1. Scope
This policy covers personal data collected through this website, infrastructure assessment intake, and any controlled applications or forms we operate.
2. Information we collect
We may collect limited categories of information, including:
- Contact details (e.g., name, email address) submitted through forms.
- Business/professional information you provide during assessments or applications.
- Technical and security data (e.g., IP address, device/browser details, event logs) used for basic security and operational analytics.
3. How we use information
We use information strictly to:
- Evaluate and respond to infrastructure assessment requests.
- Review talent applications and maintain internal review records.
- Communicate about engagements, follow-ups, and service delivery.
- Protect the website and systems from abuse and unauthorized access.
4. What we do not do
- We do not sell or rent personal data.
- We do not build advertising profiles or run behavioral ad tracking.
- We do not intentionally collect sensitive personal data unless you explicitly provide it for a clear purpose.
5. Cookies & analytics
We may use minimal cookies or analytics strictly for performance, security, and understanding general usage patterns.
- No advertising cookies.
- No cross-site tracking intended.
- You can disable cookies via your browser settings, though some site functions may be affected.
6. Data storage & security
We apply reasonable technical and organizational measures designed to reduce risk of unauthorized access, alteration, or loss.
- Access is limited to those who need it for delivery, review, or security operations.
- Credentials and sensitive operational details should be handled via secure channels (not public chat or informal messaging).
- No system is 100% secure; disciplined access control and logging reduce exposure.
7. Data retention
We retain information only as long as necessary for operational and legal purposes, including:
- Assessment and application data retained for internal evaluation and recordkeeping.
- Deletion requests honored where feasible unless retention is required by law or necessary for legitimate operational needs (e.g., security logs).
8. Your rights
Depending on your jurisdiction, you may have rights to access, correct, delete, or restrict certain processing of your personal data.
Requests can be submitted through the Request Assessment pathway so they can be routed and tracked.
9. Third-party services
Some services (hosting, email, analytics) may be provided by third parties. Their handling of data is governed by their own privacy policies.
We select providers that align with a minimal-data posture and reasonable security expectations.
10. Updates
We may update this Privacy Policy from time to time. Updates apply prospectively and will be reflected on this page with a revised effective date.
11. Contact
Privacy-related inquiries should be submitted through our controlled intake so they can be routed appropriately and handled with traceability.
Operational note: Do not include passwords, access tokens, or secrets in any privacy inquiry.