PRIVACY

Your privacy is fundamental to our trusted by design approach. Here's how we protect and handle your data.

Effective: November 1, 2025Last updated: November 1, 2025

Overview

RubiLabs builds software that helps organizations discover the invisible threats in their data. Privacy and security are not just features—they're the foundation of everything we build.

Transparency First

Every action and insight is traceable, auditable, and explainable — including how we handle your data.

Purpose Limitation

We collect and process data solely for threat detection and security analysis — nothing more.

Your Control

You maintain ownership and control of your data with options for residency and deletion.

Our Commitment

We will never sell your data, use it for advertising, or share it for purposes beyond threat detection and security analysis. Your trust is the foundation of our business.

Data We Collect

We collect only the data necessary to deliver effective threat detection and security analysis. Here's what that includes:

Account & Authentication Data

Information required to create and secure your account, enable access controls, and provide support.

  • Name, email address, company information
  • Authentication credentials and multi-factor tokens
  • Role and permission settings
  • Support and communication preferences

Security & Threat Data

Data you connect to our platform for threat detection and analysis.

  • Network logs and traffic patterns
  • Transaction records and financial data flows
  • System events and application logs
  • Entity relationships and behavioral patterns

Platform Usage Data

Information about how you use our platform to improve performance and security.

  • Feature usage and interaction patterns
  • Query performance and response times
  • Error logs and system diagnostics
  • Security events and access logs

How We Use Data

We process your data for specific, legitimate purposes that align with our mission to help you discover invisible threats.

Threat Detection

Analyzing patterns and anomalies to identify potential security threats.

  • Pattern recognition and anomaly detection
  • Risk scoring and threat prioritization
  • Relationship mapping and entity analysis

Service Delivery

Providing, maintaining, and improving our platform capabilities.

  • Platform operation and optimization
  • Customer support and troubleshooting
  • Feature development and enhancement

Compliance & Legal

Meeting regulatory requirements and legal obligations.

  • Regulatory reporting and audits
  • Legal process and law enforcement requests
  • Internal compliance monitoring

Security & Protection

Data you connect to our platform for threat detection and analysis.

  • Infrastructure security monitoring
  • Fraud and abuse prevention
  • Incident response and investigation

Data Sharing

We do not sell your data. We share data only in limited circumstances necessary for service delivery and legal compliance.

Service Providers

We work with carefully vetted service providers who help us deliver our platform. These providers have strict contractual obligations to protect your data and use it only for specified purposes.

Legal Requirements

We may disclose data when required by law, regulatory obligations, or valid legal process. We will notify you of such requests unless legally prohibited.

Business Transfers

In the event of a merger, acquisition, or sale of assets, your data may be transferred. We will provide notice and ensure the receiving party maintains the same privacy protections.

What We Never Do

  • Sell your data to third parties
  • Use your data for advertising or marketing
  • Share data with competitors
  • Process data for purposes beyond threat detection

Security Measures

We implement comprehensive security measures to protect your data against unauthorized access, disclosure, or destruction.

Encryption

All data is encrypted both in transit and at rest using industry standards.

  • AES-256 encryption for data at rest
  • TLS 1.3 for data in transit
  • End-to-end encryption for sensitive workflows

Access Controls

Strict controls ensure only authorized personnel can access your data.

  • Role-based access control (RBAC)
  • Multi-factor authentication required
  • Regular access reviews and audits

Infrastructure

Our infrastructure is designed with security and resilience in mind.

  • Zero-trust network architecture
  • Network segmentation and isolation
  • 24/7 security monitoring and response

Compliance

We maintain certifications and undergo regular security assessments.

  • SOC 2 Type I (Ongoing application)
  • ISO 27001 compliant (Ongoing application)
  • Regular penetration testing

Your Rights

You have comprehensive rights regarding your personal data. We provide easy ways to exercise these rights.

Access & Portability

Request access to your personal data and receive a copy in a structured, machine-readable format for transfer to another service.

Correction & Update

Update or correct inaccurate personal data through your account settings or by contacting our support team.

Deletion & Erasure

Request deletion of your personal data, subject to legal and contractual retention requirements.

Processing Restrictions

Object to or restrict certain types of data processing, where legally permitted.

How to Exercise Your Rights

Contact our privacy team at privacy@rubilabs.io or through your account settings. We will respond to requests within 30 days.

For EU residents: You also have the right to lodge a complaint with your local data protection authority.

Data Retention

We process your data for specific, legitimate purposes that align with our mission to help you discover invisible threats.

Active Accounts

Data is retained while your account is active and for as long as needed to provide services, typically for the duration of your subscription.

Closed Accounts

After account closure, personal data is deleted within 90 days, except where retention is required for legal or regulatory purposes.

Security Logs

Security and audit logs are retained for up to 7 years to meet compliance requirements and support incident investigation.

Anonymized Data

We may retain anonymized, aggregated data indefinitely for product improvement and threat intelligence purposes.

Question About Privavcy?

Privacy is fundamental to our trusted by design philosophy. If you have questions or concerns, we're here to help.