![]() We collect your email address as another piece of information to validate who you are if you need to recover your account or your account has been compromised, and also to communicate notices about your account to you like suspicious logins or other activity that could be related to a compromise of your Authy account or one of your accounts in other applications or programs that integrate with the Authy 2-Factor Authentication API. We will use your phone number to communicate to you verification codes so you can log into your account on that application or program. If you have not downloaded the Authy app, but use an application or program that directly integrates with Authy’s 2-Factor Authentication API, when that application or program shares your phone number and email address with us, we will create an Authy account for you. If you are a user of an application or program that directly integrates with Authy’s 2-Factor Authentication API, those applications or programs collect your phone number and email address and share that information with us so we can use it to associate your account on that application or program with your Authy account that you created when you downloaded the Authy app. The device on which you first created your Authy account is considered your “primary device.” You may also enter your email address. After the phone number is verified, the phone number you use will be the identifier for your Authy account that allows you to add and associate additional devices to your same Authy account. We send a verification code to that phone number to be sure that the person creating the Authy account also has control over the phone number entered. Once you open the Authy app, we ask you to provide us with a phone number to create your Authy account. Please see our main Privacy Notice for more information.īefore you submit any information on or through Authy, please carefully review this notice. When we refer to Twilio, we mean the Twilio entity with which you have contracted. If you are interested in our practices relating to personal information collected when you build an application that integrates with Authy’s API to add two-factor authentication to your application, click here. Authy can be used as an alternative to programs such as Google Authenticator or as a provider of 2-factor authentication for applications or programs that directly integrate with Authy’s 2-factor authentication API.īelow is a summary of our practices when it comes to your personal information collected when you download and use the Authy desktop or mobile app. The Authy apps generate one time passwords and push notifications on your desktop computer or mobile device that can be used as a part of a 2-step verification process with your Authy-compatible accounts to add another layer of security.
0 Comments
Leave a Reply. |