top of page

Privacy Policy

We reserve the right to modify this privacy policy at any time, so please review it frequently. Changes and clarifications will take effect immediately upon their posting on the website. If we make material changes to this policy, we will notify you here that it has been updated, so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we use and/or disclose it. 

By accepting the policies you also agree to provide all the information requested verifiable & true, any attempt to provide false credentials may have undefined consequences.

By accepting the policies you also agree (sign yourself up) to face serious and may be dangerous, harmful and legal consequences if found abusing or exploiting Safe House's policies, engaging in unethical activities on Safe House & allies and other criminal or illegal activities.

Cookies

What type of information we collect?

We receive, collect and store any information you enter on our website or provide us in any other way. In addition, we collect the Internet protocol (IP) address used to connect your computer to the Internet; login; e-mail address; password; computer and connection information and purchase history. We may use software tools to measure and collect session information, including page response times, length of visits to certain pages, page interaction information, and methods used to browse away from the page. We also collect personally identifiable information (including name, email, password, communications); payment details (including credit card information), comments, feedback, product reviews, recommendations, and personal profile.

More information about our data collection can be found on this page at section A

How we collect information?

When you conduct a transaction on our website, as part of the process, we collect personal information you give us such as your name, address and email address and other required information subjected to the delivery, shipping, transactions, payments, chargebacks, subscriptions, interests, On demand service, contact, requests & other LEA agreements.

To learn more about our collected data privacy, please read section B

Why we collect such personal information?

We collect such Non-personal and Personal Information for the following purposes:

  1. To provide and operate the Services;

  2. To provide our Users with ongoing customer assistance and technical support;

  3. To be able to contact our Visitors and Users with general or personalized service-related notices and promotional messages;

  4. To create aggregated statistical data and other aggregated and/or inferred Non-personal Information, which we or our business partners may use to provide and improve our respective services; 

  5. To help us serve our users better by providing services based on the information we get from our users.

  6. To comply with any applicable laws and regulations.

  7. Detailed information about the purpose can be found at section B.2

Section A- What ‘Personal Information’ do we collect?

To provide you the Services, we must collect Personal Information relating to an identified or identifiable natural person (“Personal Information”). We collect Personal Information you provide us, from your use of the Services, and from other sources. Here are the types of Personal Information we collect about you:

  1. Information you provide us. When you register for our Services, sign up for any Safe House events, subscribe to our blog(s) or newsletter(s), purchase and/or register domain names, use any of our Services; and/or when you contact us directly by any communication channel (e.g., Safe House's support tickets, emails), you may provide us Personal Information, such as name, email address, phone number, payment information (for Users with Paid Services), information you include in your communications with us and with other users on our platform, and Personal Information contained in scanned identification documents (such as an ID card, driver’s license, passport, or official company registration documents).  

  2. Information we collect when you use the Services. When you visit, download, and/or use any of our Services, we may collect aggregated usage Personal Information, such as Visitors’ and Users’ browsing and ‘click-stream’ activity on the Services, session heatmaps and scrolls, non-identifying Personal Information regarding the Visitor’s or User’s device, operating system, internet browser, screen resolution, language and keyboard settings, internet service provider, referring/exit pages, date/time stamps, etc

  3. Information we collect from other sources. We may receive Personal Information about you from third-party sources, such as i) security providers , fraud detection and prevention providers for example to help us screen out users associated with fraud, ii) social media platforms, when you log-in or sign-up using your social media account, we may receive Personal Information from that service (e.g., your username, basic profile Personal Information) and in some cases, we may collect Personal Information from lead enhancement companies which help us to improve our service offering; iii) advertising and marketing partners in order to monitor, manage and measure our ad campaigns.

Section B- How we store user information?

Safe House uses Wix.com, IONOS 1&1 and our own THE DRIVE hosting and storage facilities to collect and store your information which follows the following security measures which are facilitated by our hosting partners -

Wix Dedicated Security Team

  • Wix employs a team of security and privacy professionals who are experts in information, application and network security. The team maintain and constantly improve the company’s defense systems, develop security review processes, build security infrastructure, and implement the company security policies. 

  • Wix's dedicated security team also actively scan our platform and infrastructure for security threats, perform penetration tests, conduct quality assurance measures and software security reviews, and provide project-specific consulting services to Wix’s product and engineering teams.

  • The security team, with the help of external experts, constantly monitor for suspicious activity in our network. They also address information security threats, and perform routine security assessments and audits.

Compliance and Certifications 

As further detailed in our Security Whitepaper, Wix is a PCI Level 1 Merchant & Service Provider and is certified as ISO 27001 and ISO 27018 compliant. Copies of our certifications can be found here.

Physical Access Controls 

 

  • Wix services are hosted on AWS and Google Cloud Platform cloud-based data centers, for which Equinix provides all physical colocation services. Our infrastructure providers maintain industry-standard security certifications, including: ISO 27001, ISO 27017, ISO 27018, SOC 1, SOC 2, SOC 3 and PCI DSS Level 1.

  • Our data center locations are detailed in our privacy policy.

  • More info on our Cloud Service Providers' security can be found at the AWS security page and the Google Cloud security page.

  • Wix’s offices worldwide are physically secured by personal identification access restriction and management.

Business Continuity, Incident Response and Disaster Recovery Plans 

  • Wix uses data centers and cloud service providers in separate geographic locations and different time zones to allow infrastructure and service availability, as well as continuity.

  • Wix develops and maintains business continuity, incident response and disaster recovery plans, which are tested and updated periodically.

  • Wix facilitates designated solutions for protection against and mitigation of DDoS attack effects.

  • Wix keeps dedicated teams in multiple geographies to support the Wix platform, services and supporting infrastructure.

System Access Controls

  • Wix maintains an access control policy that covers Wix’s internal network and systems processing personal data. This facilitates control processes, including access logging, monitoring and limitation.

  • Wix’s records and systems distinguish customer records and information from non-customer information. 

  • Data insert, deletion, and modification are stamped and logged (date/time and relevant personnel). 

Application Level Security, Monitoring and Risk Identification & Assessment

  • Wix hashes Wix Users’ account credentials and passwords.

  • Wix Users can choose to establish two-factor authentication in their Wix accounts for an additional layer of security. 

  • Wix Users can customize many of their website permissions (This varies, depending on the specific service and features used).

  • All of Wix cloud and public interfaces are automatically scanned for vulnerabilities and misconfigurations on a regular basis.  Wix regularly monitors, detects, and blocks incoming attacks on our platform.

  • Penetration tests are performed on our platform by Wix’s security team and an external third party on a regular basis. Results are evaluated and remediated (if needed). 

  • Wix maintains a security bug bounty program, which gives independent security researchers a platform for testing and submitting vulnerability reports.

  • Wix facilitates privacy controls in its code to ensure customers’ data privacy and to prevent one customer from accessing another customer’s data.

Control and Security Measures for Storage, Transmission and Transport of Personal Data

  • All new sites created on Wix have HTTPS automatically enabled as part of the basic services provided by Wix. 

  • All critical interfaces and functions (i.e. user authentication, payment transactions (PCI data) and PII related processes are only accessible using at least TLS v1.2.

  • Wix has a multiple layer security architecture to help protect against 0-day security issues.

  • Firewalls and intrusion prevention systems are in place to prevent unauthorized access.

  • Wix facilitates a SOC 24/7/365 monitoring program focused on information gathered from various sources (internal network traffic, employee actions on systems and on-going research about vulnerabilities). Analysis is performed using different tools for traffic capture and parsing. 

Employee Awareness and Training 

  • Wix’s security team communicates with all employees on a regular basis, covering topics such as emerging threats, phishing awareness campaigns, and other industry-related security topics.

  • All Wix employees:

  1. Undergo security training when joining the company and on an ongoing basis (as required), as well as additional role dependent training on specific aspects of security (as required).

  2. Agree to the company’s code of conduct, which highlights our commitment to keep customer information safe and secure. 

  3. Sign a confidentiality statement at the time of hire.

Third Party Risk Management Program

Prior to engaging new third-party service providers or vendors who will have access to Wix data, platform or systems, Wix conducts a risk assessment of vendors’ data security practices as part of Wix’s Third Party Risk Management Program.

Law Enforcement Request Policy

  • Wix respects the human rights of our customers and their end users.

  • As such, Wix implements a Law Enforcement Request Policy, which is designed to ensure that all data requests received from law enforcement agencies, governmental or regulatory bodies (“Authorities”) are valid and made in accordance with the applicable legal procedures.

  • Wix does not disclose personal data to Authorities, unless required by applicable law, and Wix challenges unlawful requests. Unless legally prohibited from doing so, if Wix receives a demand for a customer’s Users-of-Users Information (as defined in the Wix Privacy Policy), Wix will redirect the relevant Authority to request such data directly from the relevant customer, as the controller of such data. 

Section B.2- Why we collect user information?

To provide you the Services, we must collect Personal Information relating to an identified or identifiable natural person (“Personal Information”). We collect Personal Information you provide us, from your use of the Services, and from other sources. Here are the types of Personal Information we collect about you:

  1. Information you provide us. When you register for our Services, sign up for any Safe House events, subscribe to our blog(s) or newsletter(s), purchase and/or register domain names, use any of our Services; and/or when you contact us directly by any communication channel (e.g., Safe House's support tickets, emails), you may provide us Personal Information, such as name, email address, phone number, payment information (for Users with Paid Services), information you include in your communications with us and with other users on our platform, and Personal Information contained in scanned identification documents (such as an ID card, driver’s license, passport, or official company registration documents).  

  2. Information we collect when you use the Services. When you visit, download, and/or use any of our Services, we may collect aggregated usage Personal Information, such as Visitors’ and Users’ browsing and ‘click-stream’ activity on the Services, session heatmaps and scrolls, non-identifying Personal Information regarding the Visitor’s or User’s device, operating system, internet browser, screen resolution, language and keyboard settings, internet service provider, referring/exit pages, date/time stamps, etc

  3. Information we collect from other sources. We may receive Personal Information about you from third-party sources, such as i) security providers , fraud detection and prevention providers for example to help us screen out users associated with fraud, ii) social media platforms, when you log-in or sign-up using your social media account, we may receive Personal Information from that service (e.g., your username, basic profile Personal Information) and in some cases, we may collect Personal Information from lead enhancement companies which help us to improve our service offering; iii) advertising and marketing partners in order to monitor, manage and measure our ad campaigns.

Section A
Section B
Section B.2

How we disclose & share your personal information?

Safe House is hosted and partially developed on the Wix.com platform and the domain is powered by IONOS by 1&1. Your data may or may not be partially stored or shared through Safe House's THE DRIVE, Wix.com’s & IONOS by 1&1's data storage, databases and the general Wix.com applications. Your data is stored and sealed on secure servers behind a firewall which are under 24/7/365 surveillance and monitoring system.

 

All direct & indirect payment gateways offered by Wix.com, PayPal, AxisBank, PayU, Paytm Provided by Paytm for Business and used by Safe House adhere to the standards set by PCI-DSS as managed by the PCI Security Standards Council, which is a joint effort of brands like Visa, MasterCard, American Express and Discover. PCI-DSS requirements help ensure the secure handling of credit card and other sensitive information by our store and its service providers. No sensitive payment information is shared to Safe House by our partner payment gateways

We may share your Personal Information with service providers and others (or otherwise allow them access to it) in the following manners and instances:

Third Party Service Providers:  Wix has partnered with a number of selected service providers, whose services and solutions complement, facilitate and enhance our own. These include hosting and server co-location services, communications and content delivery networks (CDNs), data and cyber security services, billing and payment processing services, domain name registrars, fraud detection and prevention services, web analytics, e-mail distribution and monitoring services, session recording and remote access services, performance measurement, data optimization and marketing services, content providers, and our legal and financial advisors (collectively, “Third Party Service Provider(s)”). 

Wix may share the following categories of Personal Information with Third Party Service Providers for a business purpose:

  • identifiers, including name, alias, postal address, unique personal identifier, online identifier, internet protocol address, email address, account name, or other similar identifiers.
     

  • commercial Personal Information, for example Personal Information regarding products or services purchased, obtained, or considered.

1.

The Personal Information may be shared solely in accordance with this policy.

Law Enforcement, Legal Requests and Duties: Wix may disclose or otherwise allow access to any categories of your Personal Information described in this Privacy Policy pursuant to a legal request, such as a subpoena, legal proceedings, search warrant or court order, or in compliance with applicable laws, if we have a good faith belief that the law requires us to do so, with or without notice to you.

2.

Protecting Rights and Safety:  Wix may share any categories of your Personal Information described in this Privacy Policy if we believe in good faith that this will help protect the rights, property or personal safety of Wix, any of our Users, any Users-of-Users, or any member of the general public, with or without notice to you.

3.

Wix Subsidiaries and Affiliated Companies: We may share your Personal Information internally within our family of companies, for the purposes described in this Privacy Policy. For example, we may share your Personal Information with Wix.com Inc. in the course of facilitating and providing you with our Services.
Sharing Personal Information b
y Wix subsidiaries and affiliated companies in the European Union, the United Kingdom and Switzerland with Wix’s subsidiaries located outside these regions will only take place under an approved transfer mechanism, such as the relevant Standard Contractual Clauses.

4.

In connection with a change in corporate control: In addition, should Wix or any of its affiliates undergo any change in control, including by means of merger, acquisition or purchase of substantially all of its assets, your Personal Information may be shared with the parties involved in such event.

By accepting the privacy & policies you are allowing Safe House to use any information you provide in our standard operations. Your credentials are safe & secured but may be shared to any law enforcement agency (LEA) on legal requests or orders.

bottom of page