Terms and Conditions
These are the Terms and Conditions of Schluss Holding B.V. (Hereinafter "Schluss", "we", "us"). With this policy, we want to give you clarity about Schluss principle, the way we deal with your data.
- We do everything in our power to make every effort to keep your data safe.
- That you control who has access to your data in your Schluss safe house and for how long.
- We will give you insight on who views your information.
- That you can withdraw access by somebody to your account.
- That you can keep your data in real-time up-to-date with anyone who has access to that data.
- That we will take all possible technical measures not to be able to see your data. And that we will not sell or otherwise misuse your personal data.
- That we will help you to deal with data sharing the best possible way.
- That our services will not be free. And therefore, we will not have to sell your data.
- That we do business in a transparent manner, that we have no secrets. Because we believe that your information belongs only to one person and that is you.
- Because we believe that you want to share your data. But you want to know with whom. And that someone else can’t just simply decide for himself how to use your data without asking you.
- Because we believe that there must be an end to the trade in what is perhaps the most valuable for people: one's identity.
- We do our utmost to ensure your online privacy. If people or parties will abuse your data on our platform in any way, we may take legal actions.
Data that you, and you alone, can store at Schluss
You can store all your personal data in an encrypted database (safe house), which is accessible only to you. In order to do that, you must first register and login at Schluss. We have no access to your encrypted safe house.
When you use Schluss, you may be required to provide some information. You keep control over that information.
Below is a list of the events when we ask for your personal information and the reasons behind that.
|Event||What data||Why & What control do you have|
|Registration||First name, last name , email address, password||For sending the email for activation and password. After that the encrypted data will be stored and cannot be seen by us.|
|Registration||First name, last name, email address||Only if you give permission, then Schluss will store this information internally to keep in touch with you. Without your permission this storage is not possible. This data will not be passed to third parties. You can decide at any time to withdraw that permission again.|
|Login||Email address, password||To identify and to give you access to your personal information. This data is used only at that time and cannot be viewed by Schluss.|
|Feedback||Name, Email Address, Feedback, Message||We store the data, take action and respond back. This data will not be passed to third parties.|
|Financial transactions||Not yet known||To be determined, but we will act in accordance with Schluss principles to process your data as anonymous as possible.|
Disclosure to third parties
Schluss cannot share your personal information with third parties from your encrypted database (safe house).
The name and e-mail address which you have decided to share with us will not be provided to third parties without your express consent, unless we are legally obliged to do so. In that case, we will make every effort to provide our users with timely information so they can cancel sharing this data with Schluss (temporary).
Right of access, correction and objection
Only you can access your data in your encrypted database (safe house) where you can view your data, edit, download and delete. Because Schluss does not know which encrypted database (safe house) belongs to you, we cannot customize or delete anything from your safe house. You can cancel your membership at Schluss by which your encrypted database (safe house) will be lifted. Thus the data will be removed from the servers of Schluss. By this cancellation you will also loose connections with other Schluss users and, thus, the access that they have given to their data.
On the Schluss website
We analyze our site’s performance at limited level. This is limited to the country level. We track the referring URL, your current visit, the operating system and its version, the browser and its version. This way the individual person or group of individuals cannot be traced. This way we can ensure that Schluss provides the optimal level of services on your device.
We use Piwik analytics to ensure that the data collected is anonymous and will not be disclosed to third parties, as is the case with Google Analytics.
Cookies Tracking: for the only purpose to make your experience with Schluss easier
|Event||Which data||What do you control|
|Not logged in||Language Preference, Piwik visit||No inspection required because the data can never be traced back to an individual|
|Logged in||Access Key for Schluss|
Do you want to limit or not to be tracked by cookies technology? Use the privacy settings page of Schluss to specify exactly which cookies should / should not be used on our website.
Third Party Websites
This privacy statement does not apply to third party websites connected or linked to our website. We cannot guarantee that these third parties are reliable and deal with your personal data the safe way. We therefore advise you to read the privacy statements of these websites before you make use of these sites.
As a result of new developments Schluss may make adjustments to this policy. We will keep you informed accordingly. For that we need to have at least your email address. Otherwise we advise you to check regularly our website for any changes in this statement.
Responsible Disclosure, or how we intend to handle reports of vulnerabilities.
We work hard to maintain and improve our systems and processes so that our customers can use Schluss safely online at all times. However, should you find a weakness in one of our systems, we would appreciate your help.
If you discover a problem in one of our systems, please let us know as soon as possible. We will immediately take appropriate actions. Schluss will act in accordance with the following rules. You agree to comply with these rules as well.
We encourage the open source community to join us to develop this platform even further. Mail or call us.
How to report a weakness
- Mail your findings to firstname.lastname@example.org. If possible encrypt the message and send it over a secure connection to prevent the information falling into the wrong hands.
- Provide sufficient information for clear understanding of the problem so we can fix it as soon as possible. Usually the IP address or URL of the affected system and a description of the problem is enough, but with more complex vulnerabilities more information may be required.
- Provide you contact detail (e-mail address or telephone number) so we can get in touch with you to work together on resolving the issue.
- Inform us as soon as possible after discovering the problem.
What we do after your report:
- We treat your report confidential and do not share your personal information with third parties without your permission, unless we are obliged to do so by law or court order.
- In principle, you remain anonymous. But if you wish, we can put your name as the discoverer of the reported weaknesses. We do that after mutual consultation.
- We will respond within 3 business days of notification with an initial assessment, and, possibly, with an expected date for a solution.
- We will solve reported weakness as soon as possible. We try as much as possible to keep abreast of progress and normally will solve this within 90 days.
- By our mutual consent we determine if and how we will publish the weakness after this has been dissolved.
- You might receive a reward. The reword depends on the quality and the amount of potential damages prevented as a result of your report.
- If you meet all conditions, we will not submit legal proceedings against you.
What is not permitted:
- Placing malware.
- To use brute force techniques, such as repeatedly entering passwords to gain access to systems.
- The use of social engineering.
- To make information public about security weaknesses before this issue is solved.
- Carrying out actions that go beyond what is strictly necessary to demonstrate and report security issues, especially when it comes to processing (including accessing or copying) of confidential data which you have had access through the vulnerability.
- To alter or delete any information in the system. If you need to copy information for your investigation, never copy more than you need. If one record is sufficient, do not go any further.
- The use of techniques that makes our system unavailable or inaccessible (DoS attacks).
- To use any other techniques to abuse our system.
Any abuse of our systems in any way will be punished.