Privacy Policy
Last Updated: November 8, 2024
1. Introduction
At Frank, we take the privacy and security of your team's data seriously. This Privacy Policy explains how we collect, use, protect, and manage information when you use our email-based team coordination service, web application (get-frank.com), and mobile applications. By using Frank, you agree to the collection and use of information in accordance with this policy. We designed our data practices to prioritize security while enabling effective team coordination and accountability tracking.
2. Information Collection and Use
Our information collection encompasses essential data required to provide and improve our service. We collect account information including business email addresses and organizational details necessary for service functionality. This includes names, job titles, and team structures that enable proper routing of communications and updates. We maintain information about user roles and permissions to ensure appropriate access control and data protection.
The service data we collect consists of email communications with Frank, including weekly updates, status reports, and team member responses. This information is essential for providing our core service functionality of team coordination and progress tracking. We process project and task information, along with any reported blockers or challenges, to provide valuable insights and facilitate team productivity.
Our systems also maintain performance metrics and analytics data to help optimize team operations and identify areas for improvement.To ensure service reliability and security, we collect technical data such as IP addresses, device information, and access patterns. This information helps us maintain system security, optimize performance, and provide appropriate technical support.
We monitor application interaction metrics and API usage to continuously improve our service and ensure optimal functionality for all users.
3. Data Processing and Storage
Our approach to data processing and storage prioritizes security and reliability. All data is protected using advanced encryption standards, with information at rest secured using industry-standard encryption protocols. We employ state-of-the-art security measures for data in transit, ensuring secure transmission across all communication channels. Our infrastructure is hosted in certified facilities that meet rigorous security and compliance standards.
Data processing activities are designed to support core service functions while maintaining privacy and security. This includes automated processing for team coordination, generation of performance insights, and delivery of important notifications. We compile reports and analyze patterns to optimize system performance and provide valuable team insights, always maintaining strict data protection standards throughout these processes.
Our data retention policies balance service needs with privacy considerations. We maintain active account data throughout the service period, with prompt removal of deleted items. Our backup systems retain data for a limited period to ensure business continuity while respecting privacy requirements. We anonymize analytics data after appropriate periods and maintain system logs only as long as necessary for security and operational purposes.
4. Data Protection and Security
Security stands at the core of our service architecture. We implement comprehensive access controls that govern how information is accessed and used within our systems. Our security program includes continuous monitoring, regular assessments, and proactive threat detection. We maintain strict protocols for security patch management and incident response, supported by regular employee security training and awareness programs.
Our security infrastructure employs multiple layers of protection, including advanced authentication mechanisms and strict access limitations. We regularly conduct security audits and vulnerability assessments to ensure our protective measures remain effective against evolving threats. Our compliance program adheres to major privacy frameworks and security standards, with regular audits to verify ongoing compliance.
5. Your Rights and Choices
We recognize and respect your rights regarding your data. Users maintain significant control over their information, including the right to access, correct, or request deletion of their data. We provide mechanisms for users to export their information and manage their privacy preferences. Users can control various aspects of data processing and retention through their account settings.
We are committed to transparency and user empowerment regarding data privacy. Our team is available to address any privacy concerns or data requests through dedicated communication channels.