1. What we collect
When you visit the site, submit a contact form, request partnership access, try the developer entry points, or interact with public API preview environments, we may collect information you provide directly, such as your name, email, company, role, phone number, use-case description, and communication content.
We also collect technical information necessary to operate the service, including timestamps, request paths, device and browser details, referral pages, error logs, form metadata, and network events relevant to security monitoring. For developer entry points and preview environments, we may also record request parameters, response status, and debugging logs for troubleshooting, auditing, and abuse prevention.
2. How we use the information
We use this information to respond to your requests, assess partnership or product fit, schedule demos, improve site content, maintain service reliability, and support integration troubleshooting, rate control, and audit trails for developer workflows.
If you contact sales, partnerships, investors, or developer relations, we use the information you submit for internal routing and follow-up by the relevant team. We do not sell your information to third-party advertising networks.
3. Storage, sharing, and retention
We retain data for as long as necessary to provide the service, meet legal obligations, handle security incidents, or support legitimate business communication. Retention periods vary by data type, including contact submissions, access logs, audit trails, and integration debugging records.
We may share necessary data with vendors that provide infrastructure, email delivery, logging, hosting, or security monitoring, but only to the minimum extent required for those services.
4. Your choices and rights
You may contact us to request access to, correction of, or deletion of personal information you submitted directly to us, and you may opt out of certain follow-up communications. Where applicable law grants additional rights, we will handle those requests within a reasonable period.
For developer testing and public preview environments, do not submit highly sensitive, production-grade, or regulated data unless we have expressly agreed in writing to the relevant control measures.
5. Security and policy updates
We protect system integrity and data security through access controls, audit logging, boundary isolation, contracts, tests, gates, and operational monitoring. No system can promise zero risk, but we continuously improve our controls.
If this policy changes materially, we will update the effective date shown on this page.