

On rare occasions, Mover employees may further access your connections and files solely to fix bugs or troubleshoot problems that have been identified. In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access.

We have strict policies and technical access controls that prohibit employee access except in these rare circumstances. But that's the rare exception, not the rule. Like most online services, we have a small number of employees who must be able to access user data for the reasons stated in our Privacy Policy. Mover employees are prohibited from viewing the content of files you transmit through Mover, and are only permitted to view file metadata (e.g., file names and locations). We work hard to protect your information from unauthorized access. We simply facilitate the transfer of your data and we have no interest in, or benefit from, retaining your data. Your Data is Not Retained by MoverĪfter we have completed transmission of your data between the services you have directed us to use, we remove any copies of your data from our servers. If supported, your files are sent between the services you choose and our servers over a secure channel using 256-bit TLS (Transport Layer Security) encryption, the standard for secure Internet network connections. Microsoft's security at the Microsoft Azure website.Google's security on the Google Cloud Platform website.

#MOVER.IO VS OTIXO SOFTWARE#
We provide this overview so that you can better understand the security measures we've put in place to protect the information that you transmit using the Mover client software and services (“ Services”). To view our current legal terms, visit Legal. This version is posted for archival reference only. This is a previous version of our legal terms.
