Author Image

Privacy Policy

Author of Hacking and Coffee

The Entire Privacy Policy

As a small business, we believe that the Privacy Policy should be small and simple as well.

As much as we’d like to not store anything, we unfortuantely have to store some information. Here’s how we store it, when we delete it, and what we do with it.

How you can Improve Privacy with us

Hacking & Coffee has a number of End-to-End Encryption (E2EE) options for communicating with customers to limit access by our providers, including:

  • Signal
  • PGP
  • Wire Whilst not E2EE, we also can accept email via Proton mail address. We are currently in the process of migrating our email to default to Proton Mail.

Communications

  • No Adverts - Hacking & Coffee will communicate as necessary with customers and prospective customers. We do not perform any advertising via email, SMS/MMS, phone, or mail.
  • SMS/MMS - We will only text you if we are provided a mobile number for communication related to work via Opt-in consent. Data and carrier rates may apply. No mobile information will be shared with third parties/affiliates for marketing/promotional purposes. All other categories exclude text messaging originator opt-in data and consent; this information will not be shared with any third parties

Data we Store

  • Active conversations - We store Email and/or SMS as needed to continue operations or provide support with you.
  • Contact Information - We store contact information containging a combination of Name, Email Address, Phone Number, or Address as needed to perform work. We will only use the information provided. We do not scrap or gather information for lead generation.
  • Work Product - We store what is needed to perform the work in scope. This may include Photographs, Computer Aided Design (CAD) documents, Code, Documentation of systems, or other media. Information gathered from the customer stays their intellectual property unless otherwise agreed in writing. Information provided as a work product by Hacking & Coffee, or its derivative businesses, remains as usable IP of Hacking & Coffee LLC unless otherwise agreed to. Photography of Tailly Ho Photography will be owned by the customer upon delivery of final product & payment, and Tailly Ho Photography will request separate permission to use it for promotional purposes.

Who can Access & Where

  • Hacking & Coffee - Members of Hacking & Coffee have access to business data. Currently Hacking & Coffee operates as a single member LLC. Should this change, this policy will be updated accordingly. Hacking & Coffee primarily operates out of the State of Washington
  • Designated Contractors - When a contractor is required for specific needs, they will be introduced nad terms of data will be discussed explicitly prior to sharing.
  • Google Workspace (Email, Calendar) - Most of ur data is moving to End to End encryption, however email, calendar, and certain document systems use Google Workspace. Due to our former European operatoions this operates under Google Ireland. Customers may request a PGP key or alternative communication method to honour their privacy settings.
  • Proton - The Swiss workspace company stores encrypted copies of Data such as Documents, but cannot access data themselves. Our email will eventually transition to Proton, and active customers will receive a communication when that happens.
  • Zoom (Phone) - Zoom manages our business phone and SMS operations at this time. Signal is available as an alternative, as well as other platforms such as Discord or Telegram. Data policies for those methods of communication apply. We will always move a conversation to Signal where possible.
  • Autodesk (CAD) - Autodesk Fusion360 is currently used for Computer Aided Design (CAD) where applicable. This is a cloud synced service, and files generated will fall under the Autodesk Privacy Policy.
  • Github (Code) - Code development projects generally run out of Github. Upon request we can self-host isolated Gitlab servers for specific needs.

Data Removal

  • Data Removal Requests - Hacking & Coffee will honour all data removal requests for customers.Hacking & Coffee will honour all data removal requests for customers. Removal requests can be granular upon customer request, such as removing specific CAD files or similar.
  • Removal Timeline - Hacking & Coffee will remove data within 7 days upon acknowledgement of receiving the request. If this timeline cannot be met, communication will be provided with the adjusted timeline and reason behind it.
  • Personal Information - * Hacking & Coffee will proactively delete any Personal Information not necessary for communication after the completion or termination of associated work. This includes, but is not limited to, Access Codes for facilities, logins for computer systems, biometrics (including body measurements for any custom fabric work). Medical information will be proactively removed unless ongoing work is discussed, in which case only the minimum information required for safe operation will be maintained (such food to avoid bringing to a customer site for allergy purposes).

Data Sharing

  • Outside of the two exceptions defined in the next section, Hacking & Coffee does not share any data without explicitly asking for consent directly.

Exceptions to this Polixy

  • If we receive a lawful request for data - We will fight for privacy rights but may not always have the ability to prevent information seizure by the Authorith Having Jurisdiction (AHJ) in the related matter. Unless a gag order is in effect, we will never provice this information without informing you.
  • If an active, former or prospective customer harrasses, intimidates, or otherwise causes problems resulting in termination of services or harm to us or our customers we reserve the right to keep information to preserve evidence. We reserve the right to share this information for purposes of prosecution or safety of others where applicable.

Outside of the above sole exception, the following terms apply to all other data and personal information.