Only 2 spots left this month

PRIVACY POLICY

Last Updated: December 2025

We aggressively protect your data. This policy outlines our protocols for data collection, usage, and defense.


1. DATA COLLECTION PROTOCOLS

We collect minimal data required to provide our services. This includes: (a) Information you voluntarily provide (Name, Email, Project Specs) via our configurator or contact forms; (b) Technical data (IP address, Browser Type) automatically collected for security and analytics protocols.

2. UTILIZATION OF INTELLIGENCE

Your data is deployed for: (a) Executing your digital architecture projects; (b) Communicating status updates and strategic proposals; (c) Internal analytics to optimize our build quality; (d) Legal compliance and invoice generation.

3. TRACKING TECHNOLOGIES

We deploy cookies to maintain session states and analyze traffic flow. You have full command over non-essential cookies via our Data Protocol settings. We do not use aggressive tracking for third-party resale.

PREFERENCES

ESSENTIAL

Required for the site to function. Cannot be disabled.

ANALYTICS

Helps us improve our build quality.

MARKETING

Targeted advertising protocols.

4. DATA RETENTION

We retain client data only for the duration of the engagement + 5 years for tax/legal auditing purposes. Transient data (analytics) is anonymized or purged after 14 months.

5. YOUR RIGHTS

Under GDPR/CCPA protocols, you have the right to: (a) Request access to your data file; (b) Demand rectification of errors; (c) Request total erasure ('Right to be Forgotten'); (d) Restrict processing. Contact us to initiate these protocols.

6. SECURITY MEASURES

We employ industry-standard encryption (TLS/SSL) for data in transit and at rest. Access to client data is strictly limited to authorized personnel with active security clearance.

7. THIRD PARTY PROCESSORS

We do not sell data. We share necessary data with trusted processors for specific functions: Vercel (Hosting), Stripe (Payments), and Google Analytics (Traffic Analysis). All partners are bound by strict DPA protocols.