TECHNICAL VALIDATION SYSTEMS

Privacy Policy

Our commitment to rigorous data integrity extends to how we handle your information. This document outlines our technical protocols for data processing and storage.

info

Note: Draft legal copy. Final version should be reviewed by counsel before publication.

01. OVERVIEW

Introduction

Last Updated: October 24, 2023

CiteScale operates a technical validation and citation repair platform. This Privacy Policy describes how CiteScale ("we", "us", or "our") collects, uses, and protects information when you access our platform, documentation, and technical journals. We prioritize the structural integrity of your content and the privacy of your operational data.


02. INPUTS

Data Collection

We collect information necessary to provide technical validation services, including:

  • check_circle Account Information: Name, professional email address, and organizational affiliation.
  • check_circle Usage Data: API request logs, interaction metrics within the content repair workspace, and validation frequency.

03. LOGIC

Audit Data Processing

When you submit content for validation, our system processes the text to identify citation gaps and factual inconsistencies.

ENCRYPTION STATUS AES-256 ACTIVE

04. INTEGRATIONS

CMS Access & Credentials

If you utilize our CMS integration features, we require temporary access tokens. These credentials are encrypted at rest and never stored in plain text. CiteScale only requests the minimum "write" permissions required to push repaired citations back to your content management system.

05. OUTPUTS

Reports & Generated Content

Validation reports and repaired content generated by CiteScale are proprietary to your account. We do not use your private content to train shared machine learning models without explicit, opt-in consent through a separate Data Contribution Agreement.

06. MEASUREMENT

Analytics

We use internal analytics to monitor platform performance and identify "low-confidence" validation zones. This helps us refine our algorithms to ensure editorial precision. These metrics are anonymized and aggregated.

07. ECOSYSTEM

Third-Party Processors

CiteScale engages a limited number of sub-processors to maintain our infrastructure:

INFRASTRUCTURE AWS (US-East)
AUTHENTICATION Auth0 Systems

08. PERSISTENCE

Data Retention

We retain operational data as long as your account is active. Transactional logs are purged after 90 days of inactivity. Content submitted for one-off validation is deleted from our cache within 24 hours of report generation.

09. RIGHTS

Data Deletion

Users may request full account deletion via the platform settings. Upon request, all associated PII and content history will be purged from our production databases within 30 days, subject to regulatory backup requirements.

10. FORTIFICATION

Security Measures

We employ a "Security by Design" architecture, including:

  • TLS 1.3 IN TRANSIT
  • SOC2 TYPE II COMPLIANT
  • MFA MANDATORY
  • ZERO-TRUST ARCHITECTURE

11. COMMUNICATION

Contact Information

For inquiries regarding data processing or to exercise your privacy rights, please contact our Data Protection Officer.

Privacy & Compliance Team

legal@citescale.tech

1200 Validation Plaza, Suite 400
Austin, TX 78701

End of CiteScale Privacy Policy v2.4.1