Privacy Policy
Your privacy is fundamental to how we operate
Effective Date: December 18, 2025
Last Reviewed: December 18, 2025
1. Introduction
Webling Studio, LLC ("Webling Studio," "we," "us," or "our") is committed to protecting your privacy and ensuring transparency in how we collect, use, and safeguard your personal information.
This Privacy Policy explains our practices regarding the collection, use, disclosure, and protection of information obtained through our website, services, and client interactions. This policy applies to:
- Visitors to our website (https://webling-studio-website-ox1b73cct-webling-studio.vercel.app)
- Users of our Digital Readiness Analysis tool
- Individuals who submit inquiries through our contact forms
- Current and prospective clients
- Future users of AI agent configuration and consulting services
By accessing our website or using our services, you acknowledge that you have read, understood, and agree to be bound by this Privacy Policy. If you do not agree with our practices, please do not use our website or services.
2. Information We Collect
We collect information to provide, improve, and personalize our services. The types of information we collect include:
2.1 Information You Provide Directly
Contact Form Submissions:
- Personal Information: Name, email address, company name, phone number (optional)
- Communication Content: Your message, inquiries, and any other information you choose to provide
- Consent Records: Documentation of your privacy consent and preferences
Digital Readiness Analysis Data:
- Business Profile: Company size, industry, technical infrastructure details
- Technical Assessment Responses: Information about your current systems, challenges, and objectives
- Solution Package Preferences: Service selections, pricing tier interests, and customization requests
- Optional Attachment: When you choose to include your analysis results with a contact form submission
2.2 Information Collected Automatically
Technical Information:
- Device Information: Browser type, operating system, device identifiers
- Usage Data: Pages visited, time spent, interaction patterns, referral sources
- IP Address: For security, fraud prevention, and geographic analytics
- Cookies and Similar Technologies: See Section 5 for detailed information
Security and Fraud Prevention Data:
- CSRF Tokens: Security tokens to prevent cross-site request forgery attacks
- Rate Limiting Metrics: Request frequency and patterns to prevent abuse
- Honeypot Field Data: Hidden form fields used exclusively for bot detection
2.3 Information from Third-Party Sources
We may receive information from third-party service providers who support our operations, including:
- Analytics Providers: Aggregated website usage and performance data
- Security Services: Threat intelligence and security monitoring data
- Communication Platforms: Delivery status and engagement metrics for authorized communications
3. How We Use Your Information
We process your personal information for the following purposes, based on applicable legal grounds:
3.1 Primary Business Purposes
- Service Delivery: To respond to inquiries, provide consultations, and deliver contracted services
- Analysis and Recommendations: To generate Digital Readiness Analysis results and solution package recommendations
- Communication: To communicate with you about your inquiries, projects, and services
- Client Relationship Management: To maintain records of our business relationship and service history
3.2 Operational and Security Purposes
- Security Protection: To detect, prevent, and respond to security threats, fraud, and malicious activity
- Platform Integrity: To maintain the functionality, reliability, and performance of our systems
- Compliance and Legal Obligations: To comply with applicable laws, regulations, and legal processes
- Audit and Accountability: To maintain records for internal audits and regulatory compliance
3.3 Analytics and Improvement
- Service Enhancement: To analyze usage patterns and improve our website and services
- User Experience Optimization: To understand how visitors interact with our platform and optimize accordingly
- Performance Monitoring: To track system performance, identify issues, and ensure optimal operation
3.4 Legal Bases for Processing (GDPR)
For users in the European Economic Area (EEA), United Kingdom, or Switzerland, we process your personal data based on:
- Consent: Where you have provided explicit consent (e.g., contact form submission)
- Contract Performance: Where processing is necessary to fulfill our contractual obligations
- Legitimate Interests: Where we have a legitimate business interest (e.g., security, analytics) that does not override your rights
- Legal Obligations: Where required by law or regulation
4. Data Sharing and Disclosure
We do not sell, rent, or trade your personal information. We may share your information only in the following circumstances:
4.1 Service Providers and Partners
We engage trusted third-party service providers who assist in operating our business, subject to strict confidentiality obligations:
- Infrastructure Providers: Hosting, content delivery, and cloud services
- Communication Services: Email delivery and customer communication platforms
- Analytics Providers: Website analytics and performance monitoring (anonymized data preferred)
- Security Services: Security monitoring, threat detection, and fraud prevention
- Payment Processors: For processing payments (we do not store payment card information)
Note: All service providers are carefully vetted and bound by data processing agreements that require GDPR-equivalent protections.
4.2 Legal Requirements and Protection of Rights
We may disclose your information when required to:
- Comply with legal obligations, court orders, or valid legal processes
- Enforce our terms of service or other agreements
- Protect the rights, property, or safety of Webling Studio, our clients, or others
- Detect, prevent, or respond to fraud, security breaches, or technical issues
- Respond to emergency situations involving potential harm to individuals
4.3 Business Transfers
In the event of a merger, acquisition, reorganization, or sale of assets, your information may be transferred to the successor entity, subject to the same privacy protections described in this policy. We will notify you via email and/or prominent notice on our website before your information becomes subject to a different privacy policy.
4.4 With Your Consent
We may share your information for any other purpose with your explicit consent or at your direction.
6. AI Agent Configuration and Data Processing
Future-Ready Provision: As Webling Studio expands its service offerings to include AI agent configuration, customization, and consulting services, this section outlines how we will collect, use, and protect data related to these advanced capabilities.
6.1 AI Agent Configuration Data
When you engage with our AI agent services, we may collect and process:
- Configuration Samples: Example prompts, instruction sets, and custom configurations you provide or we develop for your agents
- Agent Behavior Parameters: Settings, guardrails, knowledge bases, and operational constraints
- Integration Data: Information about systems, APIs, and workflows your agents interact with
- Usage Analytics: Performance metrics, conversation logs (when authorized), and optimization data
- Training Materials: Custom knowledge bases, documentation, and domain-specific information you provide
6.2 Use of AI Configuration Data
We will use AI agent configuration data exclusively for:
- Service Delivery: Building, testing, and deploying your custom AI agent configurations
- Optimization: Improving agent performance, accuracy, and reliability based on your requirements
- Troubleshooting: Diagnosing and resolving technical issues with agent behavior or integrations
- Compliance: Ensuring agent configurations meet applicable regulatory requirements and ethical guidelines
Your AI agent configurations and custom data will NEVER be:
- Used to train third-party models without explicit written consent
- Shared with competitors or used for comparative analysis
- Incorporated into public or shared agent configurations
- Retained beyond the service period without contractual agreement
6.3 Third-Party AI Platforms
When implementing AI agent solutions, we may integrate with third-party AI platforms (e.g., OpenAI, Anthropic, custom models). In such cases:
- We will disclose which platforms are used for your specific implementation
- We will configure privacy-preserving settings (e.g., opt-out of training) where available
- We will provide transparency about data flows between systems
- We will implement data minimization practices to limit information exposure
- We will obtain your consent for any data processing beyond our direct control
6.4 Agent Interaction Data and Conversation Logs
If your AI agent implementation includes conversation logging or user interaction tracking:
- You maintain ownership and control over all interaction data
- We will implement your specified retention policies and data handling procedures
- We will configure appropriate access controls and encryption
- We will provide tools for data export, deletion, and compliance reporting
- We will ensure compliance with applicable regulations (GDPR, CCPA, industry-specific requirements)
6.5 AI Ethics and Responsible Development
Our AI agent configuration services adhere to ethical AI principles:
- Transparency: Clear disclosure of AI usage and capabilities to end users
- Fairness: Testing for and mitigating bias in agent responses and behavior
- Privacy by Design: Building privacy protections into agent architecture from inception
- Human Oversight: Ensuring appropriate human review and control mechanisms
- Accountability: Maintaining clear responsibility chains for agent actions and outputs
Note: As AI technologies and regulations evolve, we will update this section to reflect best practices and compliance requirements. Clients with active AI agent implementations will receive advance notice of any material changes.
7. Data Security Measures
We implement industry-standard security measures to protect your information from unauthorized access, alteration, disclosure, or destruction.
7.1 Technical Security Controls
- Encryption: TLS/SSL encryption for data in transit; encryption at rest for sensitive data
- Access Controls: Role-based access control (RBAC) and principle of least privilege
- Authentication: Multi-factor authentication (MFA) for administrative access
- Network Security: Firewalls, intrusion detection systems, and DDoS protection
- Security Monitoring: 24/7 monitoring, logging, and alerting for security events
- Vulnerability Management: Regular security assessments, penetration testing, and patch management
7.2 Organizational Security Measures
- Security Training: Regular security awareness training for all personnel
- Confidentiality Agreements: All employees and contractors sign confidentiality agreements
- Incident Response: Documented incident response procedures and breach notification protocols
- Vendor Management: Security assessments of all third-party service providers
- Compliance Audits: Regular internal and external security audits
7.3 Application Security
- Input Validation: Sanitization and validation of all user inputs
- CSRF Protection: Anti-CSRF tokens for all state-changing operations
- XSS Prevention: Content Security Policy (CSP) and output encoding
- Rate Limiting: Protection against brute force and denial-of-service attacks
- Secure Development: Following OWASP guidelines and secure coding practices
Important: While we implement robust security measures, no method of transmission over the Internet or electronic storage is 100% secure. We cannot guarantee absolute security but remain committed to protecting your information using industry best practices.
8. Data Retention
We retain your personal information only as long as necessary to fulfill the purposes outlined in this Privacy Policy, comply with legal obligations, and resolve disputes.
8.1 Retention Periods by Data Type
Contact Form Inquiries
Retained for 2 years from last contact, or until you request deletion
Digital Readiness Analysis Results
Retained for 1 year if submitted with inquiry; otherwise stored locally on your device only
Client Project Data
Retained for duration of engagement plus 7 years for legal and tax purposes
Analytics and Usage Data
Anonymized data retained for 26 months; identifiable data for 14 months
Security Logs
Retained for 1 year for security analysis and incident response
AI Agent Configuration Data
Retained for duration of service agreement plus 6 months, unless otherwise specified in contract
8.2 Deletion and Anonymization
When retention periods expire or upon your request, we will:
- Securely delete or anonymize your personal information
- Remove data from active systems and backups within 90 days
- Retain only anonymized or aggregated data that cannot identify you
- Maintain deletion records for compliance verification
8.3 Legal Retention Requirements
Certain information may be retained longer when required by law, including:
- Financial records (7 years per IRS requirements)
- Contract and legal documents (statute of limitations periods)
- Information subject to litigation holds or regulatory investigations
9. Your Privacy Rights
You have certain rights regarding your personal information. The specific rights available to you depend on your location and applicable laws.
9.1 Universal Rights (All Users)
- Right to Access: Request a copy of the personal information we hold about you
- Right to Correction: Request correction of inaccurate or incomplete information
- Right to Deletion: Request deletion of your personal information (subject to legal exceptions)
- Right to Withdraw Consent: Withdraw previously given consent at any time
- Right to Opt-Out: Opt out of marketing communications and certain data processing activities
9.2 Additional Rights (GDPR - EEA, UK, Switzerland)
- Right to Restriction: Request restriction of processing under certain conditions
- Right to Data Portability: Receive your data in a structured, machine-readable format
- Right to Object: Object to processing based on legitimate interests or for direct marketing
- Right to Lodge a Complaint: File a complaint with your local data protection authority
- Automated Decision-Making: Right not to be subject to solely automated decisions with legal effects
9.3 Additional Rights (CCPA/CPRA - California Residents)
- Right to Know: Know what personal information is collected, used, shared, or sold
- Right to Delete: Delete personal information held by businesses and service providers
- Right to Opt-Out: Opt out of the "sale" or "sharing" of personal information (Note: We do not sell data)
- Right to Correct: Correct inaccurate personal information
- Right to Limit: Limit use and disclosure of sensitive personal information
- Non-Discrimination: Not be discriminated against for exercising CCPA rights
9.4 How to Exercise Your Rights
To exercise any of these rights, please contact us at:
Privacy Rights Requests
- Email: privacy@weblingstudio.com
- Subject Line: "Privacy Rights Request - [Type of Request]"
- Response Time: We will respond within 30 days (45 days for complex requests)
We may need to verify your identity before processing your request. For security purposes, we may request additional information to confirm you are the person about whom we hold data.
9.5 Authorized Agents
You may designate an authorized agent to make requests on your behalf. The agent must provide written authorization and we may require you to verify your identity directly with us.
10. International Data Transfers
Webling Studio operates primarily in the United States. If you are located outside the United States, please be aware that information we collect will be transferred to, stored, and processed in the United States.
10.1 Legal Basis for Transfers
For data transfers from the EEA, UK, or Switzerland to the United States, we rely on:
- Standard Contractual Clauses (SCCs): EU-approved model contracts for data transfers
- Adequacy Decisions: Transfers to countries deemed adequate by the European Commission
- Your Explicit Consent: Where you have provided informed consent for the transfer
- Contractual Necessity: Where transfer is necessary to perform our contract with you
10.2 Safeguards for International Transfers
We implement additional safeguards for international data transfers:
- Encryption of data in transit and at rest
- Contractual commitments from service providers to maintain equivalent protections
- Regular assessments of data protection laws in countries where we transfer data
- Data minimization to reduce the amount of data transferred
10.3 Data Localization Preferences
For enterprise clients with specific data localization requirements, we can accommodate:
- Hosting in specific geographic regions
- Data residency commitments in contractual agreements
- Local processing for sensitive data categories
Contact us to discuss custom data localization arrangements for your organization.
11. Children's Privacy
Our services are intended for businesses and professional users. We do not knowingly collect personal information from children under the age of 16.
If you are under 16 years of age, please do not submit any personal information through our website or services. If we become aware that we have collected personal information from a child under 16, we will take steps to delete that information as quickly as possible.
If you believe we may have collected information from a child under 16, please contact us immediately at privacy@weblingstudio.com.
12. Changes to This Privacy Policy
We may update this Privacy Policy from time to time to reflect changes in our practices, technologies, legal requirements, or other operational reasons.
12.1 Notification of Changes
- Material Changes: We will notify you via email (to your registered address) and/or prominent notice on our website at least 30 days before changes take effect
- Non-Material Changes: We will update the "Last Reviewed" date at the top of this policy
- Active Clients: Clients with active service agreements will receive direct notification of any changes affecting their data processing
12.2 Review Schedule
We conduct quarterly reviews of this Privacy Policy to ensure it remains current with:
- Evolving privacy regulations and best practices
- Changes in our service offerings and data practices
- Feedback from clients and privacy advocates
- Technological advancements and security developments
12.3 Your Continued Use
Your continued use of our website or services after policy changes become effective constitutes your acceptance of the updated policy. If you do not agree to the changes, please discontinue use of our services and contact us to delete your information.
13. Contact Us
If you have questions, concerns, or requests regarding this Privacy Policy or our data practices, please contact us:
Webling Studio, LLC
Privacy & Data Protection Officer
Email: privacy@weblingstudio.com
General Inquiries: hello@weblingstudio.com
Website: https://webling-studio-website-ox1b73cct-webling-studio.vercel.app
For Privacy Rights Requests:
- Use subject line: "Privacy Rights Request - [Type]"
- Include your full name and email address associated with your inquiry
- Specify the nature of your request (access, deletion, correction, etc.)
- Allow up to 30 days for response (45 days for complex requests)
EU/UK Data Protection Representative:
To be appointed if regular monitoring of EU/UK data subjects occurs
Response Commitment: We are committed to addressing your privacy concerns promptly and transparently. All privacy inquiries receive priority handling and will be responded to within our committed timeframes.
Acknowledgment of Understanding
By using our website, submitting forms, or engaging with our services, you acknowledge that you have read, understood, and agree to the practices described in this Privacy Policy.
This Privacy Policy was last updated on December 18, 2025 and is reviewed quarterly to ensure continued compliance and transparency.