We immensely value
your trust in OSlash

Your trust is at the forefront of everything we do. And we wish to make sure our users feel confident when they are engaging with OSlash’s product.
From our end, we understand that this would mean providing clear and easily digestible information about all the efforts we take to ensure your information is a 100% secure, safe, and private, even from us!

All data—in transit & at rest—is encrypted

We practice privacy by design

We are security-first at everything we do

We tightly control access to all data

Privacy by design | OSlash

We immensely
value your
trust in OSlash

Innovate from anywhere with secure and agile IT solutions. From device to cloud to edge, with Dell Technologies you can innovate and adapt like no before so you’re always ready for the next opportunity. The Dell Technologies portfolio delivers  technology to support your business on its journey to digital.

Your trust is at the forefront of everything we do. And we wish to make sure our users feel confident when they are engaging with OSlash’s product—whether it’s via our browser extensions, mac application, or in the future, our mobile apps. From our end, we understand that this would mean providing clear and easily digestible information about all the efforts we take to ensure your information is a 100% secure, safe, and private, even from us! This page outlines OSlash’s first-user principles.

Privacy by design | OSlash

We make money when you upgrade
your subscription—not by selling your data

We’re committed to the privacy & security of your data. We have and would never sell/rent your data to any third party.
We make money only when our users see value in our product and upgrade to OSlash Pro or OSlash Enterprise

View our pricing plans

All data—in transit and at rest—is encrypted to keep your information safe

All OSlash shortcuts and users’ data are secured in our encrypted database. For an additional layer of security, it is designed such that no other user (even internal OSlash employees) can connect a particular user to their history – this is done by building a secure pivot table that maps users and their data to their unique ID, with the secure pivot table not accessible by any personnel.

Privacy by design | OSlash

We practice privacy
by design

We work with a lot of user data. To make sure it’s safe, we redact all sensitive information and Personally Identifiable Information (PII) and then proceed to store all the documents that we’re indexing.

This means that OSlash does not see or store anything typed in credit card forms, password fields, URL fields, or fields where similar private information is provided.

We are security-first
at everything we do

We protect your data with an enterprise-grade security system. That largely means your data goes through 2048 bit SSL encryption. We’re SOC 2 compliant and frequently conduct third party audits, hackathons, and bug bounty programs to nip any vulnerability in the bud. OSlash’s in-house team of security specialists is dedicated to fortifying the security of our product, infrastructure, and operations. 

We tightly control access
to all user data

OSlash restricts employee access to customer data across our network, infrastructure, and services. Only those authorized to access data critical to their work may do so with the “principle of least privilege.” Users can also request us to delete their data if they wish to. Additionally, users can view all the data associated with their account - this includes shortcuts, snippets, and workspace information.

You can read further details on our Privacy Policy and Terms of Service.
 If you have questions that are not answered here, we encourage you to get in touch