Privacy

Joolo Core Capabilities

  • All requests to the Joolo website start a session which stores the IP address in the session data and creates a session cookie in the user's browser. The IP address is used as a security measure to help protect against potential session hijacking attacks and this information is deleted once the session has expired and its data purged. The session cookie's name is based on a randomly generated hash and therefore does not have a constant identifier. The session cookie is destroyed once the session has expired or the user has exited their browser.
  • Joolo's logging system records the IP address of the visitor which led to a message being written to its log files. These log files are used to record various activity on the site, including information related to core updates, invalid login attempts, unhandled errors, and development information such as the use of deprecated APIs.
  • When a network connection is available, the Joolo platform will attempt to communicate with the joomla.org servers for various capabilities, to include:
    • Checking for updates for the Joomla application
    • Help screens for core Joomla extensions
    As with all HTTP requests, the IP address of your server will be transmitted as part of the request. For information on how Joomla processes data on its servers, please review our privacy policy.

Authentication - Cookie

  • In conjunction with a plugin which supports a "Remember Me" feature, this plugin creates a cookie on the user's client if a "Remember Me" checkbox is selected when logging into the website. This cookie can be identified with the prefix `joomla_remember_me` and is used to automatically log users into the website when they visit and are not already logged in.

CAPTCHA - Invisible reCAPTCHA

  • The Invisible reCAPTCHA plugin integrates with Google's reCAPTCHA system as a spam protection service. As part of this service, the IP address of the user answering the captcha challenge is transmitted to Google.

Privacy

  • In order to process information requests, information about the user must be collected and logged for the purposes of retaining an audit log. The request system is based on an individual's email address which will be used to link the request to an existing site user if able.
Log in to comment
Remember you can let us know what you think of this article on forums!

Search