Privacy
& Data Policy
Our commitment to safeguarding your business data and operational intelligence.
1. Introduction
2. Information Collection
- Personal Information: We collect business contact information, such as names, email addresses, and company details, necessary to manage our projects and communications.
- Technical Data: We may collect IP addresses, browser types, and usage statistics to monitor platform performance and enhance user experience.
- Project-Specific Data: Any business logic, documentation, or specifications shared with us for the purpose of developing your internal systems.
3. How We Use Data
4. Confidentiality
5. Security Measures
Access Control
Access to client data is restricted to authorized personnel who require it to perform their duties. We use secure password management and authentication systems.
Data Encryption
Sensitive information is encrypted both in transit and at rest using standard industry protocols to prevent unauthorized access.
6. Third-Party Integrations
We utilize best-in-class providers for payments (Stripe), communication, and specialized development tools. These entities maintain their own rigorous security standards. We vet our sub-processors annually for security compliance.
7. Your Rights & Data Portability
You retain full ownership of your data. You have the right to access, rectify, or request erasure of your personal information. Given our role as a developer of internal systems, we also support data portability requests to ensure you are never 'locked in' to our services.
Inquiries
If you have specific concerns regarding data security, sub-processors, or our confidentiality protocols, please reach out to our team.
Contact Security Lead