Privacy
& Data Policy

Our commitment to safeguarding your business data and operational intelligence.

Last Updated: February 18, 2025

1. Introduction

Innerstack ("we," "our," or "us") is committed to protecting the privacy and security of the information you share with us. This Privacy Policy explains how we collect, use, and safeguard your data when you engage with our services. We prioritize data protection as a core part of our professional relationship with our clients.

2. Information Collection

  • Personal Information: We collect business contact information, such as names, email addresses, and company details, necessary to manage our projects and communications.
  • Technical Data: We may collect IP addresses, browser types, and usage statistics to monitor platform performance and enhance user experience.
  • Project-Specific Data: Any business logic, documentation, or specifications shared with us for the purpose of developing your internal systems.

3. How We Use Data

The data we collect is used strictly for the following purposes: delivering and improving our technology services, providing technical support, processing payments, and complying with legal obligations. We do not sell or share your data with third parties for marketing purposes.

4. Confidentiality

We understand the sensitive nature of the information we handle, including API keys, database access, and proprietary workflows. Innerstack maintains strict confidentiality protocols to ensure that your business infrastructure and intellectual property remain protected at all times.

5. Security Measures

Access Control

Access to client data is restricted to authorized personnel who require it to perform their duties. We use secure password management and authentication systems.

Data Encryption

Sensitive information is encrypted both in transit and at rest using standard industry protocols to prevent unauthorized access.

6. Third-Party Integrations

We utilize best-in-class providers for payments (Stripe), communication, and specialized development tools. These entities maintain their own rigorous security standards. We vet our sub-processors annually for security compliance.

7. Your Rights & Data Portability

You retain full ownership of your data. You have the right to access, rectify, or request erasure of your personal information. Given our role as a developer of internal systems, we also support data portability requests to ensure you are never 'locked in' to our services.

Inquiries

If you have specific concerns regarding data security, sub-processors, or our confidentiality protocols, please reach out to our team.

Contact Security Lead