Last Updated — 28 February 2026
Data Policy & Transparency
We believe data responsibility is not optional. This document explains how information is collected, processed, stored, and protected across our infrastructure — with security, accountability, and trust at the core.
Our systems are built on secure, modern cloud architecture designed for performance, encryption, and global availability.
1. Information We Collect
- • Account identifiers (name, email)
- • Authentication and session data
- • Usage analytics & system logs
- • Device & browser metadata
- • Content submitted through the platform
2. Why We Process Data
- • Delivering core functionality
- • Improving system performance
- • Abuse & fraud prevention
- • Security monitoring
- • Legal compliance obligations
All sensitive data is encrypted in transit using HTTPS and protected through strict infrastructure-level access controls.
3. Security & Protection Measures
Encryption
Data is encrypted in transit using TLS protocols and protected with modern encryption standards.
Access Controls
Strict role-based access policies ensure only authorized personnel can access sensitive information.
Monitoring
Continuous monitoring and automated alerts protect against abnormal system behavior or threats.
4. Data Retention & Deletion
We retain data only for as long as necessary to operate services, fulfill contractual obligations, and meet legal requirements. Users may request deletion subject to compliance requirements.
5. Third-Party Infrastructure
We rely on secure cloud providers and service partners that meet global compliance standards. All third-party processors are contractually obligated to maintain strict confidentiality and data protection controls.
6. Your Rights
- • Access your personal data
- • Request correction
- • Request deletion
- • Withdraw consent
- • Data portability (where applicable)
