Privacy Policy

Effective Date: May 1, 2026

This Privacy Policy explains how CompWate LLC, a Wyoming limited liability company (“CompWate,” “Press.js Cloud,” “we,” “us,” or “our”), collects, uses, discloses, transfers, stores, and protects information when you access or use our websites, applications, APIs, command-line tools, hosted rendering services, documentation, related products and services, and any other offerings that link to or incorporate this Privacy Policy (collectively, the “Services”).

Our website is cloud.pressjs.dev. You may contact us at [email protected].

Our mailing address is:

CompWate LLC

30 N Gould St Ste R

Sheridan, WY 82801

United States

By using the Services, you acknowledge that your information may be processed as described in this Privacy Policy. If you use the Services on behalf of a company, organization, or other legal entity, you are responsible for ensuring that your use of the Services complies with applicable privacy and data protection laws.

Important Notice: This Privacy Policy is incorporated into our Terms of Service. This Privacy Policy is intended to provide transparency, but it does not create contractual rights beyond those required by applicable law or expressly stated in our Terms of Service.

1. Scope of This Privacy Policy

This Privacy Policy applies to information we process in connection with the Services, including, without limitation:

workspace registration and authentication;

use of our dashboard, APIs, CLI, and documentation;

upload, deployment, rendering, storage, and download workflows;

support, billing, security, analytics, and communications;

websites and pages controlled by us;

Deploys, versions, render jobs, payloads, environment variables, secrets, and Outputs;

any other feature, workflow, product, or service that links to or incorporates this Privacy Policy.

This Privacy Policy does not apply to third-party websites, services, integrations, payment processors, authentication providers, hosting providers, open-source projects, package registries, browsers, external resources, similar third-party tools, or any other third parties that we do not control. Their privacy practices are governed by their own policies.

2. Key Commitments About Deploy Content

This section explains our commitments regarding information contained within your Deploys and rendering workflows.

For purposes of this Privacy Policy, “Deploy Content” means Customer Content and related service materials that you upload, submit, configure, process, store, or generate through the Services, including, without limitation:

source files, built files, HTML, CSS, JavaScript, assets, fonts, images, and documents;

deploy artifacts and versions;

render job payloads;

environment variables;

secrets, API keys, tokens, credentials, and other sensitive configuration values;

generated PDFs and other Outputs;

metadata, configuration files, and service records associated with Deploys;

files, data, or content submitted through APIs, CLI tools, the dashboard, or other Service interfaces.

2.1 We Do Not Sell Deploy Content

We do not sell Deploy Content.

We do not sell, rent, trade, broker, disclose for money, or otherwise commercially exploit the contents of your Deploys, code, payloads, environment variables, secrets, credentials, generated PDFs, or other Outputs.

2.2 We Do Not Provide Deploy Content to Third Parties Except in Limited Cases

We do not provide Deploy Content to third parties except in the limited circumstances described in this Privacy Policy, including, without limitation:

to service providers who process it only as needed to provide, secure, operate, store, transmit, render, support, or maintain the Services;

when you direct us to do so, including, without limitation, by using an integration, sharing a workspace, downloading an Output, inviting a team member, or configuring a workflow;

when necessary to comply with applicable law, legal process, court orders, subpoenas, governmental requests, or regulatory obligations;

when necessary to protect the rights, safety, security, property, or integrity of CompWate, the Services, users, third parties, or the public;

when necessary to investigate, prevent, or respond to fraud, abuse, security incidents, policy violations, unauthorized access, or misuse of the Services;

in connection with an actual or proposed merger, acquisition, financing, reorganization, bankruptcy, sale of assets, change of control, or similar corporate transaction, subject to appropriate confidentiality or data protection measures where applicable;

when otherwise reasonably necessary to provide, protect, operate, enforce, support, or improve the Services, or in other circumstances permitted or required by applicable law.

2.3 We Do Not Use Deploy Content for Advertising

We do not use Deploy Content to build advertising profiles, sell advertising, target third-party ads, or market third-party products to you.

2.4 Aggregated and De-Identified Statistics

We may collect and use aggregated, anonymized, or de-identified statistics derived from use of the Services to understand, operate, secure, and improve the Services.

These statistics may include, without limitation:

total render volume;

aggregate render duration;

aggregate error rates;

aggregate storage usage;

aggregate API usage;

aggregate feature usage;

aggregate performance metrics;

aggregate plan-limit or quota trends;

aggregate reliability and availability metrics;

other aggregated or de-identified operational, security, billing, product, or reliability measurements.

We do not use these aggregated or de-identified statistics to identify the contents of a specific Deploy, reveal your code, expose your secrets, disclose your payloads, or reconstruct your Customer Content or Outputs.

2.5 No General AI Training on Deploy Content

We do not use Deploy Content or Outputs to train general-purpose artificial intelligence models unless we separately and clearly state otherwise and obtain any consent required by applicable law.

3. Information We Collect

We collect information in several ways, including information you provide to us, information generated through your use of the Services, information processed as part of your Deploy Content, information received from third parties, and other information described in this Privacy Policy or permitted by applicable law.

3.1 Workspace Information

We may collect information including, without limitation:

name;

email address;

username or workspace identifier;

company or organization name;

password or authentication credentials, where applicable;

login method;

workspace settings;

role, permissions, team, workspace, or organization membership;

communications preferences;

other profile, workspace, verification, or administrative information you provide or that is generated through the Services.

3.2 Billing and Transaction Information

If you purchase paid Services, we or our payment processors may collect information including, without limitation:

billing name;

billing email;

billing address;

payment method details;

tax information;

invoices, receipts, subscription status, plan, usage, and payment history;

other billing, subscription, tax, compliance, or transaction-related information.

We generally do not store full payment card numbers. Payment information may be processed by third-party payment processors subject to their own terms and privacy policies.

3.3 Usage and Technical Information

When you use the Services, we may collect technical and usage information including, without limitation:

IP address;

browser type and version;

device identifiers and characteristics;

operating system;

user agent;

referring and exit pages;

pages viewed;

timestamps;

API requests;

CLI usage;

authentication events;

deploys, versions, aliases, render jobs, and job status;

file sizes, storage usage, render time, concurrency, and quota usage;

error messages, diagnostic data, logs, and performance data;

approximate location inferred from IP address;

security, fraud-prevention, and abuse-detection signals;

other usage, telemetry, diagnostic, operational, or technical signals generated by the Services.

3.4 Customer Content and Deploy Content

“Customer Content” means any files, code, documents, data, payloads, fonts, images, text, secrets, environment variables, configurations, instructions, metadata, or other materials that you upload, submit, transmit, store, process, or make available through the Services.

Customer Content and Deploy Content may include personal information depending on what you choose to upload or process. For example, if you use the Services to render invoices, certificates, reports, forms, statements, or other documents or materials, those materials may contain personal information.

You are responsible for ensuring that you have all rights, permissions, notices, consents, legal bases, and safeguards required to upload, process, render, store, and distribute Customer Content and Deploy Content through the Services.

3.5 Outputs

The Services may generate PDFs or other outputs from Customer Content (“Outputs”). Outputs are generated through rendering and document processing workflows that may execute on globally distributed servers. Outputs may contain personal information if the underlying Customer Content contains personal information.

We process Outputs to provide the Services, including rendering, storing, delivering, downloading, retaining, deleting, troubleshooting, and securing them.

3.6 Support and Communications

If you contact us, we may collect information including, without limitation:

your name;

email address;

organization information;

support messages;

attachments or screenshots you provide;

diagnostic information;

records of our communications with you;

other information you provide or that we generate while responding to your request.

3.7 Cookies and Similar Technologies

We may use cookies, local storage, pixels, SDKs, and similar technologies for purposes including, without limitation:

keeping you signed in;

remembering preferences;

securing workspaces;

preventing fraud and abuse;

measuring usage and performance;

understanding how users interact with the Services;

improving the Services;

supporting other security, performance, personalization, analytics, and operational purposes described in this Privacy Policy.

You may control cookies through your browser settings. Disabling cookies may affect functionality.

3.8 Information from Third Parties

We may receive information from third parties, including, without limitation:

authentication providers;

payment processors;

infrastructure providers;

analytics providers;

fraud-prevention or security providers;

business partners;

public sources;

users who invite you to an organization, team, or workspace;

other third-party or publicly available sources that are relevant to providing, securing, supporting, or improving the Services.

4. How We Use Information

We use information for the following purposes, including, without limitation:

to provide, operate, maintain, and improve the Services;

to create and manage workspaces;

to authenticate users and protect workspaces;

to process uploads, deploys, versions, render jobs, payloads, Outputs, downloads, and storage;

to provide APIs, CLI functionality, dashboards, documentation, and support;

to process billing, subscriptions, invoices, taxes, usage, credits, and payments;

to monitor usage, quotas, plan limits, performance, reliability, and availability;

to detect, prevent, investigate, and respond to fraud, abuse, security incidents, policy violations, and unauthorized access;

to debug, troubleshoot, test, and develop the Services;

to communicate with you about the Services, including workspace notices, security notices, support responses, billing notices, product updates, and administrative messages;

to enforce our Terms of Service and other policies;

to comply with legal obligations, court orders, subpoenas, regulatory requests, law enforcement requests, and applicable laws;

to protect the rights, safety, property, and interests of CompWate, users, third parties, and the public;

to perform aggregated or de-identified analytics and understand how the Services are used;

to evaluate, develop, and improve features, performance, pricing, limits, reliability, security, and user experience;

for other purposes disclosed to you, authorized by you, reasonably necessary to operate or improve the Services, or permitted or required by applicable law.

We do not use Deploy Content to sell advertising, target third-party advertising, or build third-party marketing profiles.

5. How We Share Information

We may share information only as described below, elsewhere in this Privacy Policy, with your direction or consent, or as otherwise permitted or required by applicable law.

5.1 Service Providers

We may share information with vendors, contractors, and service providers who help us operate the Services, including, without limitation, providers of:

cloud infrastructure;

hosting;

content delivery;

distributed computing;

storage;

databases;

logging and monitoring;

analytics;

payment processing;

authentication;

email delivery;

customer support;

security;

fraud prevention;

error tracking;

business operations;

other technical, operational, professional, legal, compliance, security, or business support services.

These service providers may process information only as needed to provide services to us and are expected to protect information appropriately.

Where service providers process Deploy Content, they do so only as necessary to provide, secure, maintain, transmit, store, render, or support the Services.

5.2 Payment Processors

Payment information may be processed by third-party payment processors. We may receive limited information including, without limitation, payment status, subscription status, billing details, invoices, transaction identifiers, and other payment-related records.

5.3 Legal Compliance and Protection

We may disclose information, including Deploy Content, if we believe in good faith that disclosure is reasonably necessary for purposes including, without limitation:

complying with applicable law;

responding to legal process, subpoenas, court orders, warrants, or governmental requests;

complying with regulatory, law enforcement, national security, or public authority requests;

enforcing our Terms of Service or other agreements;

detecting, preventing, or investigating fraud, abuse, security incidents, or technical issues;

protecting the rights, property, safety, or security of CompWate, users, third parties, or the public;

preventing harm, unauthorized access, service misuse, or illegal activity;

responding to emergencies, preventing imminent harm, or addressing other circumstances permitted or required by applicable law.

Where legally permitted and reasonably practicable, we may attempt to notify you before disclosing Deploy Content in response to legal process. We may not provide notice where prohibited by law, court order, emergency circumstances, security risk, or governmental request.

5.4 Business Transfers

We may disclose or transfer information in connection with an actual or proposed merger, acquisition, financing, reorganization, bankruptcy, sale of assets, change of control, or similar corporate transaction.

If Deploy Content is involved in such a transaction, we will seek to handle it consistently with this Privacy Policy and appropriate confidentiality or data protection obligations where applicable.

5.5 Organization Workspaces

If you use the Services as part of an organization, team, workspace, or company workspace, information about your workspace and usage may be visible to administrators or authorized users of that organization, including your email address, role, activity, deploys, usage, and related workspace information.

Organization administrators may be able to access, manage, export, delete, or restrict access to Deploy Content associated with that organization.

5.6 With Your Direction or Consent

We may share information when you direct us to do so, authorize an integration, invite another user, connect a third-party service, request support, download or share an Output, configure a workflow, or otherwise consent, or in other circumstances where you direct, authorize, request, or consent to the disclosure.

5.7 Aggregated or De-Identified Information

We may use and share aggregated, anonymized, or de-identified information that does not reasonably identify you, your users, your Deploy Content, your code, your secrets, your payloads, or your Outputs.

We may use this information for analytics, benchmarking, reliability, security, capacity planning, service improvement, and business reporting.

6. International Data Transfers and Global Processing

6.1 Global Infrastructure and Servers

We are based in the United States. The Services are provided using globally distributed infrastructure, including, without limitation, cloud regions, content delivery networks, and servers operated by us and our service providers.

The Services include compute-intensive operations, including, without limitation, PDF rendering, document generation, image processing, HTML-to-PDF conversion, font subsetting, and related rendering and transformation workflows, that may be executed on globally distributed servers and infrastructure rather than in a single centralized data center. This architecture is designed to reduce latency, improve performance, increase reliability, and enhance the user experience.

6.2 Where Processing Occurs

Your information, including Customer Content, Deploy Content, and Outputs, may be transmitted, routed, cached, processed, accessed, rendered, or temporarily stored in multiple countries or regions as part of providing, securing, accelerating, and maintaining the Services. This may include, without limitation, countries or regions outside your country of residence.

Specifically:

compute-intensive rendering and document processing (including PDF generation, HTML rendering, image processing, font subsetting, and related workflows) may occur on servers located in various countries and regions worldwide, potentially including, without limitation, North America, South America, Europe, the Middle East, Africa, Asia Pacific, and Oceania;

static assets, cached content, and intermediary processing artifacts may be cached on servers in multiple regions to improve delivery speed, availability, and reliability;

API requests, CLI commands, authentication events, and other control-plane operations may be routed through multiple geographic regions for performance, redundancy, and security purposes;

logs, metrics, telemetry, and diagnostic data may be generated, processed, and stored in multiple regions to support monitoring, security, reliability, and operational needs;

other routing, storage, caching, processing, support, compliance, security, or operational activities may occur in additional locations as needed to provide, protect, operate, support, or improve the Services.

6.3 Storage and Transience

The primary or final persistent storage location for workspace data, Customer Content, Deploy Content, Outputs, logs, backups, and related service data may be the United States, unless we state otherwise or agree otherwise in writing.

Distributed processing is generally transient and compute-only — the results are delivered to you and may be persisted in primary storage, but the processing environment itself may not retain your Customer Content or Deploy Content after processing completes, subject to ordinary caching, logging, and operational practices.

6.4 Acknowledgment and Safeguards

By using the Services, you acknowledge that your information may be transferred to, processed in, rendered in, temporarily stored in, and persistently stored in the United States and other jurisdictions, where privacy and data protection laws may differ from those in your jurisdiction. Some jurisdictions may not provide the same level of data protection as your country of residence.

Where required by applicable law, we use appropriate safeguards for international transfers, which may include, without limitation, contractual protections (including, without limitation, standard contractual clauses or data processing agreements), transfer impact assessments, technical measures (including, without limitation, encryption in transit and at rest), organizational measures, or other legally recognized mechanisms. You may contact us at [email protected] for information about the specific safeguards applicable to international transfers of your information.

6.5 Your Compliance Obligations

You are responsible for ensuring that your use of the Services — including the international transfer, distributed processing, and storage of Customer Content, Deploy Content, and Outputs — complies with applicable data protection, privacy, export control, sanctions, consumer protection, data localization, sector-specific, and other laws in your jurisdiction and the jurisdictions where your end users, customers, or data subjects are located. If your use of the Services is subject to data residency, data localization, sovereignty, or similar requirements, you should contact us at [email protected] to discuss whether the Services can be configured to meet your requirements.

7. Data Retention and Deletion

We retain information for as long as reasonably necessary, including, without limitation, to provide the Services, comply with legal obligations, resolve disputes, enforce agreements, prevent abuse, maintain security, and operate our business.

Retention periods may vary depending on the type of information, plan, product feature, workspace status, retention settings, legal requirements, backup cycles, security needs, technical constraints, and other operational or legal factors.

7.1 Typical Retention Categories

Typical retention categories include, without limitation:

workspace information may be retained while your workspace is active and for a reasonable period afterward;

billing and transaction records may be retained as required for tax, accounting, audit, fraud prevention, chargeback, and legal purposes;

logs may be retained for security, debugging, abuse prevention, analytics, reliability, and operational purposes;

Customer Content, Deploy Content, and Outputs may be retained according to your plan, settings, product behavior, deletion requests, backup cycles, and legal obligations;

transient or temporary Outputs may expire or be deleted automatically;

secrets and environment variables may be retained while needed to provide the Services or until deleted, rotated, overwritten, or removed through workspace controls;

backups may persist for a limited period after deletion before being overwritten, isolated, expired, or removed.

7.2 Deletion Requests

You may request deletion of personal information by contacting [email protected]. You may also be able to delete certain Customer Content, Deploy Content, Outputs, deploys, versions, aliases, API keys, secrets, or workspace data through the Services.

We may need to verify your identity, workspace ownership, authority, jurisdiction, and request details before fulfilling a deletion request.

7.3 Deletion Is Not Always Immediate

Because the Services operate on globally distributed infrastructure, deletion may not be immediate across all systems, regions, caches, logs, replicas, queues, backups, disaster recovery systems, service-provider systems, and other technical or operational locations.

When you delete information or when we approve a deletion request, we will take reasonable steps to delete, de-identify, or disable access to the relevant information from active production systems within a reasonable period, unless retention is required or permitted by law, security, fraud prevention, dispute resolution, accounting, backup integrity, service continuity, legitimate business needs, or other lawful grounds.

Copies may remain for a limited time in:

encrypted backups;

disaster recovery systems;

temporary caches (including CDN caches and other service caches);

logs and security records;

replication systems;

archival systems;

systems of service providers acting on our behalf;

other technical or operational storage locations used to provide, secure, maintain, or support the Services.

These residual copies (including copies in CDN caches and other service caches) are generally not used for active production purposes and will be deleted, overwritten, isolated, expired, or made inaccessible according to ordinary backup, retention, security, cache eviction, and deletion cycles.

7.4 Information We May Retain

We may retain certain information after a deletion request where necessary or permitted, including, without limitation, to:

comply with law, legal process, tax, accounting, or audit obligations;

complete transactions you requested;

provide the Services you requested;

detect, prevent, or investigate fraud, abuse, security incidents, or unauthorized access;

enforce our Terms of Service or other agreements;

resolve disputes;

maintain business records;

protect the rights, safety, property, and security of CompWate, users, third parties, or the public;

preserve records required for legal claims or defenses;

maintain backup integrity and service continuity until backup expiration;

address other operational, security, legal, compliance, or business needs permitted by applicable law.

7.5 Aggregated and De-Identified Data

We may retain aggregated, anonymized, or de-identified information after deletion of personal information or Deploy Content, provided it does not reasonably identify you, your users, your Deploy Content, your code, your secrets, your payloads, or your Outputs.

7.6 California Deletion Rights

California residents may have the right to request deletion of personal information collected from them, subject to exceptions. California’s official CCPA materials describe consumer rights including the right to know, delete, correct, and opt out of certain uses of personal information.

8. Security

We use reasonable administrative, technical, and organizational measures designed to protect information against unauthorized access, loss, misuse, disclosure, alteration, and destruction.

However, no method of transmission, processing, or storage is completely secure. We cannot guarantee absolute security.

You are responsible for the following, including, without limitation:

securing your workspace credentials;

protecting API keys, tokens, secrets, and webhooks;

configuring your applications securely;

limiting access to Customer Content, Deploy Content, and Outputs;

reviewing Outputs before distribution;

using appropriate safeguards for personal, sensitive, regulated, or confidential data;

rotating secrets and credentials when appropriate;

taking other reasonable steps required by your use case, industry, jurisdiction, or data sensitivity.

If you believe your workspace or data has been compromised, contact us at [email protected].

Security testing, vulnerability research, scanning, probing, exploitation, or assessment of the Services is governed by our Terms of Service and requires our prior express written authorization. If you believe you have discovered a vulnerability, you must follow the coordinated vulnerability disclosure process described in our Terms of Service.

9. Your Privacy Choices

Depending on your location and applicable law, you may have rights including, without limitation, to:

access personal information;

correct inaccurate personal information;

delete personal information;

obtain a copy of personal information;

object to or restrict certain processing;

withdraw consent where processing is based on consent;

opt out of certain marketing communications;

appeal certain privacy decisions;

limit certain uses or disclosures of sensitive personal information;

opt out of sale, sharing, or targeted advertising where applicable.

To make a request, contact [email protected].

We may need to verify your identity, workspace ownership, authority, jurisdiction, and request details before fulfilling a request. We may deny or limit requests where permitted by law, including where compliance would violate another person’s rights, interfere with security, conflict with legal obligations, reveal trade secrets, compromise the Services, require us to retain information, or involve other circumstances permitted or required by applicable law.

10. California Privacy Notice

This section applies to California residents to the extent the California Consumer Privacy Act, as amended by the California Privacy Rights Act (“CCPA”), applies to us.

California’s official CCPA materials describe consumer rights including the right to know, delete, correct, opt out of sale or sharing, limit certain uses and disclosures of sensitive personal information, and not be discriminated against for exercising privacy rights.

10.1 Categories of Personal Information We May Collect

In the past twelve (12) months, we may have collected the following categories of personal information, including, without limitation:

Identifiers, including, without limitation, name, email address, workspace ID, IP address, user ID, and similar identifiers.

Commercial information, including, without limitation, subscription plan, invoices, payment status, transaction history, and usage records.

Internet or network activity information, including, without limitation, logs, pages viewed, API requests, CLI activity, device information, browser information, and interaction data.

Geolocation information, including, without limitation, approximate location inferred from IP address.

Professional or employment-related information, including, without limitation, company name, organization membership, role, and business contact information.

Customer Content and Deploy Content, to the extent it contains personal information you choose to upload or process.

Inferences, including, without limitation, abuse-prevention signals, usage patterns, plan recommendations, reliability indicators, or risk indicators.

Sensitive personal information, only if you choose to include it in Customer Content, Deploy Content, billing information, workspace security information, or support communications.

Other information described in this Privacy Policy, provided by you, generated through your use of the Services, or permitted by applicable law.

10.2 Sources

We may collect personal information including, without limitation, from:

you;

your organization, team, workspace, or administrators;

your use of the Services;

devices and browsers;

payment processors;

authentication providers;

service providers;

security and fraud-prevention providers;

communications with us;

other service providers, public sources, or third-party sources relevant to providing, securing, supporting, or improving the Services.

10.3 Purposes

We collect and use personal information for the purposes described in this Privacy Policy, including, without limitation, providing the Services, billing, support, security, fraud prevention, analytics, compliance, service improvement, and other purposes disclosed to you, authorized by you, or permitted or required by applicable law.

10.4 Disclosure of Personal Information

We may disclose personal information to the categories of recipients described in Section 5, including, without limitation, service providers, payment processors, organization administrators, legal authorities, parties involved in business transfers, and other recipients described in this Privacy Policy or permitted or required by applicable law.

10.5 Sale or Sharing

We do not sell Deploy Content, Customer Content, code, secrets, environment variables, payloads, credentials, generated PDFs, or Outputs.

We do not sell personal information for money.

We do not knowingly sell or share personal information of users under 16 years of age.

If our use of analytics, advertising, or similar technologies is considered a “sale” or “sharing” under California law, you may have the right to opt out. You may contact us at [email protected] to exercise applicable rights.

10.6 Sensitive Personal Information

We do not use or disclose sensitive personal information for purposes that would require a right to limit under the CCPA unless we provide the required notice and choice.

You should not upload sensitive personal information unless necessary and unless you have all required rights and safeguards.

10.7 California Rights

Subject to legal limitations, California residents may have rights including, without limitation, to:

know what personal information we collect, use, disclose, sell, or share;

access personal information;

delete personal information;

correct inaccurate personal information;

opt out of sale or sharing;

limit certain uses of sensitive personal information;

not be discriminated against for exercising privacy rights.

To exercise rights, contact [email protected].

11. European, UK, and Other International Users

If you are located in the European Economic Area, United Kingdom, Switzerland, or another jurisdiction with similar laws, you may have additional rights under applicable data protection laws.

Depending on the context, we may act as a “controller” for workspace, billing, website, security, analytics, and business operations data, and as a “processor” or “service provider” for Customer Content and Deploy Content processed on your behalf.

11.1 Legal Bases

Where required, our legal bases for processing may include, without limitation:

performance of a contract;

legitimate interests, including, without limitation, operating, securing, improving, and protecting the Services;

compliance with legal obligations;

consent, where required;

protection of vital interests, where applicable;

other legal bases recognized by applicable law.

11.2 Your Rights

Subject to applicable law, you may have rights including, without limitation, to access, correct, delete, restrict, object to processing, data portability, withdraw consent, lodge a complaint with a supervisory authority, and exercise other rights recognized by applicable law.

To exercise rights, contact [email protected].

11.3 International Transfers

Your information may be transferred to and processed in the United States and other jurisdictions as described in Section 6 (International Data Transfers and Global Processing). Where required by applicable law, we use appropriate transfer mechanisms, including, without limitation, standard contractual clauses or other legally recognized safeguards. You may contact us at [email protected] for information about the specific safeguards applicable to international transfers.

12. Children’s Privacy

The Services are not directed to children under 13, and we do not knowingly collect personal information from children under 13.

You may not use the Services to upload, process, or store children’s personal information unless you have all legally required rights, consents, notices, safeguards, and other measures required by applicable children’s privacy, data protection, consumer protection, or similar laws.

If you believe a child has provided personal information to us without appropriate authorization, contact us at [email protected].

13. Marketing Communications

We may send you administrative, transactional, billing, security, service-related, and other operational messages. These are necessary for the Services and you may not be able to opt out of them while maintaining an active workspace.

We may also send marketing communications where permitted by law. You may opt out of marketing emails by using the unsubscribe link or contacting us at [email protected].

We do not use Deploy Content to target marketing messages.

14. Do Not Track

Some browsers offer “Do Not Track” signals. There is no universally accepted standard for how online services should respond to these signals. We do not currently respond to Do Not Track signals unless required by law.

15. Data Processing Addendum

If you are a business customer and need a data processing addendum (“DPA”) for Customer Content or Deploy Content that includes personal information, contact us at [email protected].

A DPA may be required where you use the Services to process personal information on behalf of your own customers, employees, contractors, end users, or other individuals.

16. Changes to This Privacy Policy

We may update this Privacy Policy from time to time. If we make material changes, we will use reasonable efforts to notify you, including, without limitation, by posting the updated Privacy Policy, updating the effective date, sending an email, displaying a notice in the Services, or using other reasonable notice methods, except where applicable law permits changes without notice.

Your continued use of the Services after the updated Privacy Policy becomes effective means you acknowledge the updated Privacy Policy. If applicable law requires affirmative consent for a change, the change will apply only after such consent or as otherwise permitted by law.

17. Contact Us

Questions, requests, or concerns about this Privacy Policy may be sent to:

CompWate LLC

30 N Gould St Ste R

Sheridan, WY 82801

United States

Email: [email protected]