We use Amazon Web Services AWS infrastructure to store your data. Apart from AWS safety guidelines, we take a number of measures to be sure that your data isn’t read by anyone else. We be sure that all transmission is secured with HTTPS in order that no one else can access your data. For this, we use a robust protocol TLS 1. 2, a powerful key trade ECDHE RSA, and a powerful cipher AES 128 GCM with industry essential 256 bit encryption using TLS/SSL HTTPS.
Non private informationNon personal assistance NPI is suggestions which cannot be used to identify a person person, such as technical suggestions about your device, region, time zone, pastime usage, performance metrics, configuration settings, anonymous behavioral assistance and other aggregated information. Loop group of workers may are looking to access your data in connection with troubleshooting or responding to a problem, system upkeep or enhancements, or other activities in the general course of operating our Services. In most cases, we will notify you and ask for your permission just before giving Loop body of workers permission to access your data. However, we may access and disclose sure data if we have got a good faith belief that such access, use, preservation or disclosure of your data is fairly essential to:meet any applicable law, law, legal procedure or enforceable governmental request;implement these Terms, adding research of potential violations;detect, steer clear of, or otherwise address fraud or security issues; and/orprotect in opposition t harm the rights, assets or safety of Loop, our users or the general public as required or accredited by law. In order for our Services to achieve this, we need to store user email account access tokens:For services that help it i.
e. Gmail, Loop uses OAuth 2. 0, that’s an open essential authorization protocol that permits us to access you email data with out wanting to understand your password. This helps keep your assistance as secure as possible. We never know or store your passwords on our servers. With OAuth 2.
0 authentication, our Services use software real tokens so that you can revoke at any moment in the app settings. If you revoke our access to your email account, our Services don’t have access to any of your data anymore. When OAuth 2. 0 authentication is not accessible i. e.
hosted Exchange, the access token consists of your email username and password. To make sure the best feasible levels of safety, we never store user passwords in our databases. For secure garage of user credentials our Services use an authorized secure storage service called MS Azure Key Vault with special purpose Hardware Security Modules HSMs accessed using a 2048 bit digital certificates. To supply our facilities, Loop stores personal tips, including user’s email address and contents of user’s emails which could come with but is not restricted to, attachments, files, images and videos. We limit access to personal data to just those employees, contractors and service providers who we consider quite need access to that tips for operating our Services. We have physical, digital, and procedural safeguards which are designed to comply with rules to give protection to user personal data.