Privacy Policy
Transparency is core to our philosophy. This document explains how we handle your data.
1. Data We Collect
- • Authentication data (API keys, session tokens)
- • Usage analytics for system performance
- • IP address and geo-location metadata
- • Security logs for threat detection
2. How We Use Your Data
We use your data to:
- • Provide requested services (endpoint access, deployment)
- • Enhance security via threat pattern recognition
- • Maintain compliance with SOC 2 Type II standards
- • Optimize network performance and routing
3. Data Sharing
Your data is never sold. Access is strictly limited to:
- • Security teams with role-based access control
- • Automated compliance monitoring systems
- • Global edge node health monitoring
4. Your Rights
You have the right to:
- • Access your data through our audit API
- • Request deletion of your account and its data
- • Opt-out of anonymous performance metrics
Requests can be made via our protected API endpoint.