Security Measures and Data Handling
This section of Image Candy explains how we protect your data. Learn about the security measures and procedures we use to keep your information private and safe.
General Data Protection Regulation (GDPR)
We follow GDPR and other applicable privacy regulations, so your data is processed lawfully and transparently. To protect it, we employ robust security controls against unauthorized access. Any images you upload or generate are removed from our servers within two hours of processing.
Securing Data with Encryption
Image Candy transfers all files over secure HTTPS, using up-to-date TLS/SSL standards to prevent eavesdropping. After upload, images are protected with 256-bit AES encryption both during transmission and while stored, ensuring security throughout processing and storage.
Data Preservation and Disposal
To meet GDPR requirements and protect your privacy, our system automatically removes any files you upload or create within two hours. You can also request deletion sooner. Once deleted, images are permanently erased from our servers and cannot be recovered or accessed.
FAQ
How is internal security maintained at Image Candy?
To protect information, we apply robust internal safeguards such as continuous monitoring, role-based access, and recurring training for our team. Sensitive data is available solely to authorized personnel, and all activities are logged and reviewed to uphold maximum security and accountability.
Does Image Candy comply with the CCPA?
We adhere to the California Consumer Privacy Act (CCPA). California residents receive clear information about how we collect, use, and share their personal data and can exercise rights to access, delete, or opt out of the sale of that information.
Does Image Candy regularly test its systems for vulnerabilities?
Our systems and infrastructure undergo regular penetration testing and vulnerability assessments. This preventive practice lets us detect, mitigate, and resolve potential risks early, safeguarding your data continuously.
How are security incidents detected and managed by Image Candy?
Our incident response capabilities are mature and always active. Cutting-edge monitoring continuously scans our environment to rapidly spot unusual activity. When a potential security issue is suspected, a specialized team moves at once to contain, examine, and resolve it while communicating with and protecting users.
In what ways does Image Candy safeguard the physical security of its data centers and server infrastructure?
We work exclusively with cloud providers and data centers that uphold best-in-class physical security. Their sites use round-the-clock surveillance, tightly controlled entry points with biometric verification, and redundant power and network infrastructure. These layered defenses ensure only authorized staff can access your data and protect it from physical breaches.
In what ways does Image Candy use cookies?
To deliver essential site functions, enhance your browsing, and analyze service usage for ongoing improvements, we rely on cookies. They may also be used to protect your account and retain your preferences. For comprehensive information on our cookie types and how to manage them, consult our Privacy Policy.