Stimes ERP Policy

Privacy Policy

This page explains how Stimes Authentication Server handles sign-in data, session information, and account security details used to protect access to business systems.

Information we collect

We process account identifiers such as username, email address, role assignments, authentication logs, device/session metadata, and security preferences needed to verify user access.

How the information is used

Identity data is used to authenticate users, secure protected areas of the platform, maintain auditability, detect suspicious activity, and support password recovery or multi-factor workflows.

Data sharing and access

Access to identity data is limited to authorized administrators, support personnel, and connected services that require it to deliver authentication, authorization, and compliance-related functions.

Retention and protection

Security-related records are retained according to operational and compliance requirements. Administrative, technical, and access-control measures are applied to protect stored credentials and identity events.

User responsibilities

Users are expected to keep passwords confidential, use approved devices, report suspected compromise promptly, and follow internal information-security requirements applicable to their organization.

Contact and policy updates

Privacy and security practices may be updated from time to time to reflect legal, operational, or platform changes. For policy questions, contact your system administrator or the Stimes support team.