Sensay Privacy Policy

Policy Updated: 18th November 2024

Table of Contents

  • Introduction
  • Definitions
  • Principles for Processing Personal Data
  • Data We Collect and Process
  • How We Use Your Data
  • Legal Basis for Processing Personal Data
  • Disclosure of Your Data
  • Data Security
  • Data Management and Privacy Layers
  • User Levels of Control
  • Company Levels of Control
  • End-to-End Encryption and Security
  • Data Retention
  • Cookie Policy
  • Ethical Considerations of Digital Cloning
  • Your Rights Under GDPR
  • International Data Transfers
  • Changes to This Policy
  • Contact Details

1. Introduction

We are committed to protecting your privacy and ensuring the security of your personal data. This policy is designed to provide you with detailed information about how we collect, use, process, and protect your personal information when you use our web app and mobile application (collectively referred to as our "Service").

We understand that your privacy is important, and we want you to feel confident about the use of your personal data when engaging with our Service. This policy aims to be transparent, comprehensive, and easily understandable, ensuring that you are fully informed about your privacy rights and how we handle your data.

This policy applies to all users of Sensay's Service, including individuals using our public features and enterprise clients utilizing our advanced security measures. We encourage you to read this policy carefully to understand our practices regarding your personal data.

2. Definitions

To help you better understand this policy, we've defined some key terms:

  • Personal Data: Any information relating to an identified or identifiable natural person ('data subject'). This includes, but is not limited to, names, identification numbers, location data, online identifiers, or factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of that person.
  • Data Controller: The entity that determines the purposes and means of processing personal data. In this context, Sensay acts as the Data Controller for the personal data you provide to us.
  • Data Processor: A person or entity that processes personal data on behalf of the Data Controller. This may include third-party service providers that we engage to perform certain functions.
  • Data Subject: Any living individual whose personal data is being processed. If you use Sensay's services, you are a Data Subject.
  • Processing: Any operation performed on personal data, whether or not by automated means, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.
  • Consent: Any freely given, specific, informed and unambiguous indication of the data subject's wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her.
  • Digital Replica: A digital representation or clone of an individual created using personal data and AI technology, capable of simulating aspects of that person's behavior, knowledge, or personality.

3. Principles for Processing Personal Data

At Sensay, we adhere to the following principles when processing your personal data:

  • Lawfulness, Fairness, and Transparency: We process personal data lawfully, fairly, and in a transparent manner. We ensure that you are informed about how your data will be used and that we handle your data with integrity.
  • Purpose Limitation: We collect personal data for specified, explicit, and legitimate purposes. We do not process your data in ways that are incompatible with these purposes.
  • Data Minimization: We ensure that the personal data we collect is adequate, relevant, and limited to what is necessary for the purposes for which it is processed. We strive to minimize the amount of data we collect and retain.
  • Accuracy: We take reasonable steps to ensure that personal data is accurate and, where necessary, kept up to date. We have processes in place to address inaccurate or incomplete data.
  • Storage Limitation: We keep personal data in a form that permits identification of data subjects for no longer than necessary for the purposes for which the data is processed.
  • Integrity and Confidentiality: We process personal data in a manner that ensures appropriate security, including protection against unauthorized or unlawful processing and against accidental loss, destruction, or damage, using appropriate technical and organizational measures.
  • Accountability: We are responsible for and can demonstrate compliance with the above principles.

4. Data We Collect and Process

Sensay collects and processes various types of personal data to provide and improve our Service. The categories of data we collect include:

  • Personal Identifiers:
    • Full name
    • Email address
    • Phone number
    • User account credentials
    • Postal address (if provided)
    • Date of birth (if provided)
    • Profile picture (if uploaded)
  • Technical Data:
    • IP address
    • Device type and model
    • Operating system and version
    • Browser type and version
    • Mobile device identifiers (e.g., IDFA, AAID)
    • Time zone setting
    • Geolocation data (if permitted by you)
    • Internet service provider
  • Usage Data:
    • Pages or features accessed
    • Time spent on different parts of the Service
    • Interaction patterns (e.g., clicks, scrolls)
    • Search queries
    • Content created or uploaded
    • Preferences and settings
    • Frequency and timing of Service use
  • Communication Data:
    • Email correspondence
    • Chat logs
    • Customer support tickets and interactions
    • Survey responses
    • Feedback provided
  • Profile Data:
    • User preferences
    • Interests
    • Skills and expertise
    • Professional background
    • Educational information
    • Social media profiles (if linked)
  • Financial Data (for paid services):
    • Payment card details (processed securely through third-party payment processors)
    • Billing address
    • Transaction history
  • Content Data:
    • Text, audio, or video content created using our Service
    • Files uploaded to our Service
    • Data used to create and train digital replicas
  • Metadata:
    • Data about how and when content was created
    • Editing history
    • Version information
  • Third-party Data:
    • Information obtained from third-party services (with your consent)
    • Public data from social media profiles (if linked)
  • Inference Data:
    • Data derived from analyzing your use of our Service
    • Predictions or inferences about your preferences or behaviors

We collect this data through various means, including direct provision by you when you create an account, use our Service, or communicate with us, automatic collection through cookies, web beacons, and similar technologies, and third-party sources, such as social media platforms or data providers (with your consent).

It's important to note that while we collect this range of data, we only process what is necessary for the specific purposes outlined in this policy. You have control over much of the data you provide and can manage your privacy settings within our Service.

5. How We Use Your Data

Sensay uses your personal data for various purposes to provide, maintain, and improve our Service. Here's a detailed breakdown of how we use your data:

  • Providing and Improving Our Service:
    • Creating and managing your account
    • Authenticating your identity and providing access to our Service
    • Personalizing your experience based on your preferences and usage patterns
    • Developing new features and functionalities
    • Conducting research and analysis to improve our Service
    • Troubleshooting issues and bugs
    • Training and improving our AI models and algorithms
  • Communicating with You:
    • Sending service-related notifications and updates
    • Providing customer support and responding to your inquiries
    • Sending newsletters, promotional materials, and marketing communications (with your consent)
    • Inviting you to participate in surveys or provide feedback
    • Notifying you about changes to our Service or policies
  • Enhancing User Experience:
    • Customizing content and recommendations based on your preferences and behavior
    • Remembering your settings and preferences
    • Providing a seamless experience across different devices
    • Analyzing usage patterns to optimize our user interface and features
  • Ensuring Security and Compliance:
    • Detecting and preventing fraud, spam, abuse, and security incidents
    • Verifying your identity for security purposes
    • Conducting security audits and risk assessments
    • Complying with legal obligations and responding to lawful requests from public authorities
    • Enforcing our terms of service and other policies
  • Creating and Managing Digital Replicas:
    • Processing your data to create digital representations or clones
    • Training AI models to simulate aspects of your behavior, knowledge, or personality
    • Storing and managing the data associated with your digital replicas
    • Providing access controls for your digital replicas
  • Analytics and Business Intelligence:
    • Generating aggregated, anonymized data for statistical analysis
    • Measuring the effectiveness of our marketing campaigns
    • Analyzing user engagement and retention
    • Producing internal reports on Service usage and performance
  • Financial Transactions (for paid services):
    • Processing payments and refunds
    • Maintaining billing records
    • Preventing fraudulent transactions
  • Product Development and Research:
    • Conducting market research and analysis
    • Testing new features and functionalities
    • Developing and improving our AI technologies
    • Collaborating with research partners (using anonymized data)
  • Legal and Regulatory Compliance:
    • Maintaining records for regulatory purposes
    • Responding to legal requests and subpoenas
    • Establishing, exercising, or defending legal claims
  • Customization and Advertising:
    • Tailoring content and advertisements to your interests (with your consent)
    • Measuring the performance of advertising campaigns
    • Providing relevant offers and promotions

It's important to note that we always strive to use the minimum amount of data necessary to accomplish these purposes. We also provide you with controls to manage how your data is used, as detailed in the "User Levels of Control" section of this policy.

7. Disclosure of Your Data

Sensay may disclose your personal data to various parties under specific circumstances. We ensure that any third parties with whom we share your data are contractually bound to protect your data with the same level of care and security that we provide. Here's a detailed overview of how we may disclose your data:

  • Subsidiaries and Affiliates:
    • We may share your data with our subsidiaries and affiliated companies for purposes consistent with this privacy policy.
    • This sharing helps us provide integrated services across our organization and may include data transfers to different jurisdictions where our affiliates operate.
  • Service Providers and Contractors:
    • We engage third-party service providers to perform certain business functions on our behalf. These may include:
      • Cloud storage providers
      • Payment processors
      • Customer support services
      • Analytics providers
      • Marketing and advertising partners
      • IT and security services
    • These service providers are given access only to the personal data they need to perform their specific functions, and they are contractually obligated to maintain the confidentiality and security of your data.
  • Business Partners:
    • With your consent, we may share your data with business partners for joint marketing initiatives or collaborative services.
    • We ensure that these partners adhere to strict data protection standards and use your data only for the specified purposes.
  • Legal Compliance and Law Enforcement:
    • We may disclose your data to comply with applicable laws, regulations, or legal processes.
    • This includes responding to court orders, subpoenas, or requests from government or regulatory authorities.
    • We may also disclose data if we believe it's necessary to investigate, prevent, or take action regarding illegal activities, suspected fraud, or situations involving potential threats to the physical safety of any person.
  • Business Transfers:
    • In the event of a merger, acquisition, reorganization, bankruptcy, or other similar event, your data may be transferred as part of Sensay's business assets.
    • We will notify you if such a transfer occurs and outline any choices you may have regarding your data.
  • With Your Consent:
    • We may share your personal data with third parties when you have given us your explicit consent to do so.
    • We will always ask for your consent before sharing your data for purposes not covered by this privacy policy.
  • Aggregated or Anonymized Data:
    • We may share aggregated or anonymized data that does not directly identify you with third parties for various purposes, including business intelligence, marketing, and research.
  • Public Forums:
    • If you post information in public areas of our Service, such as forums or comment sections, this information may be visible to other users and the public.
    • We recommend being cautious about what personal information you disclose in these public spaces.
  • Social Media Platforms:
    • If you choose to connect your Sensay account with social media platforms, we may share certain information with those platforms to enable features like single sign-on.
    • The data shared and how it's used will be governed by the privacy policies of those social media platforms.
  • Enterprise Clients:
    • For our enterprise clients, we may share certain data with the organization that manages your Sensay account, in accordance with our agreement with that organization.
  • Professional Advisors:
    • We may disclose your data to professional advisors, such as lawyers, auditors, and insurers, where necessary in the course of the professional services they render to us.

We take great care to ensure that any disclosures of your personal data are necessary and proportionate. We implement appropriate safeguards to protect your data during any transfers or disclosures, including data encryption and contractual obligations for recipients to protect your data.

If you have concerns about how your data is shared, please contact us using the information provided in the "Contact Details" section of this policy.

8. Data Security

At Sensay, we prioritize the security and privacy of our clients' data. Our robust security measures are designed to protect sensitive information at every stage of the data lifecycle. We continuously update our security protocols to stay ahead of potential threats and meet the evolving needs of our users, including our enterprise clients. Here's a comprehensive overview of our security measures:

  • Data Encryption at Rest:
    • All customer data stored in our systems is encrypted using Advanced Encryption Standard (AES) with 256-bit key length.
    • This industry-standard encryption ensures that data remains secure even if unauthorized access to our storage systems occurs.
    • Encryption keys are managed securely and rotated regularly.
  • Data Encryption in Transit:
    • We use Transport Layer Security (TLS) to encrypt all data transmitted between our clients and our servers.
    • This ensures that data cannot be intercepted or tampered with during transmission.
    • We regularly update our TLS protocols to maintain the highest level of security.
  • Regular Security Audits:
    • We conduct regular internal and third-party security audits to identify and address potential vulnerabilities.
    • These audits include penetration testing, vulnerability assessments, and code reviews.
    • We promptly address any identified issues and continuously improve our security posture.
  • Access Controls:
    • Strict access controls and authentication measures are in place to ensure that only authorized personnel can access sensitive data.
    • We implement multi-factor authentication for all employee access to our systems.
    • Access rights are regularly reviewed and updated based on the principle of least privilege.
  • Network Security:
    • Our infrastructure is protected by enterprise-grade firewalls and intrusion detection/prevention systems.
    • We employ network segmentation to isolate sensitive data and systems.
    • Regular vulnerability scans and patch management ensure our systems are up-to-date and secure.
  • Physical Security:
    • Our data centers are protected by multiple layers of physical security measures.
    • These include 24/7 surveillance, biometric access controls, and environmental controls.
  • Employee Training and Awareness:
    • All employees undergo regular security awareness training.
    • We have strict policies and procedures in place for handling sensitive data.
  • Incident Response Plan:
    • We maintain a comprehensive incident response plan to quickly address any potential security breaches.
    • Our team is trained to detect, respond to, and mitigate security incidents promptly.
  • Compliance:
    • Our security measures are designed to comply with industry standards and regulations such as GDPR, CCPA, and HIPAA where applicable.
    • We regularly review and update our practices to maintain compliance with evolving regulations.
  • Third-Party Risk Management:
    • We carefully vet and monitor all third-party service providers who may have access to our systems or data.
    • We require our vendors to maintain stringent security standards and undergo regular assessments.
  • Data Backup and Recovery:
    • We maintain encrypted backups of data for disaster recovery purposes.
    • Backups are retained for 30 days, after which they are securely deleted.

We are committed to continuously improving our security measures and providing our clients with the highest level of data protection available. If you have any questions about our security practices, please contact our security team.

9. Data Management and Privacy Layers

At Sensay, we understand that different types of data require different levels of privacy and protection. To address this, we have implemented a multi-layered approach to data management and privacy:

  • Public Replicas:
    • These are digital replicas designed for broad interaction and sharing.
    • Public replicas can engage with a wide audience, providing general information and experiences.
    • They do not contain or disclose sensitive personal data.
    • Users have control over what information is included in their public replicas.
  • Private Replicas:
    • Private replicas are restricted to the user and specific whitelisted accounts.
    • These replicas contain more detailed and personal information.
    • Access is strictly controlled to ensure that only trusted individuals can interact with private replicas.
    • Users can manage the whitelist and revoke access at any time.
  • Secrets in Public Replicas:
    • Some public replicas include "Secrets", which are pieces of information accessible only to whitelisted accounts.
    • This feature allows users to share certain details selectively, even within a public setting.
    • It provides an additional layer of privacy for sensitive information within otherwise public replicas.
  • Data Storage and Transfer:
    • All data, regardless of its privacy layer, is stored securely using encryption at rest.
    • Data transfers between privacy layers or to authorized third parties are conducted using secure, encrypted channels.
    • We ensure that data storage and transfer processes comply with GDPR and other relevant regulations.
  • Access Controls:
    • Each privacy layer has its own set of access controls.
    • Users can define and manage access permissions for their replicas and data.
    • Our system enforces these access controls rigorously to prevent unauthorized data access.
  • Data Isolation:
    • We maintain strict isolation between different users' data and between different privacy layers.
    • This ensures that data from one privacy layer or user cannot inadvertently leak into another.
  • Audit Trails:
    • We maintain detailed audit trails of all access to and modifications of data across all privacy layers.
    • Users can review these audit trails to monitor access to their data.
  • Data Minimization:
    • We apply the principle of data minimization across all privacy layers.
    • Only the data necessary for the intended purpose is collected and processed within each layer.
  • User Education:
    • We provide clear guidance and education to users about the different privacy layers and their implications.
    • Users are empowered to make informed decisions about which privacy layer to use for different types of data and interactions.
  • Consent Management:
    • Users must provide explicit consent for data to be moved between privacy layers.
    • Consent is granular, allowing users to control exactly what data is shared and with whom.
  • Data Portability:
    • Users can export their data from any privacy layer in a machine-readable format.
    • This supports data portability rights and allows users to transfer their data between services if desired.
  • Deletion and Right to be Forgotten:
    • Users can request deletion of their data from any privacy layer.
    • We ensure that data is securely and completely erased across all relevant systems and backups.

By implementing these privacy layers and management practices, we aim to provide our users with flexible, powerful tools to control their data while ensuring the highest standards of privacy and security.

10. User Levels of Control

At Sensay, we believe in empowering our users with comprehensive control over their personal data. We provide various tools and settings that allow you to manage your privacy preferences and data usage. Here's a detailed overview of the control you have:

  • Account Settings:
    • Modify your profile information at any time
    • Update your contact details and communication preferences
    • Change your password and security settings
    • Manage linked accounts (e.g., social media integrations)
  • Privacy Settings:
    • Control the visibility of your profile and content
    • Manage who can see and interact with your digital replicas
    • Set default privacy levels for new content you create
    • Control data sharing with third-party integrations
  • Data Access:
    • Request a copy of all personal data we hold about you
    • Download your data in a machine-readable format
    • View and manage your data across different privacy layers
  • Data Modification:
    • Edit or update any of your personal data
    • Correct inaccuracies in your information
    • Request changes to how your digital replicas behave or respond
  • Data Deletion:
    • Delete specific pieces of content or data
    • Request complete deletion of your account and associated data
    • Understand the implications of data deletion on your service usage
  • Consent Management:
    • View and modify your consent settings for various data processing activities
    • Opt in or out of specific data uses, such as marketing communications or research
    • Withdraw consent for processing activities at any time
  • Digital Replica Control:
    • Create, modify, or delete your digital replicas
    • Control the data sources used to train your replicas
    • Manage access permissions for your replicas
    • Pause or deactivate your replicas temporarily or permanently
  • Communication Preferences:
    • Choose which types of communications you want to receive from us
    • Set preferences for notification frequency and channels
    • Unsubscribe from marketing communications with a single click
  • Third-Party Data Sharing:
    • View which third parties have access to your data
    • Control what data is shared with these parties
    • Revoke access for specific third parties at any time
  • Data Portability:
    • Export your data in a standard, machine-readable format
    • Transfer your data to other services or platforms
  • Activity Logs:
    • View logs of activities related to your account and data
    • Monitor access to your digital replicas
    • Receive notifications for important account activities
  • AI Training Opt-Out:
    • Choose whether your data can be used to train our AI models
    • Opt out of specific types of AI training or usage
  • Cookie Control:
    • Manage your cookie preferences through our cookie banner
    • Choose which types of cookies you accept or reject
    • Update your cookie settings at any time
  • Geographic Restrictions:
    • Set geographic restrictions on where your digital replicas can be accessed
    • Control data processing locations for compliance with local regulations
  • Two-Factor Authentication:
    • Enable or disable two-factor authentication for enhanced account security
    • Choose your preferred 2FA method (e.g., SMS, authenticator app)
  • Account Deactivation:
    • Temporarily deactivate your account without deleting your data
    • Understand the difference between deactivation and deletion

These controls are accessible through your account settings on our platform. We are committed to continually improving and expanding these controls to give you the utmost transparency and authority over your personal data.

If you need assistance with any of these controls or have questions about managing your data, please contact our support team. We're here to help you understand and exercise your data rights effectively.

11. Company Levels of Control

As a data controller, Sensay implements various organizational and technical measures to ensure the proper handling and protection of user data. These company-level controls are designed to comply with data protection regulations and maintain the trust of our users. Here's an overview of our internal controls:

  • Data Processing:
    • Consent-Based Processing: We process personal data primarily based on explicit consent from users. Consent is obtained transparently, and users are informed about the specific purposes for which their data will be used.
    • Legitimate Business Purposes: In addition to consent, we may process data for legitimate business purposes, such as improving services, conducting research, and ensuring security and compliance. We conduct regular assessments to ensure these purposes are justified and do not override user rights.
  • Data Protection:
    • Encryption Protocols: All data, both in transit and at rest, is secured using advanced encryption protocols to prevent unauthorized access and data breaches.
    • Access Controls: Strict access control measures are implemented to ensure that only authorized personnel can access sensitive data. This includes multi-factor authentication and role-based access controls.
    • Security Audits: Regular security audits are conducted to identify and mitigate potential vulnerabilities. These audits are performed by internal and external experts to ensure comprehensive security coverage.
  • Data Auditing:
    • Regular Audits: We conduct regular audits of our data processing activities to ensure compliance with GDPR and other relevant data protection regulations. These audits assess data handling practices, security measures, and user consent management.
    • Transparency Reports: We provide transparency reports to users, outlining data processing activities, security measures, and any incidents or breaches that may have occurred. These reports are part of our commitment to transparency and accountability.
  • Data Protection Officer (DPO):
    • We have appointed a Data Protection Officer responsible for overseeing our data protection strategy and implementation.
    • The DPO ensures that we remain compliant with data protection laws and serves as a point of contact for users and supervisory authorities on privacy matters.
  • Employee Training:
    • All employees undergo regular data protection and privacy training.
    • We maintain a culture of privacy awareness throughout the organization.
  • Data Protection Impact Assessments (DPIAs):
    • We conduct DPIAs for new projects or significant changes that involve processing personal data.
    • These assessments help us identify and mitigate privacy risks before they occur.
  • Vendor Management:
    • We carefully vet and monitor all third-party vendors who may have access to user data.
    • Data processing agreements are in place with all vendors, ensuring they adhere to our strict data protection standards.
  • Incident Response Plan:
    • We maintain a comprehensive incident response plan to address potential data breaches quickly and effectively.
    • Regular drills and updates ensure our team is prepared to handle any data protection incidents.
  • Data Retention Policies:
    • We have implemented clear data retention policies that define how long different types of data are kept.
    • Automated systems ensure that data is securely deleted when it is no longer needed for the purposes for which it was collected.
  • Compliance Monitoring:
    • We continuously monitor changes in data protection laws and regulations.
    • Our policies and practices are regularly updated to ensure ongoing compliance.
  • Privacy by Design:
    • We incorporate privacy considerations into all stages of product development and business operations.
    • Privacy-enhancing technologies are integrated into our systems and processes.
  • Internal Audits:
    • Regular internal audits are conducted to ensure that our data protection practices align with our policies and legal requirements.
    • Audit findings are reported to senior management and used to drive continuous improvement.
  • Documentation:
    • We maintain detailed documentation of all our data processing activities, including purposes, categories of data, recipients, and security measures.
    • This documentation is regularly reviewed and updated to ensure accuracy and completeness.
  • Data Minimization Practices:
    • We implement data minimization techniques to ensure we only collect and process the data necessary for specified purposes.
    • Regular reviews are conducted to identify and eliminate unnecessary data collection or processing.

These company-level controls demonstrate our commitment to protecting user data and maintaining the highest standards of privacy and security. We continuously evaluate and enhance these controls to adapt to the evolving data protection landscape and to meet the expectations of our users.

12. End-to-End Encryption and Security

At Sensay, we employ advanced encryption technologies to ensure the highest level of data protection for our users. Our approach includes both end-to-end encryption providing unparalleled security for sensitive information.

  • Data Encryption:
    • We use end-to-end encryption to protect data from the moment it is collected until it reaches its intended destination.
    • This ensures that data remains secure during transmission and storage, and can only be decrypted by the intended recipient.
  • Secure Channels:
    • All communication between users and Sensay's servers is encrypted using secure channels (e.g., TLS/SSL).
    • This prevents unauthorized interception and access to sensitive information during transit.
  • Encrypted Storage:
    • Data stored on Sensay's servers is encrypted using advanced encryption standards.
    • Even if data is accessed unlawfully, it remains unreadable and secure without the proper decryption keys.
  • Key Management:
    • We implement robust key management practices to ensure the security of encryption keys.
    • Keys are rotated regularly and stored securely, separate from the encrypted data.
  • Client-Side Encryption:
    • Where possible, we implement client-side encryption, meaning data is encrypted on the user's device before being transmitted to our servers.
    • This ensures that even Sensay cannot access the unencrypted data.
  • Perfect Forward Secrecy:
    • We employ perfect forward secrecy in our encryption protocols.
    • This means that even if an encryption key is compromised in the future, it cannot be used to decrypt past communications.
  • Encrypted Backups:
    • All data backups are encrypted to ensure that data remains protected even in backup storage.

13. Data Retention

At Sensay, we are committed to retaining personal data only for as long as necessary to fulfill the purposes for which it was collected, including for the purposes of satisfying any legal, accounting, or reporting requirements. Our data retention policies are designed to comply with data protection laws while ensuring that we have the information we need to provide our services effectively.

  • General Retention Periods:
    • Account Information: Retained for the duration of your account's active status. If you haven't used your account for 24 months, we will notify you and may deactivate your account if you don't respond.
    • Transaction Data: Kept for 7 years to comply with tax and accounting regulations.
    • Communication Records: Stored for 3 years from the date of last communication for customer support purposes.
    • Usage Data: Retained for 18 months to improve our services and user experience.
    • Marketing Data: Kept for 2 years from the last interaction unless you opt-out earlier.
  • Data Associated with Digital Replicas:
    • Retained for as long as the digital replica is active.
    • Users can delete their replicas at any time, which will trigger the deletion of associated data.
    • Inactive replicas that haven't been accessed for 12 months may be archived or deleted after notifying the user.
  • Log Data and Analytics:
    • System logs are retained for 6 months for security and troubleshooting purposes.
    • Aggregated, anonymized analytics data may be retained indefinitely as it cannot be used to identify individuals.
  • Data Backup Retention:
    • We maintain encrypted backups of data for disaster recovery purposes.
    • Backups are retained for 30 days, after which they are securely deleted.
  • Legal Hold:
    • If we receive a legal order or are involved in litigation, we may need to retain certain data beyond our normal retention period.
    • We will notify affected users of such legal holds unless prohibited by law.
  • User-Requested Deletion:
    • When you request deletion of your data, we will delete or anonymize it within 30 days.
    • Some data may be retained in encrypted backups for up to 30 additional days until those backups are overwritten.
  • Archived Data:
    • Some data may be archived for statistical, historical, or research purposes.
    • Archived data is secured with strong encryption and access controls.
  • Retention of Encrypted Data:
    • For data protected by end-to-end encryption or FHE, the encrypted data may be retained, but without the decryption keys, it remains inaccessible and effectively deleted.
  • Third-Party Data Retention:
    • We require our third-party service providers to adhere to retention periods compatible with our policies.
    • We conduct regular audits to ensure compliance.
  • Review and Update of Retention Policies:
    • Our data retention policies are reviewed annually and updated as necessary to reflect changes in our services, legal obligations, and user needs.
  • User Control Over Retention:
    • Users can request earlier deletion of their data at any time through their account settings or by contacting our support team.
    • We provide tools for users to export their data before requesting deletion.
  • Retention Notifications:
    • We will notify users before deleting their data due to inactivity or the end of a retention period, giving them the opportunity to extend the retention if desired.
  • Anonymization:
    • Where possible, we anonymize data instead of deleting it entirely. This allows us to retain useful information for analytics and service improvement without compromising individual privacy.
  • Special Categories of Data:
    • Special categories of personal data (e.g., health information) are subject to shorter retention periods unless a longer retention is required by law or explicitly consented to by the user.

We are committed to being transparent about our data retention practices. If you have any questions about how long we retain specific types of data, please contact our Data Protection Officer using the information provided in the "Contact Details" section of this policy.

Remember that even after data is deleted from our active systems, it may persist in backups for a limited time. However, we ensure that all backups are securely deleted according to our retention schedule.

15. Ethical Considerations of Digital Cloning

At Sensay, we recognize that the creation and use of digital replicas (or "digital clones") raise important ethical considerations. We are committed to addressing these concerns transparently and responsibly. Here's an overview of our approach to the ethical aspects of digital cloning:

  • Informed Consent:
    • We obtain explicit, informed consent from individuals before creating their digital replicas.
    • Users are provided with clear, comprehensive information about the process, potential uses, and implications of their digital replicas.
    • Consent can be withdrawn at any time, leading to the deactivation and deletion of the digital replica.
  • Transparency:
    • We are open about the capabilities and limitations of our digital replica technology.
    • Users are informed about how their data is used to create and maintain their digital replicas.
    • We provide clear information about who can access and interact with digital replicas.
  • Privacy and Data Protection:
    • Digital replicas are subject to the same stringent privacy and security measures as other personal data.
    • Users have granular control over what information is included in their digital replicas and how they are used.
  • Accuracy and Representation:
    • We strive to ensure that digital replicas accurately represent the individual's knowledge, personality, and values.
    • Users can review and modify their digital replicas to ensure they align with their current views and preferences.
  • Preventing Misuse:
    • We have strict policies against using digital replicas for deception, impersonation, or any malicious purposes.
    • Technical measures are in place to prevent unauthorized creation or use of digital replicas.
  • Emotional and Psychological Impact:
    • We acknowledge the potential emotional impact of interacting with digital replicas, especially of deceased individuals.
    • Clear labeling ensures that users are always aware they are interacting with a digital replica, not the actual person.
  • Intellectual Property Rights:
    • We respect the intellectual property rights of individuals in relation to their digital replicas.
    • Users retain rights over the content and intellectual property they contribute to their digital replicas.
  • Ethical Use in Business and Research:
    • We have guidelines for the ethical use of digital replicas in business, education, and research contexts.
    • Any use of digital replicas for research purposes is subject to ethical review and approval.
  • Child Protection:
    • We have special safeguards and restrictions for the creation and use of digital replicas of minors.
    • Parental consent is required for any digital replica creation involving individuals under the age of consent.
  • Cultural Sensitivity:
    • We respect cultural differences in attitudes towards digital representation and afterlife.
    • Users can set cultural preferences that affect how their digital replicas operate.
  • Transparency in AI Interaction:
    • We clearly disclose when AI is being used in the creation or operation of digital replicas.
    • Users are informed about the extent of AI involvement in generating responses or behaviors.
  • Right to be Forgotten:
    • Users have the right to completely delete their digital replicas and associated data.
    • We provide clear processes for exercising this right, including posthumous deletion requests.
  • Ethical Review Board:
    • We maintain an independent ethical review board to assess and advise on ethical issues related to digital cloning.
    • This board regularly reviews our practices and policies to ensure they align with ethical standards.
  • Ongoing Ethical Assessment:
    • We continuously evaluate the ethical implications of advancements in our digital cloning technology.
    • We engage with ethicists, policymakers, and the public to address emerging ethical concerns.
  • Education and Awareness:
    • We provide resources to help users understand the ethical implications of digital cloning.
    • We participate in public discussions and academic forums on the ethics of AI and digital representation.
  • Posthumous Management:
    • We offer options for users to set preferences for the management of their digital replicas after death.
    • These include options for deletion, archiving, or continued operation under specified conditions.
  • Ethical AI Training:
    • Our AI models used in digital replicas are trained with ethical considerations in mind, including fairness and bias mitigation.
  • Transparency in Limitations:
    • We are clear about the current limitations of digital replica technology to manage user expectations.
    • Users are informed that digital replicas are simulations and may not perfectly replicate human behavior or decision-making.

By adhering to these ethical principles, we aim to ensure that our digital cloning technology is developed and used in a way that respects individual rights, promotes transparency, and contributes positively to society. We recognize that ethical considerations in this field are complex and evolving. We are committed to ongoing dialogue with users, experts, and stakeholders to continually refine our approach to these important issues.

16. Your Rights Under GDPR

As a data subject under the General Data Protection Regulation (GDPR), you have several rights concerning your personal data. At Sensay, we are committed to facilitating the exercise of these rights. Here's a detailed explanation of your rights and how you can exercise them:

  • Right to be Informed:
    • You have the right to be informed about the collection and use of your personal data.
    • We provide this information through this privacy policy and additional notices where necessary.
    • If we decide to use your data for a new purpose, we will provide you with additional information.
  • Right of Access:
    • You have the right to request a copy of your personal data that we hold.
    • We will provide this information free of charge (for the first request) within one month of your request.
    • To request access, use the "Data Access Request" feature in your account settings or contact our Data Protection Officer.
  • Right to Rectification:
    • You have the right to have inaccurate personal data rectified, or completed if it is incomplete.
    • You can update most of your information directly through your account settings.
    • For data you can't update yourself, contact our support team, and we'll make the changes within one month.
  • Right to Erasure (Right to be Forgotten):
    • You have the right to request the deletion of your personal data in certain circumstances (e.g., when the data is no longer necessary for the purposes it was collected).
    • To request erasure, use the "Delete My Data" option in your account settings or contact our Data Protection Officer.
    • We will comply with your request within one month unless there's a legal reason to retain some data.
  • Right to Restrict Processing:
    • You can request that we limit the way we use your personal data.
    • This right applies in specific circumstances, such as when you contest the accuracy of your data.
    • To exercise this right, contact our Data Protection Officer with details of your request.
  • Right to Data Portability:
    • You have the right to receive your personal data in a structured, commonly used, and machine-readable format.
    • You can also request that we transfer this data directly to another controller.
    • Use the "Export My Data" feature in your account settings to exercise this right.
  • Right to Object:
    • You have the right to object to the processing of your personal data in certain circumstances, including processing for direct marketing.
    • To object to marketing, use the unsubscribe link in our emails or adjust your communication preferences in your account settings.
    • For other objections, contact our Data Protection Officer with details of your request.
  • Rights Related to Automated Decision Making and Profiling:
    • You have the right not to be subject to a decision based solely on automated processing, including profiling, which produces legal effects or similarly significantly affects you.
    • While we use automation in our services, we do not make solely automated decisions with significant effects. If this changes, we will inform you and provide ways to request human intervention or challenge the decision.
  • Right to Withdraw Consent:
    • Where we process data based on consent, you have the right to withdraw that consent at any time.
    • You can withdraw consent for specific processing activities in your account settings or by contacting our Data Protection Officer.

To exercise any of these rights, please use the relevant features in your account settings or contact our Data Protection Officer using the information provided in the "Contact Details" section of this policy. We will respond to all requests within one month. In complex cases, we may extend this period by two months, but we will inform you of any such extension within the first month.

Please note that while we will always strive to accommodate your rights, there may be situations where we are legally obligated to retain certain data. We will explain any such limitations when responding to your requests.

17. International Data Transfers

Sensay operates globally, which means that your personal data may be transferred to and processed in countries other than your country of residence. These countries may have data protection laws that are different from the laws of your country. Here's how we handle international data transfers:

  • Adequacy Decisions:
    • Where possible, we transfer data to countries that have been deemed to provide an adequate level of protection for personal data by the European Commission.
  • Standard Contractual Clauses:
    • For transfers to countries without an adequacy decision, we implement Standard Contractual Clauses (SCCs) approved by the European Commission.
    • These clauses ensure that your personal data receives an adequate level of protection in the recipient country.
  • Privacy Shield:
    • While the EU-U.S. Privacy Shield is no longer valid for EU-U.S. transfers, we continue to comply with Privacy Shield principles as a demonstration of our commitment to data protection.
  • Binding Corporate Rules:
    • For intra-group transfers, we are in the process of implementing Binding Corporate Rules to ensure consistent protection of personal data across our global operations.
  • Consent:
    • In some cases, we may transfer your data based on your explicit consent to the transfer, after informing you of the possible risks.
  • Necessary for Contract Performance:
    • We may transfer your data if it's necessary for the performance of a contract between you and Sensay, or for pre-contractual measures taken at your request.
  • Data Localization Options:
    • For enterprise clients with specific data residency requirements, we offer options to keep data within specified geographical regions.
  • Transparency:
    • We are transparent about where your data is processed. You can find information about our data centers and processing locations in your account settings.
  • Third-Party Transfers:
    • We ensure that any third parties we share data with also comply with appropriate data transfer mechanisms.
  • Data Transfer Impact Assessments:
    • We conduct regular assessments of our data transfer mechanisms to ensure they provide adequate protection in light of any changes in law or circumstances.
  • Encryption in Transit:
    • All data transfers are encrypted using industry-standard protocols to protect data during transmission.
  • Right to Information:
    • You have the right to obtain information about the safeguards we use for international data transfers. Contact our Data Protection Officer for more details.
  • EU Representative:
    • We have appointed a representative in the EU to act as a point of contact for EU data subjects and supervisory authorities.
  • Monitoring of International Transfer Laws:
    • We closely monitor changes in international data transfer laws and adjust our practices accordingly.

If you have any questions or concerns about our international data transfer practices, please contact our Data Protection Officer using the information provided in the "Contact Details" section.

18. Changes to This Policy

We may update this Privacy Policy from time to time to reflect changes in our practices, technologies, legal requirements, and other factors. When we do, we will update the "last updated" date at the top of this policy. If we make significant changes to this policy, we will notify you through a prominent notice on our Service or by sending you a direct communication.

  • Notification of Changes:
    • For material changes, we will provide notification via email, in-app notifications, or prominent notices on our website at least 30 days before the changes take effect.
    • For minor changes, we may update the policy without prior notification, but we will always indicate the last updated date.
  • Review of Changes:
    • We encourage you to review this policy periodically to stay informed about how we protect your personal data.
  • Consent to Changes:
    • Your continued use of our Service after any changes to this policy constitutes your acceptance of the new terms.
    • If you do not agree with the changes, you should discontinue using our Service and contact us to close your account.
  • Archive of Previous Versions:
    • We maintain an archive of previous versions of this policy, which you can request by contacting our Data Protection Officer.
  • Explanation of Changes:
    • When we make significant changes, we will provide a summary of what has changed along with the updated policy.
  • Regulatory Compliance:
    • We update this policy to ensure ongoing compliance with applicable data protection laws and regulations.
  • User Rights:
    • If changes to this policy affect your rights or the way we use your data, we will obtain your consent where required by applicable law.
  • Third-Party Notifications:
    • If changes affect our relationships with third-party processors, we will notify and update agreements with these parties as necessary.
  • Staff Training:
    • Our staff receives training on any significant changes to this policy to ensure consistent implementation across our organization.
  • Feedback Mechanism:
    • We welcome your feedback on any changes to this policy. You can provide feedback through our support channels or by contacting our Data Protection Officer.

19. Contact Details

If you have any questions, concerns, or requests regarding this Privacy Policy or our data practices, please don't hesitate to contact us. Here are the ways you can reach us:

  • Data Protection Officer:
  • General Privacy Inquiries:
  • Customer Support:
    • For general inquiries or support related to your account:
    • Email: contact@sensay.io
    • Live Chat: Available through our website and telegram channel
  • Social Media:
    • While we monitor our social media channels, please do not share personal information or account details through these public platforms. Use the secure methods above for privacy-related communications.
  • Response Times:
    • We aim to respond to all privacy-related inquiries within 72 hours.
    • For formal data subject requests under GDPR, we will respond within one month as required by law.
  • Availability:
    • Our support team is available 9am - 5pm CET.
    • For urgent privacy matters outside of these hours, please use the emergency contact number provided in your account settings.
  • Verification Process:
    • To protect your privacy, we will verify your identity before discussing or acting on any privacy-related requests.

We are committed to addressing your concerns and respecting your privacy rights. If you are unsatisfied with our initial response, please let us know, and we will escalate your concern to the appropriate team for further review.
Thank you for trusting Sensay with your personal data. We are committed to protecting your privacy and ensuring a secure, enjoyable experience with our Service.