Synology and How Your Analytical Data is Stored, Used and Deleted
Synology, a renowned network-attached storage (NAS) solutions provider, maintains a series of data-driven services to supplement their product suite. The transparency and clarity in Synology’s data collection and storage protocols reflect their dedication to ensuring users’ privacy. Below is a comprehensive evaluation of their privacy practices across several services.
Resources Usesd for this Summary:
Needless to say, the full extent of Synology’s internal operations are going to be largely confidential. However, much like any other company that handles user data, they provide a detailed breakdown of their terms of service and data collection disclosure. These are provided as guidelines of how the brand receives, stores, utilizes and deletes data that is collected in the process of specific applications or services. Full details on these policies in their full length can be found below:
- Software EULA
- Services Data Collection Disclosure
- Synology Account
- Pre-Release Program Agreement
- Package Center
- Legal Agreement
Additionally, we made a much larger video on this subject, that highlights all the areas of the Synology service agreements and data collection details. You can find it HERE.
C2 Service: The Synology C2 Service is a cloud suite aiming to enhance the user experience for Synology product users. For subscribers, Synology requires essential data such as account credentials and payment details. If users partake in specific events within the C2 platform, event-specific URLs might be recorded. This data collection allows Synology to seamlessly integrate and customize services for its user base. Data is safeguarded using encryption techniques and is stored across globally distributed data centers located in the US, Germany, and Taiwan. Upon the cessation of a subscription or when an account is deleted, Synology retains the data for a stipulated period before initiating permanent deletion to give users a window for potential account recovery.
Device Network Mapping: With the vision of easing initial device setups, Synology designed the Device Network Mapping service. It collects specific device details to assist in identifying and preparing devices to integrate within a network environment. Though this service collects vital information, Synology ensures the temporary nature of this storage. The data is designated for removal post its immediate utility or after 90 days of inactivity, ensuring no unnecessary long-term storage.
QuickConnect and Synology DDNS: Synology’s commitment to improving connectivity for users is manifested in services like QuickConnect and Synology DDNS. These services, while instrumental in boosting user experience, require the collection of device information. This data serves to facilitate domain name resolutions and enhance the security of user connections through encryption. The retention of this data is directly linked to the active status of the user’s Synology Account.
Synology Application Service: To satiate the modern user’s demand for real-time notifications, Synology offers the Synology Application Service. This service processes messages and certain device details, which are essential for push notifications across Synology’s application suite. It’s worth noting that post the delivery of these messages, Synology takes measures to ensure that the data is immediately purged from their servers.
DSM Configuration Backup: Recognizing the value of configuration data, Synology presents the DSM Configuration Backup service. It not only stores configuration details securely but also ensures that the data is encrypted, making it a vital asset in restoration or upgrade scenarios. If a user opts to deactivate this service, Synology maintains a data retention policy of up to 180 days before initiating the deletion process.
Active Insight: Active Insight emerges as a valuable tool for users seeking analytical insights into their NAS devices’ performance. By accumulating operation data, Synology endeavors to offer performance insights, real-time analytics, and specialized technical support. This service also aids in Synology’s internal product improvement initiatives. Synology commits to store this data in its Frankfurt data center, ensuring European data protection standards. Periodic evaluations are performed to cleanse any identifiable links from the stored data, reinforcing privacy measures. Moreover, stringent access controls are in place to limit raw and aggregated data visibility to a select set of employees.
MailPlus: The MailPlus service, when paired with Bitdefender’s antispam/antivirus functionalities, necessitates the sharing of specific technical data. This collaboration is vital to offer a fortified defense against spam and potential cyber threats. However, users should be aware that this data bypasses Synology’s storage mechanisms and is sent directly to Bitdefender’s infrastructure.
Concluding Thoughts: Navigating through Synology’s data privacy policies reveals a company that is invested in ensuring a clear demarcation of its data collection, utilization, storage, and deletion methodologies. Each service comes equipped with user-centric guidelines and often offers choices for users to opt-in or out as per their comfort. However, users must remain vigilant and thoroughly understand third-party collaborations and their implications. As with any service, the responsibility remains mutual: while Synology offers transparent practices, users must be proactive in understanding and deciding what’s best for their data.
📧 SUBSCRIBE TO OUR NEWSLETTER 🔔🔒 Join Inner Circle
Get an alert every time something gets added to this specific article!
This description contains links to Amazon. These links will take you to some of the products mentioned in today's content. As an Amazon Associate, I earn from qualifying purchases. Visit the NASCompares Deal Finder to find the best place to buy this device in your region, based on Service, Support and Reputation - Just Search for your NAS Drive in the Box Below
Need Advice on Data Storage from an Expert?
Finally, for free advice about your setup, just leave a message in the comments below here at NASCompares.com and we will get back to you. Need Help? Where possible (and where appropriate) please provide as much information about your requirements, as then I can arrange the best answer and solution to your needs. Do not worry about your e-mail address being required, it will NOT be used in a mailing list and will NOT be used in any way other than to respond to your enquiry.(Early Access) Minisforum MGA1 7600M XT eGPU Docking Station Review
(Early Access) The Best M.2 SSD NAS To Buy Right Now
(Early Access) My Favourite NAS Releases of 2024
(Inner Circle) Recommended ATX NAS Motherboard Guide - 6 GREAT NAS MOBOs!
(Early Access) Flashstor Gen 2 NAS - SHOULD YOU BUY? (Short Review)
(Early Access) The DREAM Video Editor NAS - Flashstor Gen 2 Review (FS6806X)
Access content via Patreon or KO-FI
OK. Good stuff. But what we need in the US, and other countries China is trying to actively hack, are the methods needed to filter data from going to China. Not how to set up the DS, but rather what sites/ports are used for it to phone home.
REPLY ON YOUTUBE
I think further videos are only warranted if you discover something questionable in other brands
REPLY ON YOUTUBE
Didn’t know where to post this question sorry. I saw a bunch of datto nas on ebay. I’ve never heard you talk about them. What do you know?
REPLY ON YOUTUBE
Re follow up, it would be cool to see this for other companies!
REPLY ON YOUTUBE
Thank for this tedious review.
REPLY ON YOUTUBE
This was very useful information, I have always valued Privacy for me and my family ever since watching the movie Enemy 0f St@te.
REPLY ON YOUTUBE
I think the main goal of NAS is keep as much as possible out of any 3rd party cloud or storages. C2 cloud etc. is nice but not really why to use Synology.
Generally, i think these agreements are just theories, as we see on twitter or facebook incidents, everything is available, once its in any vendor cloud connected to. Synology will be same.
REPLY ON YOUTUBE
After they implement AI, they will collect ALL THE DATAZ. Build your own NAS. Cheaper and better performance per $
REPLY ON YOUTUBE
Thks &;
When I gets my DS1824+ , I’m going to wear my aluminum-foil-hat when using it 😉
REPLY ON YOUTUBE
If I ever see a cookie aggrement popup where I have to individually deselect “legitimate interest”, as if that was a real thing, then I immediately go to another site. I do not ever use such a site. I also thought I was alone in this but it turns out I have seen several people IRL do the same thing.
Fight back against threat actors like google, facebook or apple. ( yes I am aware of using a youcensor account, it is on a isolated junk device )
I have not yet allowed internet access to my synology nas. I need to set up VLAN and such first.
You may not stop evil from entering you technology devices, but you could at least annoy these “intelligence” services and make them work for the protection money they extort from you.
REPLY ON YOUTUBE
I would be much more concerned about my data leaking, if China invaded Tiawan
REPLY ON YOUTUBE
i’ve been contemplating on buying a synology NAS. Watching your videos giving all the different perspectives including this one helps me to make a decision to whehter i should build my own or buy a NAS. So yes, I absolutely think these videos help, despite it being as lengthy as 35 minutes. Keep it up!! 🙂
REPLY ON YOUTUBE
Some people may be legally required by their Government to ensure the security of their data, for example if they’re working with ITAR restricted data.
REPLY ON YOUTUBE
Zero (i will never buy synology due to this).
REPLY ON YOUTUBE
Great new insights, terms & conditions for SynologY! Thanks for sharing. Food for thought.
REPLY ON YOUTUBE