Privacy Policy
Effective Date: January 1, 2026
Executive Summary
I. Core Commitments
The AI model trained on your data belongs to you. You can export it, delete it, or revoke access. We have no rights to it.
2. We Cannot Access Your Data
ATLAS is architected so that decryption is structurally impossible for our systems and personnel. Your encryption keys never leave your device. Decryption happens only inside hardware-isolated enclaves that have no persistent storage and no operator access.
3. Verify Us, Don't Trust Us
Our security-critical code is open source. You can audit it, reproduce builds, and verify that what runs on our servers matches our published code.
4. Keys Don't Persist
Encryption keys are generated, used, and destroyed within a single session. We don't store master keys, backup keys, or recovery keys. This means past sessions are permanently undecryptable—even to us.
5. No Derivative Use
Your data is never used to train other systems, improve products for other users, train foundation models, or share with third parties. Period.
6. Built for Regulated Professionals
ATLAS exists for people bound by attorney-client privilege, healthcare confidentiality, securities law, fiduciary duty, and similar constraints. Our architecture reflects these legal realities.
II. What Data We Collect & How We Store It
Pro Users: Data encrypted and stored on ATLAS infrastructure
Ultra Users: Data remains exclusively on your infrastructure; ATLAS processes but never stores
Your Personal Intelligence (Encrypted & Private)
For Pro Users: Data remains encrypted at rest on ATLAS infrastructure and is decrypted temporarily inside a secure enclave during processing.
For Ultra Users: Data never exists on ATLAS infrastructure. You maintain the data on your own systems. ATLAS accesses and processes it only when you request, with no persistent storage on our systems.
Types of Data We Process:
Account & Infrastructure Data:
III. Technical Architecture & Security
ATLAS executes sensitive operations inside Trusted Execution Environments (TEEs) — hardware-isolated secure zones where code runs without exposure to the general system.
Technical Isolation:
Cryptographic Code Verification:
Key Management & Ephemeral Cryptography
We use a distributed key architecture where decryption requires pieces held by both you and the TEE:
Client-Side:
Server-Side:
Data Flow & Isolation:
Your Device → ATLAS Backend (Relay Layer) → ATLAS TEE (Isolated Processing) → LLM Providers
The backend layer is a blind relay—it handles authentication and routing, but structurally cannot decrypt data. The TEE is the only place where plaintext exists, and only for the duration of processing.
IV.5 Account Tiers & Data Architecture
Ultra Tier
V. Large Language Model Integration & Zero Data Retention
Ultra Users: Use local models on your infrastructure (no external LLM API calls)
VI. Data Retention & Deletion
Ultra Users:
Your Right to Delete:
Pro Users: You have absolute control—delete specific items, entire categories, or your full account. Deletion renders encrypted data mathematically irretrievable. Backups purged within 30 days.
Ultra Users: By design, nothing is stored on ATLAS to delete. Revoke access immediately, request deletion of activity logs, and request confirmation that no data remains in ATLAS cache.
VII. Third-Party Data & LLM Providers
We do not sell your data. We do not share it with advertisers, brokers, or marketing companies.
Service Providers (under confidentiality agreements):
Legal Obligations
Third-Party Integrations You Control
You can connect external services (Gmail, Notion, Slack, etc.):
VIII. Security & Threat Model
Ultra Users - What ATLAS Defends Against:
Limitations & Transparency:
Pro Users:
Ultra Users:
IX. Your Privacy Rights
Access & Portability
Correction
Deletion
Opt-Out
To Exercise Your Rights
X. International Data Transfers
We comply with international data protection standards:
XI. Children & Minors
XII. Changes to This Policy
Material Changes: We'll notify you via email and provide a comment period
How to Object: Contact contact@thinkv1.com if you disagree with changes
XIII. Contact Information
Email: contact@thinkv1.com
Website: https://thinkv1.com