Privacy Policy
Detailed policy describing what data we process, why we process it, how long we retain it, and what rights users have.
Information we collect
We collect account and operational data required to deliver and secure the service.
- Identity and profile data such as name, email, and account IDs.
- Workspace and membership configuration details.
- Billing records, payment events, and transaction metadata.
- Support communications and issue-reporting context.
Usage and technical telemetry
We process API-related telemetry to maintain reliability, detect abuse, and improve operations.
- Request timestamps, endpoint metadata, and status outcomes.
- Usage aggregates for quotas, cost tracking, and analytics.
- Security logs for anomaly detection and incident response.
- Performance metrics such as latency and error distributions.
Why we process data
Data processing supports service delivery, account integrity, security, compliance, and support.
- Authenticate users and authorize workspace operations.
- Process billing and maintain financial integrity.
- Investigate incidents, outages, and abuse patterns.
- Provide technical support and customer communication.
Data sharing and third parties
We share data only when operationally required, legally necessary, or explicitly requested by users.
- Payment providers process transactions under their own policies.
- Infrastructure providers may process operational metadata.
- Legal disclosures may occur when required by applicable law.
- We do not sell personal data for unrelated advertising purposes.
Retention and deletion
Retention periods vary by data type and legal, security, or operational requirements.
- Logs are retained only for necessary operational windows.
- Billing records are retained for audit and compliance needs.
- Inactive credentials should be revoked and cleaned up regularly.
- Deletion requests are handled subject to legal obligations.
Security controls
We apply layered controls to protect account and operational data.
- Least-privilege access practices for internal systems.
- Credential handling controls and periodic key rotation guidance.
- Monitoring and alerting for suspicious access patterns.
- Incident response procedures for security events.
User rights and requests
Users can request account-related assistance regarding stored personal data.
- Request correction of inaccurate account information.
- Request access to data associated with your account.
- Request deletion where legally and technically applicable.
- Use official support channels for privacy-related requests.
Policy updates and contact
This policy may be updated as services evolve or legal requirements change.
- The latest version is published on this page.
- Material changes are reflected in updated dates.
- Questions can be submitted through contact and support channels.
- Continued service usage follows the latest published policy.