Transparency and Privacy
Basic Security Criteria for Searchby
We want to be transparent in how we actively protect our customers' data. This document is intended to outline how we process uploaded images, document's and how we protect the data you submit.
At Searchby, we know that privacy plays a key role in gaining and maintaining the trust of our customers. Therefore, we are committed to maintaining a high level of data security in accordance with the provisions of the GDPR on the protection of confidential data.
Safety guaranteed
Microsoft Azure. Google Cloud.
Our services use the strongest security technologies from proven and reputable suppliers such as Microsoft Azure and Google Cloud.
Security
The strongest security technologies from proven suppliers.
Privacy
High level of data security in accordance with GDPR regulations.
Transparency and Privacy
We actively protect our customers' data. Every user knows how data from photos and documents is transposed into text and returned to the user in the Searchby application.
Encryption
The security strategy we implement.
Each document or document image you upload to Searchby is transferred via an encrypted connection to the OCR scanner so that the scanner can analyze its contents and return the result to you in Searchby.
All data you send to Searchby is encrypted in transit and at rest.
*We use secure data centers located in the European Union. The data centers are *ISO/IEC 27001 security certified.
*The ISO/IEC family of standards helps organizations protect information assets. Contains requirements for an information security management system (ISMS). It identifies a set of best practices and details security controls that can help manage information risk.
FAQ
Check out the most frequently asked questions about security and document flow in the Searchby application.
Where are the photos and documents processed by Searchby?
Photos are processed in server locations located in the European Union.
How does Searchby process submitted documents?
Searchby does not use any of your data (photos, text documents) for any purpose other than providing you with the text from the image you uploaded. Searchby does not share uploaded photo data with third parties.
Are photos sent to Searchby saved on the application's servers?
The OCR mechanisms we use use your photos only to extract content in text form. Your data is not shared, processed or used for other purposes (e.g. artificial intelligence training).
What type of cipher does the application use?
We use the Advanced Encryption Standard (AES) algorithm to encrypt data at rest. All data on the server is encrypted with AES256 by default.
How does Searchby ensure that the data I submit is secure?
Encryption is one element of the broader security strategy we employ.
Encryption in transit is the use of the https protocol: as in electronic banking.
Searchby ensures that all the data you transfer is encrypted in transit and at rest.
This protocol protects your data when transferring it, e.g. from a local computer to the server where the information contained therein is read. Data encrypted in this way is protected against access by third parties.
By "encryption at rest" we mean the encryption used to secure data stored on the server.
Does Searchby use my data to improve its text-to-image reading service?
Searchby does not use the data you submit to train Artificial Intelligence and Machine Learning.
What happens to the uploaded photos after reading the text from them?
All document photos are deleted from the server immediately after they are recognized by the OCR scanner.
What certificates guarantee safety?
The application meets the ISO/IEC 27001 standard.
The ISO/IEC 27000 family of standards helps organizations protect information assets.
It provides requirements for an information security management system (ISMS), defines a set of best practices, and details security controls that can help manage the information risk of data processing applications.
Contact us
We would be happy to explain how the application works.