Článek ještě nebyl přeložen do vašeho jazyka.

Security

Security

We provide this overview so that you can better understand the security measures we’ve put in place to protect the information that you store using PhoneCopy.

Secure Storage

We encrypt the contacts and data that you store on PhoneCopy using the standards, which is the same encryption standard used by banks to secure customer data. Encryption for storage is applied after contacts are uploaded, and we manage the encryption keys.

PhoneCopy uses own physical data storage located in large-scale data centers. According to our internal rules, we use strong perimeter control, video surveillance, and professional security staff to keep data centers physically secure.

PhoneCopy also employ significant protection against network security issues such as Man in the Middle (MITM) attacks, and packet sniffing.

Secure Transfers

Your contacts and data are sent between PhoneCopy’s software clients or mobile phones itself and our servers over a secure channel using 256-bit SSL (Secure Sockets Layer) encryption, the standard for secure Internet network connections.

Your data are preferably sent between PhoneCopy’s mobile apps or mobile device itself and our servers over a secure channel using 256-bit SSL encryption where supported. Not all devices support encrypted communication, so i such as case contacts and data are not always encrypted.

Your Contacts and Data is Backed Up

PhoneCopy keeps redundant backups of all data over multiple locations to prevent the remote possibility of data loss. In the unlikely event that this redundancy were to fail, PhoneCopy should need some time to recover it to full operation,

Privacy

A copy of our full privacy policy can be found as part of our Terms of Service.

We guard your privacy to the best of our ability and work hard to protect your information from unauthorized access.

PhoneCopy employees are prohibited from viewing the content of data you store in your PhoneCopy account, and are only permitted to view metadata (e.g., number of contacts, assigned devices). Like most online services, we have a small number of employees who must be able to access user data for the reasons stated in our privacy policy (e.g., when legally required to do so). But that’s the rare exception, not the rule. We have strict policy and technical access controls that prohibit employee access except in these rare circumstances. In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access.

There is possibility to request our employees to access your profile for time limited period to solve your support request. In these rare cases there are all transactions fully logged and regularly audited by security manager.

Third-party Apps

If you choose to access PhoneCopy server using third-party applications (“apps”), be aware that those apps utilize their own security protocols and have their own privacy policies. If you’re not comfortable with the privacy and security features of those apps, you shouldn’t use them with PhoneCopy. For example, third-party apps might not employ encryption when transmitting data, might collect information that PhoneCopy does not, and might use information differently than PhoneCopy does.

Compliance with Laws and Law Enforcement

As set forth in our privacy policy, and in compliance with EU and Czech law, PhoneCopy cooperates with EU law enforcement when it receives valid legal process, which may require PhoneCopy to provide the contents of your private PhoneCopy account. In these cases, PhoneCopy will remove PhoneCopy’s encryption from the data before providing them to law enforcement.

I think I've found a security exploit. Where do I report security concerns?

We take a number of measures to ensure that the data you store on PhoneCopy is safe and secure. While we're very confident in our technology, we recognize that no system can guarantee data security with 100% certainty. For that reason, we will continue to innovate to make sure that our security measures are state of the art, and we will investigate any and all reported security issues concerning PhoneCopy's services or software. For a direct line to our security experts, report security issues to .

We'll fully credit anybody whose reports lead to the improvement of PhoneCopy security. A list of those who have contributed reports leading to a bug or security issue can be found on our special thanks page.