Legal framework / rev. 1.0
Data Sovereignty
& Privacy.
Operational policies for the collection, retention, and security of sensitive client data.
Introduction
Second Phase LLC is committed to protecting client and visitor information. This document outlines what information we collect, how it is used, and the safeguards we apply across our website and project delivery systems.
By engaging with our systems, services, or strategy workflows, you acknowledge the necessity of limited data processing required for communication, delivery coordination, and operational continuity.
Information Collection
Voluntary input
Names, email addresses, phone numbers, company details, and project context submitted through contact forms, booking requests, or direct correspondence.
Automated telemetry
Basic interaction metadata including page visits, device class, and browser diagnostics required for analytics, performance tuning, and security monitoring.
Data Usage
Operational emails
Notify you about project updates, scheduling, and requested deliverables.
System analytics
Improve site stability, performance, and user experience across devices.
Optimized storage delivery
Retain only what is necessary for approved business and support workflows.
Third-Party Disclosure
We do not sell, lease, or transfer your data to unrelated third parties. Disclosure is restricted to vetted technology partners or service providers whose involvement is necessary to fulfill a contracted service, communications workflow, or approved support operation.
Data Security
End-to-end encryption
Sensitive submissions and operational data in transit are protected.
Access control layers
Internal access is restricted to authorized operators and approved vendors.
Contact Information
For data requests, corrections, or privacy questions, contact:
privacy@secondphase.ai