Trust · Privacy

Privacy by design.Not an afterthought.

Signal intelligence processes sensitive B2B data. Kinetik is built with privacy principles embedded in the architecture — data minimization, purpose limitation, and transparent controls for customers.

Privacy principles

How we protect your data

Our approach to privacy is designed for enterprise B2B data processing requirements.

Data minimization

We only collect and process data necessary for the signal intelligence workflows you configure. No hidden data collection or secondary uses.

Purpose limitation

Customer data is used exclusively for the contracted services. We don't sell data, build profiles for advertising, or use data for unrelated purposes.

Secure processing

All data processing occurs within secure, isolated environments with encryption and access controls. Processing activities are logged and auditable.

Retention controls

Customers control data retention periods. Data is deleted upon request and at contract termination per agreed timelines.

Data residency

EU data residency options available. Data transfer mechanisms (SCCs) in place for cross-border data flows where required.

Individual rights

We support customers in responding to individual rights requests (access, deletion, portability) under GDPR and CCPA.

Legal

Privacy Policy Summary

This is a summary of key privacy terms. The full privacy policy governs data processing activities. For questions, contact privacy@kinetikb2b.ai (placeholder).

Data we process

Kinetik processes B2B contact and account data that customers provide or authorize us to access from integrated systems. This includes CRM records, engagement signals, and enrichment data necessary for signal intelligence workflows.

How we use data

Customer data is used exclusively to provide contracted signal intelligence services — scoring, routing, and workflow orchestration. We do not use customer data for advertising, sell data to third parties, or train ML models on customer data without explicit consent.

Data sharing

Customer data is shared only with authorized sub-processors necessary to provide services (cloud infrastructure, specific integrations). All sub-processors are contractually bound to equivalent privacy protections.

Data retention

Customers configure data retention periods based on their requirements. Data is securely deleted upon request or at contract termination per agreed timelines (typically 30-90 days).

Note: This summary is for informational purposes. Refer to the full privacy policy and data processing agreement for complete terms.

Data Processing Agreement

Enterprise customers receive a Data Processing Agreement (DPA) that defines roles, responsibilities, and technical measures for GDPR compliance.

Request DPA →

Sub-processor List

We maintain a list of authorized sub-processors and notify customers of changes. Sub-processors are vetted for security and privacy compliance.

Request sub-processor list →

Privacy questions?

Our team can discuss privacy requirements, provide documentation, and address specific concerns for your evaluation.

Contact usView security

No hard sell. Clear evaluation plan.