Carefully details how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.
View information regarding the underlying technology used in this CIAM demo site.
The software, systems and other tools deployed on this site are carefully built with privacy in mind. For instance we use pairwise in all of our integrations to ensure PII information if any can not be correlate across systems.We do not collect your information for any other purposes except for the purposes of you interacting with the demo site. We collect the following information about you:
Time allows us to adapt the authentication and authorization process. For instance, we can challenge you with multi-factor authentication at night and not do so during the day depending on the configured rules in the demo site or based on your preferences.
When do we collect the information?
Device information allows us to personalize your experience and tailor authentication and authorization processes based on whether we know the device or the location you are accessing the site from. You other information such as first name and last name is used to build a suitable identity profile to use within this platform. You can upload a photo or with your consent, we will download you social media platform profile image which will be used on this platform as your avatar. When you login into the demo site, you will be asked to consent to the use of certain information during the demo. You can delete your information at any time. We will also ask you to agree or disagree to us contacting you.
How do we secure your information?
We will secure the integrity and confidentiality of your PI that is in our possession and under our control by taking the appropriate reasonable technical and organizational measures to prevent loss, damage, unauthorized destruction, unlawful access, or unlawful processing of your PI. In doing so we will have due regard to generally accepted applicable or industry information security practices and procedures. The age requirement for engaging with our Channels is 18 years of age. To the extend required by applicable law, users under the age of 18 years of age must obtain parental or guardian consent. We will afford the same level of protection to all PI processed, regardless of the age of the person the PI pertains to..
What are your rights?
You have the following options available to you in respect of your PI that we process: you may inquire from us at no cost whether we hold your PI, as long as you provide us with adequate proof of your identity; where necessary, request the correction, destruction or deletion of your PI; Object to, restrict or limit the processing of your PI, object to using your PI for purposes of direct marketing, request to not have your PI used to be sent unsolicited email. You can exercise any of your rights listed above by sending an email to firstname.lastname@example.org. If you want to change your email preferences, you can do so by selecting the preference settings on the most recent email that you received from us. Where we have reasonable doubt as to the identity of the person making an inquiry we may request additional information in order to confirm the identity of the person, such as an identity document, including a drivers license or passport. Please note that the above rights are not absolute, and we may be entitled to refuse requests where exceptions apply. Should we determine that you are not entitled to exercise a specific right, we will provide you with the reason(s) why. Should we have reasonable grounds to believe that your PI has been accessed or acquired by any unauthorized person, we shall, as soon as is reasonably possible and lawfully required, notify the applicable regulator/s, as well as yourself, unless we are unable to establish the identity of the PI that has been unlawfully accessed..
Welcome to the I'curity Solutions Website. These Terms and Conditions ("Agreement") governs the use of the services ("Service") that are made available by demo.icurity.co.za. ("I'curity.co.za", "we" or "us").
Please Read The Following Carefully As It Affects Your Legal Rights.
Using our Services
GENERAL TERMS AND CONDITIONS
By agreeing to these Terms, you represent and warrant to us: (i) that you are at least eighteen (18) years of age; (ii) that you have not previously been suspended or removed from the Web-site and (iii) that your use of the Web-site is in compliance with any and all applicable laws and regulations.
2. Use of this Website
In connection with your use of our Website, you must act responsibly and exercise good judgment. Without limiting the foregoing, you will not: Violate any local, state, provincial, national, or other law or regulation, or any order of a court Infringe the rights of any person or entity, including without limitation, their intellectual property, privacy, publicity or contractual rightsInterfere with or damage our Services, including, without limitation, through the use of viruses, cancel bots, Trojan horses, harmful code, flood pings, denial-of-service attacks, packet or IP spoofing, forged routing or electronic mail address information or similar methods or technology Use automated scripts to collect information or otherwise interact with the Services or the Website Enter into this agreement on behalf of another person or entity without consent or the legal capacity to make such agreements as a representative of an organization or entity.
3. Intellectual Property
All code, text, software, scripts, graphics, files, photos, images, logos, and materials contained on this Website, or within the Services, are the sole property of I'curity Solutions. Unauthorized use of any materials contained on this Website or within the Service may violate copyright laws, trademark laws, the laws of privacy and publicity, and/or other regulations and statutes. If you believe that any of the materials infringe on any third party's rights, please contact I'curity Solutions immediately at the address provided below.
4. Termination of Use; Discontinuation and Modification of the Website.
We may at our sole discretion suspend or terminate your access to the Website at any time, with or without notice for any reason or no reason at all. We also reserve the right to modify or discontinue the Website at any time (including, without limitation, by limiting or discontinuing certain features of the Website) without notice to you. We will have no liability whatsoever on account of any change to the Website or any suspension or termination of your access to or use of the Website.
You agree that you will be responsible for your use of the Website, and you agree to defend, indemnify, and hold harmless I'curity and its officers, directors, employees, consultants, affiliates, subsidiaries and agents (collectively, the "I'curity Entities") from and against any and all claims, liabilities, damages, losses, and expenses, including reasonable attorneys' fees and costs, arising out of or in any way connected with (i) your access to, use of, or alleged use of the Website; (ii) your violation of this Agreement or any representation, warranty, or agreements referenced herein, or any applicable law or regulation; (iii) your violation of any third-party right, including without limitation any intellectual property right, publicity, confidentiality, property or privacy right; or (iv) any disputes or issues between you and any third party. We reserve the right, at our own expense, to assume the exclusive defense and control of any matter otherwise subject to indemnification by you (and without limiting your indemnification obligations with respect to such matter), and in such case, you agree to cooperate with our defense of such claim.
7. Governing Law
We have carefully picked technologies that are open source, support multi-cloud strategies and allow rapid innovation to build this demo site. Contact us for details on the components and software used.
API Gateway used on this demo site are scalable, open source and runs in front of any RESTful API and is extended through Plugins, which provide extra functionality and services.
multi-factor authentication (MFA) is an increasingly important tool for validating the identity of users accessing everything from desktops to cloud-based resources, providing advanced login options.
Caching and data pipelines allow the result of pipeline construction to be reused between pipelines and between runs of an application. Pipelines are reused when passing the same pipeline cache object.
How does your solution support other platforms?
We Our identity and access management platform provides maximum compatibility with hybrid cloud architectures, plus seamless scalability across cloud, mobile and device topographies. It enables companies to simplify the delivery of compliance-grade security while applying passwordless, transparent authentication that effectively secures users, devices, applications and transactions.
How does CIAM use multi-factor authentication?
CIAM supports multi-factor authentication (MFA) natively through Identity and Access Management. Additionally, users can be authenticated with MFA any supported third-party Identity Provider that supports MFA. This providers our clients with real business value from the robust combination of security, convenience and scalability.
How to remove a device from your account?
Log into your account and and select the 2 factor credentials that you have registered, in this case Super Gluu devices. Select the device you want to remove, and click on the delete icon next to the edit icon.
How to delete my account?
Log into your account and select the remove my account button. You will be asked if you are sure, select yes and account will be deleted.