisationnelles conformes aux exigences légales et réglementaires françaises et européennes, permettant d’assurer leur sécurité et leur confidentialité.</p>
<p>En particulier, la Société du Figaro utilise des technologies de protection, comme des systèmes de chiffrement, d'authentification, de détection de fraudes afin de protéger votre compte en ligne, ainsi que vos transactions de paiement" |
|
APPROVED |
AgnesDeLion Staff |
Jami |
"
We use state of the art end-to-end encryption with perfect forward secrecy for all communications and comply with the X.509 standard.
We use TLS/SRTP to secure connection and communications over the network.</p>
<br>
" |
|
APPROVED |
AgnesDeLion Staff |
Pobox |
"using secure communication transmission software (known as "secure sockets layer" or "SSL") that encrypts all information you input on our website before it is sent to us.
SSL is an industry standard encryption protocol and this ensure that the information is reasonably protected against unauthorised interception." |
|
APPROVED |
EarldridgeJazzedPineda |
Project Euler |
"Your connection to the website will use a secure SSL connection (HTTPS).</p>" |
|
APPROVED |
EarldridgeJazzedPineda |
Anydesk |
"We use state-of-the-art encryption methods (for example,.
SSL) via HTTPS in order to protect the security of your data during transfer.
Our security measures are being continuously improved in line with technological developments." |
|
APPROVED |
EarldridgeJazzedPineda |
Ornikar |
Information is provided about security practices |
|
PENDING |
AgnesDeLion Staff |
Torrent Privacy |
"The SOFTWARE PRODUCT provides you secured connection using SSH protocol to COMPANY's server(s)." |
|
APPROVED |
EarldridgeJazzedPineda |
Valid Number |
"
To protect your session-related information when you visit our website, your information is transmitted through a SSL (Secure Socket Layer), which is a standard technology to encrypt and transmit data over the Internet.
</p>" |
|
APPROVED |
AgnesDeLion Staff |
HP | Hewlett-Packard |
"When we transmit highly-confidential information (such as credit card number or password) over the internet, we protect it through the use of encryption, such as later versions of the Transport Layer Security (“TLS”) protocol.</p>" |
|
APPROVED |
EarldridgeJazzedPineda |
t2bot.io |
"We use software best practices to guarantee
that only people who you designate as viewers of your data can access it.
In other words,
we segment our user data via software.
We do our best and are very confident we're doing
a good job at it, but, like every other service that hosts their user data on the same
database, we cannot guarantee that it is immune to a sophisticated attack." |
|
DECLINED |
lr19_ |
Aternos |
" Your <strong>password</strong> is already concealed on your computer (hash) and will then be stored with more security (hash + salt) on our servers.
So your password will never reach our servers in plaintext and is extra secured.
<br>
<br>" |
|
APPROVED |
AgnesDeLion Staff |
Monero |
"SHA hashes are provided for end users to confirm they have downloaded the correct file." |
|
APPROVED |
EarldridgeJazzedPineda |
Coop |
"16.
Comment protégeons-nous vos données?" |
|
APPROVED |
welda Curator |
BlueMail |
"Security is extremely important to us.
We use industry leading security practices to preserve the integrity of all your data.
For example, when you transmit sensitive information and when you send and receive emails, BlueMail encrypts the transmission of that information using secure socket layer technology (SSL).
However, no method of electronic transmission or storage is 100% secure, so we cannot guarantee absolute security." |
|
APPROVED |
welda Curator |
Electronic Frontier Foundation |
"<p>EFF employs industry standard security measures to protect the loss, misuse, and alteration of the information under our control, including appropriate technical and organizational measures to ensure a level of security appropriate to the risk, such as the pseudonymization and encryption of personal data, data backup systems, and engaging security professionals to evaluate our systems effectiveness.
EFF has turned on HTTPS by default.</p>
<p>Although we make good faith efforts to store information collected by EFF in a secure operating environment, we cannot guarantee complete security.</p>" |
|
APPROVED |
welda Curator |
Pexgle |
"We are continuously implementing and updating administrative, technical, and physical security measures to help protect your information against unauthorized access, loss, destruction, or alteration.
Some of the safeguards we use to protect your information are as follows<ul>
<li>Limited access to the production database at the network level</li>
<li>Limited access to the production database at the process/users level</li>
<li>Password policy for access to the production database</li>
<li>Data transfer encryption</li>
<li>Data encryption in the database (for card data and authentication credentials)</li>
<li>WAF (Web Application Firewall)</li>
<li>DDoS protection</li>
<li>Internal password change policies</li>
<li>PCI DSS compliance</li>
<li>Logging of actions and log analysis</li>
<li>Antiviruses on admins workstations</li>" |
|
APPROVED |
AgnesDeLion Staff |
Pronatura Switzerland |
"Les données personnelles que vous mettez à notre disposition via les formulaires Web envoyés sur nos pages de soutien (support.pronatura.ch), lors de la souscription à une newsletter (infolettre) ou d’une demande de contact, nous parviennent de façon sécurisée sous forme cryptée.
Le processus sécurisé utilisé (protocole SSL, Secure Sockets Layer) est à la pointe de la technologie.</p>
<p>Le cryptage SSL (identifiable par l’abréviation https:// dans la barre d’adresse du navigateur) est un protocole de cryptage des données lors du transfert du serveur Internet au navigateur.
Ce transfert offre un niveau de sécurité particulièrement élevé.
Vos données personnelles sont cryptées par le protocole SSL lors du transfert entre votre ordinateur et notre serveur SSL.</p>" |
|
APPROVED |
welda Curator |
Coinbase |
"For example, we use computer safeguards such as firewalls and data encryption, we enforce physical access controls to our buildings and files, and we authorize access to personal information only for those employees who require it to fulfill their job responsibilities.
Full credit card data is securely transferred and hosted off-site by payment vendors like Worldpay, (UK) Limited, Worldpay Limited, or Worldpay AP Limited (collectively “Worldpay”) in compliance with Payment Card Industry Data Security Standards (PCI DSS).
This information is not accessible to CB or Coinbase staff.
" |
|
APPROVED |
AgnesDeLion Staff |
AirVPN |
"<br>Security measures are taken to protect data leakage, illegal use of data, unauthorized access to data, specifically (but not limited to):</p>
<ul>
<li>machines where operations which might involve personal data are protected by redundant security, including, but not limited to, responding only to private host names and rejecting connections from anything different that a tiny white list of addresses</li>
<li>the database of the accounts is not stored in those Air servers which are dedicated to provide VPN access.
it is stored in servers which are not accessible from the outside</li>
<li>Air databases, according to their contextual usage, are isolated from each other</li>
<li>in the users database all personal data that do not need a search index are encrypted</li>
<li>physical access to the machines keeping the users database is prevented by state of the art surveillance in top rated datacenters</li>
<li>Air uses only ciphers for which a cryptographic practical/feasible attack has not been found by the worldwide scientific community</li>" |
|
APPROVED |
AgnesDeLion Staff |
Among Us |
"<p>We recognize our responsibility to protect the Personal Information you entrust to us. Here is how we protect your information:</p>
<ul>
<li>We do not use vulnerability scanning and/or scanning to PCI standards.</li>
<li>We only provide articles and information.
We never ask for credit card numbers.</li>
<li>We do not use Malware Scanning.</li>" |
|
APPROVED |
Aayan |
Remind |
"Remind's main database and all backups are encrypted at rest.
</li>
<li>The AWS cloud infrastructure has been designed and managed in compliance with regulations, standards, and best-practices, including HIPAA, SOC 1/SSAE 16/ISAE 3402 (formerly SAS70), SOC 2, SOC 3, PCI DSS Level 1, ISO 27001, FedRAMP, DIACAP and FISMA, ITAR, FIPS 140-2, CSA, and MPAA.
</li>
<li>" |
|
APPROVED |
AgnesDeLion Staff |
Brax.Me |
" We do not store your password directly (we use something called an irreversible hash).
This means that we cannot see your password or log in to your account without your knowledge." |
|
APPROVED |
AgnesDeLion Staff |
Privacy.com |
"We use leading technologies such as (but not limited to) data encryption, firewalls and server authentication to protect the security of your data.
Our staff and third parties whenever we hire them to provide support services, are required to observe our privacy standards and to allow us to audit them for compliance." |
|
APPROVED |
private prawn Curator |
Waldhör Solutions |
"Your data is being stored on the same servers on which our website is being stored.
These servers are encrypted and being provided by our web host “World4You” that is hosting in Austria, where its servers are located.
If you are interested you can get more information at https://www.world4you.com/en/server/datacenter-und-technik.html about the servers and the web host that is responsible for data security of its servers." |
|
APPROVED |
waldhoer.solutions |
Posteo |
"We always technically protect your content data with the latest security technologies (see our information page about encryption).
In addition, content data is consistently saved on encrypted hard drives to protect them from physical access.
We operate and maintain our own server infrastructure.
All of our servers and stored data are located in Germany." |
|
APPROVED |
Jack |
PDF24.org |
"
All data transmissions to and from our servers, which process personal data, are encrypted via SSL.</p>" |
|
APPROVED |
jmrtr |
IDrive |
"IDrive supports 256-bit AES data encryption before transmission from your computer using either (i) a default key or (ii) an optional user defined private key created by you.
Based on your privacy and security needs, you need to make an appropriate encryption key choice.
This encryption process encrypts the data contained within the file and not the file-name itself.
Certain metadata related to files including file thumb derivatives may not be encrypted.
These metadata and derivatives are necessary for faster display and search.
For web and mobile based data transfers, data is sent over an encrypted channel with server side AES 256-bit encryption.<br>
<br> If you choose the default encryption option, the system chooses a key for encrypting your data.
While your data is still encrypted, IDrive personnel may still be able to decrypt your data using your Registration Information if such a situation should ever arise.
<br>
" |
|
APPROVED |
mrmarc |
Yleisradio |
"We pay particular attention to data protection and information security in the design, implementation and maintenance of our services.
We use appropriate physical, technical and administrative security measures to protect your personal data.
Persons have been specifically appointed to take care of privacy protection and information security.
We restrict access to systems and databases containing personal data to the appointed persons who have an essential work-related need and the right to process the personal data in question.</p>
<p>We implement data protection and information security requirements by using, among other things, preventive risk management measures, by taking privacy protection and information security into account in the design of our services, by training our personnel and by regularly reviewing the compliance of our services with regard to data protection legislation." |
|
APPROVED |
lr19_ |
BitPay |
"Our security measures include risk assessments and controls for the following: application and system access, system and application development and maintenance, acceptable use, data classification, incident response, disaster recovery and business continuity, and security training." |
|
APPROVED |
EarldridgeJazzedPineda |
Jehovah's Witnesses |
"We use up-to-date data storage and security techniques to protect your personal information from unauthorized access, improper use or disclosure, unauthorized modification, unlawful destruction, or accidental loss.
All processors of personal data and any third parties we engage to process your personal information are obligated to respect the confidentiality of your information.
We keep your personal data for only as long as reasonably necessary for the purposes for which it was collected or to comply with any applicable legal reporting or document retention requirements.</p>
<p>We protect your personal data during transit using encryption protocols such as Transport Layer Security (TLS).
We use computer systems with limited-access protocols, housed in facilities using physical, electronic, and procedural security measures to protect the confidentiality and security of information transmitted to us.
We keep strict security standards to prevent any unauthorized access.</p>" |
|
APPROVED |
levijneuwirth |
Paradox Interactive |
"<p>We maintain physical, electronic and procedural safeguards to help guard your data in compliance with applicable privacy regulations.
If transactions are offered on the Services, transaction information is transmitted to and from the Service in encrypted form using industry-standard Transport Layer Security (TLS used to be known as SSL) connections to help protect such information from interception.
We strictly restrict authorized access to your data only to those persons who have a legitimate purpose to access it.
We also have security measures in place to protect the loss, misuse and alteration of the data we process.
We encourage you to be careful when sharing your data with other users when you use our Services like forums or chats.
Paradox will NEVER ask for your password to be sent separately or in clear text.
Anyone doing so is probably trying to steal your stuff." |
|
APPROVED |
levijneuwirth |
Desmos |
"We care about the security of your information and employ physical, administrative, and technological safeguards designed to preserve the integrity and security of all information collected through our Service.
Access to information is limited (through user/password credentials and, in some cases, two factor authentication) to those employees who require it to perform their job functions.
We use industry standard SSL (secure socket layer technology) encryption to transfer personal information.
Other security safeguards include but are not limited to data encryption, firewalls, physical access controls to buildings and files, and employee training.
You can help protect against unauthorized access to your account and personal information by selecting and protecting your password appropriately and limiting access to your computer and browser by signing off after you have finished accessing your account.</p>" |
|
APPROVED |
levijneuwirth |
FanFiction |
"<li>We take appropriate security measures to protect against unauthorized access to or unauthorized
alteration, disclosure or destruction of data.
</li>
<li>When applicable, we use industry standard encryption to protect the communication between all
compatible devices and our services.
</li>
<li>We restrict access to your personally identifying information to site staffs who need to know
that information in order to operate, develop or improve our services." |
|
APPROVED |
Holonium |
Liberapay |
"<p>All network connections are encrypted, except for some communications between machines located in the same datacenter.</p>
<p>As a precaution against identity theft in case of data leak, the identity information of Liberapay account owners is stored encrypted in our database.</p>" |
|
APPROVED |
arlo Staff |
RightsStatements |
"We take all steps necessary to ensure that your data is stored securely and used only in accordance with the preferences you have requested." |
|
APPROVED |
arlo Staff |
LastPass |
"LogMeIn has implemented a comprehensive data privacy and security program which includes appropriate technical and organizational measures designed to safeguard and protect the personal, identifiable, and/or confidential information we collect or you share with us.
LogMeIn’s operations, on a product and/or suite-specific basis, have been assessed by independent third-party auditors against recognized security standards and controls, including SOC2 Type II, BSI C5, SOC3, and ISO 27001." |
|
APPROVED |
welda Curator |
VKontakte |
"To reduce the probability of third parties gaining unauthorized access, if you login to your account from an unusual server (in particular, from a server located in a foreign country), we will block entry to your personal page.
You will then receive a message asking you to provide certain digits indicated in SMS sent to your mobile phone number.
After three unsuccessful attempts to enter these digits, we will block access from that server for 4 hours." |
|
APPROVED |
AgnesDeLion Staff |
420A3.com |
"<li>Email Address, Stored Encrypted.
Never shown onscreen, or shared, unless you otherwise allow it.</li>
<li>Passwords are NEVER sent in emails or displayed onscreen.
Passwords ARE stored in our database, encrypted via a 1-way salted hash.</li>
<li>We will NEVER store Credit Card data on our servers or database" |
|
APPROVED |
ken@kensblog.com |
La Centrale |
"Ainsi, nous utilisons des mesures de sécurisation (et notamment d'authentification des personnels) de nos locaux, de nos outils informatiques, de notre réseau informatique interne et des serveurs, de sauvegarde des données, de journalisation des activités, de sécurisation des données lors des développements informatiques et des opérations de maintenance, des anomalies et des évènements liés à la sécurité des données, des mesures d'archivage, et de protection en cas d'échange de données (par exemple le protocole " https ").</p" |
|
APPROVED |
AgnesDeLion Staff |
Nextcloud |
"<p>In line with our business strategy of not monetizing home and small business users but aim for large enterprises, our goal is to ONLY track employees of companies using their work email.
We try to drop all home/private users from the database as soon as we find out they are private users, of course after we have sent them the white paper they asked for.
For example, we remove contacts with an @gmail or @icloud address and keep obviously business related addresses (@acme @example-ltd @placeholder-corp.com).
For those we then might follow up on a End-to-end Encryption white paper download a week later with an offer to download our Server-side Encryption white paper.
" |
|
APPROVED |
AgnesDeLion Staff |
Artspace |
"<p>We use reasonable physical, electronic, and administrative safeguards to help us protect the security, integrity and confidentiality of data stored on our system.
The Site encrypts your credit card number and other Personal Information using secure socket layer (SSL) technology to provide for the secure transmission of the information from your PC to our servers.
SSL is an industry-standard protocol for encryption over the Internet.
While no system is 100% secure, we believe that the measures we have implemented minimize the risk of security breach to an appropriate level given the types of information involved.
Please note that any information you provide us by email is unencrypted.</p>" |
|
APPROVED |
AgnesDeLion Staff |
La Girafe Extraordinaire (DEPRECATED Expired or Suspended) |
"<p>Les renseignements personnels que nous collectons sont conservés dans un environnement sécurisé.
Les personnes travaillant pour nous sont tenues de respecter la confidentialité de vos informations.<br>Pour assurer la sécurité de vos renseignements personnels, nous avons recours aux mesures suivantes :</p>
<ul>
<li>Protocole SSL (Secure Sockets Layer)</li>
<li>Gestion des accès – personne autorisée</li>
<li>Gestion des accès – personne concernée</li>
<li>Logiciel de surveillance du réseau</li>
<li>Sauvegarde informatique</li>
<li>Identifiant / mot de passe</li>
<li>Pare-feu (Firewalls)</li>
</ul>
<p>
<strong>Nous nous engageons à maintenir un haut degré de confidentialité</strong> en intégrant les dernières innovations technologiques permettant d’assurer la confidentialité de vos transactions.
" |
|
APPROVED |
Frankie |
Pole-Emotion |
"<p>Chez nous, vos données personnelles sont transmises en toute sécurité grâce à un codage.
À cette occasion, nous utilisons le système de codage SSL (Secure Socket Layer).
Personne ne peut garantir une protection absolue.
Cependant, nous protégeons notre site web et nos autres systèmes par des mesures techniques et organisationnelles contre la perte, la destruction, l’accès, la modification et la diffusion de vos données par des personnes non autorisées.</p>" |
|
APPROVED |
PoleEmotion |
Amazon Prime Video |
"How Secure Is Information About Me? <p>We design our systems with your security and privacy in mind.</p>
<ul>
<li>
We work to protect the security of your personal information during transmission by using encryption protocols and software.
</li>
<li>
We follow the Payment Card Industry Data Security Standard (PCI DSS) when handling credit card data.
</li>
<li>
We maintain physical, electronic, and procedural safeguards in connection with the collection, storage, and disclosure of personal customer information.
Our security procedures mean that we may occasionally request proof of identity before we disclose personal information to you.
</li>
<li>
Our devices offer security features to protect them against unauthorized access and loss of data." |
|
APPROVED |
Dr_Jeff Staff |
Chilliapps - Abandonment Protector |
"5.4 “Chilliapps” will maintain an information security program (including the adoption and enforcement of internal policies and procedures) against accidental or unlawful loss, access or disclosure.
Accordingly, we are committed to identifying reasonably foreseeable and internal risks to security and unauthorized access to the “Chilliapps” services and minimize security risks, including through risk assessment and regular testing.
</p>" |
|
APPROVED |
arlo Staff |
Qwant |
"How does Qwant protect your privacy?
<p>When you use Qwant as a search engine, <strong>we do not set any advertising cookie</strong> on your browser, nor do we look at what you personally searched for previously.
When you make a query, it is immediately pseudonymized using the methods set forth in this Privacy Policy.</p>
<p>We also undertake to make every effort to guarantee the security and confidentiality of our users’ personal data and in particular to prevent such data from being altered, deleted or accessed by unauthorized third parties.
The URL of Qwant begins with “HTTPS”, which indicates to users that they are communicating their data securely through the TLS protocol.
Technically, the TLS guarantees visitors that their data cannot be intercepted while in transit over the network in a fraudulent or accidental manner.
In addition, the padlock that appears in front of the Qwant URL on most browsers certifies that you are browsing a secure site." |
|
APPROVED |
Dr_Jeff Staff |
NewPipe |
"<p>All data is stored on a dedicated server administrated by the NewPipe project.
Neither the hosting provider nor any other third party does have any access to the data, as it is stored encryptedly on the hard disks using so-called full-disk encryption.</p>
" |
|
APPROVED |
AgnesDeLion Staff |
Future PLC |
"
<p>We are committed to protecting the personal data we hold.
In accordance with GDPR, we adopt appropriate technical and organisational measures to help prevent unauthorised access to your information and ensure data is held securely.
We also require any third parties to whom we may transfer personal data to have appropriate security measures in place.
We ask third parties to complete Data Security Questionnaires so we can be sure they are a safe place for your data.</p>
" |
|
APPROVED |
AgnesDeLion Staff |
Khan Academy |
"Once we receive your transmission of information, Khan Academy makes commercially reasonable efforts to ensure the security of our systems.
When you enter sensitive information, we encrypt the transmission of that information using secure socket layer technology (SSL) or similar technologies.
However, please note that this is not a guarantee that such information may not be accessed, disclosed, altered, or destroyed by breach of any of our physical, technical, or managerial safeguards." |
|
APPROVED |
Dr_Jeff Staff |
Merriam-Webster |
"Security of Your Information <p>Any personally identifiable information collected through this site is stored on limited-access servers.
We maintain safeguards to protect these servers and the information they store.
Also, to help protect the privacy of data and personally identifiable information you transmit through the use of our Services, we maintain physical, technical and administrative safeguards.
We update and test our security technology on an ongoing basis.
We strive to restrict access to your personal data to those employees who need to know that information to provide benefits or services to you.
In addition, we strive to educate all of our employees about the importance of confidentiality and maintaining the privacy and security of your information.</p> " |
|
APPROVED |
AgnesDeLion Staff |
DiscourseHosting |
"We adopt appropriate data collection, storage and processing practices and security measures to protect against unauthorized access, alteration, disclosure or destruction of your personal information, username, password, transaction information and data stored on our Site.</p>
<p>Sensitive and private data exchange between the Site and its Users happens over a SSL secured communication channel and is encrypted and protected with digital signatures.
" |
|
APPROVED |
AgnesDeLion Staff |
Kalunga |
"Segurança # <p>A Kalunga compromete-se com a segurança do tratamento dos dados pessoais dos titulares, por meio da utilização de meios avançados de tecnologia da informação, não somente em seu site, mas em todos os seus demais canais de venda e de contato.</p>
<p>Todas as informações fornecidas são criptografadas e alocadas em um servidor seguro.
Isso garante que seus dados pessoais e de cobrança não serão interceptados ou copiados.</p>
<p>A Kalunga adota todas as medidas de segurança para proteger os dados pessoais dos titulares.
Assim, ao fornecer os seus dados no site da Kalunga, você estará em uma página cujo padrão de segurança é o SSL (SECURE SOCKET LAYER), utilizado pela maioria dos sites de Bancos.</p>
<p>Note que sempre que você estiver na página de cadastro, o cadeado de segurança aparecerá no rodapé ou barra de endereços, dependendo do seu navegador.
Isto significa que você estará em uma página de web segura.</p>
<p>As informações de cartões de crédito não são armazenadas em nossos sistemas e todo o processo de aprovação é feito diretamente com as Administradoras de Cartões e Bancos.
Para sua tranquilidade, o ícone do cadeado fechado, no canto superior da tela, indica absoluta segurança durante a transmissão de dados em sua compra.</p>
<p>Para sua segurança, se houver qualquer divergência de informações cadastrais e de pagamento, a Kalunga entrará em contato para confirmar os dados antes de aprovar o pedido." |
|
APPROVED |
KnossosDomovoi Curator |
Speaky |
"All transmissions of personal data will be encrypted via “https” pages.
This mainly concerns all the administrator tools (server management, database access, server access).
All communication between servers is encrypted using TLS technology, and access to the server is via encrypted SSH and VPN connections. This guarantees a high level of data security and confidentiality. In addition, all user and supervisor passwords are encrypted (SHA256) in our database and cannot be read externally or internally by SPEAKY.
It is for this reason that we only send new passwords and never an existing password.
This is a very important security measure that prevents inappropriate access to strictly personal and confidential data. " |
|
APPROVED |
welda Curator |
Brain.fm |
"Brain.FM has put in place certain technological and procedural security functions in order to protect the personal information it collects, uses or transfers from loss, misuse, alteration or destruction.
Brain.FM uses firewalls to help prevent outside parties from accessing our database server through the Internet, and physical access to the database server is restricted to authorized individuals.</p>
<p>When transferring personally identifiable information to and from third parties Brain.FM uses SSL &.
SFTP (Secure FTP) (which includes SHA-2 encryption), as required for Email Sender and Provider Coalition (ESPC) membership." |
|
APPROVED |
welda Curator |
VPN.AC |
"We make use of several security measures to safeguard the data of our users, such as and not limited to: full disk encryption, forced TLS (HTTPS) for all website access, remote access to servers permited only to a very limited number of employees.
" |
|
APPROVED |
welda Curator |
Follow My Health |
"Allscripts uses both technical and procedural Security Measures to maintain the confidentiality, integrity, and security of the FollowMyHealth Universal Health Record and other databases, including the use of firewalls, complex passwords, dual-factor authentication, various audit trails, data loss prevention, regular penetration testing, risk assessments, and anti-virus software.
FollowMyHealth encrypts all PHR Data during transmission between your Provider and FollowMyHealth.
Within FollowMyHealth, all PHR Data is encrypted at three levels: each individual has a unique encryption key.
demographic information is encrypted.
and clinical data is separately encrypted." |
|
APPROVED |
welda Curator |
CNED |
"
<p>Le CNED et ses sous-traitants mettent en œuvre des mesures de sécurité physique et techniques destinées à assurer la sécurité et l’intégrité des données afin que celle-ci ne puissent faire l’objet d’extraction frauduleuse, de modification ou de suppression malveillante.
Ces mesures mises en œuvre sont proportionnées à la sensibilité des données et à l’impact que leur corruption aurait pour vous.
Parmi ces mesures ont peut citer :</p>
<p> -  .
Des accès aux applications par authentification par un couple identifiant/mot de passe <br>-  .
Des accès aux locaux protégés par badges avec politique de gestion des accès<br>-  .
Une politique d’accès aux locaux des serveurs du CNED encore plus stricte<br>-  .
Une politique de sauvegarde des données<br>-  .
Une sécurisation des flux de données saisies en ligne en https<br>-  .
Un chiffrement des données telles que les mots de passe<br>-  .
Un encadrement contractuel du prestataire, sous-traitant avec un engagement de confidentialité <br>-  .
Une conformité au RGS applicable aux administrations.</p>
" |
|
APPROVED |
AgnesDeLion Staff |
huggingface |
"The Company follows generally accepted industry standards, including the use of appropriate administrative, physical and technical safeguards, to protect Personal Information." |
|
DECLINED |
pie3636 |
Mastodon.world |
"How do we protect your information? <p>We implement a variety of security measures to maintain the safety of your personal information when you enter, submit, or access your personal information.
Among other things, your browser session, as well as the traffic between your applications and the API, are secured with SSL, and your password is hashed using a strong one-way algorithm." |
|
APPROVED |
BuckyRiverBeaver |
Airtable |
"You can learn more about our security practices at https://airtable.com/security" |
|
APPROVED |
AgnesDeLion Staff |
Poll Everywhere |
"We have implemented industry standard measures designed to secure your personal information from accidental loss and from unauthorized acess, use, alteration, and disclosure, both during transmission and once we receive it.
All information you provide to us is stored on our secure servers behind firewalls.
Any payment transactions are encrypted using SSL technology.</p>" |
|
APPROVED |
beans |
SimpleX Chat |
"SimpleX Chat Ltd.
("SimpleX Chat") uses the best industry practices for security and encryption to provide secure [end-to-end encrypted](./docs/GLOSSARY.md#end-to-end-encryption)" |
|
APPROVED |
blazyrawr |
THE GOOGLE CEMETERY |
Information is provided about security practices |
|
PENDING |
Aayan |
AliExpress |
"We implement appropriate technical and organisational measures to prevent unauthorized access to the Site, to maintain data accuracy and to ensure the correct use of the information we hold." |
|
DECLINED |
DJJ05 |
AdWork Media Group |
"All sensitive information is encrypted with SSL and our server is routinely audited to ensure a secure environment for AdWork Media users" |
|
APPROVED |
DJJ05 |
Marcus |
"We take the security of personal information, including U.S.
Social Security numbers, seriously and work to limit access to personal information to authorized employees, agents, contractors or vendors.
We also maintain physical, electronic and procedural safeguards designed to protect the information against loss, misuse, damage or modification and unauthorized access or disclosure while in our possession." |
|
DECLINED |
DJJ05 |
Bodybuilding.com |
"<strong>6.
SECURITY" |
|
APPROVED |
welda Curator |
WakaTime |
"We enforce SSL when our users
communicate with WakaTime." |
|
PENDING |
DJJ05 |
Frontier Airlines |
"Our measures and practices are intended to protect your information against unauthorized access or erroneous disclosure, and to protect against the unlawful interception of your Transaction Information, including by requiring our Payment Processor to comply with applicable laws and industry standards and by employing Transport Layer Security (TLS) 1.2 and higher encryption technology supported by most versions of Microsoft Internet Explorer, Chrome, Firefox, and other popular browsers." |
|
APPROVED |
DJJ05 |
Notesnook |
"All your data is encrypted using state-of-the-art encryption algorithms (XChaCha20-Poly1305-IETF &.
Argon2) on your device before any transmission over the Internet" |
|
APPROVED |
(deactivated) Suspended |
Patients Know Best |
"We store all of your information on secure servers and encrypt all of your information" |
|
DECLINED |
PKBIG |
Patients Know Best |
"We store all of your information on secure servers and encrypt all of your information.
Our security measures are tested at least annually to standards set by the UK National Cyber Security Centre" |
|
DECLINED |
PKBIG |
Tennessee State Government |
Information is provided about security practices |
|
PENDING |
Aayan |
ToS;DR Phoenix |
"Passwords are hashed in our database with the bcrypt algorithm." |
|
APPROVED |
(deactivated) Suspended |
Telegram |
"When you send photos, videos or files via secret chats, before being uploaded, each item is encrypted with a separate key, not known to the server.
This key and the file’s location are then encrypted again, this time with the secret chat’s key — and sent to your recipient.
They can then download and decipher the file.
This means that the file is technically on one of Telegram’s servers, but it looks like a piece of random indecipherable garbage to everyone except for you and the recipient.
We don’t know what this random data stands for and we have no idea which particular chat it belongs to.
We periodically purge this random data from our servers to save disk space.</p>
<i>" |
|
QUOTE NOT FOUND |
AgnesDeLion Staff |
Proton AG |
"Data is ALWAYS stored in encrypted format on our servers.
Offline backups may be stored periodically, but these are also encrypted.
We do not possess the ability to access any user encrypted message content on either the production servers or in the backups.</p>" |
|
QUOTE NOT FOUND |
AgnesDeLion Staff |
ToS;DR |
"We must not store your passwords unencrypted.
We undertake to review our security technologies from time to time, for example if our encryption or hash functions are not considered good enough any more.</p>" |
|
QUOTE NOT FOUND |
Esmooth Curator |