Data and Security Policy
Fusion Bots is dedicated to the highest standards of data security and integrity. This policy outlines the technical measures, protocols, and best practices we employ to ensure the protection and privacy of user data processed through our online document management tools, including our PDF Converter, Document Translator, and all related utility services.
1. Our Commitment to Data Security
We understand that you entrust us with sensitive business and personal files. Our commitment is to provide a secure file conversion environment where user files are handled with confidentiality, integrity, and availability in mind.
2. File Handling and Deletion Protocols
The core of our data security relies on rapid, automated deletion:
- Temporary Processing: When you upload a file for conversion (e.g., using our Image to PDF Maker), the file is temporarily stored on our secured servers solely for the duration necessary to complete the conversion and deliver the output.
- Automated Deletion: Immediately after the processing is complete and the user has downloaded the file, or if the process times out, all uploaded files and the resulting output files are automatically and permanently deleted from our servers.
- Timeframe: Files are typically deleted within minutes, and in no case are they retained for longer than a maximum of 30 minutes.
- No Retention Default: We do not maintain backups or copies of your processed files unless explicitly required by a specific, opted-in feature (e.g., saving to a third-party cloud service).
3. Technical Security Measures
We employ a layered security approach to protect our systems and your data:
3.1 Encryption
- Data in Transit (Transmission): All data transfer between your browser and our servers is secured using industry-standard SSL/TLS encryption (HTTPS). This ensures that your files and connection details remain private during the upload and download processes, facilitating secure PDF tools usage.
- Data at Rest (Temporary Storage): While files are temporarily at rest during the processing window, they are protected within secure, access-controlled environments.
3.2 System Security
- Access Control: Access to our production environment and servers is strictly limited to authorized personnel using secure credentials, multi-factor authentication (MFA), and the principle of least privilege.
- Monitoring and Logging: We utilize continuous security monitoring and logging to detect and respond instantly to potential threats, unauthorized access, or unusual activity.
- Regular Audits: Our systems and code are regularly audited for vulnerabilities to ensure the highest level of security for our online document translation and other utilities.
4. Non-Usage of User Files
Fusion Bots does not inspect, copy, or analyze the content of your files for purposes other than performing the explicitly requested tool function.
- No Content Mining: We do not use the content of your uploaded files for training machine learning models, advertising purposes, or any form of content mining.
- Compliance: Our handling protocols ensure compliance with our Privacy Policy regarding file confidentiality.
5. Third-Party Services and Subprocessors
We rely on carefully vetted, secure third-party subprocessors (such as cloud hosting providers) to host and operate our Service.
- We ensure all third-party providers adhere to stringent security standards and have contracts in place to protect the confidentiality and security of any data they may handle on our behalf.
- Payment Security: Payment processing is handled by compliant third-party processors. We do not store sensitive payment information on our servers.
6. Incident Response
In the unlikely event of a data security incident, Fusion Bots has established a formal Incident Response Plan. Our priorities are:
- Containment and remediation of the threat.
- Thorough investigation of the incident.
- Notifying affected users and relevant authorities as required by law.
7. User Responsibility
While we maintain robust security, users also play a vital role in security:
- Keep your account credentials secure (if applicable to paid services).
- Avoid using weak passwords.
- Be mindful of the content you upload, ensuring it complies with our Terms of Use and relevant legal standards.
8. Contact for Security Concerns
If you have any questions about this Data and Security Policy or wish to report a potential security vulnerability, please contact our security team immediately.
Email: contact@fusionbots.in