Privacy Policy
1. Information We Collect
We collect minimal information to provide our search services:
- Search Queries: Temporarily processed to deliver search results, not stored permanently
- Technical Data: IP address (anonymized), browser type, and device information for security
- Usage Analytics: Aggregated, non-personal statistics to improve our service
- Security Logs: Automated security monitoring data to prevent abuse
2. How We Use Your Information
Your information is used exclusively to:
- Improve quality and performance
- Prevent spam, abuse, and security threats
- Comply with legal requirements when necessary
3. Information Sharing
We share information to no one and even we do not store your data
4. Data Security & Retention
We implement industry-leading security measures including encryption, secure servers, and regular security audits. Search queries are deleted within 24 hours, and technical logs are anonymized after 30 days.
5. Your Rights
Under data protection laws, you have the right to:
- Know what data we collect and how it's used
- Access any personal information we may have
- Request deletion of your data
- Opt out of analytics tracking
- File complaints with data protection authorities
Terms of Service
1. Service Description
Gyro is a privacy-focused search engine that provides web search results while protecting user privacy. We aggregate content from various sources to deliver relevant, unbiased search results.
2. Acceptable Use
You agree to use Gyro responsibly and not for:
- Illegal activities or violating laws
- Automated scraping or overwhelming our servers
- Spreading misinformation, hate speech, or harmful content
- Attempting to compromise our security or other users' privacy
- Commercial use without our explicit permission
3. Service Availability
We strive to provide reliable service but cannot guarantee 100% uptime. We may temporarily suspend service for maintenance, security updates, or to comply with legal requirements.
4. Intellectual Property
Gyro's technology, design, and brand are our intellectual property. Search results link to original sources - we respect content creators' rights and encourage users to do the same.
5. Limitation of Liability
Gyro provides search results "as is." We are not responsible for the accuracy, legality, or content of external websites. Users access third-party content at their own discretion.
6. Governing Law
These terms are governed by applicable laws in our jurisdiction.
7. Changes to Terms
We may update these terms to reflect legal changes or service improvements. Major changes will be communicated via our website with 30 days notice.
Security Policy
1. Our Security Commitment
Gyro employs enterprise-grade security measures designed specifically for privacy-focused services. We protect both user data and search infrastructure with multiple layers of security.
2. Data Protection Measures
- Encryption: All data encrypted with AES-256 in transit and at rest
- Server Security: Hardened servers with multi-factor authentication
- Network Protection: Advanced firewall and intrusion detection systems
- Data Centers: Secure facilities with strict access controls
- Backup Systems: Encrypted, geographically distributed backups
3. Employee Security
All team members undergo background verification and security training. Access to systems is role-based and regularly audited. No employee can access user search data.
4. Third-Party Security
We carefully evaluate all service providers for security compliance. Our cloud partners meet international security standards and sign strict data protection agreements.
5. Incident Response
Our security incident response plan ensures:
- Immediate threat containment and investigation
- User notification within 24 hours of confirmed data impact
- Cooperation with cyber security authorities
- Public transparency reports for significant incidents
- Continuous improvement based on lessons learned
6. User Security Best Practices
- Use HTTPS version of any website.
- Keep your browser updated for latest security features
- Be cautious when clicking search results from unknown sources
- Report suspicious search results or phishing attempts
- Consider using VPN for additional privacy protection
7. Vulnerability Reporting
Found a security issue? We appreciate responsible disclosure. Report vulnerabilities to our security team, and we'll work with you to address them quickly and fairly.
8. Compliance & Certifications
Our security practices comply with international standards including ISO 27001 and best practices for data protection and privacy.