The measures/methods/policies we use to protect users’ personal and workspace data are as follows.
1. Technical measures
A. Data safety
i. We use a backup system in Amazon to ensure the data is always backed up in different places.
ii. We use a Firewall to protect Awesome Screenshot Servers.
iii. A comprehensive log system is enabled to record changes in data.
iv. A trash can feature is designed to prevent unwanted data loss.
v. A mechanism was applied to enforce a periodic change of keys for access to servers.
vi. Access to personal data in the IT system requires authentication using a user ID and password & also in a specific location.
B. Login-related data protection
i. All passwords users use in our system are encrypted if users decide to use Email and Password to log in AwesomeScreenshot.com directly.
ii. If users use Google accounts to log in directly, there will be no password stored in Awesome Screenshot servers.
C. No data collection.
i. We don’t sell any data to any third party.
ii. We don’t put any ads on our extension and website, so there will be no ads-related data collection on all clients/web services provided by Awesome Screenshot.
i. The software installed on our server(s) is supervised to prevent worms, viruses, Trojan Horses, rootkits, etc.
E. Safety measures provided by Amazon Data Center
i. Data is stored in a room secured by a door with increased fire resistance.
ii. Data is stored in a room secured by a door with increased burglary resistance.
iii. Devices such as a UPS, a power generator and/or a separate power grid are used to protect the computer system for processing personal data from the effects of power failures.
2. Organizational measures
A. All content is automatically set to private by default in our system unless the user decides to share it. We can only access the data when we assist users with their requests.
Moreover, you have the option to revoke the shareable link at any time.
Related instruction: How to revoke or cancel a shareable link
B. Ordinary employees are forbidden to access users’ key data, such as screenshots and screen recordings.
C. An access control system will be used if we need to access some users' data when users request it, such as helping users.
D. To keep data confidential, persons employed in data processing have been trained in the security of the information system and have been familiarized with the regulations on personal data protection.