Privacy Policy
Last updated: May 6, 2026
1. Introduction
Embedder ("we", "our", or "us") describes in this Privacy Policy how we collect, use, store, share, and protect your information when you use our AI-powered embedded software development platform and services (collectively, the "Services").
By using our Services you agree to the collection and use of information in accordance with this Privacy Policy. If you do not agree, do not use our Services.
2. Information We Collect
2.1 Account Information
When you create an account or use our Services we collect:
- Name, email address, and authentication credentials
- Profile picture and basic profile information (when provided through OAuth)
- Company or organization information (for team and enterprise accounts)
- Payment information, processed by Stripe; we store a customer reference and the last four digits of the payment instrument, not full card numbers
- Account preferences, settings, and your communications with us
2.2 Uploaded Content
We collect, store, and process all documents, files, code, datasheets, and other content that you upload to our Services, including source code and firmware, hardware datasheets and technical documentation, project files and build configurations, and any other files or data you provide. We process uploaded documents to generate vector embeddings (mathematical representations of your content) that enable our AI features to provide context-specific assistance for your projects.
2.3 API Usage and Telemetry
We collect telemetry about your use of the Services, including API endpoint calls and timing metrics, token usage and model selections, error logs and performance metrics, feature usage patterns, and AI conversation history.
2.4 Automatically Collected Information
- Device information: browser type, operating system, device identifiers
- Network information: IP address and approximate geographic location
- Usage data: pages viewed, navigation paths, click patterns
- Cookies and similar technologies (see Section 10)
- Log data: timestamps, system events, diagnostic information
3. How We Use Your Information
- Service provision: to provide, operate, and maintain the Services
- AI features: to process your uploaded documents, generate embeddings, and enable context-aware AI assistance for your projects
- Service improvement: to analyze telemetry, understand usage patterns, and improve the Services and user experience
- Billing and accounting: to process payments, track usage for billing, and maintain accurate financial records
- Customer support: to respond to inquiries and troubleshoot issues
- Communications: to send service updates, security alerts, technical notices, and support messages
- Security: to detect, prevent, and address technical issues, security threats, fraud, or abuse
- Legal compliance: to comply with applicable laws and lawful requests
We do not sell personal information, and we do not authorize our sub-processors to use your content to train their models.
4. AI Processing and Model Providers
Our Services use third-party AI models from Anthropic (Claude), OpenAI (GPT), and Cohere (embeddings). When you use AI features, your prompts, code, uploaded documents, and intermediate embeddings may be transmitted to these providers in order to generate responses or embedding vectors. We configure our AI provider integrations to disable provider-side training where the provider supports such a setting, and our agreements prohibit providers from using customer content to train their general-purpose models. Each provider has its own privacy policy; we recommend reviewing them.
Sensitive content: do not upload highly sensitive, regulated, or third-party-confidential information unless you have evaluated the risks and have an enterprise agreement with us that addresses such use.
5. Sub-processors
We engage the following third parties to deliver the Services. They access your information only to perform tasks on our behalf under written agreements that restrict use to those tasks.
5.1 Hosting and infrastructure
- Google Cloud Platform (GCP): primary hosting, Cloud SQL (PostgreSQL), Cloud Storage, Memorystore (Redis), Secret Manager. All production workloads run in
us-central1. - Cloudflare: edge network, DNS, CDN, WAF, Zero Trust Access, Cloudflare Tunnel.
5.2 AI inference and embeddings
- Anthropic: Claude AI inference.
- OpenAI: GPT AI inference.
- Cohere: embedding generation for retrieval-augmented features.
- Weaviate: managed vector database that stores embeddings of your uploaded content.
5.3 Billing and product operations
- Stripe: payment processing and subscription management.
- Loops: lifecycle and product email.
- Resend: transactional email (account verification, password reset, alerts).
- PostHog: product analytics; honors Global Privacy Control where applicable.
- Sentry: error and performance monitoring. Embedder operates a self-hosted Sentry instance on its own infrastructure; error events including stack traces and contextual metadata are sent to it.
5.4 Internal operations
The following providers support internal operations and do not, in normal use, receive customer content: Google Workspace (corporate email and documents), Drata (compliance automation; receives metadata about systems and personnel only), and Kandji (workforce-device management; does not process customer data).
We will update this list when we add or remove a sub-processor. Customers under signed agreements receive advance notice of material sub-processor changes per the terms of their agreement.
6. Data Sharing and Disclosure
We do not sell your personal information or uploaded content to third parties. We may share your information only:
- With the sub-processors listed in Section 5, under contractual confidentiality and use restrictions.
- When required by law, court order, subpoena, or other legal process, or to establish, exercise, or defend legal claims.
- To investigate, prevent, or take action regarding suspected fraud, abuse, or violations of our Terms of Service.
- In connection with a merger, financing, acquisition, or sale of assets; we will notify you of any such transfer that affects your information.
- With your explicit consent for a specific purpose.
- As aggregated or de-identified data that cannot reasonably be used to identify you.
7. Data Security
We implement organizational and technical measures appropriate to the risk:
- Encryption of data in transit using TLS, and encryption at rest using provider-managed keys at GCP.
- Authentication and least-privilege access controls for personnel; production access is brokered through single sign-on with multi-factor authentication.
- Logging of administrative actions and access to production systems, with retention controls described in Section 8.
- Vulnerability management and dependency-scanning processes that target remediation timelines based on severity.
No system is perfectly secure. If you believe your account or data has been compromised, contact us at [email protected].
8. Data Retention
We retain information for as long as we need it to provide the Services and to meet legal obligations.
- Account and uploaded content: retained while your account is active. When you delete your account, we mark the account as deleted and rotate identifying fields (such as email) so the account is no longer reachable through normal product flows. We do not currently run a separate hard-purge job that physically erases account rows from our primary database; uploaded content is removed on a best-effort basis at deletion time and through subsequent backup-rotation cycles. We are working to add an automated end-to-end purge across our database and sub-processors. Until that is in place, you can request a manual purge at any time using the contact in Section 14 and we will complete it within 45 days.
- Database backups: we keep up to 30 most-recent automated backups of our primary database and 7 days of point-in-time recovery transaction logs. Backups roll forward and old backups age out automatically.
- Application and telemetry logs: retained for approximately 14 days in our default log store. Specific operational logs may be retained for shorter or longer periods as configured.
- Audit logs: retained for 730 days under bucket-locked, write-once storage to support security investigations and compliance.
- Billing records: retained for 7 years to comply with tax and accounting regulations.
- Legal holds: data may be retained longer where required for legal, regulatory, or legitimate business purposes.
9. Your Rights and Choices
Depending on your location, you may have the following rights:
- Access: request a copy of the personal information we hold about you.
- Correction: request correction of inaccurate or incomplete personal information.
- Deletion: request deletion of your personal information, subject to legal exceptions.
- Portability: request a copy of your data in a structured, commonly used, machine-readable format.
- Objection: object to certain processing of your personal information, including for marketing purposes.
- Restriction: request that we restrict processing in certain circumstances.
- Withdraw consent: where processing is based on consent, withdraw it at any time.
To exercise any of these rights, email us at [email protected]. We will acknowledge your request within 10 business days and respond substantively within 45 calendar days; we may need to verify your identity first.
California residents:the California Consumer Privacy Act (CCPA) provides additional rights, including the right to know what personal information we have collected and the right to opt out of any "sale" or "sharing" of personal information. We do not sell personal information.
Global Privacy Control: we honor Global Privacy Control (GPC) signals from your browser as a valid opt-out under applicable laws.
EU/UK residents: under the GDPR and UK GDPR, you have the right to lodge a complaint with your local supervisory authority if you believe our processing of your personal data violates applicable law.
10. Cookies and Tracking
We use cookies and similar technologies to maintain your login session, remember your preferences, analyze usage, and detect abuse. You can control cookies through your browser settings; disabling some cookies may impair functionality. Where required by law, we ask for your consent before setting non-essential cookies.
11. International Data Transfers
Embedder is a US-based company and our production systems are hosted in the United States (GCP, region us-central1). If you access the Services from outside the United States, your information will be transferred to and processed in the United States. For transfers from the European Economic Area, the United Kingdom, and Switzerland, we rely on the European Commission's Standard Contractual Clauses (and the UK Addendum where applicable) with our sub-processors, supplemented by additional safeguards as required.
12. Children's Privacy
Our Services are not intended for children. We do not knowingly process personal data of children under 16 in the European Economic Area, or under 13 in the United States. If we learn that we have collected such information, we will delete it.
13. Changes to This Privacy Policy
We may update this Privacy Policy from time to time. We will indicate the date of the latest revision at the top of this page and, for material changes, will provide additional notice (such as an in-product notice or email).
14. Contact
Privacy and data-subject requests: [email protected].
Security reports: [email protected].
The role responsible for our privacy program is the Embedder Security Officer, who acts as our Data Protection Officer.