The privacy of your data—and it is your data, not ours!—is a big deal to us. In this policy, we lay out: what data we collect and why; how your data is handled; and your rights with respect to your data. We promise we never sell your data: never have, never will.
What we collect and why
Our guiding principle is to collect only what we need. Here’s what that means in practice:
Identity & Access
When you join the waiting list for Fensak, we ask for your email address. That's so we can send you product updates and private beta links for the service. We may also contact you to conduct a live interview to learn more about your use case. You can unsubscribe at any time following the links in the email.When you sign up for Fensak, we ask for identifying information such as your name, email address, and maybe a company name. That’s so you can personalize your new account, and we can send you product updates and other essential information. We may also send you optional surveys from time to time to help us understand how you use our products and to make improvements. With your consent, we will send you our newsletter and other updates. We sometimes also give you the option to add a profile picture that displays in our products. You can change your notification settings at any time through the links in the email, or on your account settings page.We’ll never sell your personal information to third parties, and we won’t use your name or company in marketing statements without your permission either.
When you sign up for Fensak, you will be asked to provide your payment information and billing address. Credit card information is submitted directly to our payment processor and doesn’t hit Fensak servers. We store a record of the payment transaction, including the last 4 digits of the credit card number, for purposes of account history, invoicing, and billing support. We store your billing address so we can charge you for service, calculate any sales tax due, send you invoices, and detect fraudulent credit card transactions. We occasionally use aggregate billing information to guide our marketing efforts.
We store on our servers the content that you upload or receive or maintain in your Fensak product accounts. This is so you can use our products as intended, for example, to upload Terraform packages in Fensak. We keep this content as long as your account is active. If you delete your account, we’ll delete the content within 60 days.
We generate non-falsifiable, signed provenance information from the package contents that you upload to Fensak. This provenance information includes information about your package, such as the originating repository and organization name. This provenance information is then hashed using SHA256 and uploaded to a Rekor instance, an immutable, tamper-resistant transparency log server. This is to provide a verifiable proof that the provenance information hasn't been tampered with. By default, it will be uploaded to the public Rekor instance maintained by LF Projects. You can change the Rekor instances where the hashed provenance information will be uploaded to from your account settings page, for example, to the private Rekor instance maintained by Fensak (requires Business plan), or a Rekor instance maintained by you. In all instances, by design, this information will remain on the Rekor servers even after account deletion. We only upload the hashed provenance information to ensure that the data is anonymized and impossible to relate back to you. The raw provenance data is only accessible in Fensak over proper authenticated sessions, and is deleted when your uploaded content is deleted as a part of account deletion.
We log the full IP address used to sign up a product account and retain that for use in mitigating future spammy signups. We also log all account access by full IP address for security and fraud prevention purposes, and we keep this login data for as long as your product account is active.
We use Plausible Analytics to track overall trends in the usage of our website. Plausible Analytics collects only aggregated information, which does not allow us to identify any visitor to our website. For more information, please visit the Plausible Analytics Data Policy.
We use persistent first-party cookies and some third-party cookies to store login sessions, certain preferences, make it easier for you to use our applications, and perform A/B testing.A cookie is a piece of text stored by your browser. It may help remember login information and site preferences. It might also collect information such as your browser type, operating system, web pages visited, duration of visit, content viewed, and other click-stream data. You can adjust cookie retention settings and accept or block individual cookies in your browser settings, although our apps won’t work and other aspects of our service may not function properly if you turn cookies off.
When you email Fensak with a question or to ask for help, we keep that correspondence, including your email address, so that we have a history of past correspondence to reference if you reach out in the future.We also store information you may volunteer, for example, written responses to surveys. If you agree to a customer interview, we may ask for your permission to record the conversation for future reference or use. We will only do so with your express consent.
When we access or share your information
To provide products or services you’ve requested. We use some third-party subprocessors to help run our applications and provide the Services to you. The following is a list of third-party subprocessors we use:Microsoft Azure. Cloud services provider.
Cloudflare. Cloud services provider.
Grafana Labs. Infrastructure and application monitoring.
Ory Cloud. Customer identity authentication and authorization service.
Paddle. Merchant of record.
Honeybadger. Error reporting service.
Plausible Analytics. Analytics service.
HubSpot. Customer sales and ticketing service.
GitHub. Version control software.
Public Rekor instance managed by LF Projects. Transparency log for
anonymized hashed data and signatures.
Carrd. Landing page provider.We may share your information at your direction if you integrate a third-party service into your use of our products. For example, we may allow you, at your option, to connect your GitHub account to your Fensak account so that we can pull repositories from GitHub to store in the registry. Source code that you push to GitHub will be stored by both Fensak and GitHub and will be available to you from both services.No Fensak human looks at your content except for limited purposes with your express permission, for example, if an error occurs that stops an automated process from working and requires manual intervention to fix. These are rare cases, and when they happen, we look for root cause solutions as much as possible to avoid them recurring. We may also access your data if required in order to respond to legal process (see “When required under applicable law” below).
To help you troubleshoot or squash a software bug, with your permission. If at any point we need to access your content to help you with a support case, we will ask for your consent before proceeding.
To investigate, prevent, or take action regarding restricted uses. Accessing a customer’s account when investigating potential abuse is a measure of last resort. We want to protect the privacy and safety of both our customers and the people reporting issues to us, and we do our best to balance those responsibilities throughout the process. If we discover you are using our products for a restricted purpose, we will take action as necessary, including notifying appropriate authorities where warranted.
Your rights with respect to your information
Many of these rights can be exercised by signing in and updating your account information.If you have questions about exercising these rights or need assistance, please contact us at email@example.com.If you are in the EU or UK, you can contact your data protection authority to file a complaint or learn more about local privacy laws.
How we secure your data
All data is encrypted via SSL/TLS when transmitted from our servers to your browser. Any files which you upload to us are stored and are encrypted at rest. Our application databases are encrypted at rest.All data are written to multiple disks instantly, backed up daily, and stored in multiple locations. Files that our customers upload are stored on servers that use modern techniques to remove bottlenecks and points of failure.
Location of site and data
Our products and other web properties are operated in the United States. If you are located in the European Union, UK, or elsewhere outside of the United States, please be aware that any information you provide to us will be transferred to and stored in the United States. By using our websites or Services and/or providing us with your personal information, you consent to this transfer.
Changes & questions