Privacy Policy.
1. Commitment to Privacy
At Intellithink, we recognize that your data is the bedrock of your intelligence. This Privacy Policy outlines our uncompromising commitment to protecting your personal information and being transparent about our data practices. By using our platform, you consent to the data collection and usage practices described here.
2. Information Collection
We collect information through multiple channels to provide a high-fidelity experience:
Identity Data
Email addresses, names, and authentication tokens provided during sign-up.
Interaction Data
The prompts, messy notes, and URLs you input for analysis, as well as the generated reasoning history.
3. Data Usage and AI Models
Your interaction data is transmitted to first-class AI providers to generate responses. We do not use your personal prompts to train global foundational models unless explicitly opted-in through enterprise programs. Your data is used exclusively for:
- Generating real-time reasoning and strategic analysis.
- Maintaining your personal chronicle (history) across devices.
- Analyzing service performance and preventing technical abuse.
- Communication regarding account status or essential updates.
4. Data Sharing and Third Parties
Intellithink does not sell, rent, or trade your personal information. We only share data with essential infrastructure partners:
- AI Providers: To process your requests.
- Database & Hosting: To securely store and serve your content.
- Authentication: To manage secure access to your intelligence lab.
5. Data Retention & Your Rights
We retain your data for as long as your account is active. You have full sovereignty over your information. Under applicable laws (including GDPR and CCPA), you have the right to:
- Access and export your personal data and reasoning history.
- Rectify any inaccuracies in your account details.
- Request the permanent erasure of all your data (Right to be Forgotten).
- Withdraw consent for optional data processing at any time.
6. Security Architecture
We implement multi-layered security protocols to safeguard your data. This includes end-to-end encryption for transmissions, secure hash algorithms for passwords, and regular infrastructure audits. While no digital system is infallible, we maintain industry-leading standards to mitigate risks.
Last updated: February 15, 2026