We are transparent about the data we use

We believe that transparency is essential to build trust. That's why we clearly share information about how we handle data security and confidentiality.

Cookie Statement

We only use cookies that are strictly necessary to operate the platform. Here is the complete list, with no unnecessary consent banner.
Cookie nameTypePurposeDuration
nuxt-oidc-authEssentialRequired to maintain the user session active.7 days
i18n_redirectedPreferencesRemembers the user's language.1 year
dashboard-sidebar-defaultPreferencesRemembers the sidebar state (collapsed or expanded).Session

Data stored in the browser

Because there's more than just cookies... Here is the precise list of items recorded in your browser ("Local Storage").
Key nameTypePurpose
content_checksum_*EssentialContains the content of certain pages. Avoids unnecessary requests and ensures a smooth experience.
nuxt-color-modePreferencesRemembers the preferred color mode (light or dark).

What we store in the database

Complete transparency on our practices: here are the types of data recorded in our database. All data in transit and at rest are systematically encrypted.
Data typePurposeRetention periodLocationEnd-to-end encryption + zero-knowledge
User emailUsed for authentication and communication.Until account deletion.IAM / Application / Payment Provider / EmailingNo
User passwordUsed for authenticationUntil account deletion.IAMNot quite. We use argon2 to hash passwords, which is a very secure hashing method resistant to brute-force attacks. However, since it is a hash and not encryption, it is not possible to retrieve the original password, even for us. That's why we indicated 'No' for encryption, as the password is not encrypted but rather transformed into a secure hash.
First and last nameUsed to personalize the user experience.Until account deletion.IAM / Application / Payment Provider / EmailingNo
User organizationUsed to personalize the user experience.Until account deletion.IAM / ApplicationNo
User public keysUsed for encrypting user data and ensuring platform security.Until account deletion.ApplicationNo
User private keysUsed for decrypting user data and ensuring platform security.Until account deletion.ApplicationYes (encrypted client-side with a password, therefore inaccessible to anyone other than the user)
Billing dataRequired for payment processing and invoicing.Legal minimum required for accountingPayment Provider / AccountingNo
Transfer / Dataroom titleUsed to identify and organize transfers and datarooms.Until deletion of the transfer / dataroom.ApplicationNo
Transfer messageUsed to provide additional information about transfers and datarooms.Until deletion of the transfer / dataroom.ApplicationYes
List of members of a transfer / dataroomRequired to manage user access to transfers and datarooms.Until deletion of the transfer / dataroom.ApplicationNo
File metadataStored to enable sharing and collaboration.Until deleted by the user.ApplicationYes - except file size (encrypted / unencrypted) and the hash (sha256) of the file name in a dataroom to avoid collisions and manage versions of the same file. This data is necessary to ensure a smooth and secure user experience, while respecting data confidentiality.

Frequently Asked Questions

Everything you need to know about security, compliance, and the features of the Retyc platform.