Legal framework / rev. 1.0

Data Sovereignty
& Privacy.

Last revised: Mar 2026

Operational policies for the collection, retention, and security of sensitive client data.

01

Introduction

Second Phase LLC is committed to protecting client and visitor information. This document outlines what information we collect, how it is used, and the safeguards we apply across our website and project delivery systems.

By engaging with our systems, services, or strategy workflows, you acknowledge the necessity of limited data processing required for communication, delivery coordination, and operational continuity.

02

Information Collection

Voluntary input

Names, email addresses, phone numbers, company details, and project context submitted through contact forms, booking requests, or direct correspondence.

Automated telemetry

Basic interaction metadata including page visits, device class, and browser diagnostics required for analytics, performance tuning, and security monitoring.

03

Data Usage

Operational emails

Notify you about project updates, scheduling, and requested deliverables.

System analytics

Improve site stability, performance, and user experience across devices.

Optimized storage delivery

Retain only what is necessary for approved business and support workflows.

04

Third-Party Disclosure

We do not sell, lease, or transfer your data to unrelated third parties. Disclosure is restricted to vetted technology partners or service providers whose involvement is necessary to fulfill a contracted service, communications workflow, or approved support operation.

05

Data Security

End-to-end encryption

Sensitive submissions and operational data in transit are protected.

Active

Access control layers

Internal access is restricted to authorized operators and approved vendors.

Active
06

Contact Information

For data requests, corrections, or privacy questions, contact:

privacy@secondphase.ai
Houston, TXSecond Phase LLCData Governance