Privacy Policy

Transparency is core to our philosophy. This document explains how we handle your data.

1. Data We Collect

  • • Authentication data (API keys, session tokens)
  • • Usage analytics for system performance
  • • IP address and geo-location metadata
  • • Security logs for threat detection

2. How We Use Your Data

We use your data to:

  • • Provide requested services (endpoint access, deployment)
  • • Enhance security via threat pattern recognition
  • • Maintain compliance with SOC 2 Type II standards
  • • Optimize network performance and routing

3. Data Sharing

Your data is never sold. Access is strictly limited to:

  • • Security teams with role-based access control
  • • Automated compliance monitoring systems
  • • Global edge node health monitoring

4. Your Rights

You have the right to:

  • • Access your data through our audit API
  • • Request deletion of your account and its data
  • • Opt-out of anonymous performance metrics

Requests can be made via our protected API endpoint.