Enterprise Data Security
Privacy Policy
Last Updated: April 2026
At Mercator Glen Systems ("we," "our," or "us"), we engineer autonomous infrastructure specifically for property managers with large portfolios and wholesale operations. We understand that we operate in environments containing highly sensitive financial, tenant, and vendor data. This Privacy Policy details our uncompromising approach to data security.
1. The Zero-Retention Mandate
We differentiate ourselves from standard AI platforms through our strict Zero-Retention Policy. Our digital employees operate purely as processing conduits:
- In-Memory Processing: Data extracted during operational workflows exists only in volatile memory during asynchronous execution.
- No Model Training: Your proprietary operational data, tenant details, purchase orders, and internal communications are never logged, retained, or utilized to train our foundational models or any third-party public models.
- Automatic Purging: Once an API call executes successfully within your authorized software, the payload footprint is instantly destroyed within our clusters.
2. Information We Collect
To provide and maintain our orchestration services, we collect limited administrative data:
- Account Details: Executive contact names, business email addresses, and billing information required for contract execution.
- Telemetry & Metadata: Infrastructure telemetry (e.g., API latency, token limits) strictly to maintain uptime. This telemetry does not contain payload content.
- Authorized Credentials: Securely vaulted OAuth tokens or restricted-scope API keys required to interface with your existing enterprise stacks.
3. Third-Party Integrations
Our digital workforce interfaces directly with your established vendors, including AppFolio, Buildium, Yardi, NetSuite, and Salesforce. We are not responsible for the independent privacy practices of these third-party software providers.
4. Enterprise Security & SOC2 Compliance
Our architecture is designed under the rigorous constraints of SOC2 Type II compliance standards. Data in transit is secured using TLS 1.3 encryption. Credentials and keys are hashed, salted, and stored within isolated secure enclaves.
5. Your Governance Rights
You maintain ultimate sovereignty over your data access. At any time, administrators can revoke our digital employees' API access. Upon written request, any localized account configuration data held by Mercator Glen will be permanently wiped within 72 hours.
For privacy inquiries or technical security reviews, please email privacy@mercatorglen.com.