Security & Privacy

Table of Contents

Privacy Policy

Transfer Of Personal Information

We do not transfer personal information outside of EEA

Your Rights Of Personal Information

You have the right to access your Personal Information. Such access may be provided at no cost upon request made to us at the contact information provided below. If for some reason access is denied, we will provide an explanation as to why access has been denied. Before we provide you with such access we will ask you to supply appropriate evidence of your identity.

You are entitled to request the information that we hold about you is deleted, updated, or corrected if you so wish. However, before we fulfill your request we may ask you for additional information confirming such action with respect to your Personal Information.

Retention Of Personal Information

As a rule, we only store your Personal Information for as long as it is necessary for the execution of our Services or the respective purpose and limit the storage period to an absolutely necessary minimum. Sometimes however we may store your Personal Information longer due to our legal obligations, regulatory requirements, in order to resolve disputes or to prevent fraud.


Artishok has taken reasonable steps to protect your Personal Data from loss, misuse, and unauthorized access, disclosure, alteration, and destruction. We have put in place appropriate physical, electronic, and managerial procedures. They have been described in our internal Security Policy (in line with GDPR regulation) and will be revised and updated from time to time by us.


GDPR Data Privacy is committed to the highest standards of data security and privacy. We have taken steps to ensure that our services comply with the Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95/46/EC (General Data Protection Regulation).

Measures for the pseudonymization and anonymization of personal data

We use anonymous aggregates and metrics for algorithm development.
PII data can’t be retrieved by relevant systems without going through anonymization, Feature removal and aggregation functions

Measures to encrypt personal data

We use encryption in storage, transport and communication levels via industry standard encryption schemes and algorithms

Measures to ensure confidentiality

We employe extensive security measures – ensuring security is maintained at real time, on deployment and on development. Environments with sensitive data are highly restricted for traffic and only selected individuals are allowed to access the environment on a pre-approved basis only

Measures to ensure availability

We deploy measures that evaluate our API availability and health

Measures to erase data and restrict processing

All individual user data will be deleted from our databases in a reasonable period of time in accordance with the regulations of the country the customer operates in.
Data in audit logs and backups might be retained for a different duration
And in accordance with the specific country regulations.

Measures to ensure integrity

We employee regular backup and replication services conducted at least 3 times a Day for minimal data loss in case of problem. We are regularly conducting restoration tests to ensure our restoration effectiveness