Skip to main content

Privacy Policy

Effective date: December 19, 2025 Last updated: January 13, 2026

This Privacy Policy explains how NopeNet, LLC ("NopeNet", "NOPE", "we", "us", or "our") collects, uses, and protects information in connection with our websites and API services.


1. About NopeNet

Legal entity: NopeNet, LLC Registered address: 382 NE 191st St, PMB 775891, Miami, Florida 33179-3899 US Website: https://nope.net Contact email: [email protected]

NopeNet is an early-stage startup. Our services are currently intended for business customers established in the United States. We do not yet offer:

  • GDPR-compliant Data Processing Agreements,
  • EU/UK representatives,
  • Standard Contractual Clauses for international transfers,
  • HIPAA Business Associate Agreements.

If you require any of the above, NOPE may not be the right fit at this time. See Section 17 for more information.


2. What We Do

We provide a business-to-business (B2B) developer API for safety and risk signalling in conversation data.

Our direct customers are businesses and developers ("Customers"), not the end-users of their platforms.

When a Customer integrates the NOPE API:

  1. Their system sends conversation text and associated metadata to our API.
  2. We route that text to large language model (LLM) providers and related infrastructure.
  3. We return structured risk signals, matched crisis resources, and optional response templates.
  4. We do not store raw conversation text in our application database for long-term use (such as user profiling or analytics).

If you are an end-user of a Customer's platform (for example, a chat app that uses NOPE), your primary privacy relationship is with that platform. This Policy explains our limited role.


3. Our Role: Controller vs. Processor

  • Customer account data For data about our direct Customers (e.g., account details, billing identifiers), we act as a data controller. We decide how and why this data is used, within the scope described in this Policy.

  • End-user conversation data For conversation text and associated metadata sent to our API by Customers, we act as a processor/service provider. Customers decide what to send us and why; we process it only to provide our services to them.

  • Aggregated and anonymized data Where we create aggregated, de-identified data from processing activities (e.g., aggregate classification volumes, error rates, model performance metrics), we may use such data as a controller for service improvement, research, and reporting purposes. This data cannot be used to identify any individual End User.


4. Information We Collect and Store

Terminology note: Throughout this Policy, "Input Data" and "conversation content" are used interchangeably to refer to text, messages, and associated metadata submitted to our API for classification. Our Terms of Service provides formal definitions for these and other terms.

4.1 Information We Store in Our Systems

These categories are stored in our own database and application systems:

Data Type Examples Purpose
Customer account Email address, optional name/organization Account management, support, communication
Authentication Hashed passwords, session tokens Secure login and session management
API credentials Hashed API keys, key names, creation dates Authenticate and manage API access
Usage metrics Evaluation counts, timestamps, rate-limit events Operations, billing, abuse detection
Support communications Emails or messages sent to us Responding to questions and support requests

Raw end-user conversation text is not written to our application database.

4.2 Information We Process but Do Not Store

These categories are processed to provide the service but are not written to our application database:

Data Type How We Handle It
Conversation content (messages) Processed in memory and routed to LLM providers for classification, then returned to the Customer. Conversation content is not written to our application database. Our system architecture processes Input Data transiently without persisting it to durable storage.
Risk assessment results Generated and returned to the Customer. We store classification metadata (severity, domains, flags) but not the underlying content. We do not maintain a per-end-user risk history database.
Customer-supplied identifiers IDs or references that a Customer includes so they can join results back to their own systems. These are passed through in responses and not stored by us.

Important limitation:

Like most cloud services, our infrastructure and service providers (for example, hosting, networking, and LLM providers) may generate technical logs that include elements of the above data (for example, IP addresses, timestamps, and request metadata) for a limited period for security, abuse monitoring, and debugging. We describe this further in Section 6.

4.3 Sensitive Crisis Content

We recognize that Input Data sent to our API may contain extremely sensitive information, including but not limited to:

  • Expressions of suicidal ideation or intent
  • Self-harm disclosures, urges, or planning
  • Abuse or domestic violence disclosures
  • Sexual assault or trafficking disclosures
  • Descriptions of trauma or victimization
  • Mental health crisis expressions
  • Threats of violence to self or others
  • Child safety concerns
  • Eating disorder content
  • Substance abuse disclosures

For all Input Data, including sensitive crisis content:

Protection Implementation
Encryption in transit All API traffic uses TLS 1.3 encryption
Encryption at rest Data at rest is encrypted using AES-256 or equivalent
No long-term storage Conversation content is not stored in our application database
Access controls Access limited to essential automated systems; human access requires documented justification and is logged
No secondary use Never sold, never shared for advertising, never used for purposes unrelated to service provision
No profiling Not used to build profiles of End Users
No model training Not used to train our own machine learning models
Minimal retention Transient processing only; see Section 8 for specific retention periods

We do not treat crisis content differently from other Input Data — all Input Data receives the same strong protections. We highlight crisis content here because of its particularly sensitive nature and the importance of transparency about how we handle it.

4.4 What We Do Not Collect or Use

We do not collect, store, or build profiles based on:

  • End-users' names, emails, or contact information,
  • Per-end-user behavioral profiles,
  • Long-term per-conversation risk histories.

If a Customer includes such information in conversation text: That data is handled in accordance with Section 4.2—processed transiently and not written to our application database. We do not extract, index, or profile End User personal information from conversation content.

We ask Customers not to include more personal information than is necessary for their use case.

4.5 Free Tools and Website Features

We provide certain tools on our website at no cost. Here is how we handle data for each:

Compliance Survey (nope.net/compliance-survey):

Aspect How We Handle It
Survey responses Processed in your browser only — not sent to our servers
Results Generated client-side; may be encoded in URL parameters for sharing
Storage We do not store your survey inputs or results in any database
Analytics We may collect aggregate page views (e.g., "compliance survey was loaded X times") but not individual responses
URL parameters If you share a results URL, the parameters are visible to anyone with the link — do not include sensitive business information

Regulation Tracker (nope.net/regs):

Aspect How We Handle It
Filter selections May be reflected in URL parameters for bookmarking/sharing
Personal data None collected — this is a read-only reference database
Analytics We may collect aggregate page views and popular filter combinations

Documentation (docs.nope.net):

Aspect How We Handle It
Personal data None collected beyond standard web server logs
Search queries May be logged in aggregate for improving documentation

For all free tools: We use privacy-respecting analytics that do not track individual users across sessions or build advertising profiles. We do not use third-party advertising trackers on these pages.

4.6 Safety Audit Services

When you engage our Safety Audit Services (see Terms of Service Section 1.3), we process additional categories of data:

Data Type How We Handle It Retention
Statement of Work details Stored as part of engagement records Duration of engagement + 3 years
Test scenario files Provided to you; master copies retained by NopeNet Indefinitely (our IP)
System response transcripts Processed for evaluation; stored securely during engagement Deleted within 90 days of report delivery
Evaluation notes Internal working notes during assessment Deleted within 90 days of report delivery
Final audit report Delivered to you; copy retained by NopeNet Duration of engagement + 3 years
Aggregate findings De-identified, aggregate data may be retained Indefinitely

Important notes on Audit data:

  • Transcripts may contain sensitive content: AI system responses to crisis scenarios may include sensitive text. We apply the same protections described in Section 4.3 (encryption, access controls, no secondary use)
  • No End User data: Audit scenarios use synthetic test cases, not real End User conversations
  • Your Confidential Information: Audit results specific to your system are treated as your Confidential Information per the Terms of Service
  • Aggregate use: We may use de-identified, aggregate audit findings (e.g., "X% of systems tested fail to detect sudden calm signals") for research and service improvement without identifying your organization. We will only publish aggregate findings that include data from at least 10 audits to prevent indirect identification

4.7 Research Contribution Program

We offer a voluntary research contribution program (nope.net/contribute) where individuals can donate their AI chatbot conversation exports to support AI safety research.

What this program is:

  • A voluntary donation of your own conversation data
  • Currently limited to ChatGPT exports only
  • No account or payment required
  • You receive a free AI Safety Report analyzing your conversations

What we collect:

Data Type Collected Discarded
Conversation titles Yes
User messages (text only) Yes
AI responses (text only) Yes
Images and attachments Yes
Audio and video Yes
Code interpreter outputs Yes
Timestamps and metadata Yes
System messages Yes

Your attestations: By contributing, you confirm that:

  • The data is your own ChatGPT conversation export
  • You have reviewed it and are comfortable sharing its contents
  • You understand it will be processed by AI systems

How we store and process contributions:

Aspect How We Handle It
Storage location Cloudflare R2 (encrypted at rest)
Processing Analyzed by LLM providers (primarily OpenAI) via our Oversight system
Access controls Limited to essential automated systems; human access requires documented justification
Purpose Internal AI safety research only; improving our detection capabilities
Third-party sharing None — data stays within NopeNet LLC infrastructure
Retention 6 months from upload, then automatically deleted

AI Safety Report:

When you contribute data, you may request a free AI Safety Report that analyzes your conversations for potentially concerning AI behaviors. This report:

  • Is generated using our Oversight analysis system
  • Analyzes a sample of your conversations (not all, for very large exports)
  • Is stored alongside your contribution and deleted on the same schedule
  • Can be accessed via a unique URL we provide

What we do NOT do with contributions:

  • We do not scrub or modify your data for PII — you are responsible for reviewing your export before uploading
  • We do not share contributions with third parties
  • We do not use contributions to train our own machine learning models
  • We do not associate contributions with any identity beyond an IP hash for abuse prevention

Deletion requests:

  • Contributions are automatically deleted 6 months after upload
  • To request early deletion, visit nope.net/contact and provide the filename of your original ChatGPT export (e.g., 2024-01-15-conversations.zip)
  • We will confirm deletion within 30 days of a verified request

Abuse prevention:

  • We store a truncated hash of your IP address (16 characters of SHA-256) to detect abuse patterns
  • We do not store your full IP address or associate it with your contribution content
  • Rate limits apply: 10 uploads per hour per IP address

5. How We Use Information

5.1 For Customer Data (Controller Role)

We use Customer account and usage data to:

  • Provide, maintain, and improve the NOPE API and related services,
  • Authenticate Customer accounts and API keys,
  • Enforce usage limits and billing,
  • Detect, investigate, and prevent abuse and security incidents,
  • Communicate with Customers about service updates, downtime, and security notices.

We do not sell Customer personal information or use it for third-party advertising.

5.2 For End-User Data (Processor/Service Provider Role)

When processing conversation text and associated metadata for Customers, we use it to:

  • Generate risk signals and assessments,
  • Match appropriate crisis resources,
  • Provide optional response templates or structured outputs,
  • Monitor for abuse and misuse of our service.

We do not:

  • Use end-user data for our own marketing,
  • Build advertising profiles,
  • Train our own models directly on Customer conversation content.

Model Training Clarity:

  • We do not train our own machine learning models on Customer Input Data
  • We do not use Input Data to fine-tune, improve, or develop proprietary models
  • Input Data is processed by third-party LLM providers solely to generate classifications
  • We configure our LLM provider accounts to:
    • Disable model training on API inputs where such controls are available
    • Use zero-data-retention (ZDR) tiers where available and commercially reasonable
    • Minimize data retention in provider logs

Where our LLM providers offer controls to disable model training on API data, we configure our integrations with those controls enabled for Customer traffic, or use providers whose APIs are not trained on Customer data by default. Customers should review the privacy documentation of any third-party providers they request us to use.


6. Service Providers and Operational Logs

We rely on third-party service providers ("Sub-processors") to host and operate our services. These providers may generate and retain operational logs that can include IP addresses, timestamps, and request metadata for security, abuse monitoring, performance, and reliability.

6.1 Categories of Sub-processors

Category Purpose Data Processed
Hosting and edge infrastructure Host our API and websites, provide CDN and edge compute HTTP requests, IP addresses, request/response metadata
Database and authentication Store application data, manage authentication and sessions Account data, usage metrics, hashed credentials
LLM routing and providers Analyze conversation text, generate classifications Input Data (conversation content), classification outputs
Payment processing Process subscription payments, manage billing Billing information, payment card tokens (we do not store full card numbers)
Email delivery Send transactional and security emails Email addresses, message content
Monitoring and logging System monitoring, error tracking, performance analytics System logs, error reports, aggregated metrics

6.2 Current Sub-processors

Sub-processor categories and representative providers:

Category Purpose Data Processed Examples
Hosting/Infrastructure API hosting, CDN, edge compute HTTP requests, IP addresses Cloud platforms, edge networks
Database/Auth Application data, sessions Account data, usage metrics Managed database services
LLM Routing Route requests to LLM providers Input Data OpenRouter (primary router)
LLM Providers Generate classifications Input Data Anthropic, Google, OpenAI
Payment Processing Subscription billing Billing info, card tokens Payment platforms
Email Delivery Transactional emails Email addresses Email delivery services
Error Monitoring System monitoring, debugging Error logs, stack traces Observability platforms

Note on LLM Routing: We use OpenRouter as our primary LLM routing service. OpenRouter receives Input Data to route classification requests to appropriate LLM providers. OpenRouter is itself a sub-processor that handles Input Data before it reaches the final LLM provider. See OpenRouter's privacy policy and data handling documentation (available via link in your dashboard) for details on their data practices.

Current provider details are available:

We maintain specific vendor names in the dashboard rather than this policy to ensure you always have current information. The dashboard list is updated when providers change.

We will notify Customers of material changes to our sub-processor list at least 30 days before the change takes effect, via email or dashboard notification. You may object to a new sub-processor by notifying us within that 30-day period; if we cannot accommodate your objection, you may terminate your subscription.

6.3 LLM Provider Data Handling

Our classification service routes Input Data to LLM providers for analysis. Important points:

Our provider selection criteria:

  • Documented security practices and certifications (SOC 2, ISO 27001 where available)
  • Data handling policies that support enterprise use cases
  • API-specific data handling (not consumer chat interfaces)
  • Ability to configure data retention and training exclusions

Our account configuration:

  • We configure accounts to disable model training on API inputs where available
  • We use enterprise or API tiers rather than consumer products
  • We select providers whose API terms exclude training by default where possible

What we don't control:

  • Providers may retain logs for limited periods (typically up to 30 days) for abuse monitoring and security
  • Exact retention periods and processing locations vary by provider
  • Provider policies may change; we monitor but cannot guarantee specific configurations

Current primary providers (routed via OpenRouter):

  • Anthropic (Claude models)
  • Google (Gemini models)
  • OpenAI (GPT models)

Links to provider privacy policies, data processing terms, and API-specific data handling documentation are available in your dashboard.

6.4 Operational Log Retention

Log Type Typical Retention Purpose
API access logs 30 days Security, abuse detection, debugging
Authentication logs 90 days Security, fraud prevention
Error logs 14 days Debugging, service reliability
LLM provider logs Up to 30 days (provider-dependent) Provider abuse monitoring, security
Payment logs 7 years Financial compliance, dispute resolution

We do not control third-party provider retention periods. The periods above are typical and may vary by provider.

6.5 Crisis Resource Data

Our crisis resource matching service (/v1/resources) uses a database of crisis helplines and support services. This data:

  • Is not personal data — it consists of publicly available information about crisis services (organization names, phone numbers, websites, hours of operation, service descriptions)
  • Does not include End User data — we do not store which resources were matched to which End Users or which Customer requested them
  • Is curated by NopeNet from public sources, crisis organization directories, and direct partnerships with crisis organizations
  • May be cached in Customer systems per their own data handling policies

When we return matched crisis resources in classification responses, we may log:

  • Resource IDs returned (for aggregate analytics, e.g., "how often is 988 returned")
  • Country/region of request (for geographic resource matching)

We do not associate resource matches with identifiable End User data.


7. Data Security

We implement reasonable technical and organizational measures designed to protect information, including:

  • HTTPS/TLS 1.3 encryption for data in transit,
  • AES-256 encryption for data at rest,
  • Hashed passwords and API keys,
  • Access controls and least-privilege principles,
  • Row-level security in our database where appropriate,
  • A service design that avoids storing raw sensitive content in our own long-term data stores.

We rely on certified infrastructure providers (such as Supabase and other major cloud services) for core hosting and storage.

No security program is perfect. We cannot guarantee absolute security.


8. Data Retention

8.1 Retention Schedule

Data Category Retention Period Rationale
Customer account data Duration of account + 3 years Legal compliance, accounting, dispute resolution
API credentials Until revoked or account closed Service functionality
Usage statistics (aggregated) Duration of account + 2 years Billing, historical records, dispute resolution
Billing records 7 years from transaction Tax and accounting requirements
Classification metadata Duration of account Audit trails, SB243 compliance support
Conversation content (Input Data) Not stored; transient processing only Privacy by design
Transient caches and buffers Up to 72 hours maximum Debugging, retry handling, service reliability
Operational logs 14-90 days depending on log type Security, debugging (see Section 6.4)
LLM provider logs Up to 30 days (provider-controlled) Provider security and abuse monitoring
Support communications Duration of account + 2 years Support history, dispute resolution
Research contributions 6 months from upload Voluntary donation program; auto-deleted
Research contribution reports 6 months from upload Deleted with associated contribution

8.1.1 Classification Metadata — What We Store

For each API request, we store classification results without the underlying content:

What We Store Example Purpose
Request metadata user_id, api_key_id, endpoint, timestamp, latency Operations, billing
speaker_severity "moderate", "high", "critical" Audit trail
risk_types ["suicide", "self_harm"] Audit trail
risk_subjects ["self", "other"] Audit trail
resources_shown true/false Compliance reporting
suicidal_ideation true/false Compliance reporting
self_harm true/false Compliance reporting

What We Do NOT Store:

  • The actual conversation text (Input Data)
  • The specific words or messages analyzed
  • End User identifiers (unless Customer includes them)
  • Per-message content history

This design is privacy-preserving. Our audit trail shows that a crisis was detected and what type, but never what the End User actually said. For SB243 compliance reporting, this is sufficient — regulators need to verify you're detecting and responding to crises, not read the actual conversations.

8.2 Conversation Content Handling

We do not store conversation content (Input Data) in our application database.

Input Data flows through our system as follows:

  1. Receipt — Input Data received via API request
  2. Validation — Request validated, authenticated
  3. Routing — Routed to LLM provider(s) for classification
  4. Processing — Classification generated by LLM provider
  5. Response — Classification results returned to Customer
  6. Purge — Input Data cleared from our application memory

Input Data may temporarily exist in:

Location Duration Purpose
Memory buffers Milliseconds to seconds Active request processing
Transient caches Up to 72 hours Retry handling, temporary buffering
LLM provider systems Up to 30 days Provider abuse monitoring, per their policies
Operational logs Up to 30 days Truncated/hashed form only; debugging, security

We design our systems to minimize retention of Input Data and do not maintain a queryable database of conversation content. After the transient processing period, we cannot retrieve specific Input Data submissions.

8.3 Deletion Requests

When you close your account or request deletion:

  • Account data is deleted or anonymized within 30 days
  • Usage statistics are anonymized (aggregated, de-identified)
  • API credentials are immediately revoked and subsequently deleted
  • We will confirm deletion in writing upon request

Limitations on deletion:

  • We cannot delete data already in third-party provider logs (subject to their retention periods, typically up to 30 days)
  • Billing records are retained as required by tax and accounting law (typically 7 years)
  • We cannot delete specific Input Data submissions because we do not store them in a retrievable format—transient caches automatically purge within 72 hours

To request deletion: Visit nope.net/contact, email [email protected], or use the account closure function in your dashboard.


9. HIPAA / Health Information

NOPE is not currently designed or represented as compliant with the US Health Insurance Portability and Accountability Act (HIPAA).

  • We do not sign Business Associate Agreements (BAAs) at this time.
  • Our services are not intended for use with Protected Health Information (PHI) as defined by HIPAA.

Customers must not send PHI to our services unless and until we explicitly state otherwise in a separate written agreement.

See our Terms of Service Section 4.4 for additional requirements regarding health information. Customers who submit PHI in violation of these restrictions do so at their own risk and in breach of their agreement with us.


10. Your Rights and Choices

10.1 If You Are a NOPE Customer

If you have an account with us, you can:

  • Access your basic account information via the dashboard,
  • Update or delete certain account details,
  • Revoke or rotate API keys,
  • Close your account (which will trigger deletion or anonymization of associated data subject to our retention needs).

You can also contact us at [email protected] or via nope.net/contact to:

  • Request a copy of personal information we hold about you,
  • Request correction or deletion of personal information,
  • Ask questions about how we handle data.

We may need to verify your identity before responding to certain requests and may retain some information where required by law or legitimate business needs (e.g., records of billing transactions).

10.2 If You Are an End-User of a Customer's Platform

If you use a service that integrates NOPE (for example, a chat app that calls our API), your primary relationship and rights (including access, deletion, or objection rights) are with that Customer.

  • We generally cannot identify you directly.
  • We act on the instructions of the Customer when processing your data.

If a Customer asks us to assist with a deletion or access request relating to data we process on their behalf, we will make reasonable efforts to support them, where technically feasible.


11. Cookies and Similar Technologies

  • Dashboard: We may use strictly necessary cookies or similar technologies for authentication, session management, and security. These are required for the service to function.
  • API: Our API itself is stateless and does not rely on cookies.
  • Marketing site: We may use privacy-respecting, non-advertising analytics (for example, aggregated traffic metrics). We do not use third-party advertising cookies or trackers.

Do Not Track: Our services do not currently respond to "Do Not Track" browser signals. However, we do not engage in cross-site tracking or behavioral advertising, so Do Not Track signals would not change our data practices.


12. Children

NOPE is a B2B service directed at organizations and adult professionals, not at children.

We do not knowingly collect personal information directly from children under 13. Our Customers may use our service in products that involve minors (for example, school safety platforms, youth mental health services, or safeguarding applications).

Processing data involving children: In such cases:

  • The Customer is the data controller and responsible for COPPA, FERPA, and other child privacy law compliance
  • We process such data solely as a service provider under the Customer's instructions
  • We do not have direct relationships with minor End Users
  • We do not knowingly collect personal information directly from children under 13
  • Customers must obtain appropriate consent or have legal basis (such as the "school official" exception) before submitting children's data

See our Terms of Service Section 4.9 for detailed Customer obligations regarding children's data, including COPPA and FERPA requirements for school customers.


13. Automated Processing and Human Oversight

Our service uses AI models to analyze text and generate risk signals and other structured outputs. This is automated processing, but in our design:

  • Outputs are signals and tools for Customers,
  • Customers retain responsibility for how they act on those signals,
  • Customers should implement appropriate human oversight and escalation processes.

We do not make automated decisions on individuals that by ourselves create legal or similarly significant effects.


14. Geographic Scope and International Transfers

NopeNet is based in the United States, and our core infrastructure is currently hosted with providers that offer US data centers.

Primary data locations:

Data Type Primary Location Notes
Application database United States (AWS us-east-1 region) Account data, usage metrics, classification metadata
Edge processing Global edge network Request routing, caching
LLM processing United States primarily Some providers may process in other regions

Transfer mechanisms: We currently rely on:

  • Our sub-processors' compliance certifications and security practices
  • Contractual protections in our agreements with sub-processors
  • The fact that our services are designed for US customers processing US data

However, some of our Sub-processors may process data in other countries or regions as part of their global cloud infrastructure. By using our services, Customers understand that information may be processed outside the state or country where they are located, in jurisdictions that may have different data protection laws.

EU/UK customers: We do not currently offer Standard Contractual Clauses (SCCs) or other EU/UK-approved transfer mechanisms. We do not have EU or UK representative appointments. Customers subject to GDPR should not use our services for processing EU/EEA personal data until we offer appropriate compliance documentation.


15. US State Privacy Laws

We are aware of comprehensive privacy laws in states such as California (CCPA/CPRA), Virginia, Colorado, Connecticut, and others. As a small early-stage company, we may not meet all statutory thresholds that make these laws directly applicable in every case.

Regardless of thresholds:

  • We do not sell personal information,
  • We do not share personal information for cross-context behavioral advertising,
  • We aim to honor reasonable access, correction, and deletion requests from individuals where we can identify them and have a direct relationship.

When we process personal information on behalf of a Customer, we act as a "service provider" or "processor" under applicable US state privacy laws. We only process such data for the limited business purpose of providing our services to that Customer.

15.1 California Consumer Privacy Act (CCPA/CPRA) Disclosures

For California residents, we provide the following disclosures required by the California Consumer Privacy Act, as amended by the California Privacy Rights Act:

Categories of Personal Information Collected (past 12 months):

Category (per CCPA) Examples Collected? Source
A. Identifiers Email address, name, IP address, account ID Yes Directly from Customers
B. Customer records Billing name, address, payment information Yes Directly from Customers
F. Internet activity API usage logs, access times, features used Yes Automatically collected
G. Geolocation Approximate location derived from IP address Incidentally Automatically collected
I. Professional information Company name, job title, industry If provided Directly from Customers
K. Inferences Account risk scores, usage patterns Limited Derived from above
Sensitive PI: Mental health Content indicating mental health status (via Input Data) Processed, not stored From Customers (End User content)

Categories NOT Collected: C (Protected characteristics), D (Commercial information beyond billing), E (Biometric), H (Sensory data), J (Education information)

Business Purposes for Collection:

  • Providing the NOPE classification service
  • Processing payments and maintaining accounts
  • Security, fraud prevention, and abuse detection
  • Service improvement and debugging
  • Legal compliance

Categories Disclosed for Business Purposes (past 12 months):

Category Recipients Purpose
A. Identifiers Hosting providers, payment processor Service operation, billing
B. Customer records Payment processor Payment processing
F. Internet activity Hosting providers, monitoring tools Service operation, security
Sensitive PI (Input Data) LLM providers Classification processing

We Do NOT:

  • Sell personal information (as defined by CCPA)
  • Share personal information for cross-context behavioral advertising
  • Use or disclose sensitive personal information for purposes other than service provision (no profiling, no advertising)
  • Retain personal information longer than reasonably necessary

Your California Privacy Rights:

Right Description How to Exercise
Know Request what PI we collect, use, and disclose nope.net/contact, [email protected], or dashboard
Access Obtain a copy of your PI nope.net/contact, [email protected], or dashboard
Delete Request deletion of your PI nope.net/contact, [email protected], or dashboard
Correct Correct inaccurate PI nope.net/contact, [email protected], or dashboard
Opt-out of sale/sharing N/A — we don't sell or share Not applicable
Limit sensitive PI use Limit use to service provision Already limited by default
Non-discrimination Not be discriminated against for exercising rights Automatic

Verification: We will verify your identity before responding to access, deletion, or correction requests. For account holders, we verify via your account email. For others, we may require additional information.

Authorized Agents: You may designate an authorized agent to make requests on your behalf. We require: (1) your signed authorization, and (2) verification of your identity.

Response Timing: We will respond to verifiable requests within 45 days. We may extend this by an additional 45 days if reasonably necessary, with notice.

Contact for Privacy Matters:

California "Shine the Light" (Civil Code § 1798.83): California residents may request information about disclosure of personal information to third parties for direct marketing purposes. We do not disclose personal information to third parties for their direct marketing purposes.


16. Security Incidents and Notifications

16.1 Our Incident Response

If we become aware of a security incident that may affect Customer data, we will:

  1. Investigate the incident promptly to determine scope, cause, and impact
  2. Contain the incident and take steps to prevent further unauthorized access
  3. Assess what data was affected and which Customers are impacted
  4. Remediate vulnerabilities and implement measures to prevent recurrence
  5. Notify affected Customers in accordance with Section 16.2
  6. Document the incident and our response for compliance purposes

16.2 Notification Timeline

Incident Type Notification Timeline Method
Confirmed breach of Customer account data Within 72 hours of confirmation Email to account owner + dashboard notice
Confirmed breach potentially affecting Input Data Within 72 hours of confirmation Email to account owner + dashboard notice
Suspected incident under investigation Reasonable updates during investigation Email or dashboard as appropriate
Third-party provider incident affecting our data Within 72 hours of our learning of impact Email with provider information
Near-miss or contained incident Disclosed in next security update Dashboard or blog

"Confirmation" means we have reasonable certainty that unauthorized access to Customer data occurred, not merely that an attempted attack was detected.

16.3 Notification Content

Security incident notifications will include, to the extent known at the time of notification:

  • Nature and description of the incident
  • Approximate date and time of the incident
  • Categories of data potentially affected
  • Approximate number of Customers affected
  • Steps we have taken to contain and remediate the incident
  • Steps we plan to take going forward
  • Steps Customers can take to protect themselves (e.g., credential rotation)
  • Point of contact for questions
  • Whether law enforcement has been notified

We will provide updates as our investigation progresses and additional information becomes available.

16.4 Customer Responsibilities

Customers are responsible for:

  • Notifying their own End Users if required by applicable law (we can provide supporting documentation upon request)
  • Determining whether the incident triggers their own breach notification obligations under CCPA, state breach notification laws, or other applicable law
  • Implementing any recommended protective measures promptly
  • Notifying us if they discover a security issue related to our services (see Terms of Service Section 4.7)
  • Maintaining accurate contact information for security notifications

16.5 Your Obligation to Notify Us

If you discover or suspect any of the following, you must notify us at [email protected] (or via nope.net/contact) within the specified timeframes:

Incident Type Notification Timeframe
Security incidents (unauthorized access to your NOPE account, API credential compromise, compromise of systems integrating with NOPE) Within 72 hours of discovery
Harm events (End User harms themselves or others following an interaction using NOPE) Within 30 days of becoming aware
Security vulnerabilities in the NOPE service Promptly upon discovery

See Terms of Service Section 4.7 for complete incident notification requirements.


17. Data Processing Agreements

17.1 Current Status

We do not currently offer:

  • GDPR-compliant Data Processing Agreements (DPAs)
  • Standard Contractual Clauses (SCCs) for international transfers
  • EU/UK representative appointments
  • HIPAA Business Associate Agreements (BAAs)

Our services are currently designed for US-based business customers processing US-based End User data.

17.2 Future Availability

We are developing:

  • A Data Processing Addendum for customers with CCPA compliance needs
  • Documentation to support customer compliance programs

If you require a DPA, BAA, or other data processing agreement, please visit nope.net/contact or email [email protected] to discuss your needs and timeline. We may be able to accommodate specific requirements for Enterprise customers.

17.3 Customer Acknowledgment

By using our services, you acknowledge that:

  • We do not currently offer DPAs, BAAs, or SCCs
  • You are responsible for determining whether your use case requires such agreements
  • If you later determine you require compliance documentation we do not offer, your remedy is to discontinue use of the service
  • We are not liable for your decision to use our services without compliance documentation that may be required for your specific use case
  • You have appropriate legal basis for any data you submit to us

18. Changes to This Policy

We may update this Privacy Policy from time to time.

  • If we make material changes, we will notify Customer account holders by email or by posting a notice on our website or dashboard at least 30 days in advance.
  • The "Last updated" date at the top of this Policy will reflect the latest version.

Continued use of our services after an update becomes effective will mean you accept the revised Policy.


19. Contact Us

If you have any questions or concerns about this Privacy Policy or our data practices, you can contact us at:

Web: nope.net/contact

Email: [email protected]

Mail: NopeNet, LLC 382 NE 191st St PMB 775891 Miami, Florida 33179-3899 US