We occasionally may need to make changes to our Services without notice. Though we do our best to make the Services operate smoothly, like in any other service or software, we cannot guarantee that Loop will always run uninterrupted, or be immune from errors or bugs. In those cases, we will do all we can to fix things immediately but cannot guarantee this will always be possible.
Your account ("Account") is automatically created when you sign in to our Services by using the log-in details to your existing email account (i.e. email and password). The best way to keep your account secure is to make sure that no other person uses your Account or knows your password. Our Services are designed for work and by using our Services, you are representing that you are over 13 and that you have the legal ability to use our Services.
We collect, store and use the following types of information and data: 1. Personally identifiable information (PII); 2. Non-personal information (NPI); 3. Your private email data including metadata and email content. Personally identifiable information Personally identifiable information (PII) is information that can be used to identify an individual person and includes information such as IP addresses, Account details, emails addresses, names, contact lists and all similar information retrieved by any other email client when accessing public email exchange information.
We collect, store, and use PII for the sole purpose of being able to deliver our Services to you.
Accounts are added to Loop through OAuth 2.0 protocol where possible. OAuth 2.0 is an open standard authorization protocol that allows third parties to access user data without needing to know or store user passwords. Also, OAuth 2.0 authentication allows users to revoke app access at any moment in app settings. If a user revokes Loop app access, our Services do not have access to any of the user data anymore.
Where OAuth 2.0 is not supported, we keep your account username and password secure in our Services. To ensure the greatest possible levels of security, user passwords are never stored in our databases. For secure storage of user credentials, we use a certified secure storage service called MS Azure Key Vault, with special purpose Hardware Security Modules (HSMs) accessed using a 2048 bit digital certificate. We then use the authorization provided to download your emails to our cloud servers and push to your device.
We use Amazon Web Services (AWS) infrastructure to store your data. Apart from AWS security policies, we take a number of measures to ensure that your data is never read by anyone else. We ensure that all transmission is secured with HTTPS so that no one else can access your data. For this, we use a strong protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and a strong cipher (AES_128_GCM) with industry standard 256 bit encryption using TLS/SSL (HTTPS). Non-personal information Non-personal information (NPI) is information which cannot be used to identify an individual person, such as technical information about your device, location, time zone, activity usage, performance metrics, configuration settings, anonymous behavioral information and other aggregated information.
Additionally, whenever you interact with our Services, we automatically receive and record ‘cookie’ information from your browser or device. ‘Cookies’ are identifiers we transfer to your browser or device that allow us to recognize your browser or device and tell us how and when pages and features in our Services are visited and by how many people. You may be able to change the preferences on your browser or device to prevent or limit these, but this may prevent you from taking advantage of some of our features.
We use NPI to customize content for you and to provide the functionality of the Services, such as email follow-ups and categorization, based on your usage patterns. We also use NPI in order to improve your user experience when using our Services. We may use internal and third party processing and analytic systems to analyze user experience, behavior and trends with NPI.
Private emails (message headers, subject, body, attachments and other metadata) are stored by Loop's cloud service and some of that content is stored locally on your device. They are used exclusively to provide you with our Services.
You can request the deletion of your data from Loop by writing to firstname.lastname@example.org. Email content stored locally on your device can be removed by deleting the Loop apps. Access to data Except as described elsewhere in these Terms, no Loop employees, contractors, agents or other personnel (collectively ‘Loop personnel’) will access or use your data in a manner that would identify you as an individual.
We have strict controls and processes in place which are designed to limit access to and use of your data by Loop personnel. We have technical controls and audit policies in place which are designed to ensure that any access to such data by Loop personnel is logged. All Loop personnel who may have or require access to your data as part of their services to Loop are bound to our policies regarding your data and we treat the privacy and security of your data with utmost respect.
Loop personnel may need to access your data in connection with troubleshooting or responding to a problem, system maintenance or upgrades, or other activities in the ordinary course of operating our Services. In most cases, we will notify you and ask for your permission prior to giving Loop personnel permission to access your data. However, we may access and disclose certain data if we have a good-faith belief that such access, use, preservation or disclosure of your data is reasonably necessary to:
Loop considers the security, confidentiality and availability of your information to be of the upmost importance. It is policy that manifests itself through all aspects of the delivery of our Services, including the infrastructure our Services run on and all Loop personnel. Loop’s approach to information security management is based on adherence to best practice methodologies such as ISO 27001, regular third-party penetration testing and close monitoring of customer security requirements.
Loop is a web, mobile & desktop email client that works with other email providers (Gmail, Office 365 and Microsoft Exchange accounts). In order to send and receive user emails, our Services need to have access to user email accounts.
When you log into your email account through our Services, you are granting Loop permission to securely access the information contained in or associated with that account. The whole process is similar to connecting any other email client.
In order for our Services to achieve this, we need to store user email account access tokens:
To ensure safe and reliable operations of our Services, we rely on the most advanced and secure solution available in the industry – Amazon Web Services (AWS). Apart from AWS security policies, we encrypt all data between the client and our service. For client encryption and authentication, we user a strong protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and a strong cipher (AES_128_GCM) with industry standard 256 bit encryption using TLS/SSL (HTTPS).
Our Services are made available to you only for your personal or internal business use, which must be in compliance with all applicable laws, rules and regulations and must not infringe or violate third party rights. You may not make commercial use of our Services, including but not limited to selling or distributing our Services to any third party.
You may not register with Loop Services using existing email account information that you do not have the right to use, or another person’s existing email account information with the intent to impersonate that person. You represent and warrant that you are of legal age to form a binding contract (or if not, you have received your parents’ or guardian’s permission to use our Services and gotten your parent or guardian to agree to these Terms on your behalf).
If you are agreeing to these Terms on behalf of an organization or entity, you represent and warrant that you are authorized to agree to these Terms on that organization or entity’s behalf and bind them to these Terms (in which case, the references to “you” and “your” in these Terms, except for in this sentence, refer to that organization or entity). You will only use our Services in a manner that complies with all laws that apply to you.
You further represent, warrant, and agree that you will not use our Services or interact with our Services in a manner that:
Any violation of any of the aforementioned is grounds for termination of your right to use or access our Services. Any unauthorized use of any Loop Services is a violation of these Terms and such violations may subject the unauthorized user and his or her agents to civil and criminal penalties.
Loop Services are currently free. We reserve the right to charge for our Services in the future. We will notify you a reasonable period before any of our Services you are using begin carrying a fee. Changing these Terms We are constantly trying to improve our Services, so these Terms may change occasionally too. We reserve the right to change the Terms at any time. When we do, we will update the date to make it clear that a new version has been created and we will bring the update to your attention in a timely manner by sending you an email or by some other means within the app.
Undoubtedly, 2018 will go down as a standout year for gender equality. In the UK, for example, the 2010 Equalities Act come into force for the first time. This Act has made it a legal requirement for all large employers with over 250 employees to publish the gender pay gap data for their organizations. No longer will it be possible for businesses in any genre to hide in the shadows. This transparency around pay aims to have a trickle-down effect when it comes to employment ratios and career progression – and no industry is more effected by this than the tech industry.
For too long we’ve been hearing about women in tech as if a female working in the technology industry is as rare as unicorns or hen’s teeth! And we think that should stop – in this year of great equality we believe that women working in the technology industry should be as “normal” as women working in any other industry whether it be healthcare or marketing, teaching or engineering. We wanted to hear from some women within our own workplace here at Loop Email, about their thoughts on being in a minority in this industry – where it all started and where they think its headed.
Blazka began her career in the technology industry almost two years ago and now works as a Backend Developer at Loop. Her interest in technology started when she was very young, she says: “I have always been interested in how things work, problem-solving and technology in general. These interests combined with being good at math – it made the most sense to study computer science.”
Despite Blazka’s passion for the industry she was wary about starting a career in technology – mainly because it is such a male-dominated field: “It made the most sense for me to go into computer science, but I was still doubtful of my decision because it was mainly male-dominated field. That might discourage some, but I have learned that if I don’t think of myself as less capable, others are less likely to. If anyone says I can’t do something I just make sure to prove them wrong!”
It’s this drive that’s kept her pushing through, in an industry that she says anyone interested in how things work should consider, male or female: “In my experience, working in the tech industry is full of challenges, interesting tasks, team work, and continuous learning. Good job opportunities and ongoing growth of the market is a big plus as well. There is nothing specifically good about being a woman in the industry, but rather being in the industry, in general, is an exciting place to be.”
Kaja, a Backend Team Lead at Loop, shares a similar story: “I guess I was interested in technology since I was a little kid because I was always hanging on to everything my dad explained to me about computers. There was a short period when I was in primary school where I didn’t know exactly that tech is where I wanted to be, but through a couple of summer camps I figured out what I want to study and then just naturally fell back to tech and programming!”
For Kaja, the key to getting more women interested in a career in technology might start in this early education phase of life: “I think it’s the stigma that it’s a man’s world and the educators not being helpful enough to recognize that a girl is really interested in technology and should pursue it, especially early on. In my case, a lot of my teachers knew I had a knack for all things computers in primary school and I even brought a lot of my hobbies into schoolwork and after school activities, but none gave me even the slightest nudge to go in that direction. And when you are told from a young age that girls go study economics or linguistics or some soft sciences and boys go and study engineering, you create a false belief in the back of children’s minds.”
And while educators are at it, maybe early years influencers need to change their language when it comes to technology careers. Blazka, thinks so: “I don’t know if you can make tech attractive to someone who is not attracted to tech, but it might help to change misconceptions of what tech can be. Maintaining computers, making video games and dealing with hardware may not attract most women, but problem-solving, extracting knowledge from a large amount of data and artificial intelligence might.”
Whatever the journey though, the women working at Loop Email love the job they’re doing. Kaja says, “Once you get into the actual business itself, most of the males are men enough to admit that yes, women can be awesome at programming!”
Having said that, they’re all in agreement with her when she says, “Is there really any difference being a woman in tech to being a man? For me, tech is awesome, we are changing the world at every turn, gender doesn’t really matter.”