We create tools that help business owners use the Internet to make their work easier and better.
The purpose of this document is to explain the processes and working practices that we are committed to in order to:
- design and create our products and services in a way that they do what they must with the least amount of data possible,
- tell our customers transparently what data is received and stored from them,
- use the latest and most up-to-date technologies to take care of our customers' data,
- let our customers remove their data at any time they want.
"Our products and services" include the dailysay.net website, the Daily Say Contents Application for Microsoft Teams, and the Daily Say App for Slack.
Section 1: What kind of data is used?
We can divide user data into three categories:
- Service-specific data: This is the data that is needed for our services to work properly.
- General user data: This data is not necessarily required for the provision of services, but their storage makes it easier for users to use our services. General data is generally stored on a user's mobile or browser to make it easier to use our services later.
- Users Usage Data and Statistics: This data is not necessarily given by the user. We obtain it by processing how users use our products.
Section 2: Collecting data
The data required by our services may be available in various forms. But we always adhere to the following rules for accessing this data:
- User-informed access: We only use data that we are directly and explicitly authorized to use.
- Access to the minimum amount of data possible: We always design and implement our services in a way that can be implemented with the least amount of data possible. This "necessity of access" must be clear to the user as well.
The method of collecting data for each of the three categories of data described in section 1 is as follows:
- Collecting service-specific data: This data is always directly received from the user. Once given by the user, this data is always maintained solely on our servers. No copy of this data is stored on user device.
- Collecting general user data:This data is always given by user but stored for reuse on the device that the user is using.
- Collecting user usage data and statistics:his data is collected to improve the service provided by us to our users or services provided by our users to their clients. We also store and process data about how our websites and applications are used to detect abuse or suspicious behaviors or to detect bugs that may occur in our software. These statistics and information may also be requested by the user.
In all cases where information is entered by user, we use secure protocols (SSL). These protocols assure us that user data cannot be accessed by a third-party. To ensure that your connection to our server is secure, make sure that there is always https at the beginning of our website URL.
Section 3: Using the data
We only store data that is either necessary to provide our services (type 1) or to facilitate the use of our services to users (type 2) or to help our users manage their business better (type 3). In all these cases, the user who uses this data is our user, not us.
We adhere to the general rule that the end user of data should be our user, not ourselves.
We never use type 1 and 2 of data ourselves. We use the Users Usage Data and Statistics (type 3) only as described. That is, to improve our services and troubleshoot them, to detect abandoned user accounts or in the processes needed to maintain the security of our systems. For example, to identify user accounts that have suspicious activity.
Section 4: The transparency of the way we make money
We never look at our users' data as a source for making money. Our services must create enough value so that our customers are willing to pay us to use them.
We will always be transparent about the way we make money so that we can assure our users that their information is safe with us.
Section 5: Data protection
All business-specific data is stored on systems that are fully under our control. We use the latest technologies to protect this data and keep it secure.
To review our services and improve them we may use the services provided by other companies. For these services we will always select reputable companies. These services are only used to process the User Usage Data and Statistics (type 3).
Providing the best service sometimes requires collaboration between several companies. We may, in some cases, decide to use other companies' services to provide better services. In those cases, we will always make decisions to ensure the security of our users' data when choosing partners.
Section 6: Accessing or deleting user data
To get access to their data, or delete the data completely, users can simply send an email to firstname.lastname@example.org. Upon receiving such request, we will respond within seven days.
Upon receiving a request to delete data, the "deactivation process" (explained in section 7) is used to ensure smooth customer experience.
Section 7: Deactivating accounts
In the process of deactivating user accounts, we must consider the possibility that the user may have made a mistake or may have realized that he/she has vital information in the account.
To handle such cases, we provide a 30-day deadline after deactivation. In this time the user can reactivate the account by contacting our support. In this period the account is deactivated and all services are stopped, but the data is still on our computers. After this deadline, all data related to the deactivated account will be removed from our system.
So when you choose to deactivate an account in one of our services, the complete removal of your data from our system will take place after 30 days.
Section 8: Changes to this document
Section 9: Contacting us about privacy
Our users can use the following email address to contact us about their privacy concerns: