Data Protection Overview
Finanzapp is committed to protecting user privacy and personal data in accordance with GDPR and other applicable data protection regulations. This page outlines our data handling practices, encryption methods, and user rights.All personal data, financial information, and authentication details are stored and processed on our secure remote server infrastructure at
finanzapp.es, separate from the frontend codebase.Data Collection
Information We Collect
Finanzapp collects the following types of information:Personal Information
Personal Information
During registration:
- Full name (
app/register.php:125) - Email address (
app/register.php:129) - Password (hashed, never stored in plain text)
- Google account information (when using OAuth)
- Email verification status
- Profile picture (optional)
Usage Information
Usage Information
Automatically collected:
- IP address and location
- Browser type and version
- Device information
- Page views and navigation patterns
- Session duration and timestamps
app/privacy.php:124-132Financial Information
Financial Information
User-provided data:
- Financial transactions
- Income and expense records
- Budget information
- Category preferences
- Financial goals
Cookie Data
Cookie Data
Data Collection Purposes
We collect and use data for the following purposes:- Service provision - Deliver core financial management features
- Service improvement - Enhance user experience and functionality
- Communication - Send important updates and notifications
- Security - Detect and prevent fraudulent activity
- Compliance - Meet legal and regulatory requirements
- Analytics - Understand usage patterns and improve performance
- Personalization - Customize user experience
- Support - Provide customer service and technical assistance
Encryption and Security
Data in Transit
All data transmitted between the client and server is encrypted:HTTPS/TLS Encryption
HTTPS/TLS Encryption
Protocol: TLS 1.3 (Transport Layer Security)Implementation:Features:
- End-to-end encryption
- Certificate validation
- Perfect forward secrecy
- Strong cipher suites
Secure Headers
Secure Headers
HTTP security headers protect against common attacks:
- Content-Security-Policy - Prevents XSS attacks
- X-Frame-Options - Prevents clickjacking
- X-Content-Type-Options - Prevents MIME sniffing
- Strict-Transport-Security - Enforces HTTPS
- X-XSS-Protection - Additional XSS protection
Subresource Integrity
Subresource Integrity
Critical resources use SRI to prevent tampering:
Data at Rest
Data stored on our servers is protected with multiple security layers:Database Encryption
Database Encryption
Implementation on backend servers:
- Encryption at rest for all database storage
- Encrypted database backups
- Secure key management systems
- Regular encryption key rotation
Password Security
Password Security
User passwords receive special protection:Never stored in plain text - All passwords are hashed using:
- Modern hashing algorithms (bcrypt or Argon2)
- Unique salt per password
- High computational cost to resist brute-force
- Regular algorithm updates as standards evolve
- Validated on client for format only
- Transmitted over HTTPS only
- Hashed immediately upon receipt by server
- Original password discarded after hashing
Access Controls
Access Controls
Strict access controls protect stored data:
- Role-based access control (RBAC)
- Principle of least privilege
- Multi-factor authentication for admin access
- Audit logging of data access
- Regular access reviews
Security Measures
As stated in our privacy policy:“We implement appropriate technical and organizational security measures to protect your personal information against unauthorized or unlawful processing and against accidental loss, destruction, or damage.”Specific measures include:
- Regular security audits and penetration testing
- Intrusion detection and prevention systems
- Web application firewall (WAF)
- DDoS protection
- Secure development practices
- Security awareness training for staff
Privacy Policy
Our comprehensive privacy policy is available at: URL: /app/privacy.phpKey Privacy Principles
Transparency
We clearly communicate what data we collect, why we collect it, and how we use it.
Data Minimization
We collect only the data necessary to provide our services effectively.
Purpose Limitation
We use data only for the purposes disclosed at collection time.
Security
We implement robust security measures to protect user data from unauthorized access.
Privacy Policy Contents
Our privacy policy includes 10 comprehensive sections:- Introduction - Overview and scope (
app/privacy.php:116-118) - Information Collection - What data we collect (
app/privacy.php:121-133) - Data Usage - How we use collected data (
app/privacy.php:136-148) - Data Sharing - When and how data may be shared (
app/privacy.php:151-153) - Cookies - Cookie usage and management (
app/privacy.php:156-160) - Security - Protection measures (
app/privacy.php:163-165) - User Rights - Your rights under GDPR (
app/privacy.php:168-176) - Data Retention - How long we keep data (
app/privacy.php:179-181) - Policy Changes - Updates to this policy (
app/privacy.php:184-186) - Contact - How to reach us (
app/privacy.php:189-195)
Table of Contents Navigation
The privacy policy includes an interactive table of contents for easy navigation:User Rights (GDPR)
Under GDPR and applicable data protection laws, users have the following rights:Right to Access
What it means: You can request access to your personal data we hold. How to exercise: Contact us at [email protected] with your request. We will provide:- Copy of your personal data
- Information about how it’s used
- Details about data sharing
- Response within 30 days
Right to Rectification
What it means: You can request correction of inaccurate or incomplete data. How to exercise:- Update information in your account settings
- Contact us for data you cannot update directly
- Correct misspelled name
- Update email address
- Fix incorrect financial data
Right to Erasure (“Right to be Forgotten”)
What it means: You can request deletion of your personal data. How to exercise: Contact us at [email protected] requesting account deletion. Limitations:- Data required for legal compliance may be retained
- Financial records may be retained per regulations
- Anonymized data may be retained for analytics
Right to Data Portability
What it means: You can receive your data in a structured, machine-readable format. How to exercise: Request data export from your account settings or contact us. Format:- JSON or CSV format
- Includes all personal and financial data
- Can be imported to other services
Right to Object
What it means: You can object to certain data processing activities. Examples:- Marketing communications
- Profiling for personalization
- Analytics (except essential cookies)
- Adjust cookie preferences
- Unsubscribe from emails
- Contact us with specific objections
Right to Withdraw Consent
What it means: You can withdraw consent for data processing at any time. Examples:- Notification preferences (
app/register.php:149-153) - Analytics cookies
- Marketing communications
- Future processing stops immediately
- Past processing remains lawful
- May affect service availability
Data Retention
We retain personal data only as long as necessary:Active Account Data
Active Account Data
Duration: While account is activeIncludes:
- Profile information
- Financial records
- Usage history
- Preferences and settings
Inactive Account Data
Inactive Account Data
Duration: 2 years after last loginAction after period:
- Account deletion notification sent
- 30-day grace period for reactivation
- Automatic deletion if no response
Transaction Records
Transaction Records
Duration: 7 years (or as required by law)Reason: Financial regulations and tax complianceScope:
- Payment records
- Subscription history
- Refund information
Marketing Data
Marketing Data
Duration: Until consent withdrawnCan be deleted:
- Immediately upon unsubscribe
- Through account settings
- By contacting support
Security Logs
Security Logs
Duration: 90 daysIncludes:
- Login attempts
- Security events
- Access logs
- Error logs
Data Sharing
We minimize data sharing and only share when necessary:“We do not sell, trade, or otherwise transfer your personal information to third parties without your consent, except as described in this policy.”
When We Share Data
Service Providers
Service Providers
Who: Trusted third-party service providersExamples:
- Cloud hosting providers
- Payment processors (for premium features)
- Email service providers
- Analytics services (Google Analytics)
- Data processing agreements
- GDPR compliance requirements
- Minimum necessary data only
- Regular security audits
Legal Requirements
Legal Requirements
When required by:
- Court orders or subpoenas
- Legal processes
- Regulatory investigations
- Protection of rights and safety
- Challenge overly broad requests
- Notify users when legally permitted
- Provide only required information
- Document all disclosures
Business Transfers
Business Transfers
In the event of:
- Merger or acquisition
- Asset sale
- Bankruptcy
- Notification of transfer
- Right to delete data
- Continued privacy protection
With Your Consent
With Your Consent
Examples:
- Sharing with financial advisors (if you authorize)
- Integration with third-party apps (if you connect)
- Public sharing features (if you opt-in)
- You choose what to share
- You can revoke consent anytime
- Clear consent requests before sharing
Third-Party Services
We integrate with the following third-party services: Google Services:- Google OAuth - Authentication (
app/login.php:103) - Google Analytics - Usage analytics (
app/cookies.php:154-156) - reCAPTCHA - Bot protection (
app/login.php:134)
- Font delivery (Google Fonts)
- Icon libraries (Font Awesome)
- JavaScript libraries (Chart.js, Notyf)
- Use HTTPS connections
- Include integrity checks where possible
- Are disclosed in privacy policy
- Can be disabled via cookie settings
Cookie Management
Users have full control over cookie usage:Cookie Consent Banner
Displayed on first visit:Cookie Categories
Necessary Cookies (Always Active)
Necessary Cookies (Always Active)
Functional Cookies (Optional)
Functional Cookies (Optional)
Analytics Cookies (Optional)
Analytics Cookies (Optional)
Managing Cookies
Options for users:- Cookie settings panel - Accessible from any page
- Browser settings - Control cookies directly in browser
- Privacy policy page - Links to cookie management (
app/privacy.php:158-159) - Cookie policy page - Detailed information (
app/cookies.php)
- Google Chrome (
app/cookies.php:171) - Mozilla Firefox (
app/cookies.php:172) - Safari (
app/cookies.php:173) - Microsoft Edge (
app/cookies.php:174)
Terms of Service
Our terms of service define the legal agreement between users and Finanzapp: URL: /app/terms.phpKey Terms Sections
- Introduction - Agreement overview (
app/terms.php:124-127) - Definitions - Key terms explained (
app/terms.php:130-139) - Account Registration - User responsibilities (
app/terms.php:142-146) - Services - What we provide (
app/terms.php:149-153) - Payments - Billing and subscriptions (
app/terms.php:156-159) - Intellectual Property - Rights and licenses (
app/terms.php:162-165) - Privacy - Data protection reference (
app/terms.php:168-172) - Limitations - Liability and warranties (
app/terms.php:175-178) - Termination - Account closure (
app/terms.php:181-184) - Modifications - Terms updates (
app/terms.php:187-190) - Governing Law - Legal jurisdiction (
app/terms.php:193-196) - Contact - Legal inquiries (
app/terms.php:199-205)
User Responsibilities
By using Finanzapp, users agree to:- Provide accurate information during registration
- Maintain account security and confidentiality
- Comply with applicable laws and regulations
- Not misuse or attempt to breach security
- Not share accounts or credentials
- Accept terms of service and privacy policy (
app/register.php:141-146)
Contact Information
For privacy, security, and data protection inquiries:Privacy and Data Protection
Email: [email protected] For:- Privacy policy questions
- Data access requests
- Data deletion requests
- Data portability requests
- Privacy complaints
Security Issues
Email: [email protected] For:- Security vulnerabilities
- Suspicious activity
- Account compromise
- Security concerns
General Contact
Email: [email protected] (cookies) or [email protected] (legal) Address: Av. del Oeste, s/n, 28922 Alcorcón, Madrid Response time:- Urgent security matters: Within 24 hours
- Data rights requests: Within 30 days (GDPR requirement)
- General inquiries: Within 5 business days
Compliance and Certifications
Regulatory Compliance
GDPR
General Data Protection RegulationFull compliance with EU data protection law:
- Privacy by design and default
- Data protection impact assessments
- Data processing records
- User rights implementation
HTTPS Everywhere
Encrypted CommunicationsAll connections use TLS encryption:
- Secure certificate (TLS 1.3)
- HSTS enforcement
- No mixed content
- Secure cookie flags
Cookie Compliance
ePrivacy DirectiveCompliant cookie implementation:
- Prior consent for non-essential cookies
- Clear cookie information
- Easy opt-out mechanisms
- Granular cookie controls
Security Standards
Our security practices align with:- OWASP Top 10 protection
- CIS Security Benchmarks
- NIST Cybersecurity Framework
- ISO 27001 principles
Data Protection Updates
We regularly update our data protection practices:“We may update this Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page and updating the ‘Last Updated’ date.”How we notify users:
- Updated date on privacy policy page
- Email notification for material changes
- In-app notification on next login
- Continued use implies acceptance
app/privacy.php for current date
Best Practices for Users
Protect Your Account
Strong Passwords
- Use unique passwords for each service
- Minimum 8 characters with uppercase and numbers
- Consider using a password manager
- Never share your password
Enable Security Features
- Use Google OAuth for enhanced security
- Monitor login activity
- Report suspicious activity immediately
- Keep recovery information updated
Protect Your Data
Be Careful What You Share
- Review privacy settings regularly
- Understand what data you’re providing
- Be cautious with third-party integrations
- Know your data rights
Stay Informed
- Read privacy policy updates
- Review security notifications
- Understand cookie usage
- Exercise your data rights when needed
Related Documentation
Security Overview
Learn about overall security architecture and principles
Authentication
Understand reCAPTCHA, OAuth, and authentication flows
Legal Resources
- Privacy Policy - Complete privacy statement
- Terms of Service - Legal agreement
- Cookie Policy - Cookie usage details
- Security Policy - Vulnerability disclosure
