Privacy Policy

Uptime Platform Privacy Policy

Last updated: November 12, 2025

This policy explains how Uptime Platform (“Uptime”, “we”, “us”) collects, uses, and shares information when you use our Nuxt-based monitoring, incident, and support workspace, related APIs, public status pages, Docker/server agents, and other Services. By using the Services you consent to these practices.

1. Information We Collect

The data we process depends on the features you configure. The table below highlights the major categories.

CategoryDescriptionExamples
Account & Profile DataInformation you or your organization submit to create and manage an account.Name, email, TOTP secrets, roles/permissions, plan tier, billing contacts.
Service ConfigurationData required to run monitoring, alerting, and incident workflows.Monitor URLs, headers, secrets, custom domains, status page content, incident drafts, webhook bindings.
Team & Collaboration DataContent created by you or teammates in the dashboard or APIs.Ticket threads, contacts, canned responses, comments, attachments, mailing list members, audit logs.
Device & Usage DataAutomatically captured telemetry about how the Services are accessed.Browser type, IP address, timestamps, API latency, error reports, rate-limit logs, auth events.
Agent & Metrics DataInformation sent from optional server and Docker agents.Hostnames, CPU/memory/disk/process metrics, monitor results, incident triggers, Jira sync metadata.
Third-Party IntegrationsData exchanged with external tools you connect.Slack/Discord/webhook payloads, Jira references, email delivery metadata, DNS/SSL validation data.

2. How We Collect Information

  • Directly from you when registering, configuring monitors/status pages, opening tickets, or communicating with support.
  • Automatically through cookies, server logs, general usage analytics, and agent heartbeats whenever you use dashboards, APIs, or agents.
  • From workspace administrators or teammates who manage shared tenant resources.
  • From third parties when you enable integrations such as Jira, Slack, DNS providers, or email services.

3. How We Use Information

  1. Provide, maintain, and secure the Services, including enforcing plan usage and account-level permissions.
  2. Execute monitoring, alerting, support, and incident workflows you configure.
  3. Send transactional communications (status notifications, support replies, security alerts) and respond to support requests.
  4. Improve reliability and performance through analytics, debugging, and capacity planning.
  5. Enforce acceptable use, investigate suspicious activity, and protect our rights, users, and infrastructure.
  6. Comply with legal obligations, respond to lawful requests, and maintain audit-ready records.
  7. Develop new features, roadmap initiatives, and beta programs informed by aggregated feedback.

4. Legal Bases

Where required (e.g., GDPR), we rely on contract performance, legitimate interests (service improvement, security, fraud prevention), compliance with legal obligations, and consent for optional programs or marketing.

5. How We Share Information

  • With subprocessors that host infrastructure, databases, caching layers, email delivery, analytics, payment processing, or customer support—each limited to providing services on our behalf.
  • With teammates within your organization according to assigned roles/permissions, including support portal and incident visibility.
  • With third-party integrations you authorize (e.g., Jira sync, Slack/Discord, webhooks), limited to the data required to operate that integration.
  • During corporate transactions (mergers, acquisitions, financings, or asset transfers) subject to confidentiality obligations.
  • When required by law or necessary to protect rights, users, safety, or enforce policies.

We do not sell personal information.

6. Data Retention

We retain data for as long as your account is active or as needed to provide the Services. Monitor history, incidents, and tickets follow plan-specific retention rules. Limited logs may be kept after account closure for fraud prevention, audits, or legal compliance.

7. Security

We employ TLS, role-based access, Redis-backed rate limits, layered middleware (auth, plan enforcement, custom-domain checks), and audit logging. No system is perfectly secure—protect API keys, agent tokens, and TOTP secrets on your side.

8. International Data Transfers

Data may be processed in the United States or other countries where we and our subprocessors operate. We use appropriate safeguards, such as Standard Contractual Clauses, when required.

9. Your Choices & Rights

Depending on your location you may request access, correction, export, deletion, or restriction of personal information, and object to certain processing. Workspace admins can self-manage most data via the dashboard or APIs. Contact us at privacy@uptime-platform.example for assistance.

You can adjust alert channels, mailing lists, and agent connections from the dashboard. Opt-out links are included with non-transactional communications where required.

10. Support Portal, Status Pages, and Public Data

  • Support Portal: Tenants control which tickets, contacts, and attachments are public. Avoid sharing sensitive data in public replies.
  • Status Pages & Custom Domains: Published incidents, metrics, and RSS/ICS feeds are intentionally public. Review content before publishing.
  • Server & Docker Agents: Agents stream system metrics and execute the automations you configure. Deploy only to systems you control.

11. Children

The Services are not directed to children under 16, and we do not knowingly collect their personal information. If you believe a child provided data, contact us and we will take appropriate action.

12. Changes to This Policy

We may update this policy to reflect operational, legal, or regulatory changes. Updates will be posted here with a revised “Last updated” date, and material changes may be announced via email or in-app notice.

13. Contact

Reach us at privacy@xuptimemonitor.com

If you have unresolved concerns, you may have the right to contact your local data protection authority.