Data protection and Privacy

Your trust is our foundation. Learn how we protect your business data with enterprise‑grade security, transparent policies, and full user control.

AI-robot

Our privacy principles

Data ownership

Your data belongs to you. We never sell, rent, or share your personal or business information.

  • Full data ownership rights
  • No data monetization
  • Clear data usage policies
Transparency

We are fully transparent about the data we collect, how we use it, and who can access it.

  • Clear data collection notices
  • Regular privacy policy updates
  • Open communication channels
User control

You have full control over your data with privacy settings and easy‑to‑use data management tools

  • Granular privacy controls
  • Easy data export
  • Simple deletion process
Legal compliance

We adhere to major privacy regulations including GDPR, CCPA, and other regional privacy laws.

  • GDPR Article 25 compliance
  • Privacy by design
  • Regular compliance audits

Your privacy rights

Under GDPR and other privacy regulations, you have full rights over your personal data.
Right of access

Request a copy of all personal data we hold about you in a portable format.

Right to rectification

Correct any inaccurate or incomplete personal data we process about you.

Right to erasure

Request deletion of your personal data when it is no longer needed for business purposes.

Right to data portability

Transfer your data to another service provider in a machine‑readable format.

Right to object

Object to the processing of your personal data for specific purposes.

Right to restriction

Request restriction of processing of your personal data in certain circumstances.

How your data is protected

Military‑grade encryption and enterprise security measures that protect your business data.

Data encryption
Your data is encrypted with AES‑256 at rest and TLS 1.3 in transit, providing complete protection from unauthorized access.
  • AES‑256 encryption for all stored data
  • TLS 1.3 encryption for all data transfers
  • Zero‑knowledge architecture — we cannot see your data
  • Hardware Security Modules (HSM) for key management
Secure infrastructure
Your data is stored in SOC 2 Type II certified data centers with enterprise‑grade physical and network security.
  • SOC 2 Type II certified data centers
  • 24/7 physical security and monitoring
  • Redundant backups across multiple geographic regions
  • Intrusion detection and prevention systems

Industry certifications

award wing
  • Information Security Management
  • ISO 27001
award wing
award wing
  • Security and Availability
  • SOC 2 Type II
award wing
award wing
  • Privacy Compliance
  • GDPR
award wing
award wing
  • Payment Security
  • PCI DSS
award wing

What data we collect

Examples include:
  • Name, email address
  • Company information
  • Billing address
  • Payment methods
Data retention:
  • Stored for the duration of your account plus 7 years for legal compliance
Examples include:
  • Invoices and billing
  • Customer information
  • Financial data
  • Business reports
Data retention:
  • Retained for as long as you maintain your account, with backups kept for 90 days after deletion
Examples include:
  • Feature usage statistics
  • Performance metrics
  • Error logs
  • Session data
Data retention:
  • Aggregated data retained up to 24 months to improve the service
Examples include:
  • Support tickets
  • Chat transcripts
  • Email correspondence
  • Call records
Data retention:
  • Retained for 3 years to preserve support history and improve service quality
Schedule a call