Last Updated: February 2026
1. Introduction
Rohit Kumar ("We," "our," or "us") respects your privacy and is committed to protecting your personal data. This privacy policy explains how we handle your data when you visit our website and use our lead recovery and AI-powered response services.
2. Data We Collect
We may collect, use, store and transfer different kinds of personal data about you which we have grouped together as follows:
- Identity Data: includes first name, last name, business name, or similar identifier.
- Contact Data: includes email address, phone number, and business address.
- Lead Data: includes form submissions, missed call records, and AI conversation logs generated through our lead recovery systems.
- Technical Data: includes IP address, browser type and version, time zone, and operating system.
3. How We Use Your Data
We will only use your personal data when the law allows us to. Most commonly, we will use your personal data in the following circumstances:
- To provide the lead recovery and AI response services you have requested.
- To manage our relationship with you (including billing and support).
- To send automated responses to your leads via AI text and email on your behalf.
- To send missed call text-back messages to callers on your behalf.
- To improve our services, customer relationships, and system performance.
4. Your Data, Your Control
Your business data—leads, contacts, call records, and conversation logs—stays in the accounts and platforms you already use (Google Calendar, your CRM, etc.). We only access what is necessary to run your lead recovery system.
- No Data Hoarding: We do not store your customer data on our own servers. Your leads live in your connected accounts.
- Limited Access: We only connect to the tools needed to power your system (e.g., your calendar, your phone number via Twilio, your contact form).
- AI Providers: AI responses are processed through enterprise API tiers (e.g., OpenAI) that do not use your data for model training.
5. Data Security
We use industry-standard encryption and secure access protocols to protect your data. All connections between your systems and third-party services are encrypted, and access credentials are stored securely with regular rotation.
6. Contact Information
If you have questions about how we handle your data, please contact us at:
[email protected]