Sentient Orbs Logo

Privacy Policy

How we collect, use, and protect your information

Sentient Orbs is committed to protecting the privacy and security of all individuals who interact with our organization. This Privacy Policy explains how we collect, use, disclose, and safeguard your information in accordance with our ethical standards and legal obligations.

Last Updated: November 20, 2025

Information We Collect

Voluntary Submissions

Intel Reports

Information submitted through our secure tip system, including observations, locations, and optional contact details

Contact Forms

Name, email, organization, and message content when you contact us

Volunteer Applications

Professional background, skills, and availability information

Automatic Information

Usage Data

IP address, browser type, pages visited, time spent, and referral sources

Device Information

Device type, operating system, and mobile device identifiers

Cookies and Tracking

We use essential cookies to maintain secure sessions and improve user experience. We do not use tracking cookies for advertising purposes.

How We Use Your Information

Research Purposes

Analyze patterns, validate reports, and advance our understanding of anomalous phenomena

Communication

Respond to inquiries, provide updates, and follow up on submissions

Security

Protect our systems, prevent fraud, and ensure lawful use of resources

Improvement

Enhance our services, website functionality, and user experience

Information Sharing and Disclosure

No Commercial Sale

We do not sell, rent, or trade your personal information to third parties for commercial purposes.

Legal Compliance

We may disclose information when required by law, subpoena, or court order, or to protect our legal rights.

Safety and Security

Information may be shared with authorities if we believe it necessary to prevent harm or illegal activity.

Aggregated Data

We may share anonymized, aggregated statistics with research partners and the public.

Restricted Information:

Classified, proprietary, or illegally obtained information will be reported to appropriate authorities as required by law.

Data Security and Retention

Security Measures

Encryption

All data transmission is encrypted using industry-standard protocols

Access Controls

Strict access controls limit data availability to authorized personnel only

Regular Audits

Security audits and vulnerability assessments are conducted regularly

Data Retention

  • Voluntary submissions: Retained indefinitely for research purposes
  • Contact information: Retained for as long as necessary to fulfill requests
  • Usage data: Automatically deleted after 24 months
  • Security logs: Retained for 12 months for incident response

Your Privacy Rights

Access and Correction

Request access to or correction of your personal information

Data Deletion

Request deletion of your personal information (subject to legal requirements)

Opt-Out

Opt out of non-essential communications and data collection

Data Portability

Request a copy of your personal data in portable format

To exercise your rights:

Please contact us.

Policy Updates

We may update this Privacy Policy from time to time. Changes will be posted on this page with an updated revision date. We encourage you to review this policy periodically for any changes.

These policies may be modified to reflect operational, legal, or security updates. We invite all users to provide feedback or raise concerns so we can ensure accuracy and transparency.