Privacy and Security in APEX Office Print (AOP)
General Privacy and Security
Privacy Policy:
- Our commitment to protecting your privacy is detailed in our Privacy Policy.
Terms of Use:
- Please refer to our Terms of Use for detailed information on the terms governing using AOP services.
Fair Use Policy:
- For more details, refer to our Fair Use Policy.
Report Generation Process
In-Memory Processing
Once data arrives at the AOP application, the entire report generation process occurs in-memory, ensuring high security and efficiency. Here is a detailed breakdown of the process:
Data Reception:
- The server receives the data along with the template in a request.
- The processing is performed completely in memory.
Temporary Storage if PDF output:
- If the requested output type is PDF, the intermediate document (document in the format of your template) is temporarily written to a unique memory folder.
- This temporary data is then converted to PDF.
- Memory Folder: The temporary storage happens in a memory folder, and any data stored is wiped clean upon a machine restart.
Data Deletion:
- The written data in the temporary folder is deleted immediately after the PDF conversion, regardless of whether the conversion was successful or not.
- A separate background process ensures data deletion in case of a program crash.
Logging for Invoicing, Security, and Debugging in case of cloud use:
- Specific details are logged for each request:
- Incoming IP address
- Template type
- Output type
- Request start and end times
- Incoming request size
- Template size
- Output size
- Error stack trace (if any)
- API key
- Specific details are logged for each request:
Updates and Releases
United Codes strives to release two major releases per year and minor releases every two to three months. These updates include new features, bug fixes, and security patches.
With every release, the dependencies are updated, security is checked, an NPM audit is performed on the dependencies, and patches are applied.
Furthermore, the following software is used to scan the code for security vulnerabilities: