Privacy Policy
Effective Date: May 1, 2025
1. Introduction
Emergent Skills ("the Company," "we," or "us") provides Performance Infrastructure and Capacity Intelligence (CI) tools via our mobile and web applications ("the App"). This Privacy Policy explains how we collect, use, and protect your information.
Our mission is to help professionals return to their operating ceiling. To do this effectively, we prioritize biological privacy and a technical architecture that ensures your state data remains yours. By using the App, you consent to the practices described in this Privacy Policy.
2. Age Restrictions
The App is intended solely for individuals 18 years of age or older. We do not knowingly collect personal information from individuals under 18. If we discover that we have collected personal information from someone under 18, we will delete that information as quickly as possible.
3. Information We Collect
We utilize a Decoupled Data Architecture to minimize risk and maximize privacy. We collect:
- a. Identity Information: Name, work email, and payment details provided during registration. This data lives in an isolated identity vault.
- b. Cognitive Capacity Data: Session transcripts and state logs (e.g., Zones Framework™ ratings). Crucially, this data is decoupled from your Identity Information at the database level. It is linked only by a system-generated UUID, ensuring that biological state data is never stored directly alongside your personal name or email.
- c. Technical Metadata: Device type, IP address, and anonymized usage analytics to ensure system stability and protocol performance.
4. Use of Information
We use your information solely to:
- Deliver state-matched capacity restoration protocols via our AI Coach.
- Process secure payments for enterprise or individual licenses.
- Identify aggregate "Capacity Drift" patterns to improve our diagnostic algorithms.
- Provide technical support and maintain system uptime.
- Comply with applicable laws and regulations.
5. Data Storage and Protection (Systems Architecture)
As a systems-first organization, we employ multi-layered security protocols aligned with SOC 2 principles:
- Encryption: Data is protected by industry-standard encryption (AES-256 encryption at rest and TLS encryption in transit).
- Least-Privilege Access: Access to production databases is strictly restricted to authorized personnel using role-based access controls (IAM).
- Audit Logging: We maintain comprehensive logs of all system access to prevent unauthorized data manipulation.
- Infrastructure: Our backend is powered by SOC 2 Type 2 compliant infrastructure (Google Cloud/Firebase).
6. Enterprise/Organizational Use (The Capacity Firewall)
For users provided access via an employer or organization:
- Aggregate Reporting Only: We provide your organization with anonymized, aggregate workforce intelligence (e.g., "The Engineering Team Capacity Heatmap").
- Individual Privacy: Your employer has zero visibility into your individual session transcripts, specific zone ratings, or the time you choose to run a reset.
- Zero Surveillance: The App is a private performance tool, not an employee monitoring system. This privacy is a functional requirement for the accuracy of our Capacity Audits.
7. Third-Party LLM Integrations
We utilize enterprise-grade Large Language Model (LLM) providers to facilitate our Capacity Coach.
- Non-Training APIs: We use dedicated Enterprise API endpoints. Data transmitted to these providers is not used to train their public models.
- Anonymization: No Personal Identifiable Information (PII) is transmitted to LLM providers; the Coach only processes the context of your current cognitive load.
8. User Rights and Control
You maintain full agency over your data:
- Access & Portability: You may view or download your stored session data at any time.
- Right to Deletion: You may request the permanent deletion of both your identity and capacity data.
- Withdrawal of Consent: You may cease data processing by deactivating your account.
9. Data Retention
We retain data only as long as necessary to provide Capacity Intelligence (CI) insights or as required by law. Decoupled session logs may be retained in an anonymized format to provide long-term "Capacity Drift" trend analysis for the user.
10. Data Breach Notification
In the unlikely event of a data breach involving your information, we will:
- Notify affected individuals promptly in accordance with applicable law.
- Take appropriate steps to minimize harm and prevent future breaches.
11. Contact Information
For questions regarding this policy or to exercise your data rights, please contact us at: