Data & Privacy Policy
Last updated: Oct 2025
At LexAIB2B, we understand that trust is the foundation of any successful partnership, especially when that partnership involves custom AI solutions and sensitive data. We take our responsibility to protect your information—and the information of your end-users—with the utmost seriousness. Your data security is our top priority.
Our Commitment to Your Data Security
We believe in a privacy-by-design approach. This means that data protection is woven into the very fabric of our AI solutions and our business processes, not added as an afterthought.
- Strict Internal Policies: Only authorized personnel can handle your data, and only as needed to provide our services.
- Secure Infrastructure: Encryption in transit and at rest, secure access controls, and regular security audits.
- Purpose Limitation: We use data only to develop, deploy, and maintain your custom AI solution as defined in your agreement. We do not sell, rent, or share data with third parties for advertising.
Compliance and Regulatory Assurance
LexAIB2B is committed to compliance with relevant federal and industry regulations, especially for clients in specialized sectors. For Educational Institutions, we can operate under processes aligned to:
- FERPA (Family Educational Rights and Privacy Act)
- COPPA (Children’s Online Privacy Protection Act)
Our Detailed Agreement Forms
A public policy is only one part of strong security. During onboarding, every client receives detailed agreement forms and a data processing addendum that specify:
- What data is collected and processed
- How that data is secured
- Roles and responsibilities of both parties
- Compliance measures and audit options
We are happy to provide prospective clients with examples of these policies during the initial consultation.
The Data We Handle
The exact data depends on the solution we build for you. Common categories include:
- Client Business Data: Documents, proprietary datasets, and operational metrics you provide for solution development.
- Client Contact Data: Names, titles, email addresses, and phone numbers for billing, support, and account management.
- Usage Data: Non-identifying technical analytics used to maintain reliability and improve performance.
Data Deletion and Retention
Your data belongs to you. Contracts define retention windows and secure deletion schedules after service termination. Upon request, we will securely destroy or return all client-provided data per the agreement.
Questions & Contact
Great security starts with open communication. If you have questions about this policy, our compliance procedures, or our security measures, please contact us: