Confidentiality is defined by the International Organization for Standardization (ISO) as "ensuring that information is accessible only to those authorized to have access".
Personally identifiable information is information that allows to directly or indirectly identify you.
When you create an account, the created "login" identifier and the name are public. If you want to stay anonymous, you can use a pseudonym in accordance with the conditions of use. You can add to your profile, keep private elements, share them with your contacts or make them public. You can always edit, disable or delete the elements constituting your profile or your digital identity.
eno provides many communication services. Some are private, such as e-mails, private messages between members and SMS. For these services, eno imposes confidentiality on its infrastructure. Moreover, contrary to other services, eno does not insert advertising links in your e-mails, does not use the content of your e-mails to display targeted advertisements and does not use your phone numbers or other coordinates to send you advertising without your consent.
Other communication services are public, like messages on forums, articles or comments on spaces. Nevertheless, you can delete your messages (online or by asking support), like those published on your space and you can forbid message publication on your space.
eno offers you to store files online through its "virtual disk" service. This service provides several levels of sharing from public to private, through a restricted share. When directories and files are private, they are only accessible via your account. Of course, this is no longer true if you allow some members to access them or if you make them public.
A cookie is a little text file stored on your hard drive by your browser by request of the Websites when you visit them. This function is essential to open and to use an account on eno. It allows us to ensure that the session data is sent to the right addressee.
On the other hand, when you try to log in, the Website asks you to keep the session active on your computer. By using this option, your login associated with a special key is stored in a cookie to automate the session opening each time you visit eno. This cookie is automatically destroyed after one month or if you use the Sign out function (by clicking on the top-hand corner on any page). If in error you log in with keeping the session active on a public computer and you forget to sign out, all you have to do is log in on another computer to invalidate the key the next opening of the browser.
If you do not keep the session active on your computer, all you have to do is close the browser to sign out.
eno can use other cookies (e.g. for the choice of the language or performing of anonymous statistics), but doesn't store other personal information into them.
eno automatically secures your communications between your computer and the Website by using the HTTPS protocol. On the other protocols (FTP, IMAP, POP, SMTP…), encryption is done according to the choice of the user in the settings of the connection software he uses. eno expressly recommends to enable encryption in software.
To a great extent, for your safety on the Internet, make sure that you are using a neat, updated and protected by an anti-virus software computer. eno puts at your disposal a special guide in order to help you.
eno implements all the necessary security measures to prevent unauthorized access, alteration, disclosure or destruction of your data. The eno servers are located in multiple data centers located in the European Union. Communications between the servers are systematically encrypted. The data is stored in real-time across multiple disks with a RAID system. Additional backups are made in centers with isolated and deferred access. The goal is to ensure data recovery even in the case of a major incident. Security measures are also physical: continuous monitoring, theft-deterrent systems, fire fighting, emergency power supply, etc.
Some organizations in particular the governmental had set up devices allowing to capture and massively monitor Internet traffic. If some safe motivations are often mentioned, there are also ulterior economic motivations such as to plunder the critical data of foreign companies. There are also political motivations, as the idea to monitor opponents or to better control public opinion. From the point of view of European law, these devices are illegal and they violate the fundamental rights. Actually, to be legitimate, any cyber monitoring must be legitimate, emanating an independent judicial authority and be applied only to persons suspected of committing or about to commit tortious or criminal acts. To protect your privacy, we invite all users to simply use encryption eno available to them (see previous article "Safety of communication") to make the data that could be captured illegally unusable. eno ensures that the access or the transmission of personal data is done in the respect of fundamental rights and is opposed to any request that would clearly illegitimate.
Your private data is not intended to leave eno, except in the following cases:
· when the functioning of a service requires it,
· when you have given us your consent,
· when your account has been the subject of an unauthorized use and/or contrary to the conditions of use and the prevention or repair of damage requires,
· when we receive a legitimate request of a judicial authority