Skip to main content

Privacy and Security in APEX Office Print (AOP)

General Privacy and Security

Privacy Policy:

  • Our commitment to protecting your privacy is detailed in our Privacy Policy.

Terms of Use:

  • Please refer to our Terms of Use for detailed information on the terms governing using AOP services.

Fair Use Policy:

Report Generation Process

In-Memory Processing

Once data arrives at the AOP application, the entire report generation process occurs in-memory, ensuring high security and efficiency. Here is a detailed breakdown of the process:

  1. Data Reception:

    • The server receives the data along with the template in a request.
    • The processing is performed completely in memory.
  2. Temporary Storage if PDF output:

    • If the requested output type is PDF, the intermediate document (document in the format of your template) is temporarily written to a unique memory folder.
    • This temporary data is then converted to PDF.
    • Memory Folder: The temporary storage happens in a memory folder, and any data stored is wiped clean upon a machine restart.
  3. Data Deletion:

    • The written data in the temporary folder is deleted immediately after the PDF conversion, regardless of whether the conversion was successful or not.
    • A separate background process ensures data deletion in case of a program crash.
  4. Logging for Invoicing, Security, and Debugging in case of cloud use:

    • Specific details are logged for each request:
      • Incoming IP address
      • Template type
      • Output type
      • Request start and end times
      • Incoming request size
      • Template size
      • Output size
      • Error stack trace (if any)
      • API key

Updates and Releases

United Codes strives to release two major releases per year and minor releases every two to three months. These updates include new features, bug fixes, and security patches.

With every release, the dependencies are updated, security is checked, an NPM audit is performed on the dependencies, and patches are applied.

Furthermore, the following software is used to scan the code for security vulnerabilities: