Privacy Policy

Last updated: April 5, 2025

At GoDeploy, we take your privacy seriously. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our website and deployment services.

Information We Collect

We collect information that you provide directly to us when you:

  • Create an account
  • Deploy applications
  • Contact our support team
  • Subscribe to our newsletter
  • Participate in surveys or promotions

This information may include your name, email address, payment information, and any other information you choose to provide.

Information Collected Automatically

When you use our services, we automatically collect certain information about your device and usage patterns. This may include:

  • Log data (IP address, browser type, pages visited)
  • Device information
  • Usage statistics
  • Cookies and similar technologies
  • Application debug logs and error reports

How We Use Your Information

We use the information we collect to:

  • Provide, maintain, and improve our services
  • Process transactions and send related information
  • Send technical notices, updates, and support messages
  • Respond to your comments and questions
  • Monitor and analyze trends and usage
  • Detect, investigate, and prevent fraudulent or unauthorized activities
  • Personalize and improve your experience

Sharing of Information

We may share your information with:

  • Third-party vendors and service providers who perform services on our behalf
  • Professional advisors, such as lawyers and accountants
  • In response to legal process or when required by law
  • In connection with a merger, acquisition, or sale of assets
  • HyperDX.io for application debug logs and troubleshooting, which may include user identifiers like email addresses and user IDs

Application Monitoring and Debugging

We use HyperDX.io to collect and analyze application debug logs, which helps us diagnose and fix issues with our services. These logs may include:

  • User identifiers such as user IDs and email addresses
  • Actions performed within the application
  • Error messages and application state information
  • Timestamps of user interactions

This information is used specifically for the purpose of troubleshooting user issues, improving application performance, and resolving errors. We limit the data shared to what is necessary for these purposes and maintain appropriate safeguards with our debugging service provider.

Third-Party Service Providers

We use the following third-party services to provide and support our platform:

  • Digital Ocean: We use Digital Ocean for cloud infrastructure and hosting services. Information processed on Digital Ocean includes:
    • Application and website hosting data
    • Deployment configurations and server logs
    • User session data and IP addresses
    • Application files and databases

    You can learn more about Digital Ocean's security practices at https://www.digitalocean.com/security

  • Supabase: We use Supabase for authentication, database storage, and user management. Information shared with Supabase includes:
    • User email addresses and authentication data
    • User profile information
    • Application data
    • Usage analytics

    You can learn more about Supabase's security practices at https://supabase.com/security

  • HyperDX: As mentioned in our Application Monitoring section, we use HyperDX for application monitoring, error tracking, and performance analysis. Information shared with HyperDX includes:
    • User identifiers (user IDs, email addresses)
    • Application logs and error reports
    • Performance metrics
    • User session data

    You can learn more about HyperDX's security practices at https://www.hyperdx.io/terms/security

Each of these third-party services has their own privacy policies and security practices. We carefully select partners that maintain high standards of data protection and comply with applicable privacy laws. We ensure that our agreements with these providers include appropriate data protection clauses.

Data Security

We implement appropriate technical and organizational measures designed to protect your information against unauthorized or unlawful processing, accidental loss, destruction, or damage. Our security infrastructure includes:

  • Transport Layer Security (TLS): All data in transit is encrypted using industry-standard TLS protocols
  • AES-256 Encryption: Data at rest is secured with AES-256 encryption
  • Row-Level Security (RLS): We implement database-level isolation between tenants and users to prevent unauthorized access
  • Authentication & Authorization: Strict access controls ensure only authorized personnel can access your data

However, no method of transmission over the Internet or electronic storage is 100% secure, so we cannot guarantee absolute security. We regularly review and update our security practices to maintain the integrity and security of your information.

Your Rights

Depending on your location, you may have certain rights regarding your personal information, including:

  • Access to your personal data
  • Correction of inaccurate data
  • Deletion of your data
  • Restriction or objection to processing
  • Data portability

To exercise these rights, please contact us at [email protected]

Cookies

We use cookies and similar technologies to collect information about your browsing activities and to distinguish you from other users of our website. This helps us provide you with a good experience when you browse our website and allows us to improve our site.

Changes to This Privacy Policy

We may update this Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page and updating the "Last updated" date. You are advised to review this Privacy Policy periodically for any changes.

Contact Us

If you have any questions about this Privacy Policy, please contact us at:

Email: [email protected]