Your Research Data Privacy: Our Highest Priority

At Quill & Key Systems, we understand the profound trust you place in us when managing your invaluable research and organizational data. This Privacy Policy is crafted to transparently elucidate our steadfast commitment to safeguarding your intellectual property and personal information. We believe that robust security and transparent data practices are the cornerstones of effective and ethical knowledge management.

Illustration of a secure digital vault with a padlock, symbolizing data protection.
Safeguarding your intellectual assets with unwavering dedication.

Our Unwavering Commitment

This Policy outlines our comprehensive approach to data protection, effective from January 1, 2024. We regularly review and update our practices to align with evolving digital landscapes and regulatory requirements, with notifications provided for any significant changes. Our scope covers all Quill & Key Systems' software, platforms, and services, ensuring consistent protection.

User Control & Transparency

Central to our philosophy is empowering you with complete control over your data. We adhere to principles of user choice, allowing you to manage how your information is handled, shared, or retained. For any privacy-related inquiries or data requests, please contact us at info@quillandkey.com.

What Data We Collect and How We Use It

Abstract illustration of data streams flowing into a secure server, representing data collection within controlled parameters.
Carefully curated data collection for optimal performance and security.

Our data collection is purposefully limited to what is essential for delivering, maintaining, and improving the robust functionality of Quill & Key Systems. We categorize the data we collect to ensure clarity and purpose, always putting your privacy first:

  • Platform Functionality Data: Information necessary for account management, service access, and core feature operation (e.g., login credentials, subscription details).
  • Research Content: Your intellectual property, such as research documents, notes, and citations. We implement a zero-knowledge architecture, meaning we cannot access the content of your research. You retain full ownership and control, with granular permissions for sharing.
  • Technical & Performance Data: Non-personal data collected for system optimization, security monitoring, and bug resolution (e.g., device information, error logs).
  • Aggregated Usage Analytics: Anonymized and aggregated data on how features are used to inform product development and enhance user experience. This data cannot be traced back to individual users.
  • Optional Data: Certain features may offer optional data collection (e.g., feedback surveys). These always come with clear opt-in and opt-out mechanisms.

Your Privacy Controls and Data Rights

Your empowerment is key to our privacy framework. Quill & Key Systems provides you with comprehensive tools and clear procedures to manage your information and exercise your fundamental data rights:

Icon depicting a user looking at data on a screen, symbolizing data access.

Access & Review

Easily view or request a copy of the personal data we hold about you directly from your account settings or by contacting our support team.

Icon depicting a document with a checkmark and re-edit symbol, symbolizing data correction.

Correction & Updates

Maintain the accuracy of your information through intuitive in-app controls, ensuring your data is always current and correct.

Icon depicting a file being deleted or shredded, symbolizing data deletion.

Deletion & Account Closure

You have the right to request deletion of your account and associated data. Our procedures ensure secure and complete data removal.

Icon depicting data moving between two databases, symbolizing data portability.

Data Portability

Upon request, receive a copy of your data in a structured, commonly used, and machine-readable format to facilitate transfer to another service.

Icon depicting a gear and user profile, symbolizing privacy settings.

Granular Privacy Settings

Fine-tune your privacy preferences within the platform, managing permissions for specific features, notifications, and sharing options.

Security Measures and Data Protection

Illustration of a multi-layered shield protecting a server, representing comprehensive data security.
Implementing industry-leading security to protect your invaluable research.

Our commitment to data protection is underpinned by robust security architecture and rigorous operational protocols. We employ a multi-layered defense strategy to shield your information from unauthorized access, disclosure, alteration, and destruction:

  • Advanced Encryption: All data, both at rest and in transit, is protected using industry-standard AES-256 encryption. This includes your documents, research notes, and personal credentials.
  • Strict Access Controls: We employ role-based access controls (RBAC) and multi-factor authentication (MFA) to ensure that only authorized personnel can access sensitive systems, with privileges granted on a need-to-know basis.
  • Continuous Monitoring & Incident Response: Our systems are monitored 24/7 for suspicious activities. We have a dedicated incident response team equipped to rapidly detect, contain, and remediate any potential security events.
  • Regular Audits & Penetration Testing: We engage independent third-party experts to conduct regular security audits and penetration tests, identifying and resolving vulnerabilities proactively.
  • Employee Training & Protocols: All Quill & Key employees undergo mandatory, recurring security and privacy training. Strict internal policies govern data handling and access.

Regulatory Compliance and International Standards

Quill & Key Systems is steadfast in its commitment to global data privacy regulations, ensuring our platform meets and exceeds the most rigorous international standards. Your peace of mind is paramount, irrespective of your location or research domain.

GDPR compliance badge icon.

GDPR

Full compliance with the General Data Protection Regulation (GDPR) for our European users, ensuring robust data subject rights.

CCPA compliance badge icon.

CCPA

Adherence to the California Consumer Privacy Act (CCPA), providing California residents with transparent data practices.

HIPAA compliance badge icon.

HIPAA

For healthcare researchers, our systems align with HIPAA security and privacy rules, with Business Associate Agreements (BAAs) available upon request.

ISO 27001 compliance badge icon.

ISO 27001

We maintain ISO 27001 certification for our Information Security Management System, ensuring systematic handling of sensitive information.

Data Sharing and Third-Party Integrations

Illustration showing interconnected nodes with a central hub, representing controlled third-party data sharing.
Managed third-party integrations with your privacy in mind.

Quill & Key Systems primarily processes data directly. When third-party services are integrated to enhance functionality or provide essential infrastructure, we apply the strictest standards to protect your data:

  • Limited Integrations: We only integrate with third-party service providers essential for platform operation or services you explicitly enable. Data sharing is limited to the minimum necessary.
  • Rigorous Vendor Agreements: All our vendors and processors are contractually bound by stringent privacy protection agreements and undergo thorough security vetting.
  • User Consent for Optional Sharing: Features involving optional data sharing with third parties (e.g., specific analytics or external integrations) require your explicit consent and offer clear opt-out mechanisms.
  • Legal Requirements: We may disclose information if legally compelled to do so, such as in response to a court order or valid governmental request. We strive to notify users of such requests when legally permissible.
  • Integration Privacy Controls: Our platform provides granular controls allowing you to manage permissions for integrated services and decide which data, if any, is shared.

Have questions about our privacy policy? We're here to help.

Contact Our Privacy Team