Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
en:privacy [2015/04/27 20:26] gustavo fixes |
en:privacy [2017/10/24 09:30] (current) |
||
---|---|---|---|
Line 17: | Line 17: | ||
=== Information collected when using the software Plagius - Plagiarism Detector === | === Information collected when using the software Plagius - Plagiarism Detector === | ||
- | The Plagius program sends the activation key encrypted (hash) along with information identifying the user's computer. This data can be: MAC address of the network card; Disk volume number; Windows user name and/or domain. This information is used to generate a [[http:// | + | The Plagius program sends the activation key encrypted (hash) along with information identifying the user's computer. This data can be: Processor ID; disk volume number; Windows user name and/or domain. This information is used to generate a [[http:// |
- | We also keep the version used for the Plagius | + | In order to improve |
All information exchanged between the Plagius program and the website are encrypted for security of our users. | All information exchanged between the Plagius program and the website are encrypted for security of our users. | ||
+ | |||
+ | The Plagius uses Internet search engines to perform the analyzes, fragments (7-13 words, usually) of the analyzed texts are sent to these search engines. These fragments are randomly extracted from the text, and the search engine is also chosen randomly. Thus, the search engines only receive parts of the text in a disconnected way. We cannot guarantee that these search engines do not store the text of searches performed. | ||
+ | |||
+ | If there is sensitive data that remains relevant even in pieces of 7 to 13 words and that even search engines cannot receive it, the Plagius should not be used for internet searches. | ||
+ | |||
=== About information sharing === | === About information sharing === |