12/21/2023 0 Comments Twilio authy desktop app![]() ![]() After the phone number is verified, the phone number you use will be the identifier for your Authy account that allows you to add and associate additional devices to your same Authy account. We send a verification code to that phone number to be sure that the person creating the Authy account also has control over the phone number entered. Once you open the Authy app, we ask you to provide us with a phone number to create your Authy account. Please see our main Privacy Notice for more information.īefore you submit any information on or through Authy, please carefully review this notice.ĭata about our users Data we process during account creation and account usage Information you share directly When we refer to Twilio, we mean the Twilio entity with which you have contracted. If you are interested in our practices relating to personal information collected when you build an application that integrates with Authy’s API to add two-factor authentication to your application, click here. Authy can be used as an alternative to programs such as Google Authenticator or as a provider of 2-factor authentication for applications or programs that directly integrate with Authy’s 2-factor authentication API.īelow is a summary of our practices when it comes to your personal information collected when you download and use the Authy desktop or mobile app. The Authy apps generate one time passwords and push notifications on your desktop computer or mobile device that can be used as a part of a 2-step verification process with your Authy-compatible accounts to add another layer of security. Handling disputes relating to our data protection practicesĪuthy, a Twilio service, offers a desktop and mobile app for two-step verification.How we secure your personal information.How to make choices about your personal information.If you have questions about our data practices or information we store about you, you can email us at Version.Your information will be transferred to the U.S.We may also have to share your information with third parties if required to do so by law. We also share your information with our third party service providers as necessary for them to provide their services to us.Websites and programs that integrate our 2-factor authentication API will be able to see information they sent us about you, your login activity to their website and program, your primary device type, and other device related information relevant to identifying unusual or suspicious activity, but they will not see any other websites or programs for which you use Authy.We use the information we gather from you to monitor for unusual or suspicious activity in your account, to communicate with you about your account, and as additional information that can be used to validate who you are if you need to recover your account or your account has been or may be compromised.We do not sell your personal information. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |