Privacy Policy
- Effective date
- December 2024
- Last updated
- December 2024
- Privacy contact
- privacy@auroracommand.ai
What we collect
- Information you provide to us (such as contact forms and resource downloads).
- Account and authentication information for portal access.
- Content you upload or connect via integrations (such as evidence and documents).
- Operational and security logs used to protect the service and maintain audit trails.
How we use information
- Provide and maintain the service and related features.
- Respond to requests, support inquiries, and demo requests.
- Improve product experience, performance, and reliability.
- Detect, prevent, and investigate security issues or abuse.
- Comply with legal obligations and enforce our terms.
Data retention
We retain information only as long as needed to provide the service, maintain security and audit logs, comply with legal obligations, and resolve disputes. Retention may vary by data type and contract.
Security
We use security controls designed to protect customer information, including encryption, access controls, and audit logging. No method of transmission or storage is completely secure.
International transfers
If you access Aurora from outside the United States, your information may be processed in the United States or other jurisdictions where we or our service providers operate.
Your rights and choices
- You can opt out of marketing emails using the unsubscribe link in the message.
- You can request access, correction, or deletion where applicable.
- You can contact us to ask about retention and account closure.
Subprocessors
We maintain a list of subprocessors that may process customer data. For procurement needs, request access through the Trust Center tiers or request security documentation.
Changes to this policy
We may update this policy to reflect changes in our practices or for legal reasons. We will update the dates at the top of this page when changes are published.
Contact
Privacy questions: privacy@auroracommand.ai.
Need a DPA or subprocessor list?
Request security documentation for procurement artifacts, or use the Trust Center for tiered sharing when an agreement is required.