Privacy Policy

Your privacy is fundamental to how we operate

Effective Date: December 18, 2025

Last Reviewed: December 18, 2025

1. Introduction

Webling Studio, LLC ("Webling Studio," "we," "us," or "our") is committed to protecting your privacy and ensuring transparency in how we collect, use, and safeguard your personal information.

This Privacy Policy explains our practices regarding the collection, use, disclosure, and protection of information obtained through our website, services, and client interactions. This policy applies to:

By accessing our website or using our services, you acknowledge that you have read, understood, and agree to be bound by this Privacy Policy. If you do not agree with our practices, please do not use our website or services.

2. Information We Collect

We collect information to provide, improve, and personalize our services. The types of information we collect include:

2.1 Information You Provide Directly

Contact Form Submissions:

  • Personal Information: Name, email address, company name, phone number (optional)
  • Communication Content: Your message, inquiries, and any other information you choose to provide
  • Consent Records: Documentation of your privacy consent and preferences

Digital Readiness Analysis Data:

  • Business Profile: Company size, industry, technical infrastructure details
  • Technical Assessment Responses: Information about your current systems, challenges, and objectives
  • Solution Package Preferences: Service selections, pricing tier interests, and customization requests
  • Optional Attachment: When you choose to include your analysis results with a contact form submission

2.2 Information Collected Automatically

Technical Information:

  • Device Information: Browser type, operating system, device identifiers
  • Usage Data: Pages visited, time spent, interaction patterns, referral sources
  • IP Address: For security, fraud prevention, and geographic analytics
  • Cookies and Similar Technologies: See Section 5 for detailed information

Security and Fraud Prevention Data:

  • CSRF Tokens: Security tokens to prevent cross-site request forgery attacks
  • Rate Limiting Metrics: Request frequency and patterns to prevent abuse
  • Honeypot Field Data: Hidden form fields used exclusively for bot detection

2.3 Information from Third-Party Sources

We may receive information from third-party service providers who support our operations, including:

  • Analytics Providers: Aggregated website usage and performance data
  • Security Services: Threat intelligence and security monitoring data
  • Communication Platforms: Delivery status and engagement metrics for authorized communications

3. How We Use Your Information

We process your personal information for the following purposes, based on applicable legal grounds:

3.1 Primary Business Purposes

  • Service Delivery: To respond to inquiries, provide consultations, and deliver contracted services
  • Analysis and Recommendations: To generate Digital Readiness Analysis results and solution package recommendations
  • Communication: To communicate with you about your inquiries, projects, and services
  • Client Relationship Management: To maintain records of our business relationship and service history

3.2 Operational and Security Purposes

  • Security Protection: To detect, prevent, and respond to security threats, fraud, and malicious activity
  • Platform Integrity: To maintain the functionality, reliability, and performance of our systems
  • Compliance and Legal Obligations: To comply with applicable laws, regulations, and legal processes
  • Audit and Accountability: To maintain records for internal audits and regulatory compliance

3.3 Analytics and Improvement

  • Service Enhancement: To analyze usage patterns and improve our website and services
  • User Experience Optimization: To understand how visitors interact with our platform and optimize accordingly
  • Performance Monitoring: To track system performance, identify issues, and ensure optimal operation

3.4 Legal Bases for Processing (GDPR)

For users in the European Economic Area (EEA), United Kingdom, or Switzerland, we process your personal data based on:

  • Consent: Where you have provided explicit consent (e.g., contact form submission)
  • Contract Performance: Where processing is necessary to fulfill our contractual obligations
  • Legitimate Interests: Where we have a legitimate business interest (e.g., security, analytics) that does not override your rights
  • Legal Obligations: Where required by law or regulation

4. Data Sharing and Disclosure

We do not sell, rent, or trade your personal information. We may share your information only in the following circumstances:

4.1 Service Providers and Partners

We engage trusted third-party service providers who assist in operating our business, subject to strict confidentiality obligations:

  • Infrastructure Providers: Hosting, content delivery, and cloud services
  • Communication Services: Email delivery and customer communication platforms
  • Analytics Providers: Website analytics and performance monitoring (anonymized data preferred)
  • Security Services: Security monitoring, threat detection, and fraud prevention
  • Payment Processors: For processing payments (we do not store payment card information)

Note: All service providers are carefully vetted and bound by data processing agreements that require GDPR-equivalent protections.

4.2 Legal Requirements and Protection of Rights

We may disclose your information when required to:

  • Comply with legal obligations, court orders, or valid legal processes
  • Enforce our terms of service or other agreements
  • Protect the rights, property, or safety of Webling Studio, our clients, or others
  • Detect, prevent, or respond to fraud, security breaches, or technical issues
  • Respond to emergency situations involving potential harm to individuals

4.3 Business Transfers

In the event of a merger, acquisition, reorganization, or sale of assets, your information may be transferred to the successor entity, subject to the same privacy protections described in this policy. We will notify you via email and/or prominent notice on our website before your information becomes subject to a different privacy policy.

4.4 With Your Consent

We may share your information for any other purpose with your explicit consent or at your direction.

5. Cookies and Tracking Technologies

We use cookies and similar tracking technologies to enhance your experience, analyze usage, and improve our services.

5.1 Types of Cookies We Use

Essential Cookies (Required)

  • CSRF protection tokens for form security
  • Session management for authenticated areas
  • Security and fraud prevention mechanisms

Functional Cookies

  • User preferences and settings storage
  • Digital Readiness Analysis progress and results (localStorage)
  • Contact form auto-fill functionality

Analytics Cookies (Opt-in)

  • Anonymized usage statistics and page views
  • Performance monitoring and error tracking
  • User journey analysis for experience optimization

5.2 Managing Your Cookie Preferences

You have control over cookies:

  • Browser Settings: Most browsers allow you to refuse or delete cookies through their settings
  • Opt-Out Tools: Use industry opt-out tools for analytics and advertising cookies
  • Do Not Track: We respect browser "Do Not Track" signals where technically feasible

Note: Disabling essential cookies may impact website functionality, including contact form submission and Digital Readiness Analysis features.

5.3 Local Storage

We use browser local storage to temporarily save your Digital Readiness Analysis progress and results on your device. This data:

  • Remains entirely on your device until you clear it or complete/restart the analysis
  • Is never transmitted to our servers unless you explicitly submit it via the contact form
  • Can be cleared at any time using your browser's data management tools

6. AI Agent Configuration and Data Processing

Future-Ready Provision: As Webling Studio expands its service offerings to include AI agent configuration, customization, and consulting services, this section outlines how we will collect, use, and protect data related to these advanced capabilities.

6.1 AI Agent Configuration Data

When you engage with our AI agent services, we may collect and process:

  • Configuration Samples: Example prompts, instruction sets, and custom configurations you provide or we develop for your agents
  • Agent Behavior Parameters: Settings, guardrails, knowledge bases, and operational constraints
  • Integration Data: Information about systems, APIs, and workflows your agents interact with
  • Usage Analytics: Performance metrics, conversation logs (when authorized), and optimization data
  • Training Materials: Custom knowledge bases, documentation, and domain-specific information you provide

6.2 Use of AI Configuration Data

We will use AI agent configuration data exclusively for:

  • Service Delivery: Building, testing, and deploying your custom AI agent configurations
  • Optimization: Improving agent performance, accuracy, and reliability based on your requirements
  • Troubleshooting: Diagnosing and resolving technical issues with agent behavior or integrations
  • Compliance: Ensuring agent configurations meet applicable regulatory requirements and ethical guidelines

Your AI agent configurations and custom data will NEVER be:

  • Used to train third-party models without explicit written consent
  • Shared with competitors or used for comparative analysis
  • Incorporated into public or shared agent configurations
  • Retained beyond the service period without contractual agreement

6.3 Third-Party AI Platforms

When implementing AI agent solutions, we may integrate with third-party AI platforms (e.g., OpenAI, Anthropic, custom models). In such cases:

  • We will disclose which platforms are used for your specific implementation
  • We will configure privacy-preserving settings (e.g., opt-out of training) where available
  • We will provide transparency about data flows between systems
  • We will implement data minimization practices to limit information exposure
  • We will obtain your consent for any data processing beyond our direct control

6.4 Agent Interaction Data and Conversation Logs

If your AI agent implementation includes conversation logging or user interaction tracking:

  • You maintain ownership and control over all interaction data
  • We will implement your specified retention policies and data handling procedures
  • We will configure appropriate access controls and encryption
  • We will provide tools for data export, deletion, and compliance reporting
  • We will ensure compliance with applicable regulations (GDPR, CCPA, industry-specific requirements)

6.5 AI Ethics and Responsible Development

Our AI agent configuration services adhere to ethical AI principles:

  • Transparency: Clear disclosure of AI usage and capabilities to end users
  • Fairness: Testing for and mitigating bias in agent responses and behavior
  • Privacy by Design: Building privacy protections into agent architecture from inception
  • Human Oversight: Ensuring appropriate human review and control mechanisms
  • Accountability: Maintaining clear responsibility chains for agent actions and outputs

Note: As AI technologies and regulations evolve, we will update this section to reflect best practices and compliance requirements. Clients with active AI agent implementations will receive advance notice of any material changes.

7. Data Security Measures

We implement industry-standard security measures to protect your information from unauthorized access, alteration, disclosure, or destruction.

7.1 Technical Security Controls

  • Encryption: TLS/SSL encryption for data in transit; encryption at rest for sensitive data
  • Access Controls: Role-based access control (RBAC) and principle of least privilege
  • Authentication: Multi-factor authentication (MFA) for administrative access
  • Network Security: Firewalls, intrusion detection systems, and DDoS protection
  • Security Monitoring: 24/7 monitoring, logging, and alerting for security events
  • Vulnerability Management: Regular security assessments, penetration testing, and patch management

7.2 Organizational Security Measures

  • Security Training: Regular security awareness training for all personnel
  • Confidentiality Agreements: All employees and contractors sign confidentiality agreements
  • Incident Response: Documented incident response procedures and breach notification protocols
  • Vendor Management: Security assessments of all third-party service providers
  • Compliance Audits: Regular internal and external security audits

7.3 Application Security

  • Input Validation: Sanitization and validation of all user inputs
  • CSRF Protection: Anti-CSRF tokens for all state-changing operations
  • XSS Prevention: Content Security Policy (CSP) and output encoding
  • Rate Limiting: Protection against brute force and denial-of-service attacks
  • Secure Development: Following OWASP guidelines and secure coding practices

Important: While we implement robust security measures, no method of transmission over the Internet or electronic storage is 100% secure. We cannot guarantee absolute security but remain committed to protecting your information using industry best practices.

8. Data Retention

We retain your personal information only as long as necessary to fulfill the purposes outlined in this Privacy Policy, comply with legal obligations, and resolve disputes.

8.1 Retention Periods by Data Type

Contact Form Inquiries

Retained for 2 years from last contact, or until you request deletion

Digital Readiness Analysis Results

Retained for 1 year if submitted with inquiry; otherwise stored locally on your device only

Client Project Data

Retained for duration of engagement plus 7 years for legal and tax purposes

Analytics and Usage Data

Anonymized data retained for 26 months; identifiable data for 14 months

Security Logs

Retained for 1 year for security analysis and incident response

AI Agent Configuration Data

Retained for duration of service agreement plus 6 months, unless otherwise specified in contract

8.2 Deletion and Anonymization

When retention periods expire or upon your request, we will:

  • Securely delete or anonymize your personal information
  • Remove data from active systems and backups within 90 days
  • Retain only anonymized or aggregated data that cannot identify you
  • Maintain deletion records for compliance verification

8.3 Legal Retention Requirements

Certain information may be retained longer when required by law, including:

  • Financial records (7 years per IRS requirements)
  • Contract and legal documents (statute of limitations periods)
  • Information subject to litigation holds or regulatory investigations

9. Your Privacy Rights

You have certain rights regarding your personal information. The specific rights available to you depend on your location and applicable laws.

9.1 Universal Rights (All Users)

  • Right to Access: Request a copy of the personal information we hold about you
  • Right to Correction: Request correction of inaccurate or incomplete information
  • Right to Deletion: Request deletion of your personal information (subject to legal exceptions)
  • Right to Withdraw Consent: Withdraw previously given consent at any time
  • Right to Opt-Out: Opt out of marketing communications and certain data processing activities

9.2 Additional Rights (GDPR - EEA, UK, Switzerland)

  • Right to Restriction: Request restriction of processing under certain conditions
  • Right to Data Portability: Receive your data in a structured, machine-readable format
  • Right to Object: Object to processing based on legitimate interests or for direct marketing
  • Right to Lodge a Complaint: File a complaint with your local data protection authority
  • Automated Decision-Making: Right not to be subject to solely automated decisions with legal effects

9.3 Additional Rights (CCPA/CPRA - California Residents)

  • Right to Know: Know what personal information is collected, used, shared, or sold
  • Right to Delete: Delete personal information held by businesses and service providers
  • Right to Opt-Out: Opt out of the "sale" or "sharing" of personal information (Note: We do not sell data)
  • Right to Correct: Correct inaccurate personal information
  • Right to Limit: Limit use and disclosure of sensitive personal information
  • Non-Discrimination: Not be discriminated against for exercising CCPA rights

9.4 How to Exercise Your Rights

To exercise any of these rights, please contact us at:

Privacy Rights Requests

  • Email: privacy@weblingstudio.com
  • Subject Line: "Privacy Rights Request - [Type of Request]"
  • Response Time: We will respond within 30 days (45 days for complex requests)

We may need to verify your identity before processing your request. For security purposes, we may request additional information to confirm you are the person about whom we hold data.

9.5 Authorized Agents

You may designate an authorized agent to make requests on your behalf. The agent must provide written authorization and we may require you to verify your identity directly with us.

10. International Data Transfers

Webling Studio operates primarily in the United States. If you are located outside the United States, please be aware that information we collect will be transferred to, stored, and processed in the United States.

10.1 Legal Basis for Transfers

For data transfers from the EEA, UK, or Switzerland to the United States, we rely on:

  • Standard Contractual Clauses (SCCs): EU-approved model contracts for data transfers
  • Adequacy Decisions: Transfers to countries deemed adequate by the European Commission
  • Your Explicit Consent: Where you have provided informed consent for the transfer
  • Contractual Necessity: Where transfer is necessary to perform our contract with you

10.2 Safeguards for International Transfers

We implement additional safeguards for international data transfers:

  • Encryption of data in transit and at rest
  • Contractual commitments from service providers to maintain equivalent protections
  • Regular assessments of data protection laws in countries where we transfer data
  • Data minimization to reduce the amount of data transferred

10.3 Data Localization Preferences

For enterprise clients with specific data localization requirements, we can accommodate:

  • Hosting in specific geographic regions
  • Data residency commitments in contractual agreements
  • Local processing for sensitive data categories

Contact us to discuss custom data localization arrangements for your organization.

11. Children's Privacy

Our services are intended for businesses and professional users. We do not knowingly collect personal information from children under the age of 16.

If you are under 16 years of age, please do not submit any personal information through our website or services. If we become aware that we have collected personal information from a child under 16, we will take steps to delete that information as quickly as possible.

If you believe we may have collected information from a child under 16, please contact us immediately at privacy@weblingstudio.com.

12. Changes to This Privacy Policy

We may update this Privacy Policy from time to time to reflect changes in our practices, technologies, legal requirements, or other operational reasons.

12.1 Notification of Changes

  • Material Changes: We will notify you via email (to your registered address) and/or prominent notice on our website at least 30 days before changes take effect
  • Non-Material Changes: We will update the "Last Reviewed" date at the top of this policy
  • Active Clients: Clients with active service agreements will receive direct notification of any changes affecting their data processing

12.2 Review Schedule

We conduct quarterly reviews of this Privacy Policy to ensure it remains current with:

  • Evolving privacy regulations and best practices
  • Changes in our service offerings and data practices
  • Feedback from clients and privacy advocates
  • Technological advancements and security developments

12.3 Your Continued Use

Your continued use of our website or services after policy changes become effective constitutes your acceptance of the updated policy. If you do not agree to the changes, please discontinue use of our services and contact us to delete your information.

13. Contact Us

If you have questions, concerns, or requests regarding this Privacy Policy or our data practices, please contact us:

Webling Studio, LLC

Privacy & Data Protection Officer

For Privacy Rights Requests:

  • Use subject line: "Privacy Rights Request - [Type]"
  • Include your full name and email address associated with your inquiry
  • Specify the nature of your request (access, deletion, correction, etc.)
  • Allow up to 30 days for response (45 days for complex requests)

EU/UK Data Protection Representative:

To be appointed if regular monitoring of EU/UK data subjects occurs

Response Commitment: We are committed to addressing your privacy concerns promptly and transparently. All privacy inquiries receive priority handling and will be responded to within our committed timeframes.

Acknowledgment of Understanding

By using our website, submitting forms, or engaging with our services, you acknowledge that you have read, understood, and agree to the practices described in this Privacy Policy.

This Privacy Policy was last updated on December 18, 2025 and is reviewed quarterly to ensure continued compliance and transparency.