LogoLogo
  • Introduction
  • Organizational security
  • Ubidots Architecture
  • Confidentiality
    • Formatting and Data Accumulation
    • Encryption in Transit
    • Encryption at Rest
    • All of Our Hired Personnel Must Sign an NDA
    • We Only Hire Directly
  • Transparency
    • Periodic Checks
    • Status Page
    • Support Channel
    • Open Source
    • Continuous Hacking to our Own Technology
    • Data Leakage Policy
  • Integrity
    • Isolated Websites
    • Code Management
    • Continuous Scanning for Vulnerabilities
  • Resilience
    • Incident Management and Resolution
    • Data Backup
    • Recovery Objective
  • Non-repudiation
    • Extensive Logs
    • Everything as Code
  • Authentication
    • For Clients
    • Internal
  • Privacy
    • Data Management and Retention Policy
  • Compliance
    • FDA 21 CFR Part 11
      • Validation
      • Audit Trails
      • Electronic Signatures
      • System Access Controls
      • Record Retention
      • Record Protection
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. Transparency

Data Leakage Policy

In cases where Ubidots detects a breach, we send emails to notify the involved parties. These emails contain information about:

  • What data was leaked or compromised;

  • When the data was leaked or compromised, and

  • How long the data was leaked or compromised.

For a breach that exposes the private data of many users, we take care to inform the public via email.

Requirements

  • 313. Inform inability to identify users

PreviousContinuous Hacking to our Own TechnologyNextIntegrity

Last updated 1 year ago

Was this helpful?