Terms of Service and Privacy Policy

Effective Date: 7/1/2025 | Last Updated: 7/1/2025

Please read these terms carefully before using our services

1. Data Collection and Information Gathering

By accessing and using our authentication platform (the "Service"), you acknowledge and consent to our comprehensive data collection practices as outlined herein. We collect, process, and store various categories of personal and technical information to provide, maintain, and improve our services, ensure security compliance, and fulfill our legal obligations under applicable data protection regulations including but not limited to the General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), and other relevant privacy laws.

Account and Authentication Data

When you create an account or authenticate with our Service, we collect and process your email address, which serves as your primary identifier and communication channel. Your password is securely processed using industry-standard bcrypt hashing algorithms with a minimum of 12 salt rounds, ensuring that plaintext passwords are never stored in our systems. We also collect any profile information you voluntarily provide, including but not limited to display names, profile pictures, and biographical information. In the event you enable two-factor authentication (2FA), we store your authentication preferences, backup recovery codes (encrypted using AES-256 encryption), and time-based one-time password (TOTP) secrets in accordance with RFC 6238 specifications.

Device and Technical Information

Our Service automatically collects comprehensive technical information about your device and browsing environment to ensure optimal functionality, security monitoring, and fraud prevention. This includes detailed device fingerprinting data such as your device type, model, operating system version, hardware specifications including CPU architecture, available memory, and screen resolution. We capture your complete browser information including the user agent string, browser version, installed plugins, supported MIME types, and language preferences. Additionally, we collect network-level data including your Internet Protocol (IP) address, Internet Service Provider (ISP) information, connection type (broadband, mobile, satellite), approximate geographical location derived from IP geolocation services, and timezone settings. This information is processed in accordance with our legitimate interests for service provision and security purposes as defined under Article 6(1)(f) of the GDPR.

Session and Usage Analytics

We maintain detailed logs of your interactions with our Service to ensure security, provide customer support, and improve our platform's functionality. This encompasses session management data including login timestamps, logout events, session duration, concurrent session tracking, and session termination reasons. Our systems record user activity patterns such as page views, feature utilization, click-through rates, navigation paths, and interaction frequencies. We also collect performance metrics including page load times, API response times, error rates, and system performance indicators. All security events are logged including failed authentication attempts, suspicious login patterns, potential security threats, account lockouts, and password reset requests. This data is retained for security monitoring and compliance purposes in accordance with our data retention policies outlined in Section 4 of this document.

HTTP Headers and Communication Protocols

Our Service processes various HTTP headers and communication metadata to ensure proper functionality, security, and compliance with web standards. This includes the complete User-Agent string containing detailed information about your browser, operating system, device capabilities, and rendering engine. We process Accept-Language headers to provide localized content and services, Accept-Encoding preferences for optimal content delivery, and Content-Type specifications for proper data handling. Referrer information is collected to understand traffic sources and user navigation patterns, while Origin headers are processed for Cross-Origin Resource Sharing (CORS) security implementations. Additional custom security headers may be processed including Content Security Policy (CSP) directives, X-Frame-Options, and Strict-Transport-Security headers as defined in RFC 6797 and related security specifications.

2. Data Processing and Utilization

The personal and technical data we collect is processed for specific, explicit, and legitimate purposes as required by applicable data protection laws. Our primary processing activities include providing secure authentication services, maintaining user accounts, facilitating secure access to protected resources, and ensuring the integrity and availability of our platform. We utilize collected data for security and fraud prevention purposes, including but not limited to detecting suspicious activities, preventing unauthorized access attempts, identifying potential security threats, implementing rate limiting mechanisms, and maintaining comprehensive audit trails for compliance and forensic analysis.

Additionally, we process data for service improvement and analytics purposes, analyzing usage patterns to enhance user experience, optimize system performance, identify and resolve technical issues, and develop new features and functionalities. Our communication processing activities include sending transactional emails such as account verification messages, security alerts, password reset notifications, and important service announcements. All data processing activities are conducted in accordance with our Privacy by Design principles and comply with the data minimization requirements under Article 5(1)(c) of the GDPR.

3. Security Measures and Data Protection

We implement comprehensive technical and organizational security measures to protect your personal data against unauthorized access, accidental loss, destruction, or damage. Our security infrastructure includes end-to-end encryption for all data in transit using Transport Layer Security (TLS) version 1.3 or higher, as specified in RFC 8446. All sensitive data at rest is encrypted using Advanced Encryption Standard (AES) with 256-bit keys, and cryptographic keys are managed through hardware security modules (HSMs) or equivalent key management systems.

Our access control mechanisms implement the principle of least privilege, ensuring that personnel access to personal data is limited to what is necessary for their specific job functions. We maintain comprehensive audit logging of all data access and processing activities, conduct regular security assessments and penetration testing, and have implemented incident response procedures in accordance with Article 33 and 34 of the GDPR. Our systems include Cross-Site Request Forgery (CSRF) protection, input validation and sanitization, SQL injection prevention measures, and comprehensive rate limiting to prevent abuse and ensure service availability.

4. Data Retention and Deletion Policies

We retain personal data only for as long as necessary to fulfill the purposes for which it was collected, comply with legal obligations, resolve disputes, and enforce our agreements. Active account data including profile information, authentication credentials, and preference settings are retained for the duration of your account's active status and for a period of thirty (30) days following account deactivation to allow for account recovery. Session and authentication logs are retained for ninety (90) days to facilitate security monitoring, fraud detection, and incident response activities.

Security event logs including failed authentication attempts, suspicious activities, and potential security incidents are retained for one (1) year to support ongoing security analysis and compliance with regulatory requirements. Technical and performance logs are retained for thirty (30) days for troubleshooting and system optimization purposes. Upon expiration of the applicable retention period, data is securely deleted using cryptographic erasure methods or secure deletion algorithms that meet or exceed NIST SP 800-88 Rev. 1 guidelines for media sanitization.

5. Third-Party Service Providers and Data Sharing

In the course of providing our services, we may engage carefully vetted third-party service providers who assist us in delivering, maintaining, and improving our platform. These service providers include cloud infrastructure providers for hosting and data storage services, email service providers for transactional email delivery, content delivery networks (CDNs) for performance optimization, and analytics services for usage monitoring and service improvement. All third-party service providers are required to enter into comprehensive data processing agreements (DPAs) that ensure adequate data protection measures and compliance with applicable privacy laws.

We may also integrate with OAuth authentication providers such as Google, GitHub, or other social login services when you choose to use these authentication methods. In such cases, we receive only the minimum necessary information required for authentication purposes, and we encourage you to review the privacy policies of these third-party providers. We do not sell, rent, or otherwise commercialize your personal data to third parties for marketing purposes, and any data sharing is conducted solely to facilitate service provision or comply with legal obligations.

6. Your Rights and Legal Protections

As a data subject, you possess comprehensive rights regarding your personal data as established under applicable data protection regulations. You have the right of access to obtain confirmation of whether we process your personal data and, if so, to receive a copy of such data along with supplementary information about the processing activities. The right to rectification allows you to request correction of inaccurate personal data and completion of incomplete data. You may exercise your right to erasure (also known as the "right to be forgotten") under specific circumstances, including when the data is no longer necessary for the original purposes or when you withdraw consent for processing based on consent.

Additionally, you have the right to restrict processing in certain situations, the right to data portability to receive your personal data in a structured, commonly used, and machine-readable format, and the right to object to processing based on legitimate interests or for direct marketing purposes. If you have provided consent for specific processing activities, you maintain the right to withdraw consent at any time without affecting the lawfulness of processing based on consent before withdrawal. To exercise any of these rights, please contact our Data Protection Officer using the contact information provided in Section 7 of this document.

7. Contact Information and Data Protection Officer

For any questions, concerns, or requests regarding these Terms of Service, our privacy practices, or your personal data, please contact our Data Protection Officer (DPO) who serves as your primary point of contact for all data protection matters. You may reach our DPO via email at privacy@company.com or through our secure support portal accessible at our support center. We are committed to responding to all inquiries within thirty (30) days as required by applicable data protection regulations, and we will provide updates on the status of your request if additional time is needed for complex inquiries.

8. Modifications and Updates to Terms

We reserve the right to modify, update, or replace these Terms of Service at our sole discretion to reflect changes in our services, legal requirements, or business practices. Material changes to these terms will be communicated to you via email notification sent to your registered email address and through prominent notices on our platform at least thirty (30) days prior to the effective date of such changes. Non-material changes such as clarifications, formatting improvements, or minor administrative updates may be implemented immediately upon posting. Your continued use of our Service following the effective date of any modifications constitutes your acceptance of the updated terms. If you do not agree to the modified terms, you must discontinue use of our Service and may request account deletion in accordance with Section 6 of this document.

This document was last reviewed and updated on 7/1/2025. For the most current version of our Terms of Service, please visit this page. Previous versions of this document are available upon request for transparency and compliance purposes.