Comments
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.
Media
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
Cookies
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.
Who we share your data with
If you request a password reset, your IP address will be included in the reset email.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where your data is sent
Visitor comments may be checked through an automated spam detection service.
Google API Services Data Usage
How We Use Google User Data
At Cygnus Alpha, we access and process Google user data solely to provide the following services through our hub.cygnusalpha.one platform:
1. Email Management
We access Gmail data using the following scopes to provide comprehensive email automation:
- https://mail.google.com/ (API_MAIL): For advanced users requiring comprehensive email management capabilities, including:
- Email migration between accounts or systems
- Advanced email rules requiring multiple operations
- Email archiving to other storage systems
- https://www.googleapis.com/auth/gmail.modify (API_MAIL_MODIFY): For email organization workflows, including:
- Automatically applying labels and moving messages between folders
- Marking emails as read/unread based on content or sender
- Identifying important emails and applying specific labels or stars
- Tracking emails that need responses and applying status labels
- https://www.googleapis.com/auth/gmail.compose (API_MAIL_COMPOSE): For email creation and sending, including:
- Sending automated responses to incoming messages
- Creating draft emails from templates for user review
- Preparing multiple personalized email drafts for campaigns
- Creating drafts that require approval before sending
- https://www.googleapis.com/auth/gmail.readonly: For reading email content to:
- Trigger automated workflows based on email content or metadata
- Extract information from emails to populate databases
- Analyze email patterns and generate reports
2. Calendar Integration
We access Google Calendar data to:
- Create, modify, and manage events and appointments
- Schedule meetings based on participant availability
- Send calendar notifications and reminders
- Synchronize events across multiple platforms
3. Document Processing
We access Google Drive, Docs, and Sheets to:
- Create and modify documents and spreadsheets
- Extract data from spreadsheets for reporting and analysis
- Organize files and folders based on user-defined rules
- Generate reports and documents from templates
4. Task Management
We access Google Tasks to:
- Create and manage task lists
- Set due dates and reminders
- Track task completion status
- Integrate tasks with other workflow elements
All data access is limited to what is necessary for the specific workflows configured by the user. We do not use Google user data for advertising, marketing, or any purpose beyond providing the requested automation services.
Data Protection Mechanisms
We implement the following data protection mechanisms to safeguard sensitive Google user data:
- Encryption: All data in transit is protected using TLS 1.2 or higher. Data at rest is encrypted using AES-256 encryption.
- Access Controls: We implement role-based access controls (RBAC) to ensure that only authorized personnel can access user data, and only when necessary for support or maintenance purposes.
- Data Minimization: We only collect and process the minimum amount of data necessary to provide our services. Workflow configurations are designed to access only the specific data required for each automation task.
- Retention Policies: We retain Google user data only for the duration necessary to provide our services. Users can delete their data at any time through our platform interface.
- Security Monitoring: We employ continuous security monitoring and regular penetration testing to identify and address potential vulnerabilities.
- Incident Response: We maintain a comprehensive incident response plan to address any potential data breaches or security incidents promptly.
- Employee Training: All employees with potential access to user data receive regular security awareness training and are bound by confidentiality agreements.
- Third-Party Assessments: We undergo regular third-party security assessments to validate our security controls and data protection mechanisms.
For more information about how we handle your data, please contact us at support@cygnusalpha.one.