Privacy Policy
AXIS BLUE is designed to capture operational evidence and generate structured outputs. This policy explains what information may be collected, how it may be used, and your choices.
1) Scope
This Privacy Policy applies to the AXIS BLUE website, keyholder access pages, and any future web or iOS interfaces that reference this policy (collectively, the “Services”).
AXIS BLUE is independently developed and is not an official corporate product unless explicitly stated in writing.
2) Information we may collect
Depending on how you use the Services, we may collect:
- Contact information you submit (e.g., name, email, role, organization) via request forms.
- Operational submissions you provide (e.g., photos, notes, keys, identifiers) when features are enabled.
- Technical data such as device type, browser type, approximate region, and basic usage events (e.g., page views).
We do not intentionally collect sensitive personal information. If you submit it anyway, you’re doing that thing humans do where they ignore the instructions and then act surprised. Don’t.
3) How information is used
Information may be used to:
- Process requests for keyholder access, accounts, or support.
- Operate the Services (e.g., display evidence, generate outputs, maintain session integrity).
- Improve reliability, security, and performance.
- Detect abuse, misuse, or unauthorized access attempts.
4) Sharing and disclosure
AXIS BLUE does not sell personal information. Information may be shared only when necessary:
- With service providers that support hosting, storage, and security (e.g., infrastructure vendors).
- To comply with law, legal process, or enforce rights and safety.
- With authorized parties when access is intentionally granted (e.g., keyholder views for a specific visit).
5) Retention
Information is retained only as long as needed for operational purposes, security, and platform improvement. When time-window controls are enabled, certain evidence may be staged and removed automatically if not approved.
6) Security
Reasonable administrative and technical controls are used to protect data. No system is perfect. If you need “perfect,” you need a time machine or a fantasy novel.
7) Your choices
- You may request access, correction, or deletion of your submitted contact information.
- You may stop using the Services at any time.
- If keyholder access is used, do not share your key. Keys are intended for controlled access.
8) Contact
For privacy questions or concerns, contact: gabriel.kearns@axisblue.io
If your concern is urgent, use the Request page and select “Security / privacy concern.”
9) Updates
This policy may be updated as the platform evolves. The latest version will be posted on this page.