Privacy policies
Authentication and Account Management
Login and Recovery
Users can sign in using a username and password or by linking their Google account.
On Google sign-in:
- Only basic information (email, first and last name) is used to create the account and allow later access.
- The platform does not access or use other Google Account information under any circumstances.
Password Recovery:
- In case of forgetting the password, the user can request a recovery code sent to the registered email.
- If the user loses access to the registered email, it will not be possible to recover the account, in compliance with our security measures.
Account Changes and Deletion
Change email:
- An email change can be requested from the account settings.
- To make the change, the user must confirm access to the new email. Once the migration is complete, the previous email is permanently unlinked and cannot be reused for the same account.
Account deletion:
- Users can request the deletion of their account from the platform settings.
- This process includes a 30-day waiting period after the request. During this period, the account will be inactive and marked for deletion.
- After the deadline has elapsed, all personal data, interactions, and content associated with the account are permanently deleted.
- The user's data is anonymized, and the account cannot be reused on the platform.
Data Processing, Use and Protection
Data Collection and Use
Data collected:
- Basic data such as preferred language, interactions on the platform, and personal settings are collected.
- This data is used exclusively to optimize the user experience and deliver personalized content.
Permitted uses of data:
- Create personalized experiences based on the user's language and preferences.
- Improve the services of the platform through aggregated analytics.
- Provide efficient technical support.
Rights over Data
Users have the right to access, modify or delete their personal information at any time.
By deleting the account, all personal and interaction data is permanently deleted or anonymized.
Information Security
Measures implemented:
- Data transmitted between the user and the platform is protected by SSL/TLS encryption.
- Data is stored on servers with advanced security technologies, including firewalls and intrusion detection systems.
- Passwords are stored in encrypted form using robust hashing algorithms.
- Logins are protected by unique and temporary tokens associated with each browser.
- Passwords are required to meet minimum security standards.
Audits and monitoring:
- Regular audits are conducted to identify and correct potential vulnerabilities.