Privacy Policy
How Cynch handles information in connection with its websites and services.
Scope
This policy describes how Cynch handles information in connection with its websites and services.
Cynch is designed to preserve continuity between decisions and work. It does not exist to profile individuals or monetize data.
Data Collection
Cynch practices data minimization by design.
We collect only what is necessary to provide continuity and context preservation services.
Cynch observes relationships and signals. It does not claim ownership of customer content. This may include:
- Organization and account identifiers (org name, admin email, billing contact)
- Authentication and access data (login events, role assignments)
- System connection metadata (connected provider type, account identifiers, scopes granted)
- Work object metadata (IDs, timestamps, titles/filenames where applicable, links back to source systems)
- Relationship and continuity metadata (edges between objects, derived relationship identifiers, contradiction/drift markers)
- Configuration and preference data (retention settings, scope allowlists)
- Security and audit logs (request logs, access logs, error logs)
Data Usage
Collected data is used solely to:
- Provide continuity detection and surfacing
- Preserve and reference relationships between decisions and execution artifacts
- Identify contradictions, drift, and unresolved dependencies at the relationship layer
- Operate, maintain, and secure the service (authentication, abuse prevention, reliability)
- Comply with legal obligations and enforce contractual terms
We do not:
- Sell customer data
- Use customer data for advertising or marketing targeting
- Build behavioral profiles of individuals
- Monitor activity outside customer-authorized systems and granted scopes
- Access content beyond the permissions provided by the source systems
Data Protection
We apply administrative, technical, and organizational safeguards appropriate to the nature of the data processed.
This includes:
- Access controls and least-privilege enforcement
- Encryption in transit and at rest (where supported)
- Logical separation of customer environments
- Audit logging of administrative access and critical actions
- Secure development and change management practices
- Incident detection and response procedures
No system is guaranteed to be risk-free.
Data Sharing
Cynch does not share data with third parties except:
- Service providers used to operate the service (hosting, storage, monitoring, email delivery)
- Professional advisors as needed (legal, accounting)
- Legal or regulatory requirements (lawful requests, compliance obligations)
- A corporate transaction (merger, acquisition, or asset sale), subject to continued protection of customer data
Service providers are bound by confidentiality and security obligations.
Data Retention
Data is retained only for as long as necessary to provide the service and in accordance with plan configuration.
Retention limits are enforced automatically. Data may be deleted upon request, subject to contractual and legal requirements.
Your Rights
Depending on jurisdiction, you may have the right to:
- Access the personal information we hold about you
- Request correction of inaccurate information
- Request deletion, subject to legal and contractual requirements
- Request export of information (where applicable)
- Object to or restrict certain processing (where applicable)
Changes to This Policy
We may update this policy as the system evolves.
Material changes will be reflected by an updated effective date. Continued use constitutes acceptance of the revised policy.
Contact
For legal or data rights inquiries, see Contact.