Privacy by design.Not an afterthought.
Signal intelligence processes sensitive B2B data. Kinetik is built with privacy principles embedded in the architecture — data minimization, purpose limitation, and transparent controls for customers.
Privacy principles
How we protect your data
Our approach to privacy is designed for enterprise B2B data processing requirements.
Data minimization
We only collect and process data necessary for the signal intelligence workflows you configure. No hidden data collection or secondary uses.
Purpose limitation
Customer data is used exclusively for the contracted services. We don't sell data, build profiles for advertising, or use data for unrelated purposes.
Secure processing
All data processing occurs within secure, isolated environments with encryption and access controls. Processing activities are logged and auditable.
Retention controls
Customers control data retention periods. Data is deleted upon request and at contract termination per agreed timelines.
Data residency
EU data residency options available. Data transfer mechanisms (SCCs) in place for cross-border data flows where required.
Individual rights
We support customers in responding to individual rights requests (access, deletion, portability) under GDPR and CCPA.
Privacy Policy Summary
This is a summary of key privacy terms. The full privacy policy governs data processing activities. For questions, contact privacy@kinetikb2b.ai (placeholder).
Data we process
Kinetik processes B2B contact and account data that customers provide or authorize us to access from integrated systems. This includes CRM records, engagement signals, and enrichment data necessary for signal intelligence workflows.
How we use data
Customer data is used exclusively to provide contracted signal intelligence services — scoring, routing, and workflow orchestration. We do not use customer data for advertising, sell data to third parties, or train ML models on customer data without explicit consent.
Data sharing
Customer data is shared only with authorized sub-processors necessary to provide services (cloud infrastructure, specific integrations). All sub-processors are contractually bound to equivalent privacy protections.
Data retention
Customers configure data retention periods based on their requirements. Data is securely deleted upon request or at contract termination per agreed timelines (typically 30-90 days).
Data Processing Agreement
Enterprise customers receive a Data Processing Agreement (DPA) that defines roles, responsibilities, and technical measures for GDPR compliance.
Request DPA →Sub-processor List
We maintain a list of authorized sub-processors and notify customers of changes. Sub-processors are vetted for security and privacy compliance.
Request sub-processor list →Privacy questions?
Our team can discuss privacy requirements, provide documentation, and address specific concerns for your evaluation.