Ninja Digital Innovations logoNinja Digital Innovations
We reply fastResponse in < 24h
Book a call
PrivacyTrust & Security

Privacy & data protection at Ninja Digital Innovation.

We build secure, observable products—and safeguard the data that powers them. This page outlines what we collect, how we use it, and the choices you have.

Our approach

Guardrails for data across products, clients, and teams.

These principles guide how we collect, use, and protect information in our platforms and client engagements.

Minimal collection

We only collect what we need to deliver services and improve reliability.

Transparency

You can ask what data we hold and how it is used, at any time.

Security by default

Access is limited, encrypted in transit and at rest, with least-privilege controls.

Data we collect

  • Contact details (name, email, company, role) when you reach out or create an account.
  • Usage and telemetry (browser, device, pages, events) to improve performance and reliability.
  • Content you submit (forms, uploads, feedback) for support and delivery.
  • Commercial data (project scope, invoices) when we engage commercially.

How we use data

  • Provide and improve our products and services.
  • Respond to inquiries, support tickets, and project requests.
  • Operate security, fraud, and abuse prevention controls.
  • Comply with legal obligations and enforce agreements.

Sharing

  • Vetted sub‑processors for hosting, email, analytics, and payments—under data protection terms.
  • Professional advisors (legal, accounting) under confidentiality.
  • Law enforcement only when required by applicable law.
  • We do not sell personal data.

Security

  • Encryption in transit (TLS) and at rest for supported services.
  • Role-based access, least privilege, and activity logging on production systems.
  • Regular backups and environment separation for staging vs. production.
  • Vendor reviews and secret management for third-party integrations.

Retention

  • Contact and account data: retained while your account or engagement is active.
  • Operational logs: typically 30–180 days, unless needed for security or compliance.
  • Contracts, billing, and tax records: retained per legal obligations.

Your choices & rights

  • Access, correct, or delete your personal data (subject to legal limits).
  • Opt out of marketing communications at any time.
  • Request a copy of sub-processor list or data protection terms for engagements.
  • EU/EEA users: you may contact your supervisory authority with concerns.

Need more detail?

Request our data processing terms or sub-processor list.

We share the specifics for client engagements—including locations, safeguards, and retention policies.