Legal

Privacy Policy

Last updated: May 6, 2026

1. Who we are

CounterSwarm ("CounterSwarm", "we", "us") is a defensive counter-drone readiness software company. Our platform helps critical-site teams simulate drone incidents, assess coverage gaps, and generate readiness reports.

For privacy inquiries: privacy@counterswarm.io

2. What information we collect

2.1 Account and authentication data

When a deployment includes authenticated workspace access, a managed identity provider may collect your email address and, optionally, your name and profile photo. CounterSwarm receives an application user identifier but does not store your password.

2.2 Organization and usage data

We store information you provide while using the platform: organization name, site details (name, address, type), assets placed on site maps, zone configurations, incident records, and readiness reports. This data is owned by your organization.

2.3 Technical and log data

We collect standard server-side logs including IP addresses, browser type, pages visited, timestamps, and error traces. This data is used exclusively for security monitoring and platform reliability.

2.4 Lead and contact data

If you submit a pilot request or contact form, we collect your name, email, organization, and any message content you provide. This is used solely to respond to your inquiry.

3. How we use your information

  • To provide and improve the CounterSwarm platform
  • To authenticate users and manage organizational access controls
  • To generate readiness assessments and downloadable reports on your behalf
  • To send transactional emails (invite notifications, report delivery)
  • To respond to support requests and pilot inquiries
  • To monitor platform security and prevent abuse
  • To comply with applicable law and legal process

We do not sell your data to third parties. We do not use your data for advertising or behavioral profiling.

4. Data sharing and processors

We may share data only with service providers necessary to operate the platform in a given environment:

ProviderPurposeData shared
Managed identity providerAuthentication and access controlEmail, user ID, session metadata
Managed data and object-storage providerApplication data, reports, and evidence storageOrganization data, incident records, generated artifacts
Managed hosting and observability providerApplication delivery, logging, and reliability monitoringRequest metadata, diagnostic logs, uptime events

Processor selection depends on the deployment environment and customer configuration. The public-site handoff is host-agnostic and may be delivered through a downstream frontend partner.

5. Data retention

Data-retention periods depend on the deployment agreement and environment. Specific retention and deletion terms should be set in the applicable commercial agreement.

6. Security

We use role-based access controls, environment-managed secrets, and defensive-only verification gates. See our Security page for the current verified posture.

7. Your rights

Depending on your jurisdiction, you may have rights to access, correct, delete, or export your personal data. To exercise these rights, contact privacy@counterswarm.io.

Additional privacy rights and timing commitments may be defined in the commercial terms for a pilot or deployment.

8. Cookies

We use only essential session cookies or equivalent session tokens required for authenticated access where that access is enabled. We do not use advertising cookies.

9. Changes to this policy

We may update this policy to reflect changes in product posture, deployment model, or applicable law.

10. Contact

CounterSwarm
For privacy matters: privacy@counterswarm.io
General contact: contact@counterswarm.io