Privacy Protocol

Privacy by default.
Transparency by design.

We collect the minimum signals needed to run automation. Every touchpoint is visible, controllable, and revocable.

Minimum collection

Only what runs the mission

No third-party ad tracking

Purpose limited

Delivery + safety only

Never sell or rent

Always exportable

One-click access & deletion

Requests prioritized

Last updated: 2024-10-01

Signal ledger

  • Account basics: email, roles, sign-in events
  • Usage behavior: feature clicks, task logs, error tracing
  • Content assets: copy, media, templates you authorize
  • Security signals: device info, IP, anomaly detection

We never

  • Sell your data to advertisers or brokers
  • Publish your content without permission
  • Build profiles unrelated to the service

Design principles

Privacy is a product feature

We treat privacy as a system rule, not a legal footnote. Every action follows minimization, visibility, and revocability.

Minimal

Collect only the essentials

Scopes are tied to automation tasks; anything else stays out.

Visible

See the full data path

Logs and settings show what enters, how it's used, and what leaves.

Revocable

Access you can withdraw

Delete data, disable features, or export at any time.

Collection scope

What we collect

Only what supports accounts, tasks, and delivery.

Account & identity

Registration info, roles, auth events

Used for login and permissions

Usage & behavior

Access logs, clicks, task runs

Used for delivery and debugging

Content & assets

Copy, media, templates you provide

Used to generate and publish

Billing & compliance

Payments, plans, invoices

Used for billing and compliance

How we use data

Purpose-limited processing

Every action is tied to delivery, security, or compliance.

  1. 1

    Run automation

    Execute tasks, interactions, and content generation.

  2. 2

    Keep it safe

    Detect anomalies, prevent abuse, protect accounts.

  3. 3

    Improve experience

    Analyze bottlenecks and refine flows.

  4. 4

    Support you

    Respond to requests and service updates.

Safety & retention

Protection and retention

We apply industry-standard safeguards and keep data only as long as needed.

Encryption in transit & at rest

Protect data during transfer and storage

Infrastructure is scoped to least-privilege

Access isolation

Role-based controls limit internal visibility

Only authorized staff can access

Audit & alerts

Critical actions are logged and monitored

Reduces misuse and risk

Retention principles

  • We keep data only to deliver services, fulfill contracts, or meet legal requirements
  • Deletion requests are handled within a reasonable time window
  • Backups rotate on schedule to ensure eventual removal

Your rights

You stay in control

Clear entry points for access, correction, and deletion.

Access & export

Retrieve a copy of your data

Correction & updates

Fix inaccurate or outdated details

Deletion & withdrawal

Disable features and remove data

Processing limits

Restrict usage in certain cases

Questions & complaints

Reach us via the contact page

We respond within a reasonable time.

Need more detail?

We will explain every field and data flow.