Our data code
We don't leave anything up to chance, and we rely on true safety. We set up all processes in accordance with GDPR and we are registered data administrators at the Czech Office for Personal Data Protection (ÚOOÚ - Úřad pro ochranu osobních údajů). We guard all the data that Foxentry works with. We have secured it so that even we cannot decipher it.
Foxentry works with cookies only to calculate autocomplete. For example, when autocompleting addresses or selecting an address from the options offered, we store details in cookies about when and how many times the search occurred (time and date). Based on this data, we create a certain history, which we use only for calculation purposes (e.g. autocompleting past searches). This data is encrypted with a complex encryption password and mechanism so that it is unreadable. In this unreadable form, it is then used in communication between Foxentry and the client's website.
What is stored in cookies?
1. Address validator
After validating the entire address, we store the ID of the address point in cookies together with information on how many times the user searched for this address. In addition, we save the date and time when such a search last took place.
2. Company validator
After validating all information about the company, we store the internal ID of the company together with information about how many times the user searched for this company or used its data. In addition, we store the date and time when such a search last occurred.
3. Validator of e-mails, names and telephone numbers
Data from your sites and applications
We never store non-anonymized data. For each request, we work only with a database of anonymized address points or IDs and a computational algorithm that suggests relevant results. There is no data storage during this process.
After a successful autocomplete or validation, information about which data was successful in the validation and which was not is stored in the statistics of a specific Foxentry project. However, we never store the original data in the database (e.g. Baker Street), but only a few initial letters of the data, which we supplement with the asterisk symbol (*). Subsequently, the modified data is encrypted and stored in the database. This prevents data from being misused even if an incompetent person accesses the decryption key that is stored on the server. We therefore protect data in two ways.
If the authorized user wants to display the data in the database, this data will be decrypted with the key, but only in the form of data in an anonymized format with an asterisk symbol (*).
E.g. address: Ba**** ***** *****, e-mail: peter@*****.com, phone number: +420 123 456 ***, name and surname: Tom ** Hor ***, company: AVA *** ******, IP address: 94.113.249. ***
This format is the final and only form of data that Foxentry stores. This data is only used to deduct the correct number of credits from your project.
Do you have the possibility to somehow decipher the modified data?
No. All data is encrypted for us and our users and cannot be decrypted in any way. They can only be viewed in anonymized form.
Can you use statistics to find out about my sales or the sales of my competitors?
Due to our strict data policy settings, such a process is impossible. All statistics are anonymized and only the project administrator has access to them. If they are decrypted, they are still irrelevant. These are just statistics on service usage and the number of requests.
How are the telephone numbers validated?
The basic validation of telephone numbers takes place internally and verifies only the format of the telephone number (length, area code). In this process, we do not query servers, but only compare the given number with the usual number formats by calculation.
Extended validation of telephone numbers
In the case of extended validation, we verify the telephone number through a secure external service that we have implemented in Foxentry. We find out details about this number and check its ability to receive calls and SMS. Subsequently, we encrypt it in an anonymized form (+420776749 ***) and store it in the project database.
How is email validation done?
Basic validation of e-mail addresses
The basic validation of e-mail addresses takes place internally and verifies only the e-mail format (at sign, domain format). In this process, we do not query the servers, but only compare the given e-mail with the usual formats of e-mail addresses by calculation.
Advanced e-mail address validation
In the case of advanced validation of e-mail addresses, we verify the e-mail addresses using our own application. We investigate the details of this email, verify its existence, and set up domain records. Subsequently, we encrypt it in an anonymized form (peter@ *****) and store it in the project database. Nobody - neither you nor us - has access to specific e-mail addresses.
To prevent misuse, two-way anonymization (IP, e-mail and telephone number) is used so that no direct connection can be found between the IP address from which the number was entered and the telephone number or e-mail itself.
How does geolocation work?
We use geolocation to improve autocomplete results and offer relevant addresses near the user. For this process, we use a list of most Czech IP addresses, which we compare with the entered IP address. According to its properties, we can assign a region or city to it. However, we can't determine the exact location.
Validation of names and surnames
Validation of first and last names takes place in real time by comparison with our internal database. If we have the given name or surname in the database, it is evaluated as valid. In case of typos or unusualness, we will also offer a more probable variant of the name in the form of a question. The proposed names are similar to the original, but have a higher representation in our database. We use country specific databases (for example for Czech names and surnames we use data from the Czech Statistical Office) to specify these suggestions. For each name and surname, we know its exact frequency of use in the country and its popularity.
EXAMPLE: The user enters the name Zdenek into the form and Foxentry asks the user: ‚,Did you mean Zdeněk?"
What servers does Foxentry use?
To ensure maximum security, we use premium German Hetzner SSD servers, which place maximum emphasis on meeting the strictest data protection criteria. Like us, they have a strict data policy and protection against spam, viruses and attacks with real technical support. It not only protects data digitally, but also in terms of hardware thanks to advanced server technologies. We back up our servers every day, so we're able to recover lost data very quickly in the event of a fault, thus ensuring Foxentry's smooth operation.