Privacy Policy

Individual encryption keys. Complete data isolation. Professional security practices.

Last updated: December 2024

Security-First Privacy Protection

ContextVault is built with individual company encryption keys, ensuring complete data isolation. Your information is protected by enterprise-grade security designed for growing companies.

Individual
Encryption Keys
Complete
Data Isolation
Professional
Security Standards

1. Introduction

Eikon Solutions ("we," "us," or "our") operates ContextVault, a professional AI context management platform. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our platform and services.

Your privacy and data security are fundamental to our service. We implement individual company encryption keys and enterprise-grade security practices to ensure complete protection of your information.

2. Information We Collect

Information You Provide Directly

  • Account Registration: Name, email address, company information, role/title
  • AI Operating System Builder: Business information, communication samples, workflow details
  • Platform Content: AI contexts, team collaboration data, custom configurations
  • Contact Forms: Contact information and inquiry details
  • Payment Information: Billing details processed securely through third-party processors

Automatically Collected Information

  • Usage Analytics: Platform interaction patterns, feature usage, performance metrics
  • Technical Data: IP address, browser type, device information, access timestamps
  • Security Logs: Authentication events, access patterns for security monitoring

Information from Third Parties

  • Integration Data: Information from connected services (MCP, n8n workflows)
  • Professional Networks: Public business information for account verification

3. How We Use Your Information

Core Service Provision

  • Providing systematic AI context management platform services
  • Generating personalized AI Operating Systems through our assessment tool
  • Facilitating team collaboration and context sharing within your organization
  • Supporting enterprise workflow integrations and automation

Professional Services

  • Delivering consulting services related to systematic context engineering
  • Providing technical support and platform guidance
  • Developing custom integrations for enterprise clients
  • Training and onboarding for systematic AI implementation

Platform Improvement

  • Analyzing usage patterns to improve platform performance and features
  • Conducting security monitoring and threat detection
  • Developing new capabilities based on systematic methodology
  • Ensuring optimal resource allocation and system scaling

4. Data Protection and Security

Individual Company Encryption

Each company account receives unique encryption keys, ensuring complete data isolation. Your information cannot be accessed by other companies or unauthorized parties.

Technical Security Measures

  • Encryption in Transit: All data transmission uses TLS 1.3 encryption
  • Encryption at Rest: Database and file storage encrypted with AES-256
  • Access Controls: Role-based permissions and multi-factor authentication
  • Network Security: Firewall protection and intrusion detection systems
  • Regular Audits: Security assessments and penetration testing
  • Backup Systems: Encrypted, geographically distributed backups

Operational Security

  • Employee background checks and security training
  • Least-privilege access principles for all system access
  • Comprehensive audit logging and monitoring
  • Incident response procedures and notification protocols

5. Data Sharing and Disclosure

Data Isolation Promise

We do not share, sell, or rent your individual company data to third parties. Individual encryption keys ensure your information remains completely isolated.

Limited Disclosure Circumstances

  • Service Providers: Encrypted data processing by verified vendors (hosting, payment processing)
  • Legal Requirements: Compliance with valid legal process, court orders, or government requests
  • Safety Protection: Preventing fraud, abuse, or threats to user or public safety
  • Business Transfers: Corporate transactions (with continued privacy protection guarantees)

Aggregated Analytics

We may use aggregated, anonymized data for research, platform improvement, and industry insights. This data cannot be traced back to individual companies or users.

6. Data Retention and Deletion

Active Account Data

We retain your data while your account is active and for as long as necessary to provide services, comply with legal obligations, resolve disputes, and enforce agreements.

Account Termination

  • 30-day grace period for data export and account recovery
  • Complete data deletion within 90 days of confirmed termination
  • Secure destruction of individual encryption keys
  • Anonymization of any required audit trail data

Legal Retention

Some data may be retained longer to comply with legal, regulatory, or tax requirements, but always with the same security protections and individual encryption.

7. Your Privacy Rights

Access and Control

  • Data Access: Request copies of your personal information
  • Data Correction: Update or correct inaccurate information
  • Data Deletion: Request deletion of your personal information
  • Data Portability: Export your data in structured formats
  • Processing Restriction: Limit how we process your information

Communication Preferences

  • Opt-out of marketing communications (service communications may continue)
  • Adjust notification settings within your account
  • Unsubscribe from AI Operating System Builder follow-ups

Exercising Your Rights

To exercise these rights, contact us at privacy@contextvault.io. We will respond within 30 days and may require verification of your identity for security purposes.

8. International Data Transfers

ContextVault primarily operates in the United States. If you access our services from other countries, your information may be transferred to, stored, and processed in the United States.

We ensure appropriate safeguards are in place for international transfers, including standard contractual clauses and our robust individual encryption key system that protects your data regardless of location.

9. Third-Party Services and Integrations

Service Providers

  • Cloud Infrastructure: Secure hosting with verified providers
  • Payment Processing: Stripe for secure billing (PCI DSS compliant)
  • Email Services: Resend for transactional communications
  • Analytics: Privacy-focused usage analytics

Platform Integrations

Our MCP and n8n integrations are designed to work within your individual encryption boundary. External integrations only access data you explicitly authorize, and all connections maintain the same security standards.

Third-Party Policies

While we carefully vet our service providers, each has their own privacy policies. We recommend reviewing the privacy policies of any external services you choose to connect.

10. Children's Privacy

ContextVault is designed for business use and is not intended for children under 13. We do not knowingly collect personal information from children under 13. If we learn we have collected such information, we will delete it immediately.

11. Changes to This Privacy Policy

We may update this Privacy Policy to reflect changes in our practices, technology, legal requirements, or other factors. We will notify you of material changes via email or platform notification at least 30 days before they take effect.

Your continued use of ContextVault after changes become effective constitutes acceptance of the updated Privacy Policy.

12. Contact Information

For questions about this Privacy Policy or our privacy practices, contact us:

Privacy Officer
Eikon Solutions
Email: privacy@contextvault.io
Subject: Privacy Policy Inquiry
Website: contextvault.io

Compliance and Future Certifications

ContextVault's architecture is designed for compliance with major privacy regulations:

Current Practices

  • • GDPR-compliant data processing
  • • CCPA privacy rights support
  • • SOC 2 Type II preparation
  • • Industry-standard compliance

Professional Standards

  • • Individual encryption keys
  • • Enterprise-grade security
  • • Professional audit trails
  • • Systematic data governance