Last Updated — 28 February 2026

Data Policy & Transparency

We believe data responsibility is not optional. This document explains how information is collected, processed, stored, and protected across our infrastructure — with security, accountability, and trust at the core.

Our systems are built on secure, modern cloud architecture designed for performance, encryption, and global availability.

Secure cloud infrastructure

1. Information We Collect

  • • Account identifiers (name, email)
  • • Authentication and session data
  • • Usage analytics & system logs
  • • Device & browser metadata
  • • Content submitted through the platform

2. Why We Process Data

  • • Delivering core functionality
  • • Improving system performance
  • • Abuse & fraud prevention
  • • Security monitoring
  • • Legal compliance obligations

All sensitive data is encrypted in transit using HTTPS and protected through strict infrastructure-level access controls.

3. Security & Protection Measures

Encryption

Data is encrypted in transit using TLS protocols and protected with modern encryption standards.

Access Controls

Strict role-based access policies ensure only authorized personnel can access sensitive information.

Monitoring

Continuous monitoring and automated alerts protect against abnormal system behavior or threats.

4. Data Retention & Deletion

We retain data only for as long as necessary to operate services, fulfill contractual obligations, and meet legal requirements. Users may request deletion subject to compliance requirements.

5. Third-Party Infrastructure

We rely on secure cloud providers and service partners that meet global compliance standards. All third-party processors are contractually obligated to maintain strict confidentiality and data protection controls.

6. Your Rights

  • • Access your personal data
  • • Request correction
  • • Request deletion
  • • Withdraw consent
  • • Data portability (where applicable)

Questions about our data practices?

Contact Our Team