Our Commitment to Your Data

At Custodia Labs, we believe privacy is a fundamental right. Here's how we protect and respect your data.

Core Principles

Your Data, Your Control

You maintain complete ownership of your data. We act as a processor, never claiming ownership or selling your information.

Security by Design

Industry-standard encryption, access controls, and security practices are built into every layer of our platform.

Transparent Practices

We're clear about what data we collect, why we collect it, and how it's used to improve our services.

Purpose-Driven Collection

We only collect data necessary for providing and improving our services, with clear purposes for each type.

What We Collect and Why

Account & Identity

  • Name, email address, and organization details
  • User roles and permissions within your organization
  • Authentication tokens and session information
  • Billing and payment information for paid accounts

Required for account creation, authentication, access control, and billing.

Connected Application Data

  • Content from connected sources (emails, documents, messages, code)
  • Metadata (timestamps, authors, permissions, file types)
  • User relationships and communication patterns
  • Folder structures and organizational hierarchies

This is the core data that powers search functionality. We index and process this to deliver search results while maintaining your existing permissions.

Search & Interaction Data

  • Search queries and click-through data
  • Result rankings and relevance feedback
  • Feature usage patterns and preferences
  • Time spent and interaction sequences

Used to improve search relevance, personalize results, and enhance the product experience.

Technical & Performance Data

  • IP addresses and device information
  • API calls and response times
  • Error logs and debugging information
  • Browser type and operating system

Ensures platform security, troubleshoots issues, and optimizes performance.

Administrative Data

  • Admin configurations and settings
  • Integration credentials (stored encrypted)
  • Audit logs and compliance records
  • Data retention and deletion preferences

Enables administrators to manage their organization's instance and maintain compliance.

Your Rights

Access Your Data

Request a complete copy of all data we have about you at any time.

Data Portability

Export your data in standard formats for easy migration.

Correction & Deletion

Update incorrect information or request complete data deletion.

Opt-Out Options

Control marketing communications and optional data collection.

How We Protect Your Data

Data Encryption

Industry-standard encryption for data at rest and TLS for data in transit

Multi-Tenant Isolation

Logical separation between customers with optional dedicated infrastructure for enterprise needs

Access Controls

Role-based permissions, authentication requirements, and comprehensive audit logging

Compliance Focus

Working toward GDPR and CCPA compliance, with SOC 2 on our roadmap

Questions About Your Data?

Our privacy team is here to help with any concerns or requests.