TECHNICAL VALIDATION SYSTEMS
Privacy Policy
Our commitment to rigorous data integrity extends to how we handle your information. This document outlines our technical protocols for data processing and storage.
Note: Draft legal copy. Final version should be reviewed by counsel before publication.
01. OVERVIEW
Introduction
Last Updated: October 24, 2023
CiteScale operates a technical validation and citation repair platform. This Privacy Policy describes how CiteScale ("we", "us", or "our") collects, uses, and protects information when you access our platform, documentation, and technical journals. We prioritize the structural integrity of your content and the privacy of your operational data.
02. INPUTS
Data Collection
We collect information necessary to provide technical validation services, including:
- check_circle Account Information: Name, professional email address, and organizational affiliation.
- check_circle Usage Data: API request logs, interaction metrics within the content repair workspace, and validation frequency.
03. LOGIC
Audit Data Processing
When you submit content for validation, our system processes the text to identify citation gaps and factual inconsistencies.
04. INTEGRATIONS
CMS Access & Credentials
If you utilize our CMS integration features, we require temporary access tokens. These credentials are encrypted at rest and never stored in plain text. CiteScale only requests the minimum "write" permissions required to push repaired citations back to your content management system.
05. OUTPUTS
Reports & Generated Content
Validation reports and repaired content generated by CiteScale are proprietary to your account. We do not use your private content to train shared machine learning models without explicit, opt-in consent through a separate Data Contribution Agreement.
06. MEASUREMENT
Analytics
We use internal analytics to monitor platform performance and identify "low-confidence" validation zones. This helps us refine our algorithms to ensure editorial precision. These metrics are anonymized and aggregated.
07. ECOSYSTEM
Third-Party Processors
CiteScale engages a limited number of sub-processors to maintain our infrastructure:
08. PERSISTENCE
Data Retention
We retain operational data as long as your account is active. Transactional logs are purged after 90 days of inactivity. Content submitted for one-off validation is deleted from our cache within 24 hours of report generation.
09. RIGHTS
Data Deletion
Users may request full account deletion via the platform settings. Upon request, all associated PII and content history will be purged from our production databases within 30 days, subject to regulatory backup requirements.
10. FORTIFICATION
Security Measures
We employ a "Security by Design" architecture, including:
- TLS 1.3 IN TRANSIT
- SOC2 TYPE II COMPLIANT
- MFA MANDATORY
- ZERO-TRUST ARCHITECTURE
11. COMMUNICATION
Contact Information
For inquiries regarding data processing or to exercise your privacy rights, please contact our Data Protection Officer.
Privacy & Compliance Team
legal@citescale.tech
1200 Validation Plaza, Suite 400
Austin, TX 78701
End of CiteScale Privacy Policy v2.4.1