Privacy Policy

PRIVACY POLICY
Elysian Technology, Inc.
Effective Date: February 2026

INTRODUCTION AND SECURITY-FIRST PRIVACY POSITION

Elysian Technology, Inc. (“Elysian Technology,” “Company,” “we,” “our,” or “us”) operates the website located at https://elystech.com/ (the “Website”) and provides technology consulting, systems architecture, engineering, and implementation services to commercial, enterprise, and regulated-sector organizations. Because our work frequently supports complex, security-sensitive, and compliance-driven environments, we approach privacy, monitoring, and data handling with a security-first and audit-ready mindset.

This Privacy Policy provides a detailed and comprehensive explanation of how we collect, generate, receive, record, classify, analyze, monitor, store, use, share, disclose, safeguard, and retain information obtained through the Website and related digital systems. It is intentionally explicit and operational in tone so that visitors, customers, auditors, and regulators can clearly understand what data practices are in place and why.

By accessing or using the Website, submitting information, or interacting with our systems, you acknowledge and agree to the practices described in this Privacy Policy. If you do not agree, you must discontinue use of the Website.

SCOPE OF COVERAGE AND SYSTEM BOUNDARIES

This Privacy Policy applies to information collected through the Website, associated landing pages, embedded forms, scheduling tools, analytics platforms, CRM systems, marketing automation systems, and related communications channels controlled by Elysian Technology.

This Policy applies to business contacts, prospective customers, vendor contacts, partners, and general visitors. It does not govern information processed strictly within customer-owned systems where we operate only as a contracted service provider under separate agreements. In those environments, data handling is governed by contract terms and client security policies.

We treat the Website as a monitored business system, not a casual brochure property. Activity on the Website may be logged and evaluated for security, performance, and compliance purposes.

BUSINESS CONTACT AND FORM SUBMISSION DATA

We collect information that you intentionally provide when you complete forms, request consultations, download resources, register for communications, or contact us electronically. This may include your full name, employer name, job title, department, business email, business phone number, project scope notes, environment descriptions, technology stack references, and service interests.

We also collect the full contents of messages and attachments you submit. Communications may be retained as business records. If you become a customer or vendor, additional contact and engagement data may be collected to support onboarding, delivery, and account management functions.

We do not require highly sensitive personal data through the Website unless it is operationally necessary and appropriate for the business purpose involved.

AUTOMATIC TECHNICAL DATA AND DEVICE SIGNAL COLLECTION

When the Website is accessed, our systems automatically collect technical and behavioral data generated by your interaction with our infrastructure. This includes IP address, device identifiers, browser type, browser version, operating system, device configuration, language settings, approximate geographic region, referring URLs, visited pages, timestamps, and navigation sequences.

We may also collect performance metrics, diagnostic signals, crash data, and rendering behavior to support reliability and troubleshooting. Repeat visits may be associated through technical identifiers and cookies. This automatic collection is standard for secure operation of an internet-facing business platform.

COOKIES, SESSION IDENTIFIERS, AND TRACKING MECHANISMS

We deploy cookies and similar technologies to enable session continuity, remember preferences, measure engagement, support analytics, and maintain security controls. Cookies may be first-party or third-party and may persist across sessions depending on configuration.

Tracking mechanisms may measure page flow, interaction timing, scroll behavior, feature usage, and repeat visitation. Some identifiers are required for security controls such as rate limiting and abuse prevention. Others support analytics and CRM attribution.

Users can block or delete cookies through browser settings. Doing so may disable certain features, interrupt sessions, or reduce Website functionality.

GOOGLE ANALYTICS AND TRAFFIC INTELLIGENCE

We use Google Analytics and related Google measurement services to generate reports about Website usage and engagement. These services collect device and interaction data through cookies and identifiers and provide aggregated reporting on traffic sources, behavior patterns, and engagement metrics.

We use this intelligence to improve Website structure, performance, usability, and content effectiveness. Google processes analytics data under its own privacy and security framework. We do not attempt to re-identify individuals through analytics data alone. Users may opt out using Google Analytics opt-out tools.

HUBSPOT CRM, MARKETING AUTOMATION, AND ENGAGEMENT HISTORY

We use HubSpot as our CRM and marketing automation platform to manage contacts, communications, and engagement records. HubSpot collects form submissions, campaign responses, email interactions, and page visits associated with identified contacts.

Once you identify yourself through a form or tracked interaction, Website activity may be associated with your contact record. This engagement history supports inquiry handling, sales qualification, follow-up, and account development. CRM profiling is limited to legitimate business relationship management.

PURPOSE LIMITATION AND USE CONTROLS

We use collected data only for defined operational and business purposes. These include responding to requests, delivering services, managing relationships, improving the Website, measuring outreach effectiveness, conducting internal analytics, protecting systems, and meeting legal obligations.

We do not use Website data for consumer advertising resale, data brokerage, or unrelated profiling. Internal access to data is role-restricted.

SECURITY MONITORING, THREAT DETECTION, AND LOGGING

We maintain continuous logging and monitoring across Website infrastructure. Automated systems and security tools evaluate traffic and behavior patterns to detect malicious activity, intrusion attempts, scraping, credential abuse, denial-of-service activity, and abnormal usage.

Security logs may contain network identifiers, request patterns, behavioral signals, and anomaly scores. Logs may be retained and analyzed for incident response, forensic investigation, and compliance validation.

DATA SHARING WITH SERVICE PROVIDERS

We share information with vetted service providers that support hosting, analytics, CRM, communications, security, and professional services. These providers operate under contractual obligations to protect data and use it only for authorized purposes.

We perform reasonable vendor due diligence appropriate to risk and function.

NO SALE OR DATA BROKERAGE

We do not sell personal information. We do not operate a data marketplace. We do not exchange personal data for monetary value or third-party advertising resale.

LAWFUL ACCESS AND GOVERNMENT REQUESTS

We may disclose information where required by subpoena, court order, regulatory request, or lawful investigative demand. We preserve records where legally required and limit disclosures to the scope required by law. We document and control such disclosures internally.

DATA RETENTION AND RECORD LIFECYCLE

We retain information for operational, contractual, security, audit, and legal purposes. Retention periods vary by data class. When data is no longer required, it is deleted or de-identified where feasible. Certain records may be retained longer to satisfy audit or regulatory obligations.

DATA PROTECTION SAFEGUARDS

We use layered administrative, technical, and organizational safeguards including access controls, least-privilege models, monitoring, and vendor security controls. Absolute security cannot be guaranteed, but reasonable controls are applied.

CALIFORNIA PRIVACY RIGHTS

California residents may request access, deletion, correction, and disclosure details regarding their personal information. We do not sell personal information and do not discriminate for exercising rights. Requests go to [email protected].

OPT-OUT AND COMMUNICATION CONTROLS

Users may unsubscribe from marketing emails using provided links. Users may block cookies through browser settings. Users may opt out of analytics tracking using available tools. Users may request suppression or deletion where legally permitted by emailing [email protected].

CHILDREN’S DATA RESTRICTION

The Website is not directed to children under 13. We do not knowingly collect children’s personal data.

INTERNATIONAL PROCESSING

Data may be processed in the United States and other jurisdictions where our providers operate. Use of the Website constitutes consent to such transfer.

POLICY CHANGES

We may update this Policy periodically. Updates are effective upon posting. Continued use indicates acceptance.

PRIVACY CONTACT

All privacy and opt-out requests should be directed to:

[email protected]
Elysian Technology, Inc.

Home

DOWNLOAD OUR FREE GUIDE:

How IT Administrators Can Deploy a More Effective Cloud