Our Privacy Commitment
You Own Your Data, We’re Just Borrowing It
Full Transparency
User Control
Fair Compensation
Security Architecture
Military-Grade Protection
Multi-Layer Security Model
Secure Data Capture
Browser Extension Security:- Runs in isolated sandbox environment
- No access to other extensions or tabs
- Encrypted data transmission
- Local anonymization before sending
- SSL/TLS encryption for all transfers
- Certificate pinning to prevent MITM attacks
- Data compression and obfuscation
- Real-time threat detection
What We Collect vs What We Don’t
Complete Transparency
✅ What We Collect
✅ What We Collect
- Click coordinates and targets
- Page navigation sequences
- Form field interactions (not content)
- Scroll patterns
- Time spent on tasks
- Page URLs (excluding parameters)
- DOM structure
- Screenshot regions (anonymized)
- Browser viewport size
- General geographic region (country)
- Page load times
- Action success/failure
- Network request metadata
- Error states
❌ What We Never Collect
❌ What We Never Collect
- Passwords or login credentials
- Credit card or payment details
- Social Security numbers
- Personal health information
- Private messages or emails
- Form input values (only structure)
- File contents
- Clipboard data
- Camera or microphone access
- Location beyond country level
- Installed software list
- File system contents
- Other browser data
- Cookies or session data
- Hardware identifiers
Automatic Privacy Protection
Smart Exclusions
Protected Categories
Category | Examples | Protection Level |
---|---|---|
Financial | Banks, payment processors, crypto exchanges | Complete exclusion |
Healthcare | Patient portals, insurance, medical sites | Complete exclusion |
Government | Tax sites, DMV, benefits portals | Complete exclusion |
Authentication | Password managers, 2FA apps | Complete exclusion |
Adult Content | Automatically detected and excluded | Complete exclusion |
Private Browsing | Incognito/Private mode | Never recorded |
User Control Features
You’re in Charge
Pause Anytime
Custom Block Lists
Selective Sharing
Data Deletion
Export Your Data
Earnings Transparency
Data Anonymization
Privacy-Preserving Techniques
Anonymization Pipeline
Stage 1: Collection
- Remove personal identifiers
- Strip URL parameters
- Blur sensitive regions
- Hash user sessions
Stage 2: Processing
- Aggregate similar actions
- Add statistical noise
- Generalize specifics
- Remove outliers
Stage 3: Storage
- Separate data from identity
- Distribute across servers
- Encrypt all records
- Regular data rotation
Stage 4: Training
- Batch processing only
- No individual tracking
- Differential privacy
- Secure aggregation
Compliance & Regulations
Meeting Global Standards
European Standards
Your Rights Under GDPR:- Right to access your data
- Right to rectification
- Right to erasure (“right to be forgotten”)
- Right to data portability
- Right to object to processing
- Right to restriction of processing
- Privacy by design and default
- Data minimization
- Purpose limitation
- Lawful basis for processing
- Data protection officer appointed
Data Governance
Community-Owned, Community-Governed
Governance Structure
Privacy Committee
Privacy Committee
Transparency Reports
Transparency Reports
Community Audits
Community Audits
Open Development
Open Development
Security Measures
Protecting Your Contribution
Infrastructure Security
- Tier 4 data centers
- Geographic redundancy
- 24/7 monitoring
- Physical security
- Disaster recovery
Application Security
- Regular security updates
- Vulnerability scanning
- Code signing
- Secure development lifecycle
- Bug bounty program
Access Control
- Multi-factor authentication
- Biometric options
- Session management
- IP allowlisting
- Anomaly detection
Incident Response
- 24/7 security team
- Automated threat detection
- Incident response plan
- User notification system
- Recovery procedures
Privacy Tools
Take Control
Privacy Dashboard
Data Inspector
Block List Manager
Consent Center
Privacy Report
Trust & Transparency
Our Open Commitment
Transparency Initiatives
Initiative | Description | Frequency |
---|---|---|
Public Audits | Third-party security audits published in full | Annual |
Transparency Reports | Data requests, collection stats, incidents | Quarterly |
Privacy Changelog | Every privacy policy or practice change | Real-time |
Community Q&A | Direct answers to privacy questions | Monthly |
Open Source Tools | Privacy and security tools available on GitHub | Ongoing |
Frequently Asked Questions
Can Action Model see my passwords?
Can Action Model see my passwords?
What happens to my data if I delete my account?
What happens to my data if I delete my account?
Can my employer see my training data?
Can my employer see my training data?
Do you sell user data?
Do you sell user data?
How do you handle government data requests?
How do you handle government data requests?
Can I use a VPN with the extension?
Can I use a VPN with the extension?
What about COPPA and children's privacy?
What about COPPA and children's privacy?
Security Resources
Privacy Policy
Security Whitepaper
Report an Issue
Contact Our Privacy Team
- Email: privacy@actionmodel.com
- Privacy Hotline: 1-800-PRIVACY
- Encrypted Contact: [PGP Key Available]
- Privacy Officer: Dr. Sarah Chen, CPO
Your privacy isn’t a feature. It’s a fundamental right. We protect it. You control it. Together, we own the future.