Our Policies, Data Security Setup, and Privacy Promise
At Mighty Networks, we take privacy and data security very seriously, and we have done extensive work to ensure that your Mighty Network is GDPR compliant and your data (and your members' data) is stored securely.
Our Privacy Promise
As the Host of a Mighty Network, you have the ability to choose the privacy settings you want to enable for your community. Communities that are private, secret, or paid are completely locked down and non-members (including search engines) cannot see the content, memberships, and conversations inside your Mighty Network.
If you choose to make your Mighty Network private or secret, only members with an invite will be able to join. You as the Host of your community also have the power to remove a member or ban them at any point.
Mighty Networks and Your Members
Mighty Networks will never email your members, and your members do not receive any communications (marketing or otherwise) from Mighty Networks directly, outside of the notifications they opt into that come from your community when they join.
Occasionally, you as a Host may receive communications from our team about feature updates and announcements, but those emails will only go out to folks who are Hosts and creators of their own Mighty Networks. Only you as the Host (or anyone else on your team who is listed as a Host) should be getting those emails.
Mighty Networks Policies
Mighty Networks Acceptable Use Policy
Mighty Networks Copyright Policy
Mighty Networks Trademark Policy
Mighty Networks EU Data Processing Addendum
Data Security on Mighty Networks
Mighty Networks takes data security very seriously, and our engineers complete regular API reviews and code reviews to address security issues upfront. In addition, a full suite of tests runs in our Continuous Integration (CI) systems to verify the security measures that have been put in place continue to function on an ongoing basis.
Our core team includes engineers with security training from Microsoft and Symantec (among others), experienced in threat modeling and security reviews. They bring this experience to bear when reviewing the work of other engineers and making security decisions.
If you have more questions about our security policies, please reach out to us directly.
Have more questions? Send us a note.