Ezumyn Corp ("we," "our," or "us") is committed to protecting your privacy. This policy explains how we collect, use, store, and protect information when you interact with our services, website, or custom software solutions.
1. Information We Collect
Information You Provide
- Contact information: Name, email address, phone number, company name
- Project information: Requirements, technical specifications, workflow details
- Communication: Emails, messages, meeting notes, feedback
Information Collected Automatically
- Website usage: IP address, browser type, pages visited, time spent
- Cookies: Session cookies for form functionality; no tracking or advertising cookies
- System logs: Access logs for security and troubleshooting purposes
Information from Custom Solutions
When we build custom software for clients, data collection is determined by the specific solution and documented in project agreements. We only access client data when necessary for development, testing, support, or maintenance—and only with explicit authorization.
2. How We Use Your Information
- Service delivery: Providing automation solutions, consulting, and technical support
- Communication: Responding to inquiries, project updates, support requests
- Project management: Planning, development, testing, deployment, documentation
- Legal obligations: Compliance with applicable laws, contracts, and regulations
- Business operations: Invoicing, accounting, internal record-keeping
We do not:
- Sell or rent your personal information to third parties
- Use your data for advertising or marketing to others
- Share client data between projects or organizations
- Use tracking pixels or behavioral advertising cookies
3. Data Storage and Security
Storage Practices
- Data stored on secure servers in the United States
- Encrypted in transit (TLS/SSL) and at rest
- Regular backups with encryption
- Access restricted to authorized personnel only
Security Measures
- Strong access controls and authentication
- Regular security updates and patches
- Logging and monitoring of system access
- Secure development practices and code reviews
- Incident response procedures
Data Retention
- Contact information: Retained while relationship is active; deleted upon request
- Project data: Retained per contract terms; typically 1-3 years post-project
- Financial records: Retained per legal requirements (typically 7 years)
- System logs: Retained 90 days unless needed for security investigation
4. Third-Party Services
We use limited third-party services to operate our business:
- Email services: For business communication
- Cloud hosting: For infrastructure and data storage
- Payment processing: For invoicing and payments (we do not store credit card information)
- Project management tools: For collaboration and documentation
We select vendors that maintain appropriate security and privacy standards. We do not share more information than necessary for the specific service.
5. Cookies and Tracking
Our website uses minimal cookies:
- Essential cookies: Session management for contact forms
- No tracking cookies: We do not use Google Analytics, Facebook Pixel, or similar tracking
- No advertising cookies: We do not serve ads or use ad networks
You can disable cookies in your browser settings without affecting core website functionality.
6. Client-Specific Solutions
For custom automation and software solutions we build:
- Data processing is defined in project agreements
- You retain ownership of your data
- We act as a data processor, not data controller
- Compliance requirements (HIPAA, FERPA, etc.) documented in contracts
- Access limited to specific authorized personnel
- Data access logs maintained for audit purposes
7. Your Rights
You have the right to:
- Access: Request what information we have about you
- Correction: Request correction of inaccurate information
- Deletion: Request deletion of your information (subject to legal retention requirements)
- Data portability: Request a copy of your data in machine-readable format
- Opt-out: Unsubscribe from communications at any time
- Questions: Ask questions about how we handle your data
To exercise these rights, contact us at privacy@ezumyn.com
8. Compliance
HIPAA (Healthcare)
For healthcare clients, we sign Business Associate Agreements (BAAs) and implement HIPAA-compliant safeguards including PHI encryption, access controls, audit logging, and breach notification procedures.
FERPA (Education)
For education clients, we comply with FERPA requirements for handling student records, including appropriate security measures, access restrictions, and data use limitations.
State Privacy Laws
We comply with applicable state privacy laws including California Consumer Privacy Act (CCPA) and similar regulations.
9. Children's Privacy
Our services are not directed to children under 13. We do not knowingly collect information from children. If we learn we have collected information from a child under 13, we will delete it immediately.
10. International Data Transfers
We are based in Florida, USA, and our servers are located in the United States. If you are accessing our services from outside the US, your information will be transferred to and processed in the United States.
11. Changes to This Policy
We may update this privacy policy to reflect changes in our practices or legal requirements. Material changes will be communicated via email to active clients. The "Last updated" date at the top indicates when changes were made.
12. Contact Us
Questions, concerns, or requests about this privacy policy: