Legal

Privacy Policy

Last updated: February 2026

We believe privacy is a fundamental right. This policy outlines how we collect, use, and protect the data that passes through our edge network and powers your account.

Section 01

Information We Collect

We only capture details that help us operate our global network effectively and securely measure outcomes.

  • Account Details: Contact and company details, billing information, and communication preferences that you submit when signing up or contacting support.
  • Network Metadata: Technical context such as request headers, IP addresses, bandwidth usage, and cache hit/miss ratios required to route and deliver your content.
  • Dashboard Analytics: Limited usage data from our control panel gathered via privacy-friendly analytics to understand aggregate engagement—not to fingerprint individual administrators.
Section 02

How We Use Your Information

Every data point is tied to a specific operational purpose connected to providing our edge services.

  • Provisioning edge nodes, routing traffic efficiently, and calculating usage based billing.
  • Delivering DDoS protection and identifying malicious traffic patterns across the global network.
  • Improving our routing algorithms—using anonymized aggregate telemetry only—and notifying you about relevant product or security updates.
Section 04

Retention & Deletion

Account and configuration artifacts stay in secure workspaces for the duration of the engagement. Cached content is ephemeral and purged according to your cache-control headers or manual invalidation requests.

We archive network access logs for up to 30 days by default so you can request exports, then purge or anonymize them unless specific regulations require longer retention. If you need immediate deletion after terminating your account, just send a request—our ops team will confirm once the purge across all edge nodes is complete.

Section 05

Your Rights

  • Access: request the data we store about your organization.
  • Correction: update incorrect or outdated configuration contact information.
  • Portability: receive structured exports of your routing configurations and access logs.
  • Erasure: ask us to delete specific accounts or all records (subject to contractual/legal obligations).
Section 06

Security & Subprocessors

We enforce SSO + MFA on every internal system, log infrastructure access, and segment environments by region and client. Our edge runtime environments are fully isolated per-tenant and configured with least-privilege constraints.

When we need specialized infrastructure (for example, underlying transit connectivity or billing processors), we only work with vendors that meet SOC 2, ISO 27001, or equivalent rigorous standards. A current list of subprocessors is available on request.

Need something specific?
For DPAs, security questionnaires, or subprocessor disclosures, email privacy@nimbusroute.com. We respond within one business day and can work with your legal or procurement team to finalize the paperwork.