At FreeAndroidSpy, we care about your privacy, and we take measures to protect your information and data. By reading this, you can inform yourself about of the key points in our security policies. Some security details will not be revealed as this could expose your information and data at risk.
We are registered as a Personal Data Administrator and we cover the requirements as set by the government and the Data Protection Statement. This means that we are authorized to store data on our servers. You know that your data will be kept safe and that you are the only one who has access to your data. We will never ask for your password. Never tell your login and password details to a third party.
The FreeAndroidSpy service is all about data. When the data is collected it is encrypted and then transferred to our secure infrastructure where all the data is stored on an encrypted storage. This means that the data cannot fall in the wrong hands while being transferred or when stored.
It is only you who has access to your data. You can access your data only by using your secure Private Area – this will require your login and password details. The initial password for your secure Private Area will be auto-generated by one of our servers. It is advisable that you change your password when you first log into your Private Area as well as once in a while.
Even our engineers are unable to view your data itself. It is the person who holds the login and password details that can log into your Private Area and access your data. No information will be shared with others. Exception is when you consented to this or it is required by law.
In order to ensure higher security we use secured co-location facility in which we operate mission-critical parts of our infrastructure.
Often it is just not enough to keep the servers up-to-date or to have highly restricted physical access to the infrastructure. Number of measures have to be taken, many of which must be conducted periodically. It is advisable that a security engineer/s is/are employed.
It is also advisable that a number of measures including, but not limited to, be taken: patching and tuning applications and services, privileges separation, filesystem fingerprinting and history, custom security-oriented configuration of the service stack (disabling unused functions, etc), kernel hardening, employing strict firewall rules, honeypot-like techniques and many more.
You can use your favorite search engine to familiarize yourself with the technical terms in case that you need.