Privacy Policy
Last Updated: October 11, 2025
This Privacy Policy describes how your personal information is collected, used, and shared when you visit or use Ekinox ("the Service", "we", "us", or "our").
By using or accessing the Service, you confirm that you have read and understood this Privacy Policy, and you consent to the collection, use, and disclosure of your information as described herein.
Interpretation and Definitions
Interpretation
Under the following conditions, the meanings of words with capitalized first letters are defined. The following definitions have the same meaning whether they are written in singular or plural form.
Definitions
For the purposes of this Privacy Policy:
- Application or Service means the Ekinox web or mobile application or related services.
- Account means a unique account created for You to access our Service or parts of our Service.
- Affiliate means an entity that controls, is controlled by or is under common control with a party, where "control" means ownership of 50% or more of the shares, equity interest or other securities entitled to vote for election of directors or other managing authority.
- Business, for the purpose of the CCPA (California Consumer Privacy Act), refers to the Company as the legal entity that collects Consumers' personal information and determines the purposes and means of the processing of Consumers' personal information, or on behalf of which such information is collected and that alone, or jointly with others, determines the purposes and means of the processing of consumers' personal information, that does business in the State of California.
- Company (referred to as either "the Company", "We", "Us" or "Our" in this Agreement) refers to Ekinox. For the purpose of the GDPR, the Company is the Data Controller.
- Cookies are small files that are placed on Your computer, mobile device or any other device by a website, containing the details of Your browsing history on that website among its many uses.
- Country refers to: Quebec, Canada
- Data Controller, for the purposes of the GDPR (General Data Protection Regulation), refers to the Company as the legal person which alone or jointly with others determines the purposes and means of the processing of Personal Data.
- Device means any device that can access the Service such as a computer, a cellphone or a digital tablet.
- Do Not Track (DNT) is a concept that has been promoted by US regulatory authorities, in particular the U.S. Federal Trade Commission (FTC), for the Internet industry to develop and implement a mechanism for allowing internet users to control the tracking of their online activities across websites.
- Personal Data (or "Personal Information") is any information that relates to an identified or identifiable individual. For the purposes for GDPR, Personal Data means any information relating to You such as a name, an identification number, location data, online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity. For the purposes of the CCPA, Personal Data means any information that identifies, relates to, describes or is capable of being associated with, or could reasonably be linked, directly or indirectly, with You.
- Google Data means any data, content, or metadata obtained via Google APIs (including Google Workspace APIs).
- Generalized AI/ML model means an AI or ML model intended to be broadly trained across multiple users, not specific to a single user's data or behavior.
- User-facing features means features directly visible or used by the individual user through the app UI.
- Sale, for the purpose of the CCPA (California Consumer Privacy Act), means selling, renting, releasing, disclosing, disseminating, making available, transferring, or otherwise communicating orally, in writing, or by electronic or other means, a Consumer's Personal information to another business or a third party for monetary or other valuable consideration.
- Service Provider means any natural or legal person who processes the data on behalf of the Company. It refers to third-party companies or individuals employed by the Company to facilitate the Service, to provide the Service on behalf of the Company, to perform services related to the Service or to assist the Company in analyzing how the Service is used. For the purpose of the GDPR, Service Providers are considered Data Processors.
- Third-party Social Media Service refers to any website or any social network website through which a User can log in or create an account to use the Service.
- Usage Data refers to data collected automatically, either generated by the use of the Service or from the Service infrastructure itself (for example, the duration of a page visit).
- Website refers to Ekinox, accessible from www.ekinox.app
- You means the individual accessing or using the Service, or the company, or other legal entity on behalf of which such individual is accessing or using the Service, as applicable. Under GDPR (General Data Protection Regulation), You can be referred to as the Data Subject or as the User as you are the individual using the Service.
1. Information We Collect
Personal Data You Provide
When you sign up, link accounts, or use features, you may provide Personal Data such as:
- Name and email address
- Phone number and mailing address
- Profile picture, settings, and preferences
- Content you upload (e.g., documents, files) within Ekinox
- Any data you explicitly input or connect, including via Google integrations
Google Data via API Scopes
If you choose to connect your Google account (e.g., Google Workspace, Gmail, Drive, Calendar, Contacts), we may request specific scopes. Types of Google Data we may access include:
- Basic profile (name, email)
- Drive files and documents
- Calendar events
- Contacts
- Gmail messages (only if explicitly requested for a specific feature)
- Other Google Workspace content or metadata as needed per feature
We only request the minimal scopes necessary for the features you enable. We do not request scopes for unimplemented features.
Usage Data
We may also collect information on how the Service is accessed and used ("Usage Data"). This Usage Data may include information such as your computer's Internet Protocol address (e.g. IP address), browser type, browser version, the pages of our Service that you visit, the time and date of your visit, the time spent on those pages, unique device identifiers and other diagnostic data.
When You access the Service by or through a mobile device, We may collect certain information automatically, including, but not limited to, the type of mobile device You use, Your mobile device unique ID, the IP address of Your mobile device, Your mobile operating system, the type of mobile Internet browser You use, unique device identifiers and other diagnostic data.
We may also collect information that Your browser sends whenever You visit our Service or when You access the Service by or through a mobile device.
Tracking & Cookies Data
We use cookies and similar tracking technologies to track the activity on our Service and hold certain information.
Cookies are files with small amount of data which may include an anonymous unique identifier. Cookies are sent to your browser from a website and stored on your device. Tracking technologies also used are beacons, tags, and scripts to collect and track information and to improve and analyze our Service.
You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Service.
2. How We Use Your Information
We use the collected data for various purposes:
- To provide and maintain our Service
- To notify you about changes to our Service
- To allow you to participate in interactive features of our Service when you choose to do so
- To provide customer care and support
- To provide analysis or valuable information so that we can improve the Service
- To monitor the usage of the Service
- To detect, prevent and address technical issues
- To manage Your Account
- For the performance of a contract
- To contact You by email, telephone calls, SMS, or other equivalent forms of electronic communication
- To enable and support user-enabled integrations with Google services (e.g., syncing files or calendar) and provide personalization, suggestions, and user-specific automation for that individual user.
- To detect and prevent fraud, abuse, or security incidents and to comply with legal obligations.
Importantly: any Google Data used within Ekinox is used only for features tied to that specific user (user-facing features), and never for generalized AI/ML training or shared model improvement across users.
3. Transfer Of Data
Your information, including Personal Information, may be transferred to — and maintained on — computers located outside of your state, province, country or other governmental jurisdiction where the data protection laws may differ than those from your jurisdiction.
If you are located outside United States and choose to provide information to us, please note that we transfer the data, including Personal Information, to United States and process it there.
Your consent to this Privacy Policy followed by your submission of such information represents your agreement to that transfer.
4. Disclosure Of Data
Business Transactions
If the Company is involved in a merger, acquisition or asset sale, Your Personal Data may be transferred. We will provide notice before Your Personal Data is transferred and becomes subject to a different Privacy Policy.
Law Enforcement
Under certain circumstances, the Company may be required to disclose Your Personal Data if required to do so by law or in response to valid requests by public authorities (e.g. a court or a government agency).
Legal Requirements
Ekinox may disclose your Personal Information in the good faith belief that such action is necessary to:
- To comply with a legal obligation
- To protect and defend the rights or property of Ekinox
- To prevent or investigate possible wrongdoing in connection with the Service
- To protect the personal safety of users of the Service or the public
- To protect against legal liability
5. Security Of Data
The security of your data is important to us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your Personal Information, we cannot guarantee its absolute security.
6. Service Providers
We may employ third party companies and individuals to facilitate our Service ("Service Providers"), to provide the Service on our behalf, to perform Service-related services or to assist us in analyzing how our Service is used.
These third parties have access to your Personal Information only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.
7. Analytics
We may aggregate or anonymize non-Google data (not tied to personal identity) for internal analytics, product improvement, usage trends, or performance monitoring. This data cannot be tied back to individual users and is not used for generalized AI/ML training with Google Data.
8. Behavioral Remarketing
The Company uses remarketing services to advertise on third party websites to You after You visited our Service. We and Our third-party vendors use cookies to inform, optimize and serve ads based on Your past visits to our Service.
Google Ads (AdWords)
Google Ads remarketing service is provided by Google Inc. You can opt-out of Google Analytics for Display Advertising and customize the Google Display Network ads by visiting the Google Ads Settings page.
Twitter remarketing service is provided by Twitter Inc. You can opt-out from Twitter's interest-based ads by following their instructions.
Facebook remarketing service is provided by Facebook Inc. You can learn more about interest-based advertising from Facebook by visiting their Privacy Policy.
9. Payments
We may provide paid products and/or services within the Service. In that case, we may use third-party services for payment processing (e.g. payment processors).
We will not store or collect Your payment card details. That information is provided directly to Our third-party payment processors whose use of Your personal information is governed by their Privacy Policy. These payment processors adhere to the standards set by PCI-DSS as managed by the PCI Security Standards Council, which is a joint effort of brands like Visa, Mastercard, American Express and Discover. PCI-DSS requirements help ensure the secure handling of payment information.
Payment processors we work with:
- Stripe
10. Use of Google / Workspace APIs & Data — Limited Use
Affirmative Statement & Compliance
Ekinox's use, storage, processing, and transfer of Google Data (raw or derived) strictly adheres to the Google API Services User Data Policy, including the Limited Use requirements, and to the Google Workspace API user data policy (when applicable). We explicitly affirm that:
- Ekinox does not use, transfer, or allow Google Data to be used to train, improve, or develop generalized or non-personalized AI/ML models.
- Any processing of Google Data is limited to providing or improving user-facing features visible in the app UI.
- We do not allow third parties to access Google Data for purposes of training or model improvement.
- Transfers of Google Data are disallowed except in limited permitted cases.
Permitted Transfers & Data Use
Ekinox's use and transfer to any other app of information received from Google APIs will adhere to Google API Services User Data Policy, including the Limited Use requirements.
- To provide or improve user-facing features (with the user's explicit consent)
- For security, abuse investigation, or system integrity
- To comply with laws or legal obligations
- As part of a merger, acquisition, divestiture, or sale of assets, with explicit user consent
Human Access Restrictions
We restrict human review of Google Data strictly. No employee, contractor, or agent may view Google Data unless one of the following is true:
- The user gave explicit, documented consent to view specific items (e.g., "Let customer support view this email/file").
- It is necessary for security, abuse investigation, or legal process.
- Data is aggregated, anonymized, and used for internal operations only (without re-identification).
Scope Minimization & Justification
We only request scopes essential to features you opt into; we do not request broad or unused permissions. For each Google API scope we request, we maintain internal documentation justifying why that scope is needed and why narrower scopes are insufficient. Where possible, we follow incremental authorization and request additional scopes only when needed in context.
Secure Handling & Storage
- Google Data is encrypted in transit (TLS/HTTPS) and at rest.
- Access controls, role-based permissions, logging, and auditing protect data.
- OAuth tokens and credentials are stored securely (e.g., encrypted vault, hardware or secure key management).
- We regularly review security practices and infrastructure.
- If a security incident affects Google Data, we will notify Google as required and cooperate fully.
Retention & Deletion
We retain data only as long as necessary for the purposes disclosed:
- Account Data: Retained during active account + 30 days after deletion request
- Google API Data: Retained during feature use + 7 days after revocation or account deletion
- Usage Logs: 90 days for analytics; up to 1 year for security investigations
- Transaction Records: Up to 7 years for legal and tax compliance
When you revoke access, delete your account, or stop using a feature, we remove associated data within the timeframes above. You may request deletion via in-app settings or by contacting us; we will comply promptly.
11. Links To Other Sites
Our Service may contain links to other sites that are not operated by us. If you click on a third party link, you will be directed to that third party's site. We strongly advise you to review the Privacy Policy of every site you visit.
We have no control over and assume no responsibility for the content, privacy policies or practices of any third party sites or services.
12. Children's Privacy
Our Service does not address anyone under the age of 18 ("Children").
We do not knowingly collect personally identifiable information from anyone under the age of 18. If you are a parent or guardian and you are aware that your Children has provided us with Personal Information, please contact us. If we become aware that we have collected Personal Information from children without verification of parental consent, we take steps to remove that information from our servers.
13. Changes To This Privacy Policy
We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page.
We will let you know via email and/or a prominent notice on our Service, prior to the change becoming effective and update the "Last updated" date at the top of this Privacy Policy.
You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.
14. Your Data Protection Rights Under General Data Protection Regulation (GDPR)
If you are a resident of the European Economic Area (EEA), you have certain data protection rights. Ekinox aims to take reasonable steps to allow you to correct, amend, delete, or limit the use of your Personal Information.
If you wish to be informed what Personal Information we hold about you and if you want it to be removed from our systems, please contact us.
In certain circumstances, you have the following data protection rights:
- The right to access, update or to delete the information we have on you.
- The right of rectification. You have the right to have your information rectified if that information is inaccurate or incomplete.
- The right to object. You have the right to object to our processing of your Personal Information.
- The right of restriction. You have the right to request that we restrict the processing of your personal information.
- The right to data portability. You have the right to be provided with a copy of the information we have on you in a structured, machine-readable and commonly used format.
- The right to withdraw consent. You also have the right to withdraw your consent at any time where Ekinox relied on your consent to process your personal information.
Please note that we may ask you to verify your identity before responding to such requests.
You have the right to complain to a Data Protection Authority about our collection and use of your Personal Information. For more information, please contact your local data protection authority in the European Economic Area (EEA).
15. California Privacy Rights
If you are a California resident, you have specific rights under the California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA), including the right to know what personal information we collect, the right to delete your information, and the right to opt-out of the sale or sharing of your personal information.
Do Not Sell or Share My Personal Information
We do not sell your personal information for monetary consideration. However, some data sharing practices (such as analytics or advertising services) may be considered a "sale" or "share" under CCPA/CPRA. You have the right to opt-out of such data sharing. To exercise this right, contact us at alexandrelecorre.pro@gmail.com.
Global Privacy Control (GPC)
We recognize and honor Global Privacy Control (GPC) signals. When your browser sends a GPC signal, we will treat it as a valid request to opt-out of the sale or sharing of your personal information.
Shine The Light Law
California Civil Code Section 1798.83 permits California residents to request information about categories of personal information we disclosed to third parties for direct marketing purposes in the preceding calendar year.
To make a request under CCPA or the Shine The Light law, please submit your request using the contact information provided below.
16. Vulnerability Disclosure Policy
Introduction
Ekinox is dedicated to preserving data security by preventing unauthorized disclosure of information. This policy was created to provide security researchers with instructions for conducting vulnerability discovery activities and to provide information on how to report vulnerabilities that have been discovered. This policy explains which systems and sorts of activity are covered, how to send vulnerability reports, and how long we require you to wait before publicly reporting vulnerabilities identified.
Guidelines
We request that you:
- Notify us as soon as possible after you discover a real or potential security issue.
- Provide us a reasonable amount of time to resolve the issue before you disclose it publicly.
- Make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, and destruction or manipulation of data.
- Only use exploits to the extent necessary to confirm a vulnerability's presence. Do not use an exploit to compromise or obtain data, establish command line access and/or persistence, or use the exploit to "pivot" to other systems.
- Once you've established that a vulnerability exists or encounter any sensitive data (including personal data, financial information, or proprietary information or trade secrets of any party), you must stop your test, notify us immediately, and keep the data strictly confidential.
- Do not submit a high volume of low-quality reports.
Authorization
Security research carried out in conformity with this policy is deemed permissible. We'll work with you to swiftly understand and fix the problem, and Ekinox will not suggest or pursue legal action in connection with your study.
Scope
This policy applies to the following systems and services:
- www.ekinox.app website
- Ekinox web application
- Ekinox API services
Any service that isn't explicitly specified above, such as related services, is out of scope and isn't allowed to be tested. Vulnerabilities discovered in third-party solutions Ekinox interacts with are not covered by this policy and should be reported directly to the solution vendor in accordance with their disclosure policy (if any). Before beginning your inquiry, email us at alexandrelecorre.pro@gmail.com if you're unsure whether a system or endpoint is in scope.
Types of testing
The following test types are not authorized:
- Network denial of service (DoS or DDoS) tests
- Physical testing (e.g., office access, open doors, tailgating), social engineering (e.g., phishing, vishing), or any other non-technical vulnerability testing
Reporting a vulnerability
To report any security flaws, send an email to alexandrelecorre.pro@gmail.com. The next business day, we'll acknowledge receipt of your vulnerability report and keep you updated on our progress. Reports can be anonymously submitted.
Desirable information
In order to process and react to a vulnerability report, we recommend to include the following information:
- Vulnerability description
- Place of discovery
- Potential Impact
- Steps required to reproduce a vulnerability (include scripts and screenshots if possible)
If possible, please provide your report in English.
Our commitment
If you choose to give your contact information, we promise to communicate with you in a transparent and timely manner. We will acknowledge receipt of your report within three business days. We will keep you informed on vulnerability confirmation and remedy to the best of our capabilities. We welcome a discussion of concerns and are willing to engage in a discourse.
18. Contact Us
If you have any questions about this Privacy Policy, please contact us at: alexandrelecorre.pro@gmail.com
- Email: alexandrelecorre.pro@gmail.com
- Mailing Address: Ekinox, 80 Langton St, San Francisco, CA 94133, USA
We will respond to your request within a reasonable timeframe.