Privacy Policy
This page explains how Stimes Authentication Server handles sign-in data, session information, and account security details used to protect access to business systems.
Information we collect
We process account identifiers such as username, email address, role assignments, authentication logs, device/session metadata, and security preferences needed to verify user access.
How the information is used
Identity data is used to authenticate users, secure protected areas of the platform, maintain auditability, detect suspicious activity, and support password recovery or multi-factor workflows.
Data sharing and access
Access to identity data is limited to authorized administrators, support personnel, and connected services that require it to deliver authentication, authorization, and compliance-related functions.
Retention and protection
Security-related records are retained according to operational and compliance requirements. Administrative, technical, and access-control measures are applied to protect stored credentials and identity events.
User responsibilities
Users are expected to keep passwords confidential, use approved devices, report suspected compromise promptly, and follow internal information-security requirements applicable to their organization.
Contact and policy updates
Privacy and security practices may be updated from time to time to reflect legal, operational, or platform changes. For policy questions, contact your system administrator or the Stimes support team.