Privacy Policy

Data Sovereignty Protocol • v1.6

Return to Base
Mission Active
Last Calibrated: May 20, 2024

Welcome to **Flow-Day**. Your privacy is our primary tactical directive. This policy explains how we collect, use, and safeguard your information across our website, mobile application, and related services.

1. Information Acquisition

Personal Information

We collect personally identifiable data including full name, email address, billing details, and account login credentials via Firebase Authentication and secure payment processors.

Telemetry Data

Device identifiers, IP addresses, browser types, and session duration are logged to optimize system performance and ensure cluster integrity.

2. Strategic Utilization

Collected data is utilized strictly for the following operational purposes:

  • Management of individuated user registries
  • Execution of subscription and payment protocols
  • Deployment of Genkit-powered AI performance insights
  • System performance monitoring and error resolution
  • Security audit logging and fraud prevention

3. Data Sovereignty & Rights

We believe in absolute data ownership. Depending on your operational sector (location), you maintain the following rights over your registry:

Access & Export

Request a full transcript of your data silos at any time.

Rectification

Correct any inaccuracies in your identity or operational logs.

Purge Protocol

Request total erasure of your registry through the System Settings.

4. Global Compliance

GDPR (European Union)

Processing is based on contractual necessity and legitimate interest. We ensure data portability and the right to lodge complaints with supervisory authorities.

CCPA (California)

We do **not** sell your personal data. California residents have the right to opt-out of data sharing and request a record of collected data categories.

5. Financial Security

All payment data is processed securely via third-party providers (e.g., Stripe, Google Pay). Flow-Day does **not** store full card numbers or sensitive CVV codes on our own servers. Encryption protocols ensure your capital nodes remain secure during transmission.

6. Cookies & Tracking

We utilize cookies to remember your HUD preferences and analyze operational behavior. This data helps us improve the user experience. You can calibrate cookie permissions through your terminal browser settings.