We endeavor not to collect personal data from users, but recognize that you may choose to provide such information in a bug report. You may choose to correct, update, access or delete the personal information you have submitted to us by sending an email to email@example.com.
Data Storage and Retention
Our general policy covers the storage and retention policies for our server logs and direct communications with us.
If you submit a bug report or contribute to a research dataset, we will maintain this information for as long as we believe it is relevant to improving the software or technology project. Generally, we do not store personally identifiable information (PII), including the IP addresses of users, when collecting bug reports or research data. However, on occasion, we may store IP addresses for limited debugging purposes. (You may also choose to submit these reports and data via Tor in order to prevent us from being able to observe your IP address.)
If you have any questions about our privacy and data protection practices, you can reach Ace2015 at:
4519 Oak Ridge Drive,
Columbia, MO 65201.
If our processing of your personal data is covered by EU law, you may also lodge a complaint with the relevant data protection supervisory authority for your country of residence.
Sharing of datasets: From time to time, we may share datasets derived from our technology projects with research partners working on topics related to Internet security, censorship resistance, privacy or other public policy objectives. We may also publish datasets in an effort to further these objectives. The datasets we may share or publish will not intentionally contain PII and we will evaluate whether further sanitization or aggregation of data is necessary to reduce the likelihood that inferences about identifiable individuals’ activities might be made from the published dataset. Because anonymization is an algorithmically complex problem, we cannot promise that it will be flawless or attack-proof. When we believe that a dataset may contain information that is especially sensitive or vulnerable to de-anonymization, we will not publish it, and if we share share such data with research partners, we will place them under a contractual obligation to keep the dataset confidential and avoid de-anonymization.
Security: Ace2015 employs industry standard security measures to protect the loss, misuse, and alteration of the information under our control, including appropriate technical and organizational measures to ensure a level of security appropriate to the risk, such as the pseudonymization and encryption of personal data, data backup systems, and engaging security professionals to evaluate our systems effectiveness. Although we make good faith efforts to store information collected by Ace2015 in a secure operating environment, we cannot guarantee complete security.
Privacy Policies for Specific Software and Technology Projects: Some of the technology projects from Ace2015 may have specific privacy policies associated with them. When we launch projects with their own privacy policies, they will be linked to from this page.