Legal
Privacy Policy
Last updated: May 6, 2026
1. Who we are
CounterSwarm ("CounterSwarm", "we", "us") is a defensive counter-drone readiness software company. Our platform helps critical-site teams simulate drone incidents, assess coverage gaps, and generate readiness reports.
For privacy inquiries: privacy@counterswarm.io
2. What information we collect
2.1 Account and authentication data
When a deployment includes authenticated workspace access, a managed identity provider may collect your email address and, optionally, your name and profile photo. CounterSwarm receives an application user identifier but does not store your password.
2.2 Organization and usage data
We store information you provide while using the platform: organization name, site details (name, address, type), assets placed on site maps, zone configurations, incident records, and readiness reports. This data is owned by your organization.
2.3 Technical and log data
We collect standard server-side logs including IP addresses, browser type, pages visited, timestamps, and error traces. This data is used exclusively for security monitoring and platform reliability.
2.4 Lead and contact data
If you submit a pilot request or contact form, we collect your name, email, organization, and any message content you provide. This is used solely to respond to your inquiry.
3. How we use your information
- To provide and improve the CounterSwarm platform
- To authenticate users and manage organizational access controls
- To generate readiness assessments and downloadable reports on your behalf
- To send transactional emails (invite notifications, report delivery)
- To respond to support requests and pilot inquiries
- To monitor platform security and prevent abuse
- To comply with applicable law and legal process
We do not sell your data to third parties. We do not use your data for advertising or behavioral profiling.
4. Data sharing and processors
We may share data only with service providers necessary to operate the platform in a given environment:
| Provider | Purpose | Data shared |
|---|---|---|
| Managed identity provider | Authentication and access control | Email, user ID, session metadata |
| Managed data and object-storage provider | Application data, reports, and evidence storage | Organization data, incident records, generated artifacts |
| Managed hosting and observability provider | Application delivery, logging, and reliability monitoring | Request metadata, diagnostic logs, uptime events |
Processor selection depends on the deployment environment and customer configuration. The public-site handoff is host-agnostic and may be delivered through a downstream frontend partner.
5. Data retention
Data-retention periods depend on the deployment agreement and environment. Specific retention and deletion terms should be set in the applicable commercial agreement.
6. Security
We use role-based access controls, environment-managed secrets, and defensive-only verification gates. See our Security page for the current verified posture.
7. Your rights
Depending on your jurisdiction, you may have rights to access, correct, delete, or export your personal data. To exercise these rights, contact privacy@counterswarm.io.
Additional privacy rights and timing commitments may be defined in the commercial terms for a pilot or deployment.
8. Cookies
We use only essential session cookies or equivalent session tokens required for authenticated access where that access is enabled. We do not use advertising cookies.
9. Changes to this policy
We may update this policy to reflect changes in product posture, deployment model, or applicable law.
10. Contact
CounterSwarm
For privacy matters: privacy@counterswarm.io
General contact: contact@counterswarm.io