PRIVACY POLICY
Elysian Technology, Inc.
Effective Date: February 2026
INTRODUCTION AND SECURITY-FIRST PRIVACY POSITION
Elysian Technology, Inc. (“Elysian Technology,” “Company,” “we,” “our,” or “us”) operates the website located at https://elystech.com/ (the “Website”) and provides technology consulting, systems architecture, engineering, and implementation services to commercial, enterprise, and regulated-sector organizations. Because our work frequently supports complex, security-sensitive, and compliance-driven environments, we approach privacy, monitoring, and data handling with a security-first and audit-ready mindset.
This Privacy Policy provides a detailed and comprehensive explanation of how we collect, generate, receive, record, classify, analyze, monitor, store, use, share, disclose, safeguard, and retain information obtained through the Website and related digital systems. It is intentionally explicit and operational in tone so that visitors, customers, auditors, and regulators can clearly understand what data practices are in place and why.
By accessing or using the Website, submitting information, or interacting with our systems, you acknowledge and agree to the practices described in this Privacy Policy. If you do not agree, you must discontinue use of the Website.
SCOPE OF COVERAGE AND SYSTEM BOUNDARIES
This Privacy Policy applies to information collected through the Website, associated landing pages, embedded forms, scheduling tools, analytics platforms, CRM systems, marketing automation systems, and related communications channels controlled by Elysian Technology.
This Policy applies to business contacts, prospective customers, vendor contacts, partners, and general visitors. It does not govern information processed strictly within customer-owned systems where we operate only as a contracted service provider under separate agreements. In those environments, data handling is governed by contract terms and client security policies.
We treat the Website as a monitored business system, not a casual brochure property. Activity on the Website may be logged and evaluated for security, performance, and compliance purposes.
BUSINESS CONTACT AND FORM SUBMISSION DATA
We collect information that you intentionally provide when you complete forms, request consultations, download resources, register for communications, or contact us electronically. This may include your full name, employer name, job title, department, business email, business phone number, project scope notes, environment descriptions, technology stack references, and service interests.
We also collect the full contents of messages and attachments you submit. Communications may be retained as business records. If you become a customer or vendor, additional contact and engagement data may be collected to support onboarding, delivery, and account management functions.
We do not require highly sensitive personal data through the Website unless it is operationally necessary and appropriate for the business purpose involved.
AUTOMATIC TECHNICAL DATA AND DEVICE SIGNAL COLLECTION
When the Website is accessed, our systems automatically collect technical and behavioral data generated by your interaction with our infrastructure. This includes IP address, device identifiers, browser type, browser version, operating system, device configuration, language settings, approximate geographic region, referring URLs, visited pages, timestamps, and navigation sequences.
We may also collect performance metrics, diagnostic signals, crash data, and rendering behavior to support reliability and troubleshooting. Repeat visits may be associated through technical identifiers and cookies. This automatic collection is standard for secure operation of an internet-facing business platform.
COOKIES, SESSION IDENTIFIERS, AND TRACKING MECHANISMS
We deploy cookies and similar technologies to enable session continuity, remember preferences, measure engagement, support analytics, and maintain security controls. Cookies may be first-party or third-party and may persist across sessions depending on configuration.
Tracking mechanisms may measure page flow, interaction timing, scroll behavior, feature usage, and repeat visitation. Some identifiers are required for security controls such as rate limiting and abuse prevention. Others support analytics and CRM attribution.
Users can block or delete cookies through browser settings. Doing so may disable certain features, interrupt sessions, or reduce Website functionality.
GOOGLE ANALYTICS AND TRAFFIC INTELLIGENCE
We use Google Analytics and related Google measurement services to generate reports about Website usage and engagement. These services collect device and interaction data through cookies and identifiers and provide aggregated reporting on traffic sources, behavior patterns, and engagement metrics.
We use this intelligence to improve Website structure, performance, usability, and content effectiveness. Google processes analytics data under its own privacy and security framework. We do not attempt to re-identify individuals through analytics data alone. Users may opt out using Google Analytics opt-out tools.
HUBSPOT CRM, MARKETING AUTOMATION, AND ENGAGEMENT HISTORY
We use HubSpot as our CRM and marketing automation platform to manage contacts, communications, and engagement records. HubSpot collects form submissions, campaign responses, email interactions, and page visits associated with identified contacts.
Once you identify yourself through a form or tracked interaction, Website activity may be associated with your contact record. This engagement history supports inquiry handling, sales qualification, follow-up, and account development. CRM profiling is limited to legitimate business relationship management.
PURPOSE LIMITATION AND USE CONTROLS
We use collected data only for defined operational and business purposes. These include responding to requests, delivering services, managing relationships, improving the Website, measuring outreach effectiveness, conducting internal analytics, protecting systems, and meeting legal obligations.
We do not use Website data for consumer advertising resale, data brokerage, or unrelated profiling. Internal access to data is role-restricted.
SECURITY MONITORING, THREAT DETECTION, AND LOGGING
We maintain continuous logging and monitoring across Website infrastructure. Automated systems and security tools evaluate traffic and behavior patterns to detect malicious activity, intrusion attempts, scraping, credential abuse, denial-of-service activity, and abnormal usage.
Security logs may contain network identifiers, request patterns, behavioral signals, and anomaly scores. Logs may be retained and analyzed for incident response, forensic investigation, and compliance validation.
DATA SHARING WITH SERVICE PROVIDERS
We share information with vetted service providers that support hosting, analytics, CRM, communications, security, and professional services. These providers operate under contractual obligations to protect data and use it only for authorized purposes.
We perform reasonable vendor due diligence appropriate to risk and function.
NO SALE OR DATA BROKERAGE
We do not sell personal information. We do not operate a data marketplace. We do not exchange personal data for monetary value or third-party advertising resale.
LAWFUL ACCESS AND GOVERNMENT REQUESTS
We may disclose information where required by subpoena, court order, regulatory request, or lawful investigative demand. We preserve records where legally required and limit disclosures to the scope required by law. We document and control such disclosures internally.
DATA RETENTION AND RECORD LIFECYCLE
We retain information for operational, contractual, security, audit, and legal purposes. Retention periods vary by data class. When data is no longer required, it is deleted or de-identified where feasible. Certain records may be retained longer to satisfy audit or regulatory obligations.
DATA PROTECTION SAFEGUARDS
We use layered administrative, technical, and organizational safeguards including access controls, least-privilege models, monitoring, and vendor security controls. Absolute security cannot be guaranteed, but reasonable controls are applied.
CALIFORNIA PRIVACY RIGHTS
California residents may request access, deletion, correction, and disclosure details regarding their personal information. We do not sell personal information and do not discriminate for exercising rights. Requests go to [email protected].
OPT-OUT AND COMMUNICATION CONTROLS
Users may unsubscribe from marketing emails using provided links. Users may block cookies through browser settings. Users may opt out of analytics tracking using available tools. Users may request suppression or deletion where legally permitted by emailing [email protected].
CHILDREN’S DATA RESTRICTION
The Website is not directed to children under 13. We do not knowingly collect children’s personal data.
INTERNATIONAL PROCESSING
Data may be processed in the United States and other jurisdictions where our providers operate. Use of the Website constitutes consent to such transfer.
POLICY CHANGES
We may update this Policy periodically. Updates are effective upon posting. Continued use indicates acceptance.
PRIVACY CONTACT
All privacy and opt-out requests should be directed to:
[email protected]
Elysian Technology, Inc.