Your Research Data Privacy: Our Highest Priority
At Quill & Key Systems, we understand the profound trust you place in us when managing your invaluable research and organizational data. This Privacy Policy is crafted to transparently elucidate our steadfast commitment to safeguarding your intellectual property and personal information. We believe that robust security and transparent data practices are the cornerstones of effective and ethical knowledge management.

Our Unwavering Commitment
This Policy outlines our comprehensive approach to data protection, effective from January 1, 2024. We regularly review and update our practices to align with evolving digital landscapes and regulatory requirements, with notifications provided for any significant changes. Our scope covers all Quill & Key Systems' software, platforms, and services, ensuring consistent protection.
User Control & Transparency
Central to our philosophy is empowering you with complete control over your data. We adhere to principles of user choice, allowing you to manage how your information is handled, shared, or retained. For any privacy-related inquiries or data requests, please contact us at info@quillandkey.com.
What Data We Collect and How We Use It

Our data collection is purposefully limited to what is essential for delivering, maintaining, and improving the robust functionality of Quill & Key Systems. We categorize the data we collect to ensure clarity and purpose, always putting your privacy first:
- Platform Functionality Data: Information necessary for account management, service access, and core feature operation (e.g., login credentials, subscription details).
- Research Content: Your intellectual property, such as research documents, notes, and citations. We implement a zero-knowledge architecture, meaning we cannot access the content of your research. You retain full ownership and control, with granular permissions for sharing.
- Technical & Performance Data: Non-personal data collected for system optimization, security monitoring, and bug resolution (e.g., device information, error logs).
- Aggregated Usage Analytics: Anonymized and aggregated data on how features are used to inform product development and enhance user experience. This data cannot be traced back to individual users.
- Optional Data: Certain features may offer optional data collection (e.g., feedback surveys). These always come with clear opt-in and opt-out mechanisms.
Your Privacy Controls and Data Rights
Your empowerment is key to our privacy framework. Quill & Key Systems provides you with comprehensive tools and clear procedures to manage your information and exercise your fundamental data rights:

Access & Review
Easily view or request a copy of the personal data we hold about you directly from your account settings or by contacting our support team.

Correction & Updates
Maintain the accuracy of your information through intuitive in-app controls, ensuring your data is always current and correct.

Deletion & Account Closure
You have the right to request deletion of your account and associated data. Our procedures ensure secure and complete data removal.

Data Portability
Upon request, receive a copy of your data in a structured, commonly used, and machine-readable format to facilitate transfer to another service.

Granular Privacy Settings
Fine-tune your privacy preferences within the platform, managing permissions for specific features, notifications, and sharing options.
Security Measures and Data Protection

Our commitment to data protection is underpinned by robust security architecture and rigorous operational protocols. We employ a multi-layered defense strategy to shield your information from unauthorized access, disclosure, alteration, and destruction:
- Advanced Encryption: All data, both at rest and in transit, is protected using industry-standard AES-256 encryption. This includes your documents, research notes, and personal credentials.
- Strict Access Controls: We employ role-based access controls (RBAC) and multi-factor authentication (MFA) to ensure that only authorized personnel can access sensitive systems, with privileges granted on a need-to-know basis.
- Continuous Monitoring & Incident Response: Our systems are monitored 24/7 for suspicious activities. We have a dedicated incident response team equipped to rapidly detect, contain, and remediate any potential security events.
- Regular Audits & Penetration Testing: We engage independent third-party experts to conduct regular security audits and penetration tests, identifying and resolving vulnerabilities proactively.
- Employee Training & Protocols: All Quill & Key employees undergo mandatory, recurring security and privacy training. Strict internal policies govern data handling and access.
Regulatory Compliance and International Standards
Quill & Key Systems is steadfast in its commitment to global data privacy regulations, ensuring our platform meets and exceeds the most rigorous international standards. Your peace of mind is paramount, irrespective of your location or research domain.

GDPR
Full compliance with the General Data Protection Regulation (GDPR) for our European users, ensuring robust data subject rights.

CCPA
Adherence to the California Consumer Privacy Act (CCPA), providing California residents with transparent data practices.

HIPAA
For healthcare researchers, our systems align with HIPAA security and privacy rules, with Business Associate Agreements (BAAs) available upon request.

ISO 27001
We maintain ISO 27001 certification for our Information Security Management System, ensuring systematic handling of sensitive information.
Data Sharing and Third-Party Integrations

Quill & Key Systems primarily processes data directly. When third-party services are integrated to enhance functionality or provide essential infrastructure, we apply the strictest standards to protect your data:
- Limited Integrations: We only integrate with third-party service providers essential for platform operation or services you explicitly enable. Data sharing is limited to the minimum necessary.
- Rigorous Vendor Agreements: All our vendors and processors are contractually bound by stringent privacy protection agreements and undergo thorough security vetting.
- User Consent for Optional Sharing: Features involving optional data sharing with third parties (e.g., specific analytics or external integrations) require your explicit consent and offer clear opt-out mechanisms.
- Legal Requirements: We may disclose information if legally compelled to do so, such as in response to a court order or valid governmental request. We strive to notify users of such requests when legally permissible.
- Integration Privacy Controls: Our platform provides granular controls allowing you to manage permissions for integrated services and decide which data, if any, is shared.
Have questions about our privacy policy? We're here to help.
Contact Our Privacy Team