1. Overview
itskode provides tooling for building, deploying, and scaling applications across our managed infrastructure. This Privacy Policy describes the personal data we collect when you use our platform, why we collect it, and the rights available to you.
2. Information We Collect
- Account information: name, username, email, password hashes, profile images, and organization metadata that you submit when creating or managing a workspace.
- Billing information: payment instrument details handled by our payment processor (we store only the last four digits, billing address, tax IDs, and transaction history).
- Usage data: deployment metadata, build durations, environment configuration, project names, feature flag states, and telemetry about dashboard interactions.
- Logs: HTTP request/response metadata, IP address, user agent, and trace identifiers for troubleshooting, security, and analytics.
- Cookies & similar technologies: authentication tokens, preference cookies, and analytics cookies to keep you signed in and to understand product adoption.
- Support communications: messages, attachments, and diagnostics you share with our support or success teams.
3. How We Use Information
We use collected information to:
- Authenticate users, operate deployments, and deliver logs, metrics, and alerts.
- Process payments, subscriptions, and usage-based invoices.
- Detect abuse, secure infrastructure, and investigate incidents.
- Provide support, respond to requests, and send transactional emails.
- Improve our platform through analytics, A/B tests, and performance tuning.
- Comply with legal obligations and enforce our Terms.
4. Legal Bases
Depending on your jurisdiction, we rely on several legal bases including: (a) performance of a contract when providing the service; (b) legitimate interests such as securing infrastructure and improving the product; (c) compliance with legal obligations; and (d) consent for certain analytics or marketing communications where required.
6. Data Retention
We retain account information while your workspace remains active and for a reasonable period afterward to satisfy legal or operational requirements. Build logs and request logs are typically stored between 14 and 90 days depending on plan tier. You may delete deployments, logs, or projects at any time; residual backups may persist for limited durations consistent with our disaster recovery policies.
7. Security
We implement administrative, technical, and physical safeguards, including encryption in transit, secret management, network isolation, access controls, monitoring, and routine penetration testing. However, no system is perfectly secure; you are responsible for securing your own systems and promptly reporting suspected incidents.
8. International Transfers
We operate globally. When information is transferred across borders, we rely on lawful transfer mechanisms such as Standard Contractual Clauses or other approved safeguards. We also maintain regional hosting options for teams with data residency needs.
9. Your Rights
Depending on location, you may have rights to request access, correction, deletion, portability, or to object to certain processing. Submit requests via [email protected], and we will verify your identity before fulfilling the request. For authorized agent or opt-out requests (e.g., CCPA), include documentation demonstrating authority.
10. Children
Our services are not directed to children under 16, and we do not knowingly collect personal data from them. If we learn a child has provided data, we will delete it promptly.
11. Changes
We may update this Policy to reflect product changes or legal requirements. We will post updates with a new "Last updated" date and, when appropriate, notify you via dashboard or email.
12. Contact
For privacy questions or requests, contact [email protected] or mail Itskode (Attn: Privacy), Karachi, Sindh 74600, Pakistan. Phone: +92 (334) 013-9169.
