This Privacy Policy describes how Compact Machines Inc. (“Compact Machines,” “We,” “Us,” or “Our”) collects, uses, discloses, and protects personal information when you access or use our website, platform, and related services (“Services”). By using the Services, you agree to the practices described in this Policy.
Compact Machines is committed to protecting your privacy, maintaining confidentiality, and complying with applicable data protection laws, including the GDPR, CCPA/CPRA, and PIPEDA, where applicable.
1.Information We Collect
1.1 Information You Provide
We may collect personal information you voluntarily provide, including:
You may also provide data when filling out forms, requesting demos, or communicating through the website.
If you choose to connect optional third-party integrations—such as QuickBooks, Google Drive, Dropbox, CRM systems, or Virtual Data Rooms (VDRs)—we collect only the data you explicitly authorize via the integration permissions. This may include financial records, documents, file metadata, folder structures, or other information required to provide Platform functionality. Compact Machines does not access or retrieve data beyond what you authorize and you may revoke integration access at any time.
1.3 Automatically Collected Information
We automatically collect certain technical and usage information, such as:
This information is collected for security, troubleshooting, fraud monitoring, and optimization.
We use cookies, web beacons, embedded scripts, and similar technologies to:
You may disable cookies in your browser settings. Disabling cookies may limit certain website features.
When you inquire about products or services, we may collect:
If you interact with features such as “share,” “like,” or sign-in with social accounts, we may receive information from those platforms in accordance with your privacy settings.
We may use embedded scripts to collect usage data during interactions with the Services. These scripts load temporarily, operate only while you interact with the site, and are removed thereafter.
2. How We Use Your Information We collect
We use the information we collect solely for legitimate business purposes, including to:
Compact Machines does not:
All processing is restricted to the purposes described above.
3. Data Security
We employ enterprise-grade security practices, including:
3.1 Compliance & Certifications
Compact Machines follows industry-standard security practices equivalent to SOC 2 Type II controls. We are currently completing our formal SOC 2 Type II audit (target completion Q2 2026). Upon request and under NDA, we provide a detailed bridging letter, penetration-test summary, and current control matrix to paying customers.
Access to production systems is limited to authorized personnel and logged regularly.
4. Data Retention
We retain User Content only as long as necessary to operate the Platform or to comply with legal obligations. You may request data deletion at any time, and Compact Machines will delete or anonymize data according to our retention schedule unless retention is legally required.
5. Third-Party Processors
Compact Machines may engage sub-processors to support infrastructure, analytics, monitoring, and operational functions. Such processors include:
All sub-processors are contractually bound to confidentiality and security obligations.
6. International Data Transfers
Your data may be processed or stored globally depending on your deployment option (e.g., Canadian region, US region, EU region, custom VPC, or on-prem). When transferring data outside your jurisdiction:
We ensure all transfers are protected by recognized legal mechanisms.
7. Your Rights
Under GDPR (EU/UK residents):
You may:
Under CCPA/CPRA (California residents):
You may:
Compact Machines does not sell or share personal information.
Under PIPEDA (Canada):
You may:
Submit requests to: support@compactmachines.ai
8. Contact Information
For privacy-related questions or rights requests, contact:
Email: support@compactmachines.ai
DATA PROCESSING AGREEMENT (DPA)
This DPA supplements the Terms of Service when Compact Machines processes personal data or confidential business data on behalf of the Customer.
1. Roles of the Parties
The Customer is the Data Controller.
Compact Machines Inc. and Compact Machines Inc. are the Data Processors.
Under CCPA, Compact Machines acts as a Service Provider.
Under PIPEDA, Compact Machines is an Organization Processing on Your Behalf.
2. Purpose of Processing
Compact Machines processes Customer Data solely for:
Compact Machines does not process Customer Data for its own purposes.
3. Processor Obligations
Compact Machines shall:
Compact Machines will not:
4. Customer Obligations
The Customer agrees to:
5. Sub-Processors
Compact Machines may use vetted sub-processors, including:
A current list of sub-processors is available upon request.
6. International Transfers
Compact Machines may store or process data globally. For cross-border transfers:
All transfers follow applicable legal requirements.
7. Data Subject Rights Assistance
Compact Machines will assist Customer in fulfilling data subject rights requests under GDPR, CCPA, or PIPEDA, including access, correction, restriction, deletion, and portability.
8. Return or Deletion of Data
Upon Customer request or termination of services, Compact Machines will delete or return all Customer Data within thirty (30) days, except where retention is legally required. Backup data is purged according to scheduled rotation.
9. Contact for DPA
All privacy and DPA inquiries:
support@compactmachines.ai
COOKIES POLICY
Compact Machines uses cookies and similar technologies to operate and improve the Platform. Cookies may collect information such as browser type, session duration, pages visited, and technical identifiers.
Compact Machines uses:
You may disable cookies through your browser settings, but certain features of the Platform may not function properly without them.
SECURITY POLICY
Compact Machines is committed to maintaining a secure environment for all users. Our security practices include:
Compact Machines maintains incident response protocols and will notify affected users of data breaches without undue delay as required by applicable law.