Skip to content

FilterID: Our Commitment to Data Protection and Responsible Usage

Understanding Our Data Landscape

Before delving into our specific practices, it’s important to understand the types of data we handle:

  1. Web-crawled data: Information we gather from public websites as part of our threat intelligence efforts.
  2. Customer-submitted data: Information provided by our clients for analysis or processing.
  3. Operational data: Data generated through the use of our services.

Each of these data types requires specific handling and protection measures, which we’ll explore in detail.

Web-Crawled Data: The Foundation of Our Threat Intelligence

A significant portion of the data we work with comes from our continuous web crawling efforts. This process is crucial for maintaining our comprehensive threat database, which powers many of our security solutions. Here’s how we approach the collection and handling of this data:

Data Collection Process

Our web crawlers systematically browse the public internet, collecting information about websites, domains, and online content. This process is automated and focuses on publicly available information. We do not attempt to access password-protected areas or private networks.

Types of Data Collected

The data we collect through web crawling includes:

  • Domain names and IP addresses
  • Website content
  • Meta information (e.g., site descriptions, keywords)
  • Links between websites
  • Technical details about web servers and hosting

Handling and Storage

Web-crawled data is initially processed on external server hardware dedicated to our data gathering operations. This setup allows us to efficiently manage the high volume of data involved in web crawling without impacting our core services.

Once processed, the relevant threat intelligence derived from this data is transferred to our main databases, which are hosted on our own hardware within the European Union. This approach allows us to maintain strict control over our core data assets while leveraging the scalability of external resources for the intensive task of web crawling.

Privacy Considerations

It’s important to note that our web crawling process is designed to respect website owners’ preferences. We adhere to robots.txt files and other standard protocols that website owners use to control crawler access. Additionally, we do not collect or store personal information about individuals from the websites we crawl.

Customer-Submitted Data: Handling with Care

When our customers use our services, they may submit data for analysis or processing. This could include URLs for threat checking, content for moderation, or other types of data relevant to our services. Here’s how we handle this sensitive information:

Data Minimization: We adhere to the principle of data minimization, which means we only collect and process the data that’s necessary to provide our services. We encourage our customers to submit only the information that’s essential for the task at hand.

Temporary Storage: Most customer-submitted data is processed in real-time and is not stored long-term. For services that require temporary storage (e.g., for batch processing), we implement strict time limits and automatic deletion processes.

Secure Processing: All customer-submitted data is processed in secure environments with strict access controls. We use encryption for data in transit and at rest to protect against unauthorized access.

Data Segregation: We maintain strict segregation between different customers’ data to prevent any possibility of cross-contamination or unauthorized access.

Operational Data: Balancing Functionality and Privacy

Operational data refers to the information generated through the use of our services. This might include logs, usage statistics, and other data necessary for the functioning and improvement of our services. Here’s our approach to handling this type of data:

Purpose Limitation: We collect and use operational data solely for the purposes of providing, maintaining, and improving our services. This data is not used for any other purposes without explicit consent.

Anonymization and Aggregation: Wherever possible, we anonymize and aggregate operational data. This allows us to gain insights for service improvement without compromising individual privacy.

Retention Policies: We have clear retention policies for operational data. Different types of data are retained for different periods based on their purpose and relevant legal requirements. Once the retention period expires, the data is securely deleted.

Our Commitment to Compliance

At FilterID, we take our legal and ethical obligations seriously. We comply with various data protection laws and regulations, including but not limited to:

  • General Data Protection Regulation (GDPR)
  • California Consumer Privacy Act (CCPA)
  • Other relevant national and international data protection laws

Our compliance efforts include:

Regular Audits: We conduct regular internal audits of our data handling practices to ensure ongoing compliance. We also engage external auditors periodically to provide an independent assessment of our practices.

Staff Training: All our staff members undergo regular training on data protection and privacy. This ensures that everyone in our organization understands the importance of data protection and knows how to handle data responsibly.

Data Processing Agreements: We enter into data processing agreements with our clients and any third-party service providers we work with. These agreements clearly define the terms of data handling, ensuring that all parties understand their responsibilities and obligations.

Transparency: We believe in being transparent about our data handling practices. Our privacy policy is written in clear, understandable language, and we’re always happy to answer questions about how we handle data.

Data Storage and Infrastructure

The security and reliability of our data storage infrastructure are paramount. Here’s an overview of our approach:

Primary Data Storage: Our main databases and core systems are hosted on our own hardware within the European Union. This allows us to maintain direct control over our most critical data assets and ensures compliance with EU data protection standards.

External Processing Resources: For data-intensive tasks like web crawling, we use external server hardware. This allows us to scale our data gathering operations efficiently without compromising the security of our core systems.

On-Premises Solutions: For clients who require it, we offer on-premises hosting solutions. In these cases, our software is installed and runs on the client’s own infrastructure. This can be beneficial for organizations with strict data localization requirements or those in highly regulated industries.

When providing on-premises solutions:

  • We provide clear guidelines for secure setup and operation.
  • We offer remote support and updates without requiring direct access to the client’s data.
  • The client retains full control over their data, with our systems processing information locally within their infrastructure.

Data Encryption and Secure Networking

We implement robust encryption measures to protect data both in transit and at rest:

  • All data transmissions between our services and to our clients are encrypted using industry-standard protocols.
  • We use private networks between our own services to add an extra layer of security.
  • For clients who require it, we can set up encrypted tunnels for even more secure data transmission.

Our Approach to Personal Data

While the majority of the data we handle is not personal in nature, we recognize the special sensitivity of personal data when we do encounter it. Our approach to personal data is guided by the following principles:

Minimization: We only collect and store personal data when it’s absolutely necessary for providing our services. In most cases, our threat intelligence and content moderation services do not require personal data to function effectively.

Purpose Limitation: When we do collect personal data, it’s only used for the specific purpose for which it was collected. We do not repurpose personal data without explicit consent.

Data Subject Rights: We respect and uphold the rights of data subjects as defined in applicable data protection laws. This includes the right to access, correct, and delete personal data.

Secure Handling: Any personal data we handle is treated with the utmost care. We implement stringent security measures to protect against unauthorized access, alteration, or disclosure.

Continuous Improvement and Future Outlook

The landscape of data protection and cybersecurity is constantly evolving, and at FilterID, we’re committed to evolving with it. We continuously monitor for new threats, emerging best practices, and changes in the regulatory environment. This allows us to proactively adapt our data handling practices to meet new challenges.

Looking to the future, we anticipate several trends that will shape our approach to data protection:

  1. Increased use of AI and machine learning in data protection
  2. Greater emphasis on privacy-enhancing technologies
  3. More stringent regulatory requirements around data handling and cross-border data transfers
  4. Growing importance of data ethics in addition to legal compliance

We’re actively preparing for these trends, investing in new technologies and continuously refining our processes to stay at the forefront of data protection practices.

We Don’t Just Store Data

At FilterID, we view data protection not just as a legal requirement, but as a fundamental aspect of our business ethics and a key differentiator in the market. Our comprehensive approach to data handling – from collection and processing to storage and deletion – is designed to ensure the highest levels of security and compliance.

We understand that when our clients choose to work with us, they’re not just selecting a service provider; they’re entrusting us with one of their most valuable assets – their data. We take this responsibility seriously and are committed to continuing to earn that trust every day through our actions and practices.

By combining robust technical measures, clear policies, and a culture of respect for data privacy, we strive to set a high standard for data protection in the cybersecurity industry. As we move forward, we remain dedicated to maintaining the delicate balance between leveraging data for powerful threat intelligence and respecting the fundamental right to privacy.

Thank you for taking the time to understand our approach to data protection and usage. If you have any questions or would like more information about our practices, please don’t hesitate to reach out. At FilterID, we believe that transparency and open communication are key to building strong, trusting relationships with our clients and partners.