Privacy Policy
Last updated Jan 11, 2026.
Introduction
Keplogic Inc. (“Keplogic,” “we,” “us,” or “our”) is a natural-language bioinformatics analysis platform. We understand the importance of protecting your personal information and are committed to handling it responsibly. This Privacy Policy explains how we collect, use, store, and protect your information. This policy is reviewed at least annually and updated as needed to reflect changes in our practices.
How We Collect and Use Information
We may collect the following types of information:
Personal Information: Name, email address, and contact details that you voluntarily provide, including information obtained through authentication providers such as Google.
Usage Information: IP address, browser type, operating system, and pages visited on our website.
Service Data: Data you provide or generate in connection with your use of our services. We use this information to: Provide, operate, and improve our services. Create and authenticate user accounts. Communicate with you about our products or servicesSupport security, fraud prevention, and compliance obligations. We do not sell personal information to anyone.
Google Authentication and OAuth Data
When you choose to sign in using Google OAuth, we access and process limited Google user data in accordance with Google API Services User Data policies.
Data Accessed
Our application accesses the following Google user data: Nammail address
This data is accessed solely for OAuth-based authentication and account creation.
Data Usage
Google user data is used exclusively for: User identification, Account creation and authentication, Account-related system logging. This data is stored securely in an encrypted database and is not used for advertising, profiling, or any unrelated purposes.
Data Sharing
Google user data is not shared with any third parties.
Data Storage and Protection
Google authentication data is protected using end-to-end encryption. Data is encrypted in transit and at rest using industry-standard encryption mechanisms. Access is restricted to authorized systems and personnel only.
Data Retention and Deletion
Google user data is retained only for as long as the user account remains activeUsers may request deletion of their data at any timeUpon verified deletion request, all associated Google user data will be permanently deleted within 7 days, unless retention is required by law
Cookies and Tracking Technologies
We use cookies and similar technologies to enhance functionality and analyze usage of our website. You can control cookie behavior through your browser settings.
Sharing Information with Third Parties
We may share information with trusted third-party service providers that support our operations (such as hosting, cloud infrastructure, and analytics). These providers are permitted to use personal information only as necessary to perform services on our behalf.
Third-Party Security Requirements
All third-party service providers who handle personal information on our behalf are contractually required to:Maintain security standards equivalent to our ownUse personal information solely for authorized purposesImplement appropriate technical and organizational safeguardsNotify us promptly of any security incidentsReturn or securely delete personal information upon termination of services
We may also disclose information if required by law, in response to valid legal requests, to protect our rights or the safety of others, or in connection with a business transaction such as a merger or acquisition.
Data Storage and Retention
Personal information is stored on secure servers located in the United States. We retain personal data only for as long as necessary to:Provide our servicesMaintain active user accountsComply with legal obligationsFulfill legitimate business purposes
Data may be deleted upon verified user request, except where retention is legally required.
Security of Your Information
We implement comprehensive technical and organizational safeguards to protect personal information, including:
Encryption: Data is encrypted in transit using TLS and at rest using industry-standard encryption (including AES-256)
Access Controls: Data access is limited to authorized personnel on a need-to-know basis
Security Monitoring: Continuous monitoring for threats and vulnerabilities
Regular Assessments: Periodic security reviews and testing
Breach Notification: In the event of a data breach affecting personal information, we will notify affected users within 72 hours of discovery and take immediate corrective action
Despite these measures, no system can be guaranteed to be 100% secure.
Children’s Privacy
Our services are not directed to children under the age of 13 (or the minimum age required by applicable law), and we do not knowingly collect personal information from children.
Your Choices and Rights
You may request access to, correction of, or deletion of your personal information by contacting us. Verified deletion requests will be completed within 7 days, unless retention is legally required.
Contact Us
If you have any questions about this Privacy Policy or our data practices, please contact us at:
Email: hello@keplogic.com