Data ProcessingTransparency
Complete transparency about how we collect, process, store, and protect your data. Understand exactly what happens to your information in our optimization platform.
Data Collection
Only essential data for optimization services
Data Processing
Secure processing with complete isolation
Data Protection
Encrypted storage and transmission
Data Control
Full control and export capabilities
What Data We Collect
We practice data minimization, collecting only the information necessary to provide our optimization services effectively and securely.
Authentication and communication
Account identification
Personalized experience
Service access control
Optimization calculations
Model training and suggestions
Progress tracking and analysis
Multi-objective optimization
Product improvement
Service optimization
Bug fixing and stability
Security and authentication
Security and fraud prevention
Compatibility and support
Responsive design optimization
Rate limiting and security
Data Collection Summary
Data Flow & Processing
Understand how your data flows through our system with complete security and privacy protection at every step.
User enters optimization parameters and measurements
Security Measures:
- Input validation
- Authentication required
- Rate limiting
Data encrypted and transmitted via HTTPS/TLS 1.3
Security Measures:
- TLS 1.3 encryption
- Certificate pinning
- Perfect Forward Secrecy
Server validates, authenticates, and processes requests
Security Measures:
- JWT validation
- API key verification
- Input sanitization
Data stored with encryption and user isolation
Security Measures:
- AES-256 encryption
- Row-level security
- Access logging
Bayesian optimization algorithms process data
Security Measures:
- Isolated processing
- Memory encryption
- Secure computation
Encrypted results returned to authenticated user
Security Measures:
- Response encryption
- User authorization
- Audit logging
End-to-End Encryption
Data is encrypted from browser to database and back
Zero Trust Architecture
Every request is authenticated and authorized
Data Isolation
Complete separation between different users' data
Audit Logging
All data access and processing is logged
Data Flow Metrics
Optimization Data Processing
Learn how your optimization data is processed through our Bayesian optimization algorithms with complete security and privacy protection.
Processing Steps:
- Parameter validation and type checking
- Constraint verification and bounds checking
- Data sanitization and normalization
- User permission and quota verification
Security:
Processing Steps:
- Gaussian Process model training
- Acquisition function optimization
- Multi-objective optimization handling
- Uncertainty quantification
Security:
Processing Steps:
- Suggestion ranking and filtering
- Confidence interval calculation
- Result formatting and validation
- Performance metrics computation
Security:
Experiment Parameters
Variables and their ranges for optimization
Examples
- • Temperature (20-100°C)
- • Pressure (1-10 bar)
- • Concentration (0.1-1.0 M)
Processing
Used for model training and constraint enforcement
Retention
Stored until user deletion or account closure
Measurement Results
Experimental outcomes and target values
Examples
- • Yield (%)
- • Purity (ppm)
- • Reaction time (min)
Processing
Used for Bayesian model training and prediction
Retention
Stored with experiment data for reproducibility
Optimization Objectives
Goals and constraints for the optimization
Examples
- • Maximize yield
- • Minimize cost
- • Target purity > 95%
Processing
Used for acquisition function and suggestion ranking
Retention
Stored with optimization configuration
Model Metadata
Information about the optimization models
Examples
- • Model version
- • Training metrics
- • Hyperparameters
Processing
Used for model management and reproducibility
Retention
Stored for audit and debugging purposes
Optimization Processing Guarantees
Data Retention & Deletion
We maintain clear data retention policies to ensure your data is kept only as long as necessary and securely deleted when no longer needed.
Data Types:
Deletion Policy:
Deleted within 30 days of account closure
Legal Basis:
Required for service provision and legal compliance
Data Types:
Deletion Policy:
User-configurable or automatic after retention period
Legal Basis:
Retained for reproducibility and scientific integrity
Data Types:
Deletion Policy:
Automatically purged after 12 months
Legal Basis:
Required for security monitoring and compliance
Data Types:
Deletion Policy:
Automatically anonymized and aggregated
Legal Basis:
Used for service improvement and optimization
Data Minimization
We retain only data necessary for legitimate business purposes
User Control
Users can configure retention periods for their optimization data
Automatic Deletion
Data is automatically deleted when retention periods expire
Secure Disposal
All deleted data is securely destroyed and unrecoverable
Legal Compliance
Retention policies comply with applicable data protection laws
Transparency
Clear communication about what data is retained and for how long
Important Notice
You have full control over your data retention settings. You can configure retention periods, request early deletion, or export your data at any time.
Your Data Rights
You have comprehensive rights over your personal data. Learn about your rights and how to exercise them easily and effectively.
What you can do:
- Complete data inventory and usage
- Data processing purposes and legal basis
- Data sharing and third-party processors
- Data retention periods and deletion schedules
How to exercise:
Access your data through your account dashboard or contact our privacy team
What you can do:
- Update account information and preferences
- Correct experimental data and parameters
- Modify optimization settings and objectives
- Update contact and billing information
How to exercise:
Edit information directly in your account or contact support
What you can do:
- Delete specific experiments or datasets
- Remove account and all associated data
- Erase data no longer needed for original purpose
- Withdraw consent for optional data processing
How to exercise:
Use account deletion tools or submit a deletion request
What you can do:
- Download all optimization experiments and results
- Export account data and preferences
- Receive data in standard formats (CSV, JSON)
- Transfer data to other optimization platforms
How to exercise:
Use the data export tool in your account dashboard
What you can do:
- Pause data processing while disputing accuracy
- Restrict processing for specific purposes
- Limit automated decision-making
- Maintain data without active processing
How to exercise:
Contact our privacy team with specific restrictions
What you can do:
- Object to direct marketing communications
- Opt out of analytics and performance tracking
- Refuse automated decision-making
- Object to processing based on legitimate interests
How to exercise:
Use privacy settings or contact our privacy team
Self-Service Dashboard
Immediate access to most data rights through your account
Privacy Request Form
Formal request process for complex data rights
Email Contact
Direct contact with our privacy team
Exercise Your Rights Today
Your privacy rights are important to us. We've made it easy to exercise your rights with self-service tools and responsive support.
To exercise your data rights, please contact our privacy team at privacy@synsilico.com.
Data Export Tool
Export your data in standard formats for backup, analysis, or transfer to other platforms. Your data portability is guaranteed under GDPR and other privacy regulations.
Includes:
- All optimization experiments and parameters
- Measurement results and optimization history
- Account information and preferences
- Usage analytics and metadata
Includes:
- Selected experiment parameters
- Measurement results and suggestions
- Optimization objectives and constraints
- Model performance metrics
Includes:
- Profile information and settings
- Subscription and billing data
- Privacy preferences
- Account activity summary
CSV
Comma-separated values for spreadsheet applications
JSON
JavaScript Object Notation for programmatic access
ZIP
Compressed archive containing multiple file formats
Secure Data Export
All data exports are encrypted, authenticated, and logged for security. Download links expire after 7 days for your protection.
For data export requests, please contact our support team at privacy@synsilico.com with your specific requirements.