Private Information Removal Policy
We offer this private information removal process as an exceptional service only for high-risk content that violates toddle's Terms of Service. Learn more.
What is Private Information?
Private information removal requests are appropriate for:
Access credentials, such as user names combined with passwords, access tokens, or other sensitive secrets that can grant access to your organization's server, network, or domain. AWS tokens and other similar access credentials that grant access to a third party on your behalf. You must be able to show that the token does belong to you. Documentation (such as network diagrams or architecture) that poses a specific security risk for an organization. Information related to, and posing a security risk to, you as an individual (such as social security numbers or other government identification numbers).
Private information removal requests are not appropriate for:
Internal server names, IP addresses, and URLs, on their own. You must be able to show that their use in a particular file or piece of code poses a security threat. Mere mentions of your company's identity, name, brand, domain name, or other references to your company in files on toddle. You must be able to articulate why a use of your company's identity is a threat to your company's security posture. Entire files or repositories that do not pose a specific security risk, but you believe are otherwise objectionable. Requests to remove content that may infringe your or your organization's copyright rights. If you have questions about how toddle handles copyright-related matters or would like to report potentially infringing content, please review our DMCA Takedown Policy . The private information removal process is generally not intended for the removal of full files or repositories — only for the specific pieces of private information in those files. While there may be cases where files are filled entirely with private information, you must justify the security risk for the removal of such files, and this may increase the time required to process your request. Trademark disputes. If you have questions about how toddle handles trademark-related matters or would like to report content containing your organization's trade or service marks, please review our Trademark Policy . Privacy complaints. If you wish to access, transfer, change, or delete your personal information on toddle, please contact our support . Content governed by our Community Guidelines , such as malware or general-purpose tools. If you have questions about our Community Guidelines or believe that content on toddle might violate our guidelines, you can contact our support to report content.
Things to Know
How Does This Actually Work?
Complainant Investigates. It is up to the requesting party to conduct their own investigation and to provide us with the details we require — most importantly, an explanation of how the data poses a security risk. toddle is not in a position to search for or make initial determinations about private information on any individual's or organization's behalf. Complainant Sends a Private Information Removal Request. After conducting an investigation, the complainant prepares and sends a private information removal request to toddle. If the request is not sufficiently detailed to demonstrate the security risk and for toddle to locate the data, we will reply and ask for more information. toddle Asks User to Make Changes. In most cases, we will contact the user who created the repository and give them an opportunity to delete or modify the private information specified in the request or to dispute the claim. User Notifies toddle of Changes. If the user chooses to make the specified changes, they must tell us so within the window of time they've been allowed. If they don't, we will disable the repository. If the user notifies us that they made changes, we will verify that the changes have been made and notify the complainant.
ORUser May Dispute the Request. If a user believes the content in question is not private information subject to this Policy, they may dispute it. If they do, we will generally leave it up to the complainant to contact the user and work things out with them directly, within reason. Complainant Reviews Changes. If the user makes changes, the complainant must review them. If the changes are insufficient, the complainant must provide toddle with details explaining why. toddle may disable the repository or give the user an additional chance to make the changes. User May Request an Additional Window to Make Changes. If the user missed their opportunity to remove the private information specified in the notice, we may allow them an additional window of approximately 1 business day, upon request, to make those changes. In that event, toddle will notify the complainant.
What About clones? (or What's a clone?)
Sending A Private Information Removal Request
Your Request Must Include:
A working, clickable link to each file containing private information. (Note that we're not able to work from search results, examples, or screenshots.) Specific line numbers within each file containing the private information. A brief description of how each item you've identified poses a security risk to you or your organization. It is important that you provide an explanation of how the data poses a security risk beyond merely stating that it does. If you are a third party acting as an agent for an organization facing a security risk, include a statement that you have a legal right to act on behalf of that organization. OPTIONAL: Let us know if your request is particularly urgent, and why. We respond to all private information removal requests as quickly as possible. However, if this request is especially time-sensitive, such as a very recent credential exposure, please explain why.