Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
A
ai_website
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Model registry
Monitor
Service Desk
Analyze
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
GitLab community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Autistici Inventati
ai_website
Commits
2371c8e4
Commit
2371c8e4
authored
Apr 19, 2020
by
sub
Browse files
Options
Downloads
Patches
Plain Diff
protect e' meglio di preserve in un botto di casi
parent
4e2a8d80
Branches
Branches containing commit
No related tags found
No related merge requests found
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
src/who/privacy-policy.en.md
+3
-3
3 additions, 3 deletions
src/who/privacy-policy.en.md
with
3 additions
and
3 deletions
src/who/privacy-policy.en.md
+
3
−
3
View file @
2371c8e4
...
@@ -66,7 +66,7 @@ that constitute a breach of our Terms of Services (spamming, DDoS and others), w
...
@@ -66,7 +66,7 @@ that constitute a breach of our Terms of Services (spamming, DDoS and others), w
able to recover from our servers an anonymized IP address possibly relatable to a user’s account
able to recover from our servers an anonymized IP address possibly relatable to a user’s account
but not to a certain physical subject. We store logs of user activity for a period up to 15 days
but not to a certain physical subject. We store logs of user activity for a period up to 15 days
(unless otherwise specified per service).
(unless otherwise specified per service).
Data regarding users’ activity helps us diagnose software issues, pr
eserve
security of the
Data regarding users’ activity helps us diagnose software issues, pr
otect
security of the
systems from intrusion, and monitor the health of the platform.
systems from intrusion, and monitor the health of the platform.
We use disk encryption on all data to mitigate the risk of data leaks in cases where
We use disk encryption on all data to mitigate the risk of data leaks in cases where
...
@@ -192,7 +192,7 @@ We do not share your data to third parties unless network inter-operatable (fede
...
@@ -192,7 +192,7 @@ We do not share your data to third parties unless network inter-operatable (fede
services require certain data to function correctly (eg. other service provider needs
services require certain data to function correctly (eg. other service provider needs
to know your email address to be able to deliver a service). In those cases, you actively
to know your email address to be able to deliver a service). In those cases, you actively
operate the choice and act of sharing the data and we have no way to stop you from
operate the choice and act of sharing the data and we have no way to stop you from
doing that. In order to pr
eserve
your privacy, we discourage you from doing that.
doing that. In order to pr
otect
your privacy, we discourage you from doing that.
We do not access your data, emails, files etc. stored on our servers unless needed for
We do not access your data, emails, files etc. stored on our servers unless needed for
troubleshooting purposes, or under suspicion of violation of our policy.
troubleshooting purposes, or under suspicion of violation of our policy.
...
@@ -264,7 +264,7 @@ configured by the users in their settings per service including the decision of
...
@@ -264,7 +264,7 @@ configured by the users in their settings per service including the decision of
whom and what to share. You may be shown embedded videos and link previews from other
whom and what to share. You may be shown embedded videos and link previews from other
websites while using services provided by A/I. This may expose you to web tracking by
websites while using services provided by A/I. This may expose you to web tracking by
external services, such as (but not limited to) Facebook, Twitter, and Google. Again,
external services, such as (but not limited to) Facebook, Twitter, and Google. Again,
in order to fully pr
eserve
your privacy, you should hold your A/I account and other
in order to fully pr
otect
your privacy, you should hold your A/I account and other
accounts separated. If that is not what you intend to do, your A/I email address could
accounts separated. If that is not what you intend to do, your A/I email address could
become a target of data collection and profiling on other systems that are not under our
become a target of data collection and profiling on other systems that are not under our
control and responsibility. All data and files stored on services that are bound to personal
control and responsibility. All data and files stored on services that are bound to personal
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment