Legal
Privacy Policy
Pelican-Tech Ltd.
Last updated 2026-05-06
1. Introduction
This Privacy Policy describes how Pelican-Tech Ltd. ('Company', 'we', 'us') processes personal data in connection with the Proc2Proof marketing website at proc2proof.com and the Proc2Proof platform ('Service'). It is provided in English; translations are for convenience and the English text controls in case of conflict.
This Privacy Policy is intended to address applicable privacy and data protection requirements, including the EU General Data Protection Regulation (GDPR) where applicable, and Israeli privacy law, including the Protection of Privacy Law, 5741-1981, as amended, including Amendment 13, to the extent applicable.
References to applicable privacy laws include such laws as amended from time to time.
2. Scope
This policy covers two distinct contexts. Where they differ, the relevant section identifies which one applies.
- -Marketing site - data collected when you browse proc2proof.com
- -The Service - data processed when you use the Proc2Proof platform under a Customer agreement
3. Role of the Company
For the marketing site, we are the data controller for visitor data we collect.
For the Service, we act primarily as a data processor on behalf of our customers ('Customers'); the Customer organization is the data controller of the data they upload.
4. Data we process (marketing site)
For the marketing site:
- -Information you submit through forms (such as name, email, company, job title, phone if provided, and any free-text content)
- -Standard hosting access logs maintained by our cloud and edge providers (such as IP address, user agent, request timestamps, and requested URLs), retained for security, abuse prevention, and operations
- -Theme preference stored in your browser's local storage
5. Data we process (Service)
For the Service:
- -User account information (name, email, role)
- -Authentication and security configuration data, including TOTP shared secrets used by authenticator applications, MFA configuration flags, hashed recovery codes, and Microsoft Entra application client secrets used by tenant-configured connectors. Such secrets are encrypted at rest using AES-256-GCM. Proc2Proof does not store one-time authentication codes themselves, active user session tokens, or user-delegated Microsoft OAuth access or refresh tokens.
- -Usage and activity logs
- -Customer-provided content (procedures, documents, evidence)
- -Technical data (IP, device info, system logs)
7. Free Scan
A Free Scan creates a Free-plan tenant through a one-time invitation flow. The invitation token is consumed after use and cannot be reused. After the tenant is created, it operates like any other Free-plan tenant, subject to applicable Free-plan limits.
When you click 'Request free scan' on the marketing site, you submit a request to be onboarded. Once onboarded, you are redirected to app.proc2proof.com to initiate a Microsoft Entra ID OAuth flow.
Microsoft Graph access used for Free Scan and Entra ID connectors is read-only. Proc2Proof performs GET requests only and does not request Microsoft Graph ReadWrite or Write permissions. Proc2Proof cannot modify, add, or delete objects in the Customer's Microsoft Entra environment.
The required Microsoft Graph permissions may include User.Read.All, Group.Read.All, Device.Read.All, Directory.Read.All, UserAuthenticationMethod.Read.All, and, where sign-in activity checks are required, AuditLog.Read.All.
Because these are application-level tenant-wide permissions, Microsoft requires Global Admin consent. Consent is granted through Microsoft's admin consent flow. Customers may remove this consent at any time in their Azure portal, which stops future Microsoft Graph access by Proc2Proof.
Proc2Proof does not store user-delegated Microsoft OAuth access tokens or refresh tokens. Access to Microsoft Graph is performed using temporary access tokens obtained when needed and discarded after use.
In connection with the Free Scan, the Service may process:
- -Application-level OAuth authorization metadata and tenant identifier required to call Microsoft Graph on the Customer's behalf
- -Identity, group, device, and configuration data returned by Microsoft Graph for the procedure-execution checks included in the scan
- -Raw evidence, check results, findings, cases, scan metadata, security logs, and aggregate results generated by the scan may be processed and retained according to the applicable Free-plan retention period and as further described in the retention and evidence-storage sections below
- -If you create an account, additional data may be retained under the applicable agreement
8. Purpose of processing (marketing site)
For the marketing site:
- -Operate the website
- -Maintain security, diagnose technical issues, and understand basic website usage through standard hosting and security logs, without advertising, analytics, or tracking cookies
- -Enable the free scan flow
- -Respond to contact form submissions
9. Purpose of processing (Service)
For the Service:
- -Provide and operate the Service
- -Maintain security and monitor usage
- -Improve functionality and performance
- -Comply with legal obligations
10. Legal bases
Where GDPR or similar regimes apply, we rely on the following legal bases for processing personal data:
- -Consent - for the free scan OAuth authorization and for optional features such as external AI processing where applicable
- -Performance of a contract - to provide the marketing site, account features, and the Service to you or to the Customer organization that engaged us
- -Legitimate interests - to operate, secure, monitor, and improve the marketing site and the Service, and to respond to inquiries, balanced against your rights and freedoms
- -Legal obligation - to comply with applicable laws, regulations, and lawful requests from authorities
- -For the Service, the Customer organization is the data controller and is responsible for establishing the lawful basis for processing personal data it uploads or directs us to process
11. Deployment models and evidence storage
The Service can be provided in different deployment configurations:
- -Cloud control plane - operated by the Company on Microsoft Azure, currently in the West Europe region
- -Customer-controlled Runner - available on Business and Enterprise plans, runs in the Customer's own infrastructure, such as the Customer's VPC or on-premise environment
- -Dedicated or hybrid environments - additional configurations may be agreed with specific Customers under a written agreement
- -In Free and Pro SaaS deployments, raw evidence collected from connectors is stored in Proc2Proof-managed infrastructure, encrypted at rest using AES-256-GCM and isolated per tenant
- -In customer-managed production deployments using the Customer-controlled Runner, raw evidence values remain in the Customer environment and are stored in the Runner's local database, encrypted at rest. The Proc2Proof control plane receives run metadata, summary results, scores, statuses, and integrity hashes, but does not store raw evidence values. Evidence drill-down is performed through signed proxy requests back to the Customer-controlled Runner
12. AI-assisted processing
Proc2Proof's core services, including procedure-execution checks, connectors, findings, cases, SLA tracking, risk register, reports, audit logs, and alerts, are deterministic and do not require LLM processing.
AI-assisted features, such as automated procedure step extraction, role extraction, chat/Q&A, AI Assist, agents, evidence classification, and suggested remediation, require the Customer's explicit tenant-level consent to AI processing when an external AI provider such as Azure OpenAI is used.
Without such consent, AI-assisted features are disabled, but the core Service remains available.
For Free and Pro plans, AI-assisted features, where enabled, use an external AI provider such as Azure OpenAI.
For Business and Enterprise Customers using a Customer-controlled Runner, AI-assisted processing may be configured to use a locally deployed model, such as Ollama, so that AI processing remains within the Customer environment. Such Customers may also choose to enable Azure OpenAI as an external AI provider.
Customer Data is not used to train shared third-party foundation models without the Customer's consent.
14. Data retention
Retention periods may vary by plan, tenant configuration, deployment architecture, and applicable customer agreement.
For standard plans, automatic retention is generally applied as follows:
- -Free: 30 days
- -Pro: 12 months
- -Business: 36 months
- -Enterprise: as agreed with the Customer, and may be tenant-configurable
- -Automatic retention applies to audit logs, raw evidence, scan-run metadata, related findings, and closed cases, subject to the applicable plan and tenant settings
- -Open cases and open findings may be retained until they are closed in order to preserve the integrity of compliance workflows. Once closed, they become subject to the applicable retention policy
- -Marketing, contact, and free-scan lead records are retained for up to 24 months, unless a longer retention period is required to establish, exercise, or defend legal claims, comply with legal obligations, resolve disputes, prevent abuse, or maintain security audit records
- -Customers may request earlier deletion, retention extension, or other retention adjustments through Proc2Proof support, subject to the applicable customer agreement and DPA
15. Security
We implement reasonable technical and organizational measures to protect data, including encryption in transit, encryption at rest for the cloud control plane, tenant-scoped access controls, and a tamper-evident audit trail.
The full list of security controls is documented at https://www.proc2proof.com/en/trust/. Security responsibilities may vary depending on the deployment model, in particular when the Customer-controlled Runner is used.
16. Data subject rights
For the marketing site, you may request access to, correction of, or deletion of visitor data we hold about you by contacting privacy@proc2proof.com.
For the Service, users should contact their organization (the Customer) regarding access, correction, or deletion requests. We support the Customer in fulfilling such requests where required.
17. International transfers
The Proc2Proof cloud control plane currently runs in the Microsoft Azure West Europe region. Subprocessors such as Cloudflare may operate global edge networks, and email delivery is performed by a provider whose infrastructure may span multiple regions.
Where personal data is transferred outside the European Economic Area, we rely on appropriate safeguards, such as standard contractual clauses, in line with applicable law. Additional regions for the cloud control plane may be offered in the future; until then, customer region selection is not available.
18. Changes
We may update this Privacy Policy from time to time. The 'Last updated' date at the top of this page reflects the most recent revision.
19. Contact
For privacy inquiries: privacy@proc2proof.com.