Data Security and System Information FAQ
We understand that you may have questions about our data handling, security practices, and more. Below, we've compiled a list of frequently asked questions to provide you with quick and informative answers.
If you have additional inquiries, please don't hesitate to reach us out at support@curator.io.
1. Does Curator collect, process, store, or handle any forms of personal information?
- While the data we collect is sourced from public information, it may include personal data. We don't process data as such, only display the public data we receive. We do store the public data we receive.
2. Is data both at rest and in transit encrypted?
- Yes
3. Does Curator offer Role-Based Access Control (RBAC) to ensure that only authorized individuals have access based on their roles and needs?
- Yes
4. Does Curator have mechanisms to ensure operation or recovery during outages?
- Curator is designed for high availability, but it could be affected by third-party source provider outages (e.g., Meta, Twitter, etc.).
5. What standards or accreditations does Curator comply with?
- Curator adheres to the standards required by third-party source providers and undergoes annual reviews for compliance.
6. Does Curator have audit capability, and how often are access audits conducted and by whom?
- Curator undergoes annual penetration testing to meet the requirements of third-party source providers.
We hope this FAQ section addresses your concerns. If you have any additional questions or need further clarification, please feel free to contact us, and we'll be happy to assist you.