Always-on monitoring for modern infrastructure
Legal

Privacy Policy

This page explains what data UpTimeBox stores, how it is used to operate the service, and how users can request export or deletion.

1. Data we collect

UpTimeBox stores account details such as name, email address, password hash, active sessions, two-factor authentication metadata, monitor definitions, check results, incidents, alert delivery history, and audit events required to operate the platform securely.

2. How we use data

We use stored data to authenticate users, run uptime checks, calculate charts and incidents, send verification emails and alerts, prevent abuse, and investigate operational or security issues.

3. Retention

Raw monitoring checks are retained according to the platform retention rules, incidents are retained for operational history, and security events are kept for audit and abuse investigation. Users can request an export of their data or delete their account from the Settings page.

4. Security

We protect account access with password hashing, session controls, optional two-factor authentication, and administrative audit logging. No system is perfect, so users should also enable 2FA and use strong unique passwords.

5. Contact

Privacy questions or deletion requests can be sent through the public contact page or from the authenticated account settings area.