Data Security and Protection
The security of your personal data is as important to us as its protection. On the social network KiKiMaT.cz, we apply technical, organizational, and legal measures to ensure that your data remains safe, confidential, and under your control.
- Secure Data Storage
1.1. All user data are stored on secure servers located in the Czech Republic or within the European Union.
1.2. The servers are protected by encryption, regular updates, and physical security measures against unauthorized access.
- Data Encryption and Transmission
2.1. The transfer of sensitive information (such as login credentials) is carried out via the secure HTTPS protocol using modern TLS encryption.
2.2. Personal data are never shared or transmitted without a legal basis or your explicit consent.
- User Account Protection
3.1. Each user is responsible for protecting their login details and using a strong password.
3.2. If suspicious activity or unauthorized access is detected, the system may temporarily restrict account functions or request identity verification.
3.3. Account verification helps prevent fake profiles and increases the overall security of the community.
- Abuse Prevention and Monitoring
4.1. KiKiMaT.cz actively monitors system traffic to prevent attacks, spam, and the spread of harmful content.
4.2. Suspicious activity may be recorded and evaluated using automated tools designed solely to protect users and maintain system stability.
- Data Backup
5.1. We perform regular data backups to prevent data loss in case of technical failure or malfunction.
5.2. Backups are stored separately and protected against unauthorized access.
- User Responsibility
6.1. Each user is responsible for the content they upload and for ensuring it complies with the laws of the Czech Republic and the European Union.
6.2. It is forbidden to publish content that violates copyright, promotes violence or hatred, or threatens the safety of other users.
- Incident Response
7.1. In the event of a security incident or data breach, we take immediate measures to mitigate the impact and inform affected users and relevant authorities in accordance with GDPR requirements.
7.2. Records of such incidents are kept only as long as necessary for evaluation and prevention of future occurrences.
- Contact Information
8.1. If you have any questions regarding security or suspect account compromise, please contact us via the contact form.
8.2. We respond to all reports without undue delay and in compliance with applicable legislation.