Privacy policy
We are committed to protecting your privacy and ensuring that your personal data is secure. This privacy policy explains how we collect, use and protect your personal information when you use our website.
-
Information we collect
-
We collect Personally Identifiable Information
- Name
- Surnames
- Residence address
- Services provided
- Tokens for integration with Google Calendar
-
Navigation information
- IP adress
- Browser type
- Pages visited
- Visiting time
-
-
How we use your information
We use the information we collect to:- Provide and improve our services.
- Personalize the user experience.
- Sending appointment reminders.
- Communicate with you, including sending you updates and promotions.
- Analyze the use of our website to improve our offers.
-
Analytics
Using device and usage information collected by our third-party analytics services, such as Google Analytics, as well as log data, we generate and process aggregate information, such as statistical or demographic data. Aggregated information may be derived from personal data, but cannot be considered as such if it does not directly or indirectly reveal your identity. For example, we may track the total number of visitors to our Platform, or review log data, or track the number of visitors to each page of our Site. We aggregate this data to calculate the percentage of users accessing a specific feature of the Platform and analyze this data to obtain trends and statistics. -
How we share your information
We do not sell, trade or rent your personal information to third parties. We may share your information with trusted third parties to help us operate our website, conduct our business, or serve you, so long as those third parties agree to keep this information confidential. -
Security of your information
We take the security of your information very seriously and have implemented several measures to ensure its protection. We use advanced technologies and practices to safeguard your personal data and maintain the integrity and confidentiality of our infrastructure. Below are some of the practices and technologies we use:-
Data encryption at rest and in transitAll personal information stored in our databases is encrypted both at rest and in transit. This means that your data is protected from unauthorized access during storage and when transmitted between our servers and your browser.
-
Amazon Web Services (AWS) RDSWe use Amazon Web Services (AWS) RDS to manage our databases. AWS RDS provides a secure and scalable database infrastructure that includes the following security features.
- Encryption at Rest: All of our databases on AWS RDS are encrypted using encryption keys managed by AWS Key Management Service (KMS). This ensures that stored data is protected from unauthorized access.
- Encryption in Transit: We use SSL/TLS to encrypt data in transit between our applications and the databases in AWS RDS, ensuring that information remains private and secure during transmission.
-
AWS Systems Manager (SSM)To securely manage and store third-party API tokens and other sensitive credentials, we use AWS Systems Manager (SSM). AWS SSM allows us:
- Secure Storage: we use AWS Systems Manager Parameter Store to securely store and manage secrets and configurations. Stored parameters are encrypted using AWS KMS keys.
- Access Control: we implement role-based access policies (IAM) to ensure that only authorized personnel can access stored secrets. This minimizes the risk of unauthorized access to sensitive credentials.
-
Incident monitoring and responseWe have continuous monitoring systems to detect and quickly respond to any suspicious activity or unauthorized access attempts. In the event of a security incident, we have an incident response plan to minimize the impact and restore the security of our systems as quickly as possible.
-
Data Backup and RecoveryWe perform regular backups of our databases to ensure availability and rapid recovery of data in the event of a system failure or data loss. Our backup and recovery procedures are designed to minimize the risk of data loss and ensure business continuity.
-
Education and trainingOur staff receives ongoing training on information security and data privacy practices to ensure they understand and correctly apply our security policies and procedures.
These security measures are designed to protect your personal information and ensure that your data is secure and treated with the utmost care and responsibility. However, despite our efforts, we cannot guarantee absolute security due to the nature of the Internet and the potential vulnerabilities inherent in technological systems.
-
-
Your rights
You have the right to access, correct or delete your personal information at any time. If you wish to exercise these rights, please contact us using the information provided at the end of this policy. -
Cookies and similar technologies
We use cookies and similar technologies to improve your experience on our website. Cookies are small data files that are stored on your device. You can control the use of cookies through your browser settings. -
Changes to this privacy policy
We reserve the right to update this privacy policy at any time. We will post the changes on this page and update the last modified date at the top of the policy. We encourage you to review this policy periodically to be informed of how we are protecting your information. -
Contact
If you have any questions about this privacy policy, please contact us by email: [email protected].