Privacy Policy

Last Updated: November 8, 2024

1. Introduction

At Frank, we take the privacy and security of your team's data seriously. This Privacy Policy explains how we collect, use, protect, and manage information when you use our email-based team coordination service, web application (get-frank.com), and mobile applications. By using Frank, you agree to the collection and use of information in accordance with this policy. We designed our data practices to prioritize security while enabling effective team coordination and accountability tracking.

2. Information Collection and Use

Our information collection encompasses essential data required to provide and improve our service. We collect account information including business email addresses and organizational details necessary for service functionality. This includes names, job titles, and team structures that enable proper routing of communications and updates. We maintain information about user roles and permissions to ensure appropriate access control and data protection.

The service data we collect consists of email communications with Frank, including weekly updates, status reports, and team member responses. This information is essential for providing our core service functionality of team coordination and progress tracking. We process project and task information, along with any reported blockers or challenges, to provide valuable insights and facilitate team productivity.

Our systems also maintain performance metrics and analytics data to help optimize team operations and identify areas for improvement.To ensure service reliability and security, we collect technical data such as IP addresses, device information, and access patterns. This information helps us maintain system security, optimize performance, and provide appropriate technical support.

We monitor application interaction metrics and API usage to continuously improve our service and ensure optimal functionality for all users.

4. Data Protection and Security

Security stands at the core of our service architecture. We implement comprehensive access controls that govern how information is accessed and used within our systems. Our security program includes continuous monitoring, regular assessments, and proactive threat detection. We maintain strict protocols for security patch management and incident response, supported by regular employee security training and awareness programs.

Our security infrastructure employs multiple layers of protection, including advanced authentication mechanisms and strict access limitations. We regularly conduct security audits and vulnerability assessments to ensure our protective measures remain effective against evolving threats. Our compliance program adheres to major privacy frameworks and security standards, with regular audits to verify ongoing compliance.

5. Your Rights and Choices

We recognize and respect your rights regarding your data. Users maintain significant control over their information, including the right to access, correct, or request deletion of their data. We provide mechanisms for users to export their information and manage their privacy preferences. Users can control various aspects of data processing and retention through their account settings.

We are committed to transparency and user empowerment regarding data privacy. Our team is available to address any privacy concerns or data requests through dedicated communication channels.