Privacy Policy
Your privacy is fundamental to our mission. Learn how we protect and handle your data in our AI content generation platform.
Privacy at a Glance
What We Collect
- Account and billing information
- Content inputs and generated outputs
- Usage analytics and performance data
- Technical data for security purposes
How We Protect It
- End-to-end encryption (TLS 1.3 + AES-256)
- Zero-knowledge architecture for content
- Regular security audits and compliance
- Strict access controls and monitoring
Data We Collect
Account Information
Information you provide when creating an account
Examples
- Email address
- Name
- Company information
- Billing details
Retention
7 years after account closure
Purpose
Account management and billing
Content Data
Content inputs and generated outputs
Examples
- Prompts and inputs
- Generated content
- Template preferences
- Style profiles
Retention
30 days (configurable up to 7 years for Enterprise)
Purpose
Content generation and improvement
Usage Analytics
How you interact with our platform
Examples
- API usage patterns
- Feature utilization
- Performance metrics
- Error logs
Retention
2 years
Purpose
Service improvement and optimization
Technical Data
Technical information about your usage
Examples
- IP addresses
- Browser information
- Device identifiers
- Session data
Retention
1 year
Purpose
Security and fraud prevention
How We Use Your Data
Primary Uses
- Provide AI content generation services
- Process billing and manage accounts
- Improve our AI models and services
- Provide customer support
- Ensure security and prevent fraud
We Never
- Sell your personal data to third parties
- Use your content for advertising
- Share data without your consent
- Train models on your proprietary content
- Store content longer than necessary
Security Measures
Encryption in Transit
All data transmission uses TLS 1.3 encryption
Encryption at Rest
AES-256 encryption for all stored data
Access Controls
Role-based access with multi-factor authentication
Regular Audits
SOC 2 Type II compliance and regular security assessments
Data Isolation
Customer data is logically and physically isolated
Incident Response
24/7 security monitoring and incident response team
AI-Specific Privacy Considerations
Content Processing
Your content inputs are processed by our AI models to generate outputs. We use a zero-knowledge architecture where possible, meaning our systems can process your content without retaining human-readable copies.
Model Training
We may use aggregated, anonymized usage patterns to improve our models, but we never use your specific content or proprietary information for training without explicit consent.
Third-Party AI Services
When using third-party AI services, we ensure they meet our privacy standards and have appropriate data processing agreements in place. Enterprise customers can opt for on-premises or private cloud deployments.
Your Rights
Right to Access
Request a copy of your personal data
How to Exercise This Right
Contact support or use the data export feature in your account settings
Right to Rectification
Request correction of inaccurate personal data
How to Exercise This Right
Update information in your account settings or contact support
Right to Erasure
Request deletion of your personal data
How to Exercise This Right
Use account deletion feature or contact support for specific data deletion
Right to Portability
Receive your data in a machine-readable format
How to Exercise This Right
Use the data export feature in your account settings
Right to Restriction
Request limitation of processing of your data
How to Exercise This Right
Contact support to discuss processing restrictions
Right to Objection
Object to processing based on legitimate interests
How to Exercise This Right
Contact support to exercise your right to object
Questions About Privacy?
Data Protection Officer
Response time: Within 72 hours
General Privacy Inquiries
Response time: Within 24 hours
Policy Updates
Version 3.0
Enhanced AI-specific privacy provisions
Version 2.1
Updated data retention policies
Version 2.0
GDPR compliance and user rights expansion