Daabo Logo
Daabo Logo
Language Selector

Legal & Transparency

Privacy Policy

We believe privacy is the foundation of trust. This policy outlines how Daabo Enterprise protects your data across our infrastructure.

calendar_today Last Updated: May 24, 2024verified_user Version 2.1.0

1. Introduction

At Daabo Enterprise, we provide high-velocity digital infrastructure. To deliver these services, we process information. This Privacy Policy describes how we collect, use, and handle your information when you use our websites, software, and services.

By using our services, you are agreeing to the terms of this Privacy Policy and the accompanying Terms of Service.

2. Data Collection

person_pin

Identity Information

Includes name, email address, physical address, and employer information provided during account creation.

dns

Technical Metadata

IP addresses, browser types, device identifiers, and operating system details collected automatically via logs.

Service Usage Logs

We monitor how users interact with our solutions to ensure stability and security. This includes API call frequencies and processing volume.

abstract data visualization with glowing blue nodes and network connections on a dark professional background

3. Data Processing

We process your data to deliver the services you request, maintain security, and improve our offerings. This may involve sharing data with trusted third-party sub-processors under strict confidentiality agreements.

4. User Rights

Under the GDPR and CCPA frameworks, you maintain absolute control over your personal data processed by Daabo. We provide tools to exercise these rights autonomously within your dashboard.

  • check_circle
    Right to PortabilityRequest a machine-readable copy of all your stored data.
  • check_circle
    Right to ErasureRequest permanent deletion of your profile and historical logs.
  • check_circle
    Right to ObjectOpt-out of specific data processing activities.

security_update_goodTransparency Guarantee

"Daabo Enterprise will never sell, lease, or monetize your personal information to third-party advertisers. Our revenue model is strictly based on service provision."

5. Security Measures

Encryption

AES-256 encryption for data at rest and TLS 1.3 for data in transit across all environments.

Access Control

Zero-trust architecture requiring multi-factor authentication (MFA) for all system access.

Compliance

Regular SOC2 Type II audits and continuous vulnerability scanning by third-party experts.

6. Data Retention

We retain your information only as long as necessary to fulfill the purposes outlined in this policy or as required by law. When data is no longer needed, it is securely destroyed.

Have questions regarding your data?

Our dedicated Privacy and Compliance team is available to assist with any inquiries or data requests.