The operator of this website cannot enforce these policies on third-party websites.
Access and security logs
Whenever a user or automated tool visits a page on or requests a resource from a server hosting the website, the following information is collected and added to the website's Access Log. If automated tools detect suspicious activity, the following information is also added to the website's Security Log.
- The current time
- The user's IP address (including information disclosed by a proxy)
- The User-Agent string sent by the user's browser or other user agent
- The URL the user visited or requested
- How the request was completed (status code)
Purpose of collection
The Access Log and Security Log are collected to to detect, investigate, and prevent malicious attempts to access a server hosting the website, and to ensure the reliability of the website.
Storage and data processors
The Access Log and Security Log information is collected and stored on servers located in Iceland and operated by 1984 ehf.
The Access Log is stored for up to 30 days.
The Security Log is stored for up to 120 days.
Relevant parts of the Access Log and/or the Security Log may be shared with relevant third parties parties (such as law enforcement and internet service providers) if human operators suspect malicious attempts to access a server hosting the website or other illegal activity.
In addition, relevant parts of the Access Log and/or the Security Log may be shared with third parties as required by law or a court order.
Unintended data collection
If a server hosting the website receive personal or sensitive data through mechanisms not intended to handle such types of data, that data may be collected and stored improperly.
The user should avoid entering personal or sensitive data where such data is not requested or required, and ensure that the user's user agent does not transmit personal or sensitive data where such transmission is not intended.
It is not possible to opt out of log collection. However, servers hosting the website allow access through anonymizing proxy services, such as Tor. The user should keep in mind that some proxy services may disclose information about the user to the websites the user visits or may be unsafe.