MADJEEK

NEWSLETTER

Sign up for free and join our community.


Do you want to boost your brand image and stay on top of trends? Sign up for our free newsletter and dive into a world of creativity and inspiration!


Every month, we share with you:


Practical tips to improve your communication strategy and enhance your brand's impact. Inspiring success case studies to help you imagine your own projects. Exclusive offers reserved for our subscribers, as well as invitations to special events. The latest trends in branding and digital to ensure you don't miss anything happening in your industry. Don't miss this opportunity to make your brand shine and connect with other enthusiasts! Subscribe now and receive your first edition directly in your inbox.


Data Information

Your personal data remains strictly confidential and is intended for internal use only. In accordance with the regulations, you can exercise your rights of deletion, correction, and access to your personal data at any time by contacting us by email: web-agency@madjeek.fr

We are committed to complying with the applicable legislation on personal data protection, including Regulation (EU) 2016/679, known as the General Data Protection Regulation (GDPR), as well as the French Data Protection Act of January 6, 1978, as amended.

According to the GDPR, you have the following rights regarding your personal data:

- Right of access: You have the right to request access to your personal data in order to know what information is stored about you.

- Right to rectification: You can request the correction of your personal data if you find that it is inaccurate or incomplete.

- Right to erasure: You have the right to request the deletion of your personal data under certain conditions, such as when the data is no longer necessary for the purposes for which it was collected.

- Right to restriction of processing: You can request that the processing of your personal data be limited under certain circumstances, for example, when you contest the accuracy of the data.

- Right to data portability: You have the right to obtain your personal data in a structured, commonly used, and machine-readable format and to transmit it to another controller.

- Right to object: You have the right to object at any time to the collection and processing of your personal data, including for direct marketing purposes.

- We take the protection of your data very seriously and implement appropriate technical and organizational measures to ensure the security and confidentiality of your personal information. For more information on your rights and our privacy policy, please feel free to visit our website on the "legal notices" page or contact us directly.

For any request regarding your rights, please address it to our Data Protection Officer (DPO) at the email address mentioned above. We are committed to responding to you promptly, in accordance with legal requirements.

We are firmly committed to protecting your personal data through robust security measures, including encrypting all user information, making it inaccessible without the password and our specific decryption software. Our encrypted files are carefully stored in a private and secure cloud space, and all data exchanges are transmitted via the anonymous Tor global network, thus ensuring the confidentiality and security of your information. We believe that transparency and security are essential to establish a trusting relationship with our users, and we remain at your disposal for any questions or concerns regarding the protection of your data.

The use of data encryption and the Tor network offers several significant advantages in terms of security and privacy:

1. Protection of sensitive data: Encryption transforms data into an unreadable format without an appropriate decryption key, meaning that even if data is intercepted or accessed by unauthorized third parties, it cannot be understood or used. This protects users' personal, financial, and sensitive information from theft or misuse.

2. Anonymity and confidentiality:

Tor network: Tor (The Onion Router) allows users to browse the Internet anonymously by masking the user's IP address and routing data through multiple nodes (servers) before reaching their destination. This makes it difficult to trace online activities, providing an additional layer of protection against surveillance and tracking.

3. Securing communications:

Data traversing through Tor is encapsulated in multiple layers of encryption, adding complexity for anyone attempting to intercept communications. This enhances the security of sensitive information exchanges between users and services.

4. Prevention of data leaks:

By protecting data with strong encryption and using Tor for transmissions, the risk of accidental or intentional data leaks is significantly reduced. This is particularly important for organizations handling personal or confidential information.

5. Regulatory compliance:

The use of encryption techniques and anonymous networks also helps organizations comply with data protection regulations, such as the GDPR, by ensuring that personal data is processed securely and respectfully toward individuals' rights.

6. Resilience against cyberattacks:

The combination of encryption and anonymity makes it more difficult for cybercriminals to effectively target data, helping to strengthen the resilience of information systems against malicious attacks such as phishing, ransomware, and data breaches. In summary, data encryption and the use of the Tor network are essential practices to ensure the security, privacy, and integrity of information, thereby reinforcing users' trust in services that handle their personal data.

In addition to Tor, Madjeek uses a VPN to enhance security by encrypting the Internet connection and masking the IP address. This provides additional protection when browsing the web and accessing unsecured networks.

Our employees are trained in our data security practices. Awareness of potential threats, such as phishing, is crucial to reduce the risk of human errors that could compromise security.

Encryption of data at rest: In addition to encrypting data in transit, your data is encrypted when stored on servers, hard drives, or databases. This protects the data even in the event of unauthorized physical access to the equipment.

At Madjeek, we apply strict access management policies based on the principle of least privilege, ensuring that users have only the access necessary to perform their tasks, including within the members' area of our site.

We apply the same rigorous methods of access management and security for all our client projects. This includes secure data storage, regular updates to maintain system integrity, and systematic backups to ensure information protection. By following these protocols, we ensure secure and reliable data processing, providing our clients with peace of mind regarding the confidentiality and security of their information.

News

Project
Blog
   
privilege escalation = no