Privacy Policy
How we collect, use, and protect your information
Sentient Orbs is committed to protecting the privacy and security of all individuals who interact with our organization. This Privacy Policy explains how we collect, use, disclose, and safeguard your information in accordance with our ethical standards and legal obligations.
Last Updated: November 20, 2025
Information We Collect
Voluntary Submissions
Intel Reports
Information submitted through our secure tip system, including observations, locations, and optional contact details
Contact Forms
Name, email, organization, and message content when you contact us
Volunteer Applications
Professional background, skills, and availability information
Automatic Information
Usage Data
IP address, browser type, pages visited, time spent, and referral sources
Device Information
Device type, operating system, and mobile device identifiers
Cookies and Tracking
We use essential cookies to maintain secure sessions and improve user experience. We do not use tracking cookies for advertising purposes.
How We Use Your Information
Research Purposes
Analyze patterns, validate reports, and advance our understanding of anomalous phenomena
Communication
Respond to inquiries, provide updates, and follow up on submissions
Security
Protect our systems, prevent fraud, and ensure lawful use of resources
Improvement
Enhance our services, website functionality, and user experience
Information Sharing and Disclosure
No Commercial Sale
We do not sell, rent, or trade your personal information to third parties for commercial purposes.
Legal Compliance
We may disclose information when required by law, subpoena, or court order, or to protect our legal rights.
Safety and Security
Information may be shared with authorities if we believe it necessary to prevent harm or illegal activity.
Aggregated Data
We may share anonymized, aggregated statistics with research partners and the public.
Restricted Information:
Classified, proprietary, or illegally obtained information will be reported to appropriate authorities as required by law.
Data Security and Retention
Security Measures
Encryption
All data transmission is encrypted using industry-standard protocols
Access Controls
Strict access controls limit data availability to authorized personnel only
Regular Audits
Security audits and vulnerability assessments are conducted regularly
Data Retention
- Voluntary submissions: Retained indefinitely for research purposes
- Contact information: Retained for as long as necessary to fulfill requests
- Usage data: Automatically deleted after 24 months
- Security logs: Retained for 12 months for incident response
Your Privacy Rights
Access and Correction
Request access to or correction of your personal information
Data Deletion
Request deletion of your personal information (subject to legal requirements)
Opt-Out
Opt out of non-essential communications and data collection
Data Portability
Request a copy of your personal data in portable format
To exercise your rights:
Please contact us.
Policy Updates
We may update this Privacy Policy from time to time. Changes will be posted on this page with an updated revision date. We encourage you to review this policy periodically for any changes.
These policies may be modified to reflect operational, legal, or security updates. We invite all users to provide feedback or raise concerns so we can ensure accuracy and transparency.
