Privacy
High-level summary — engagement-specific contracts supersede this page where they conflict.
Public site
This brochure site is mostly static content. Infrastructure may log routine HTTP metadata (for example IP address, user agent, timestamps) at reverse proxies and CDN layers consistent with normal operations.
Intake form
If you use the request form, your submission is processed by our form provider to reach our inbox. Do not submit secrets or private keys in intake fields — use secure channels agreed under contract when applicable.
Contact
For privacy-related inquiries tied to an engagement, use the coordination channel named in your statement of work.