- Introduction
CentralAuth ("Company," "we," "us," or "our") is committed to compliance with the General Data Protection Regulation (GDPR) and protecting the privacy rights of all individuals whose personal data we process. This document outlines how we comply with GDPR requirements and your rights as a data subject. - Legal Basis for Processing
- Legitimate Interest – We process authentication data to provide secure access to third-party services and maintain service security.
- Consent – Where required, we obtain explicit consent for processing personal data, particularly for non-essential features.
- Contractual Performance – Processing necessary to perform our authentication services as outlined in our Terms of Use.
- Legal Obligation – Processing required to comply with applicable laws and regulations.
- Data Subject Rights Under GDPR
- Right of Access (Article 15) – You have the right to obtain confirmation of whether we process your personal data and access to such data.
- Right to Rectification (Article 16) – You can request correction of inaccurate or incomplete personal data.
- Right to Erasure (Article 17) – You may request deletion of your personal data under certain circumstances.
- Right to Restrict Processing (Article 18) – You can request limitation of processing under specific conditions.
- Right to Data Portability (Article 20) – You have the right to receive your personal data in a structured, commonly used format.
- Right to Object (Article 21) – You may object to processing based on legitimate interests or for direct marketing purposes.
- Rights Related to Automated Decision-Making (Article 22) – You have rights regarding automated processing and profiling, where applicable.
- Data Processing Activities
- Authentication Data – Email addresses, device identifiers, and authentication tokens processed for identity verification.
- Security Logs – Login attempts, device information, and access patterns processed for security monitoring.
- Usage Analytics – Aggregated and pseudonymized data for service improvement and security analysis.
- Communication Data – Support inquiries and correspondence processed for customer service.
- Data Retention Periods
- Active Account Data – Retained while your account is active and for 30 days after account deletion.
- Security Logs – Retainedn for up to 6 months for security monitoring and incident response.
- Support Communications – Retained for 2 years to maintain support history and service quality.
- Legal Compliance Data – Retained as required by applicable laws and regulations.
- Data Protection Measures
- Technical Safeguards – Encryption in transit and at rest, access controls, and regular security assessments.
- Organizational Measures – Staff training, data protection policies, and privacy by design principles.
- Data Minimization – We collect and process only the minimum personal data necessary for our services.
- Pseudonymization – Where possible, we use pseudonymization techniques to reduce privacy risks.
- International Data Transfers
- Transfer Mechanisms – When transferring data outside the EU/EEA, we use appropriate safeguards such as Standard Contractual Clauses (SCCs).
- Third-Party Processors – Our service providers are contractually bound to GDPR compliance requirements.
- Adequacy Decisions – We prioritize transfers to countries with EU adequacy decisions where possible.
- Consent Management
- Clear Consent – We obtain clear, specific, and informed consent where required.
- Withdrawal Rights – You can withdraw consent at any time through your account settings.
- Consent Records – We maintain records of consent given and withdrawn for compliance purposes.
- Data Breach Notification
- Supervisory Authority Notification – We will notify relevant supervisory authorities within 72 hours of becoming aware of a breach likely to result in high risk.
- Individual Notification – Affected individuals will be notified without undue delay when a breach is likely to result in high risk to their rights and freedoms.
- Breach Response – We maintain an incident response plan to contain, assess, and remediate data breaches.
- Third-Party Data Sharing
- Service Integration – Authentication data is shared with third-party services you choose to access, subject to their privacy policies.
- Processor Agreements – Third-party processors are bound by data processing agreements ensuring GDPR compliance.
- No Marketing Sharing – We never share personal data for third-party marketing purposes.
- Data Protection Officer
- Contact Information – For data protection inquiries, contact us via the contact form.
- Responsibilities – Our DPO monitors compliance, conducts impact assessments, and serves as the point of contact for supervisory authorities.
- Exercising Your Rights
- Request Process – Submit data subject requests via the contact form.
- Identity Verification – We may require identity verification to process your requests securely.
- Response Timeline – We respond to requests within 30 days, with possible extensions for complex requests.
- No Cost – Exercising your rights is generally free, unless requests are manifestly unfounded or excessive.
- Supervisory Authority
- Right to Lodge Complaint – You have the right to lodge a complaint with your local data protection supervisory authority.
- Lead Authority – Our lead supervisory authority is the Dutch Data Protection Authority (Autoriteit Persoonsgegevens).
- Updates to GDPR Compliance
- Regular Reviews – We regularly review and update our GDPR compliance measures.
- Notification of Changes – Significant changes to our data processing activities will be communicated as required by law.
- Documentation – We maintain comprehensive records of our processing activities as required by Article 30 GDPR.
- Contact Information
For GDPR-related inquiries, data subject requests, or to contact our Data Protection Officer, please use the contact form. You can also reference our Privacy Policy for additional information about our data practices.