GitProtect’s Terms of Service outlines the terms, conditions, rights and limitations related to Customer using GitProtect.io. Please, look through them carefully as it includes the most important principles.
Learn moreThis Data Processing Agreement is an agreement between GitProtect provider - Xopero Software - and a data processor (such as a third-party service provider). It regulates personal data processing conducted for business purposes.
Learn moreThe Partner Program Agreement, along with our Privacy Policy, Data Processing Agreement constitute the agreement established by and between GitProtect.io provider – Xopero Software - and any person or entity registering as a Partner.
Learn moreThis Service Level Agreement (SLA) is an agreement between GitProtect.io and End User that defines the way IT services necessary for operating is provided and maintained. It identifies the required and the expected level of service.
Learn moreThe General Data Protection Regulation stands for the personal data privacy and security of individuals. Our Xopero Software’s GDPR ensures the privacy and security of user’s personal data.
Learn moreThis Privacy-cookies Policy sets the way GitProtect.io gathers and processes personal information you provide us with, and recognizes the importance of protecting your personal data.
Learn moreThis Payment and Refund Policy outlines all the general terms how the payment for our Service and Software is made and explains all the financial issues between GitProtect.io and Customer.
Learn moreWelcome to our sub-processors page where we maintain a current list of infrastructure and service-specific sub-processors authorized to process our customer data.
Learn moreThis Personal Date Protection Policy was established in connection with requirements specified in EU Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data…
Learn moreInformation is an extremely important asset and we are responsible for ensuring that this information is kept safe and used appropriately. In this document, we present the security policies implemented in our company, good practices...
Learn more