1. INTRODUCTION
Brightcone AI (referred to herein as “the Company”, “Brightcone”, “we”, “us”, or “our”) is committed to maintaining the highest standards of confidentiality, privacy, and information security with respect to all data provided to, collected by, or generated in connection with the Company’s Products and operations.
This Confidentiality and Privacy Policy (the “Policy”) sets out the principles and practices governing the collection, processing, use, storage, disclosure, retention, and protection of information in connection with the Brightcone Platform and the Brightcone Product Suite (collectively referred to as the “Products”), as further defined in Section 2 of this Policy.
This Policy applies to all individuals and entities that interact with the Products and related services, including enterprise clients, their authorised users, website visitors, employees, contractors, and prospective customers.
In enterprise deployments, the client organisation generally determines the purposes and means of processing personal data and acts as the Data Controller, while Brightcone acts as a Data Processor on behalf of the client. In circumstances where Brightcone independently determines the purposes and means of processing including, without limitation, activities relating to marketing, recruitment, website administration, or internal business operations, Brightcone acts as a Data Controller. The allocation of roles and responsibilities shall in all cases be governed by the applicable service agreement, Data Processing Agreement, or other contractual documentation.
By accessing or using any of the Products, you acknowledge that you have read this Policy and understand that your use of the Products is subject to its terms. This Policy forms part of and should be read in conjunction with the Company’s Terms of Service, applicable enterprise agreements, and any executed Data Processing Agreement, which collectively govern the use of the Products.
Deployment Architecture Principle. Brightcone’s architecture is designed to enable client data to be processed within the client’s designated infrastructure environment, including on-premise environments or client-controlled cloud infrastructure (such as Amazon Web Services, Microsoft Azure or equivalent providers). Brightcone does not host or retain client business data on Company-owned infrastructure. To the extent that incidental, transient, or technically unavoidable processing occurs outside the client’s designated environment, including for purposes of secure transmission, system integrity, monitoring, compliance obligations, or contractual service delivery, such processing shall be limited in scope and duration and subject to appropriate technical and organisational safeguards consistent with this Policy and applicable law.
This Policy is effective as of February 26, 2026 and supersedes all prior versions. The Company reserves the right to amend or update this Policy at its discretion. Where required by applicable law or contract, material amendments will be communicated to registered users and enterprise clients in accordance with Section 15 of this Policy.
2. DEFINITIONS AND INTERPRETATION
2.1Definitions
Capitalised terms used but not defined in this Section shall have the meanings ascribed to them elsewhere in this Policy.
In this Policy, the following terms shall have the meanings set out below. Where a term is not defined herein, it shall be interpreted in accordance with Applicable Law and, where relevant, the definitions set out in the applicable service agreement or Data Processing Agreement.
"Anonymised Data" means data that has been irreversibly altered in such a manner that a Data Subject can no longer be identified, directly or indirectly, and which therefore does not constitute Personal Data under Applicable Law. Anonymised Data is not subject to the protections afforded to Personal Data under this Policy.
"Authorised Users" means individuals permitted by a client organisation to access and use the Products under the terms of the applicable service agreement, including employees, contractors, and other personnel acting on behalf of the client.
"Client Data" means all data, documents, content, configurations, and information provided by or on behalf of a client, or generated through a client’s authorised use of the Products or Services, including without limitation business data, employee information, customer records, operational data, and AI-generated outputs produced within the client’s Deployment Environment.
"Confidential Information" means any non-public information disclosed by either party to the other in connection with the Products or Services, whether disclosed orally, in writing, electronically, or by any other means, and whether or not marked as confidential at the time of disclosure. Confidential Information does not include information that:
is or becomes publicly available through no act or omission of the receiving party;
was already lawfully known to the receiving party at the time of disclosure, as evidenced by contemporaneous written records;
is independently developed by the receiving party without reference to or use of the disclosing party’s Confidential Information; or
is required to be disclosed by Applicable Law, court order, or regulatory authority, provided that the receiving party gives prior written notice where legally permissible and reasonably cooperates with any effort to seek a protective order.
is lawfully obtained from a third party without restriction.
"Cookies" means small text files or similar tracking technologies placed on a user’s device by a website or application for purposes including authentication, session management, analytics, and system functionality, as further described in Section 11 of this Policy.
"Data Breach" means any accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or unauthorised access to, Personal Data transmitted, stored, or otherwise processed by the Company or its Sub-Processors.
"Data Controller" means the natural or legal person, public authority, agency, or other body which, alone or jointly with others, determines the purposes and means of the Processing of Personal Data, as defined under Applicable Law.
"Data Processing Agreement" or "DPA" means a legally binding agreement between the Company and a client governing the terms under which the Company processes Personal Data on behalf of the client in its capacity as a Data Processor.
"Data Processor" means a natural or legal person, public authority, agency, or other body which processes Personal Data on behalf of the Data Controller pursuant to documented instructions and in accordance with Applicable Law.
"Data Subject" means an identified or identifiable natural person to whom Personal Data relates.
"Deployment Environment" means the technical infrastructure within which the Products are installed, operated, and maintained, which is owned or controlled by the client, including on-premise servers, the client’s cloud environment, Virtual Private Cloud (VPC), or equivalent private infrastructure.
"Personal Data" or "Personally Identifiable Information (PII)" means any information that identifies, relates to, describes, or could reasonably be linked, directly or indirectly, to an identified or identifiable individual, as further defined under Applicable Law.
"Processing" means any operation or set of operations performed on data, whether or not by automated means, including collection, recording, organisation, structuring, storage, adaptation, retrieval, consultation, use, disclosure by transmission, dissemination, alignment, restriction, erasure, or destruction.
"Products" means the Brightcone Platform and the Brightcone Product Suite, including all associated software, applications, interfaces, APIs, AI components, dashboards, documentation, configurations, tools, and related services made available by the Company, as may be updated, modified, enhanced, or extended from time to time.
"Protected Health Information" or "PHI" means individually identifiable health information as defined by Applicable Law governing health data privacy, including where relevant the Health Insurance Portability and Accountability Act (HIPAA), applicable where the Products are deployed in healthcare or health-adjacent environments and the client qualifies as a Covered Entity or Business Associate.
"Services" means any implementation, integration, support, maintenance, advisory, configuration, hosting facilitation, or other professional or technical services provided by the Company in connection with the Products.
"Sub-Processor" means any third party engaged by the Company to process Personal Data on behalf of a client in accordance with documented instructions and applicable data protection obligations.
"Terms of Service" means the Company’s standard terms and conditions governing access to and use of the Products, as published on the Company’s website and as amended from time to time.
"Applicable Law" means all laws, regulations, regulatory requirements, and legally binding guidance applicable to the Processing of Personal Data, the protection of Confidential Information, and the performance of the Company’s obligations under this Policy.
2.21Interpretation
Unless the context otherwise requires:
references to a “Section” are to a section of this Policy;
the singular includes the plural and vice versa;
headings are for convenience only and shall not affect interpretation;
the words “include”, “includes”, and “including” shall be construed as if followed by “without limitation”;
references to Applicable Law include amendments, re-enactments, successor legislation, and subordinate regulations; and
in the event of any inconsistency between this Policy and a duly executed enterprise agreement or Data Processing Agreement, the terms of such agreement shall prevail to the extent of the inconsistency.
3. SCOPE AND APPLICABILITY
This Policy applies to the Processing of Personal Data and the handling of Confidential Information in connection with the Products and Services.
This Policy governs:
Client Data processed within the Deployment Environment;
Personal Data processed by the Company in its capacity as a Data Processor;
Personal Data processed by the Company in its capacity as a Data Controller;
Information collected through the Company’s website and marketing activities.
In enterprise deployments, the client organisation determines the purposes and means of Processing of Client Data and remains responsible for ensuring that such Processing complies with Applicable Law and the applicable Data Processing Agreement (as defined in Section 2.9).
Where the Company acts as a Data Processor, it processes Personal Data solely in accordance with documented instructions from the Data Controller and the applicable Data Processing Agreement.
This Policy does not apply to:
Third-party services not controlled by the Company;
Client-managed infrastructure or data processed independently by a client outside the scope of the Products;
Third-party applications or integrations configured independently by the client, unless expressly agreed in writing;
Data processed by Sub-Processors under their own privacy policies and contractual terms, except to the extent that the Company has entered into data protection obligations with such Sub-Processors under this Policy or an applicable Data Processing Agreement.
4. INFORMATION WE COLLECT
4.1Information Provided by Enterprise Clients
When an enterprise client engages with Brightcone, the Company may collect and process:
Organisation name, registered address, and primary contact details;
Billing contact information and payment details where applicable. Payment transactions are processed through authorised third-party payment processors (e.g., Stripe). Brightcone does not store full payment card details and relies on such providers to maintain compliance with PCI-DSS and other applicable standards;
Technical contact details for deployment, configuration, and support;
Project specifications, configuration settings, integration details, and implementation documentation necessary for the provision of Products and Services.
4.2Authorised User Information
When Authorised Users access the Products, the Company may process:
Name, business email address, and organisational role;
Authentication identifiers associated with the user’s account. User passwords and primary authentication credentials are managed within the client’s identity management system or chosen identity provider. Brightcone does not collect, store, or have access to user passwords or raw authentication tokens;
Access timestamps, session identifiers, usage metadata, and interaction logs generated in connection with Product usage.
4.3Automatically Collected Technical Data
In the course of operating the Products and Services, the Company may collect certain technical and operational metadata necessary for system functionality, security, and performance monitoring, including:
Log files, access records, and error reports;
API call metadata and system diagnostic information;
Device and connection information required for secure transmission;
System-generated identifiers necessary to maintain session integrity.
Such technical data is processed solely for operational, security, compliance, and service improvement purposes and is subject to the safeguards described in Section 10 of this Policy.
4.4Client Data
Client Data consists of information provided by or generated on behalf of enterprise clients through authorised use of the Products.
Client Data may include:
Business documents, reports, structured and unstructured knowledge content;
Employee and customer records, depending on the client’s implementation;
AI prompts, contextual inputs, and generated outputs;
Clinical or health-related documentation in healthcare deployments (e.g., Bright Summarization);
IT service management records, tickets, and operational data (e.g., Bright Desk).
Client Data is processed primarily within the client’s designated Deployment Environment as defined in Section 2.12. Subject to the limited exceptions described in Section 1.6, Brightcone does not host or retain Client Data on Company-owned or Company-controlled infrastructure.
4.5Special Categories of Data
Certain deployments of the Products, including healthcare-related deployments, may involve the Processing of special categories of Personal Data or Protected Health Information as defined in Section 2.16.
Where such data is involved, Processing shall be subject to additional safeguards, contractual protections, and legal requirements under Applicable Law, including where relevant the execution of a Business Associate Agreement under HIPAA.
The Company does not seek to collect special categories of Personal Data through its website or general marketing activities.
4.6Website and Marketing Information
When individuals visit the Company’s website or interact with marketing communications, the Company may collect:
IP address, browser type, device characteristics, and operating system;
Website usage analytics, including pages viewed, duration of visit, and referral sources;
Information voluntarily submitted through contact forms, demo requests, event registrations, or newsletter subscriptions;
Cookies and similar tracking technologies, as described in Section 11 of this Policy;
Website and marketing information is collected on the basis of the Company’s legitimate interests in operating and improving its digital presence and marketing activities, or on the basis of consent where required under Applicable Law.
5. LAWFUL BASIS FOR PROCESSING
5.1General Principles
The Company processes Personal Data only where it has a lawful basis under Applicable Law.
5.2Contractual Necessity
Where the Company provides Products and Services to enterprise clients, Processing of Personal Data is necessary for the performance of a contract or to take steps at the request of the Data Controller prior to entering into a contract.
5.3Legitimate Interests
The Company may process Personal Data where such Processing is necessary for its legitimate interests, including:
Operating, maintaining, and improving the Products and Services;
Ensuring network and information security;
Preventing fraud, misuse, or unauthorised access;
Managing internal administration and business operations;
Conducting limited analytics using Anonymised Data (as defined in Section 2.2).
In relying on legitimate interests as a lawful basis, the Company has assessed that such interests are not overridden by the interests or fundamental rights and freedoms of the Data Subjects concerned, having regard to the nature of the data and the context of the Processing.
5.4Legal Obligations
The Company may process Personal Data where required to comply with Applicable Law, regulatory obligations, court orders, or lawful requests from public authorities.
5.5Consent
Where required under Applicable Law, the Company will rely on the Data Subject’s consent for specific Processing activities, including certain marketing communications or the placement of non-essential Cookies.
Data Subjects may withdraw consent at any time in accordance with Section 12 of this Policy, without affecting the lawfulness of Processing carried out prior to withdrawal.
5.6Processor Role Clarification
Where the Company acts as a Data Processor, it processes Personal Data solely on the documented instructions of the Data Controller and in accordance with the applicable Data Processing Agreement.
6. HOW WE USE INFORMATION
6.1Product Delivery and Support
The Company uses information collected in connection with the Products to:
Deploy, configure, and maintain the Products within the client’s Deployment Environment;
Provide technical support, troubleshooting, and incident resolution;
Deliver software updates, security patches, and system enhancements;
Manage billing, invoicing, and payment processing through authorised third-party providers.
6.2Product Improvement and Research
The Company may use aggregated and Anonymised Data (as defined in Section 2.2) to improve Product performance, reliability, and functionality.
Such Anonymised Data may be used to develop new features, conduct internal research, and evaluate system performance.
The Company does not use Client Data or Personal Data for training third-party AI models or for developing generalised AI models without the client’s explicit written consent and an appropriate contractual agreement.
6.3Communications
The Company may use contact information to:
Send service-related notices, updates, and security alerts;
Respond to inquiries, support requests, and operational communications;
Provide product updates, marketing information, or event invitations, subject to Applicable Law. Recipients of marketing communications may opt out at any time by following the unsubscribe instructions included in such communications or by contacting the Company as described in Section 17\.
6.4Legal and Compliance Purposes
The Company may process information to:
Comply with Applicable Law, regulatory obligations, and lawful legal processes;
Protect the rights, property, and safety of the Company, its clients, and others;
Enforce the Terms of Service, Data Processing Agreements, and other contractual rights.
6.5Security and Fraud Prevention
The Company uses automatically collected technical data and operational metadata to monitor system integrity, detect and prevent unauthorized access, investigate security incidents, and protect the Products, clients, and Data Subjects from fraud and misuse.
Such Processing is carried out on the basis of the Company’s legitimate interests as described in Section 5.3 and, where applicable, legal obligations under Section 5.4.
6.6No Sale or Commercial Exploitation of Data
The Company does not sell, rent, trade, license, or otherwise monetise Personal Data or Client Data to third parties. Information is used solely for the purposes described in this Section and as otherwise disclosed in this Policy or agreed in writing with the relevant client.
7. DATA PROCESSING ARCHITECTURE
7.1Client-Premises Processing Model
Brightcone's architecture is designed to enable Client Data to be processed primarily within the client's designated Deployment Environment.
Subject to the limited exceptions described in Section 1.6, Client Data is not transmitted to, hosted on, or persistently stored within Company-owned infrastructure.
AI models deployed for enterprise clients operate within the client's Deployment Environment or within infrastructure expressly designated and controlled by the client.
Data at rest and in transit is designed to remain within client-controlled systems, subject to the deployment configuration selected by the client and the limited exceptions described in Section 1.6.
Access by Brightcone personnel to client systems occurs only where expressly authorised for support, maintenance, or contractual service delivery purposes and is subject to confidentiality and access control safeguards. Such access shall be limited to the minimum scope necessary for the authorised purpose and shall not exceed the access permissions granted by the client under the applicable service agreement.
7.2Data Isolation and Segregation
Each client deployment is logically and, where applicable, network-segregated from other client environments.
The Company does not commingle Client Data across deployments.
Model instances, configurations, and operational environments are provisioned on a per-client basis.
Encryption keys and access credentials are managed within the client's infrastructure in accordance with the client's security policies. The Company recommends that clients adopt encryption key management practices consistent with applicable industry standards and the sensitivity of the data processed.
Network-level isolation mechanisms, including Virtual Private Cloud (VPC) segmentation or equivalent on-premises controls, are implemented in accordance with the deployment model selected by the client.
7.3Brightcone Corporate Systems
The Company's internal corporate systems do not store Client Data, except where limited and incidental data may be processed in accordance with Section 1.6.
The Company's internal systems may store:
.1 Client account and contractual information;
.2 Billing and payment records processed via authorised third-party providers;
.3 Support ticket metadata and operational service records;
.4 Product licensing information and configuration references necessary for contract administration;
.5 Aggregated and Anonymised Data, where permitted by contract and Applicable Law.
8. DATA SHARING AND DISCLOSURE
8.1No Sale of Personal Data
The Company does not sell, rent, trade, or otherwise monetise Personal Data or Client Data to third parties for marketing or advertising purposes.
8.2Authorised Disclosures
The Company may disclose information only in the following circumstances:
Service Providers and Sub-Processors: To trusted service providers and Sub-Processors (as defined in Section 2.18) who assist in providing the Products or operating the Company's corporate systems, including payment processors and professional advisors, subject to contractual confidentiality and data protection obligations consistent with this Policy and any applicable Data Processing Agreement. The Company maintains a list of current Sub-Processors, which is available upon written request or as otherwise made available through client documentation portals.
Legal and Regulatory Requirements: Where required by Applicable Law, regulation, subpoena, court order, or lawful request from a governmental authority. Where legally permissible, the Company shall provide the affected client or Data Subject with prior written notice of such disclosure and shall reasonably cooperate with any effort to seek a protective order or equivalent relief.
Protection of Rights: To protect the rights, property, or safety of the Company, its clients, Data Subjects, or others, including in connection with fraud prevention, security investigations, or enforcement of contractual rights.
Business Transactions: In connection with a merger, acquisition, restructuring, financing, or sale of assets, provided that affected clients are notified in accordance with Applicable Law and contractual obligations. Any successor entity shall be required to honour the obligations of this Policy with respect to Personal Data and Client Data, or affected Data Subjects and clients shall be notified in accordance with Applicable Law and provided with any rights required under such law.
With Explicit Consent: Where disclosure is made with the explicit prior written consent of the relevant client or Data Subject, as applicable.
8.3California Consumer Privacy Act
To the extent Applicable Law includes the California Consumer Privacy Act (CCPA) or the California Privacy Rights Act (CPRA), California residents may have additional rights with respect to their Personal Data, including the right to know, right to delete, right to correct, and the right to opt out of the sale or sharing of Personal Data.
The Company does not sell or share Personal Data as those terms are defined under the CCPA and CPRA.
The Company will not discriminate against individuals for exercising their rights under applicable California privacy laws.
California residents may exercise their rights by contacting the Company as described in Section 17 of this Policy.
8.4Healthcare Deployments
Where the Products are deployed in healthcare environments, disclosures involving Protected Health Information shall be governed by the applicable Business Associate Agreement and the requirements of Applicable Law, including HIPAA, as further described in Section 4.5 of this Policy.
8.5International Data Transfers
Where disclosure or sharing of Personal Data involves a transfer to a jurisdiction outside the country of origin, such transfers shall be conducted in accordance with Section 13 of this Policy.
9. DATA SECURITY
9.1Security Framework
The Company implements technical, administrative, and physical safeguards designed to protect Personal Data, Client Data, and Confidential Information against unauthorised access, disclosure, alteration, loss, and destruction, in accordance with Applicable Law and industry standards appropriate to the nature and sensitivity of the data processed. The Company aligns its security program with industry-recognized frameworks appropriate to its operational profile.
9.2Technical Safeguards
The Company maintains technical security measures including, where applicable:
Encryption of data in transit using industry-standard transport layer security protocols;
Encryption of data at rest using strong cryptographic standards appropriate to the deployment configuration;
Access control mechanisms, including role-based access controls and least-privilege principles;
Support for multi-factor authentication for administrative access;
Audit logging and monitoring of system activities;
Automated detection or redaction mechanisms for sensitive data categories where such features are enabled as part of the Product configuration.
9.3Administrative Safeguards
The Company maintains organisational safeguards including:
Confidentiality obligations for employees and contractors;
Security awareness training provided on a periodic basis;
Documented incident response procedures;
Periodic security assessments appropriate to the Company’s operational profile;
Background verification processes for personnel with access to sensitive systems, where permitted under Applicable Law.
9.4Physical Safeguards
The Company implements reasonable physical security controls for its corporate facilities and devices, including:
Controlled access to office environments;
Encryption of Company-issued devices where applicable;
Device management controls, including remote access restriction or wipe capabilities where supported.
9.5Shared Responsibility
Where Client Data is processed within the client’s Deployment Environment, the client remains responsible for implementing and maintaining appropriate security controls within its own infrastructure, including network configuration, encryption key management, access control policies, and backup procedures.
9.6Incident Response and Breach Notification
In the event of a confirmed Data Breach affecting Client Data for which the Company is responsible under Applicable Law or contract, the Company shall notify the affected client without undue delay and, where required under Applicable Law, within the time period prescribed by such law.
Where the client is the Data Controller, the client retains primary responsibility for notifying affected Data Subjects and relevant supervisory authorities as required under Applicable Law. The Company shall provide reasonable assistance to the client in fulfilling such obligations to the extent within the Company’s knowledge and control.
Such notification shall include, to the extent known at the time:
.1 The nature of the incident;
.2 The categories and approximate volume of data affected;
.3 The likely consequences of the incident;
.4 Measures taken or proposed to contain and remediate the incident.
The Company shall take reasonable steps to investigate, mitigate, and remediate the incident and shall cooperate with the client in fulfilling any regulatory or notification obligations required under Applicable Law.
10. CONFIDENTIALITY OBLIGATIONS
10.1Scope of Confidentiality
Non-public information disclosed in connection with the Products or Services shall be treated as Confidential Information as defined in Section 2.5.
Confidential Information may include, without limitation:
Client Data and business information;
Product architecture, source code, and technical documentation;
Pricing, contractual terms, and commercial arrangements;
Business strategies, plans, and financial information;
Personal Data and employee or customer information.
10.2Protection Standards
The Company shall:
Protect Confidential Information using at least the same degree of care it uses to protect its own confidential information of a similar nature, and in no event less than reasonable and appropriate technical and organisational measures having regard to the nature and sensitivity of the information;
Restrict access to Confidential Information to personnel with a legitimate business need to know;
Require personnel with access to be bound by confidentiality obligations;
Use Confidential Information solely for purposes authorised under the applicable agreement;
Not disclose confidential information to third parties except as permitted under Section 8 of this Policy or under an applicable agreement.
10.3Exclusions
Confidentiality obligations shall not apply to information that:
Is or becomes publicly available without breach of this Policy;
Was lawfully in the receiving party’s possession prior to disclosure;
Is independently developed without reference to the Confidential Information;
Is lawfully obtained from a third party without restriction;
Is required to be disclosed under Applicable Law, subject to prior notice where legally permissible.
10.4Duration
Confidentiality obligations shall survive termination of the applicable agreement for the period specified in such agreement or, if no period is specified, for a reasonable period consistent with the nature of the information. Trade secrets shall be protected for so long as they retain trade secret status under Applicable Law.
11. AI-SPECIFIC PROVISIONS
11.1Scope of AI Governance
This Section applies to all artificial intelligence components, machine learning models, natural language processing systems, and automated decision-support tools forming part of the Products.
The Company is committed to the responsible development and deployment of AI systems that respect privacy, operate with appropriate transparency, and are designed to minimise the risk of harmful or discriminatory outputs.
11.2AI Model Deployment and Data Isolation
AI components deployed for enterprise clients operate within the client’s Deployment Environment in accordance with Section 7 of this Policy.
Model instances are provisioned on a per-client basis and are not shared across client environments.
Client Data processed by AI components does not leave the client’s designated infrastructure except as described in Section 1.6.
11.3Training Data and Model Development
The Company does not use Client Data or Personal Data to train, fine-tune, or develop generalised AI models without the explicit written consent of the relevant client and an appropriate contractual agreement governing such use.
Where Anonymised Data (as defined in Section 2.2) is used for internal evaluation, testing, benchmarking, or product improvement, such data shall not reasonably permit identification of any individual or client.
The Company maintains internal documentation regarding AI model development and data sources to the extent required under Applicable Law.
11.4AI Output Disclaimer
AI-generated outputs are produced based on patterns in training data and client-provided inputs and may contain inaccuracies or limitations.
AI-generated outputs do not constitute professional advice, including legal, medical, financial, or clinical advice, and should not be relied upon without appropriate human review.
Clients and Authorised Users are responsible for reviewing and validating AI-generated outputs before acting upon them, particularly in regulated or high-impact contexts.
The Company does not guarantee the factual accuracy, completeness, or fitness for the purpose of AI-generated outputs.
The Products are not designed to make fully automated decisions that produce legal or similarly significant effects without human oversight.
11.5Human Oversight
The Company’s AI systems are designed to support human decision-making rather than replace it.
Clients deploying AI features in contexts involving significant decisions affecting individuals are responsible for implementing appropriate human oversight consistent with Applicable Law.
11.6Algorithmic Transparency
Upon reasonable request, the Company may provide high-level information regarding the general functioning of AI systems, including types of inputs, output categories, and known limitations.
Where required under Applicable Law, the Company shall reasonably cooperate with clients in providing meaningful information concerning automated processing that produces legal or similarly significant effects.
11.7AI Regulatory Compliance
The Company monitors developments in AI-related regulatory frameworks and shall take reasonable steps to align its AI governance practices with Applicable Law.
Clients remain responsible for ensuring their use of AI-powered features complies with sector-specific regulatory obligations applicable to their organisation.
12. DATA SUBJECT RIGHTS
12.1Role-Based Allocation of Responsibility
Where the Company acts as a Data Processor, Data Subject requests relating to Client Data must be directed to the relevant enterprise client acting as Data Controller.
The Company shall provide reasonable assistance to clients in responding to Data Subject requests within the timeframes required under Applicable Law.
Where the Company acts as a Data Controller, individuals may exercise their rights directly with the Company.
12.2Available Rights
Subject to Applicable Law and identity verification, Data Subjects may have the following rights:
Right of Access
Right to Rectification
Right to Erasure
Right to Restriction of Processing
Right to Data Portability
Right to Object
Rights relating to Automated Decision-Making
Right to Withdraw Consent
The scope and applicability of these rights depend on the jurisdiction and legal basis for processing.
12.3Enterprise Client Rights
Enterprise clients may, subject to applicable agreements:
Request account-level data summaries;
Request correction of organisational data;
Request deletion of account data subject to legal retention requirements;
Export Client Data from their Deployment Environment;
Conduct audits in accordance with the applicable service agreement.
12.4Exercising Rights
Requests may be submitted to privacy@brightcone.ai.
The Company will respond within thirty (30) calendar days of receipt of a verifiable request, unless a longer period is permitted under Applicable Law. Where an extension is required due to complexity or volume, the requesting party shall be notified in advance.
12.5California Residents
California residents may exercise rights under the CCPA and CPRA.
The Company does not sell or share Personal Data as defined under the CCPA or CPRA.
The Company will not discriminate against individuals for exercising rights under California privacy law.
13. INTERNATIONAL DATA TRANSFERS
13.1 The Company may transfer or provide access to Personal Data across international borders in the course of operating its Products and Services.
13.2 Where Personal Data is transferred to jurisdictions that do not provide an equivalent level of data protection, the Company shall implement appropriate safeguards in accordance with Applicable Law.
13.3 Such safeguards may include:
Standard Contractual Clauses;
Adequacy decisions;
Binding Corporate Rules;
Other recognised transfer mechanisms.
13.4 Client Data remains subject to the deployment architecture described in Section 7\.
13.5 International transfers shall not diminish the protections afforded under Applicable Law.
14. DATA RETENTION
14.1General Principle
Personal Data is retained only for as long as necessary to fulfil the purposes for which it was collected, to comply with legal obligations, resolve disputes, and enforce agreements.
14.2Client Data
Client Data retention is primarily governed by the client.
Upon termination, residual copies within Company systems shall be deleted or rendered inaccessible within thirty (30) days unless retention is required by law or agreed in writing.
Written confirmation of deletion will be provided upon request.
The Company shall cooperate with reasonable transition or preservation requests during agreed transition periods.
14.3Account and Contractual Records
Account and contractual records shall be retained for the duration of the relationship and for seven (7) years thereafter, or longer if required by Applicable Law.
14.4Technical and Operational Metadata
Technical and operational metadata described in Section 4.3 shall be retained only for as long as necessary for operational, security, and compliance purposes and shall thereafter be deleted or anonymised.
14.5Marketing Data
Marketing data shall be retained until opt-out or deletion request, and removed within thirty (30) days thereafter, subject to legal retention obligations.
14.6Anonymised Data
Anonymised Data may be retained indefinitely for legitimate analytical and product improvement purposes.
15. COOKIES AND TRACKING TECHNOLOGIES
15.1 Cookies are used in accordance with Section 2.6 of this Policy and the categories described below.
15.2 Categories of Cookies:
Essential Cookies — Strictly necessary for the operation of the website and core Product functionality, including navigation, session management, authentication, and form submission.
Essential Cookies cannot be disabled without impairing website or Product functionality.
Analytics Cookies — Used to collect aggregated information about how visitors interact with the website for performance and improvement purposes.
Marketing and Preference Cookies — Used to deliver relevant content and measure marketing effectiveness. These are deployed only with prior consent where required under Applicable Law.
15.3 A Cookie consent mechanism is presented upon first visit to the website.
15.4 Users may modify or withdraw Cookie preferences at any time through the website settings or browser configuration.
15.5 Withdrawal of consent does not affect the lawfulness of prior processing.
16. HEALTHCARE-SPECIFIC PROVISIONS
16.1 This Section applies to deployments involving Protected Health Information.
16.2 Where required, a Business Associate Agreement shall be executed prior to PHI processing.
16.3 PHI processing occurs within the client’s Deployment Environment.
16.4 Access to PHI is restricted consistent with the minimum necessary standard.
16.5 The Company supports de-identification mechanisms consistent with recognised regulatory standards.
16.6 Clients remain responsible for compliance with additional state health privacy laws.
17. POLICY AMENDMENTS
17.1 The Company may amend this Policy to reflect changes in law or practice.
17.2 Material amendments will be notified at least thirty (30) days in advance where required.
17.3 Non-material clarifications may be made without advance notice.
17.4 Continued use constitutes acknowledgement of the updated Policy.
17.5 Prior versions are archived and available upon request.
18. GOVERNING LAW
18.1 This Policy shall be governed by the laws specified in the applicable service agreement.
18.2 Disputes shall be resolved in accordance with the applicable agreement.
18.3 Nothing limits a Data Subject’s right to lodge a complaint with a supervisory authority.
19. CONTACT INFORMATION
Contact us at: privacy@brightcone.ai
The Company will acknowledge privacy-related correspondence within five (5) business days and respond substantively within thirty (30) calendar days where practicable.