Data Security and System Information FAQ
Curator takes data security seriously. This FAQ covers how we handle data, encryption, access control, and system reliability.
Does Curator collect, process, store, or handle any forms of personal information?
While the data we collect is sourced from public information, it may include personal data. We don't process data as such, only display the public data we receive. We do store the public data we receive.
Is data both at rest and in transit encrypted?
Yes. All data is encrypted both at rest and in transit.
Does Curator offer Role-Based Access Control (RBAC)?
Yes. Curator provides Role-Based Access Control to ensure that only authorized individuals have access based on their roles and needs.
Does Curator have mechanisms to ensure operation or recovery during outages?
Curator is designed for high availability. However, the platform could be affected by third-party source provider outages (e.g., Meta, X/Twitter, etc.).
What standards or accreditations does Curator comply with?
Curator adheres to the standards required by third-party source providers and undergoes annual reviews for compliance.
Does Curator have audit capability, and how often are access audits conducted?
Curator undergoes annual penetration testing to meet the requirements of third-party source providers.
Have more questions about security? Contact [email protected]