Privacy & Data Use

We collect the minimum data necessary to deliver consulting value, send the assets you explicitly request, and run at most two permission-based follow-ups. No ads. No data resale. No hidden drip.

Last Updated: 2025-09-09

What We Collect

  • Email & Role (optional): Provided when you request the Week 1 Right-Sizing Playbook or book time.
  • Explicit Consent Flag: Whether you agreed to receive the two follow-up messages.
  • Operational Events: Anonymous page interactions (e.g. booking success) pushed to a local dataLayer for analytics aggregation.
  • Scheduling Inputs: Data you enter into the embedded Cal.com widget (handled under their policy).
  • Server Logs: Minimal request logs (timestamp, route, status) for abuse detection and uptime diagnostics.

We do not collect: passwords, payment card data, sensitive personal categories, or behavioral heatmaps.

How We Use It

  • Send the requested asset (playbook) and confirm delivery.
  • Provide at most two consult-oriented follow-ups (day 3 + day 7) if you consented.
  • Evaluate anonymized funnel performance (conversion ratios, not individual profiles).
  • Protect the site from automated abuse and diagnose stability issues.
  • Fulfill direct communication you initiate (contact form / scheduling).

Legal bases (where applicable): Consent (asset + follow-ups) and Legitimate Interest (security, performance, core service delivery).

Cookies & Similar Technologies

We seek to keep cookies/lightweight storage minimal. Categories currently in use or potentially deployed:

Essential
Session integrity, rate limiting, CSRF protection.
Performance
Aggregate analytics (page views, conversion funnels). No cross-site tracking.
Conversion
Attribution of a booking or consult request to a prior asset request (first/last touch within our domain only).
Security
Abuse / anomaly detection tokens to mitigate automated form spam.

No third‑party advertising, retargeting pixels, social media trackers, or fingerprinting scripts are intentionally deployed.

Retention & Deletion

Lead records (email + consent flag) are stored in a minimal internal store. If no engagement occurs after the final follow-up, we may purge the record during periodic clean-ups (generally within 90–180 days).

Deletion / access requests: email privacy@marphil.us. We will remove or provide an export of your record within a reasonable timeframe (usually < 10 business days).

Processors / Service Providers

  • Cal.com: Scheduling workflow (meeting logistics, confirmation emails).
  • Email Infrastructure (SMTP / AWS SES / SendGrid): Asset delivery + follow-ups (only one active provider at a time).
  • Hosting: Application hosting & edge delivery (may include regional replication & CDN caching).
  • Error & Performance Monitoring (if enabled): Anonymous stack traces / timing metrics.

We select providers with encryption in transit and industry-standard security practices. Data residency may involve US and other regions depending on CDN edge caching.

Your Rights

  • Access: Ask what data we hold.
  • Deletion: Request removal at any time.
  • Rectification: Correct an email/role mismatch.
  • Restriction / Objection: Opt out of follow-ups instantly.
  • Portability: Receive a simple export (JSON or text).

We respond to reasonable requests promptly and without unnecessary friction.

Security Measures

Controls include principle-of-least-privilege for operational email credentials, transport encryption (HTTPS / TLS), minimal data surface, and periodic dependency updates. We intentionally avoid collecting high-risk personal or financial data.

Incident response: If we ever discover unauthorized access affecting you, we will notify impacted contacts using the last known valid email.

Contact & Changes

Questions or requests: privacy@marphil.us

We may revise this policy to reflect process or provider changes. A new “Last Updated” date will appear at the top. Material changes (scope expansion or new tracking categories) will be clearly flagged.

© 2025 MarPhil LLC