Data Privacy
Privacy-first architecture and data handling practices to protect user data.
Overview
PenguinMails is built on a foundation of privacy-by-design principles, ensuring that user data is protected through technical, organizational, and procedural safeguards. We provide transparency and control over data collection, processing, and storage.
Privacy Principles
-
Data Minimization - Collect only what’s necessary
-
Purpose Limitation - Use data only for stated purposes
-
Transparency - Clear communication about data practices
-
User Control - Empower users to manage their data
-
Security First - Protect data with encryption and access controls
-
Accountability - Maintain compliance and audit trails
Level 1: Core Privacy Features
Privacy-First Data Collection
Collect minimum necessary data for email marketing functionality.
Required Data
For Registration
-
Email address (authentication)
-
Name (personalization)
-
Password (hashed, never stored in plain text)
For Campaigns
-
Contact email addresses
-
Optional: First name, last name, company
-
Custom fields (user-defined, optional)
Not Collected
-
❌ Social Security Numbers
-
❌ Financial information (Stripe handles payments)
-
❌ Sensitive health data
-
❌ Biometric data
-
❌ Unnecessary tracking data
Transparent Privacy Policies
Clear, accessible privacy policies that explain data practices.
Privacy Policy Available At
-
Marketing website - https://penguinmails.com/privacy
-
In-app link - Footer of every page
-
Onboarding - Shown during signup
-
API documentation - Privacy considerations for developers
Privacy Policy Includes
-
What data we collect - Comprehensive list
-
Why we collect it - Purpose for each data type
-
How we use it - Processing activities
-
Who we share it with - Third-party processors
-
How long we keep it - Retention policies
-
User rights - Access, deletion, portability
-
Contact information - Privacy officer contact
Policy Updates
-
Notification required - Email notice of material changes
-
Version history - Track policy changes over time
-
Effective date - Clear indication of when changes take effect
-
Continued use - Implied acceptance or explicit re-consent
User Data Control
Empower users to manage their own data through self-service tools.
Data Access
User Profile Data Export
-
Download all personal data in JSON or CSV format
-
Includes: profile, preferences, campaign history, analytics
-
Generated within 24 hours
-
Available via: Settings → Privacy → Export My Data
Contact Data Export
-
Export all contacts and lists
-
CSV format compatible with other tools
-
Includes all custom fields
-
Available via: Leads → Export
Data Correction
-
Self-service profile editing - Update name, email, preferences
-
Contact data updates - Correct contact information
-
Bulk corrections - CSV import for bulk updates
-
API updates - Programmatic data correction
Data Deletion
-
Account deletion - Complete removal of user account
-
30-day grace period - Soft delete allows recovery
-
Permanent deletion - After 30 days, irreversible
-
Cascade delete - Removes all associated data
What Gets Deleted
-
✅ User profile and credentials
-
✅ Contact lists and segmentation
-
✅ Campaign data and templates
-
✅ All personally identifiable information (PII)
What’s Retained (Legal/Compliance)
-
âš ï¸ Audit logs (7 years, anonymized)
-
âš ï¸ Transaction records (7 years for tax compliance)
-
âš ï¸ Abuse/spam reports (perpetual, for platform security)
Data Security
Multi-layered security protects data at rest and in transit.
Encryption
Encryption at Rest
-
Database encryption - PostgreSQL transparent data encryption
-
Field-level encryption - Additional encryption for sensitive fields
-
Encrypted backups - All backups encrypted
-
Key management - Secure key storage and rotation
Encryption in Transit
-
TLS 1.3 - All connections encrypted (web, API)
-
SMTP TLS - Email transmission encrypted
-
No plain HTTP - HTTPS enforced
-
HSTS enabled - Prevent downgrade attacks
Access Controls
-
Role-based access - Users have minimum necessary permissions
-
Multi-factor authentication - Optional MFA for enhanced security (Planned)
-
Session management - Automatic logout, secure session tokens
-
IP restrictions - Optional IP allowlisting for enterprise
Level 2: Advanced Privacy Features
Privacy by Design & Default
Privacy considerations built into every feature from the ground up.
Design Principles
Proactive Not Reactive
-
Privacy protections in place before data collected
-
Security reviews for new features
-
Privacy impact assessments for high-risk processing
Privacy as Default
-
Most privacy-protective settings enabled by default
-
Users must opt-in to data sharing
-
No pre-checked consent boxes
-
Minimal data collection by default
Privacy Embedded
-
Not a bolt-on feature
-
Integrated into architecture
-
Part of development lifecycle
-
Continuous monitoring and improvement
Default Settings
New User Defaults:
data_sharing: false
analytics_tracking: minimal
marketing_emails: false
third_party_integrations: disabled
session_timeout: 30 minutes
mfa: recommended (not required) # Planned
Data Retention & Deletion
Automated data lifecycle management ensures compliance with retention policies.
Retention Policies
User Data
Active Users:
Profile Data: Indefinite (while account active)
Activity Logs: 12 months (rolling)
Deleted Accounts:
Soft Delete: 30 days (recovery period)
Hard Delete: Permanent after 30 days
Audit Logs: 7 years (anonymized, compliance)
Contact Data
Active Contacts:
Engaged (opened/clicked): Indefinite
Inactive (no engagement): 24 months
Unsubscribed:
Email address: Perpetual (suppression list)
Other data: Deleted after 30 days
Bounced:
Hard bounce: Immediate suppression
Soft bounce (3x): Suppression after 3 attempts
Campaign Data
Campaigns:
Metadata: 36 months
Email Content: 24 months
Send Logs: 36 months
Analytics: 12 months (aggregated indefinitely)
Automated Deletion
Scheduled Jobs
-
Daily - Remove expired soft-deleted accounts
-
Weekly - Clean up inactive bounce logs
-
Monthly - Archive old campaign data
-
Quarterly - Review and clean up test data
Third-Party Data Sharing
Transparency about sub-processors and when data is shared.
Sub-Processors (Services We Use)
Infrastructure
-
NileDB - Multi-tenant PostgreSQL database
-
Purpose: Data storage
-
Location: US (EU option Q2 2026)
-
Data: All platform data
-
-
Redis - Caching and queue management
-
Purpose: Performance, background jobs
-
Location: Same as application server
-
Data: Temporary cache, job queues
-
-
Hostwind - VPS hosting
-
Purpose: Infrastructure hosting
-
Location: US data centers
-
Data: All application and database data
-
Payment Processing
-
Stripe - Payment processor
-
Purpose: Subscription billing
-
Location: Global (US-based)
-
Data: Payment method, billing address (tokenized)
-
Email Delivery (Optional)
-
Postmark - Transactional email delivery
-
Purpose: High-deliverability email sending
-
Location: US
-
Data: Email content, recipient addresses
-
-
Mailgun - Bulk email delivery
-
Purpose: Marketing campaign delivery
-
Location: US (EU option available)
-
Data: Email content, recipient addresses
-
Data Sharing Controls
When We Share Data
-
✅ With user consent (integrations)
-
✅ To provide requested services
-
✅ With sub-processors (listed above)
-
✅ For legal compliance (subpoena, court order)
When We Don’t Share Data
-
❌ Selling to third parties
-
❌ Marketing to non-users
-
❌ Sharing with affiliates
-
❌ Unrelated business purposes
Privacy for Contacts
Respect privacy of your email contacts (not just platform users).
Contact Privacy Rights
GDPR Rights for Contacts (EU Residents)
-
Right to access data
-
Right to rectification
-
Right to erasure
-
Right to data portability
-
Right to object to processing
How Contacts Exercise Rights
-
Contact the tenant - Email sender (your customer)
-
Tenant requests from PenguinMails - Via admin panel
-
PenguinMails fulfills request - Export, correct, delete data
-
Confirmation provided - Tenant notifies contact
Contact Data Security
-
Tenant isolation - Contacts visible only to owning tenant
-
Workspace isolation - Optional workspace-level separation
-
Encrypted storage - Same encryption as user data
-
Access logging - Audit trail of contact data access
Level 3: Technical Implementation
Privacy-Enhancing Technologies
Pseudonymization
Separate PII from Operational Data
-- Separate tables for PII vs operational data
CREATE TABLE contacts (
id UUID PRIMARY KEY,
email VARCHAR(255) ENCRYPTED, -- PII
created_at TIMESTAMP
);
CREATE TABLE contact_engagement (
contact_id UUID REFERENCES contacts(id),
campaign_id UUID,
event_type VARCHAR(50),
occurred_at TIMESTAMP
-- No PII stored here
);
Data Anonymization
Anonymize Audit Logs
// Anonymization Job (runs quarterly)
UPDATE audit_logs
SET
user_email = 'anonymized@example.com',
ip_address = '0.0.0.0',
user_agent = 'anonymized'
WHERE
created_at < NOW() - INTERVAL '90 days'
AND anonymized = false;
Privacy API Endpoints
Export User Data
POST /api/v1/privacy/export
Authorization: Bearer {user_token}
Response:
{
"export_id": "exp_abc123",
"status": "processing",
"estimated_completion": "2025-11-24T12:00:00Z",
"download_url": null // available when complete
}
Delete User Account
DELETE /api/v1/users/me
Authorization: Bearer {user_token}
{
"confirmation": "DELETE",
"reason": "no_longer_needed" // optional
}
Response:
{
"status": "scheduled_for_deletion",
"soft_delete_until": "2025-12-24T10:30:00Z",
"permanent_deletion_date": "2025-12-24T10:30:00Z"
}
Privacy Audit Logging
Comprehensive logging of privacy-sensitive actions.
Privacy Audit Events:
- user.data_exported
- user.data_deleted
- user.consent_updated
- contact.data_accessed
- contact.data_exported
- contact.data_deleted
- privacy_policy.accepted
- privacy_policy.updated
- dpa.signed
Privacy Impact Assessments (PIA)
Evaluate privacy risks for new features and processing activities.
When PIA Required
-
New feature involving personal data
-
Changes to data processing
-
New third-party integration
-
Expansion to new jurisdiction
PIA Process
-
Identify data flows - Map data collection and sharing
-
Assess necessity - Justify data collection
-
Evaluate risks - Privacy and security risks
-
Mitigation measures - Technical and organizational safeguards
-
Documentation - Record PIA findings
-
Review - Regular reassessment
Privacy Training & Awareness
For PenguinMails Team
-
Privacy onboarding - New employee training
-
Annual refresher - Yearly privacy training
-
Incident response - How to handle privacy incidents
-
Data handling - Proper data access and storage practices
For Customers (Tenants)
-
Privacy best practices - Documentation and guides
-
Compliance resources - Help center articles
-
Template DPAs - Standard data processing agreements
-
Privacy webinars - Regular training sessions
Related Documentation
Compliance
-
GDPR Compliance - EU data protection details
-
CAN-SPAM Compliance - US email law
-
Unsubscribe Management - Opt-out handling
-
Compliance Overview - All compliance features
Security
-
Security Framework - Security architecture
-
Data Encryption - Encryption technical details
-
Access Controls - RBAC implementation
Legal
-
Privacy Policy - Official privacy policy
-
Terms of Service - User agreement
-
DPA Template - Data processing agreement
Privacy Support
Contact Privacy Team
-
Email - privacy@penguinmails.com
-
Data Protection Officer - dpo@penguinmails.com
-
Security Issues - security@penguinmails.com
Privacy Resources
-
Help Center - Privacy FAQs and guides
-
Privacy Policy - Official privacy documentation
-
Trust Center - Security and compliance information
Last Updated: November 24, 2025 Privacy Officer: Chief Privacy Officer Compliance: GDPR, CCPA, PIPEDA, LGPD
Privacy is a fundamental right. PenguinMails is committed to protecting user privacy through technical excellence, transparency, and accountability.