top of page
Official_Ascent_HI_Logo.png

Privacy Policy

Privacy Policy

Last Updated: April 27, 2026

Your privacy matters to us. This Privacy Policy explains how LightSkai collects, uses, shares, and protects your personal information when you use our meeting intelligence platform.

1. Introduction
Ascent HI ("we," "our," or "us") is committed to protecting your privacy. This Privacy Policy applies to our website, applications, and services (collectively, the "Service").
By using our Service, you agree to the collection and use of information in accordance with this policy. If you do not agree with this policy, please do not use our Service.
2. Information We Collect
2.1 Information You Provide
Data TypeExamplesPurpose
Account InformationName, email address, passwordAccount creation and authentication
Meeting ContentAudio files, transcripts, uploaded documentsProvide transcription and analysis services
Payment InformationCredit card details, billing addressProcess payments (via secure payment processors)
CommunicationsSupport requests, feedbackProvide customer support
2.2 Information Collected Automatically
When you use our Service, we automatically collect:

  • Device Information: Browser type, operating system, device identifiers

  • Usage Data: Features used, time spent, interaction patterns

  • Log Data: IP address, access times, pages viewed, referring URLs

  • Cookies: Session cookies and persistent cookies for authentication and preferences

2.3 Information from Third Parties
We may receive information from third-party services you connect to LightSkai, such as:

  • Calendar integrations (Google Calendar, Microsoft Outlook)

  • Video conferencing platforms (Zoom, Microsoft Teams, Google Meet)

  • Single sign-on providers

3. How We Use Your Information
We use your information to:

  • Provide the Service: Process and analyze your meeting content

  • Improve the Service: Analyze usage patterns to enhance features

  • Communicate: Send service updates, security alerts, and support messages

  • Personalize: Customize your experience based on preferences

  • Secure: Detect and prevent fraud, abuse, and security incidents

  • Comply: Meet legal obligations and enforce our terms

4. AI and Machine Learning
Important: We use AI and machine learning to provide transcription, summarization, and analysis features. Your meeting content may be processed by AI models to deliver these services.
Our AI processing:

  • Occurs on secure, encrypted infrastructure

  • Is used solely to provide requested features

  • Does not use your content to train general AI models without explicit consent

  • May involve third-party AI service providers under strict data protection agreements

5. How We Share Your Information
We do not sell your personal information. We may share your information with:
5.1 Service Providers
Third-party vendors who assist in providing the Service, including:

  • Cloud hosting providers (e.g., AWS, Google Cloud)

  • Payment processors (e.g., Stripe)

  • AI service providers (e.g., OpenAI)

  • Analytics providers

  • Customer support tools

All service providers are bound by data protection agreements.
5.2 Legal Requirements
We may disclose information if required by law or if we believe disclosure is necessary to:

  • Comply with legal processes or government requests

  • Protect our rights, privacy, safety, or property

  • Enforce our Terms of Service

  • Protect against legal liability

5.3 Business Transfers
If LightSkai is involved in a merger, acquisition, or sale of assets, your information may be transferred as part of that transaction.
6. Data Retention
We retain your information for as long as:

  • Your account is active

  • Needed to provide services to you

  • Required by law or for legitimate business purposes

After account deletion, we may retain certain information for up to 90 days for backup and recovery purposes, and longer where required by law.
7. Data Security
We implement industry-standard security measures, including:

  • Encryption: TLS 1.3 for data in transit, AES-256 for data at rest

  • Access Controls: Role-based access, multi-factor authentication

  • Monitoring: 24/7 security monitoring and intrusion detection

  • Audits: Regular security assessments and penetration testing

  • Compliance: SOC 2 Type II certified infrastructure

While we strive to protect your information, no method of transmission over the Internet is 100% secure. We cannot guarantee absolute security.
8. Your Privacy Rights
Depending on your location, you may have the following rights:
Access
Request a copy of your personal data we hold
Correction
Request correction of inaccurate data
Deletion
Request deletion of your personal data
Restriction
Request restriction of data processing
Portability
Receive your data in a portable format
Objection
Object to certain types of processing
To exercise these rights, please contact us at privacy@lightskai.com. We will respond to your request within 30 days.
9. International Data Transfers
Your information may be transferred to and processed in countries other than your own. We ensure appropriate safeguards are in place, including:

  • Standard contractual clauses approved by relevant authorities

  • Data processing agreements with all service providers

  • Compliance with applicable data transfer regulations

10. California Privacy Rights (CCPA)
California residents have additional rights under the CCPA, including:

  • Right to know what personal information is collected

  • Right to know if personal information is sold or disclosed

  • Right to opt-out of the sale of personal information

  • Right to non-discrimination for exercising privacy rights

We do not sell personal information as defined by the CCPA.
11. European Privacy Rights (GDPR)
If you are in the European Economic Area (EEA), you have rights under the GDPR including those listed in Section 8. Our legal bases for processing include:

  • Contract: Processing necessary to provide our Service

  • Consent: Where you have given explicit consent

  • Legitimate Interests: For security, fraud prevention, and service improvement

  • Legal Obligation: Where required by law

12. Cookies and Tracking
We use cookies and similar technologies to:

  • Keep you signed in

  • Remember your preferences

  • Understand how you use our Service

  • Improve our Service

You can control cookies through your browser settings. Disabling cookies may affect Service functionality.
13. Children's Privacy
Our Service is not intended for children under 18 years of age. We do not knowingly collect personal information from children. If you believe we have collected information from a child, please contact us immediately.
14. Third-Party Links
Our Service may contain links to third-party websites. We are not responsible for the privacy practices of these websites. We encourage you to review their privacy policies.
15. Changes to This Policy
We may update this Privacy Policy from time to time. We will notify you of material changes by:

  • Posting the updated policy on our website

  • Sending an email to registered users

  • Displaying a notice in the Service

Your continued use of the Service after changes constitutes acceptance of the updated policy.
16. Data Protection Officer
For privacy-related inquiries, you may contact our Data Protection Officer:

Google API Data Usage & OAuth Compliance (Enhanced Section)

17. Google API Services Data Usage & Compliance

Ascent HI (“AscentHI,” “we,” “our,” or “us”) integrates with Google services to provide optional functionality such as authentication and user-directed file storage. This section describes in detail how we access, use, store, and protect data obtained through Google APIs, and how we comply with Google’s API Services User Data Policy.

17.1 Scope of Google Data Access

When a user chooses to connect their Google account to AscentHI, we may request access to the following categories of data:

A. Basic Profile Information

  • Name

  • Email address

  • Google account identifier

Purpose:

  • Account creation and authentication

  • User identification within the platform

  • Secure session management

B. Google Drive (Limited Access)

AscentHI requests restricted Google Drive access using the following scope:

What this means:

  • We can only access files that the user explicitly creates, uploads, or selects through AscentHI

  • We cannot access, view, or scan a user’s entire Google Drive

Purpose:

  • Enable users to export AI-generated coaching reports, summaries, and documents directly to their Google Drive

  • Allow users to manage files created by AscentHI within their Drive environment

17.2 Explicit User Action Requirement

AscentHI does not automatically access or process Google user data.

All Google data access is:

  • Initiated explicitly by the user

  • Performed only in response to a direct user action, such as:

    • Signing in with Google

    • Selecting a file

    • Exporting a report to Google Drive

At no time does AscentHI:

  • Access user Google data in the background

  • Monitor Google Drive contents

  • Perform automated scanning of user files

17.3 Limited Use Compliance (Google Requirement)

AscentHI complies with Google’s Limited Use requirements, which strictly govern how Google user data may be used.

We affirm the following:

✅ Permitted Use Only

Google user data is used solely to provide or improve user-facing features within AscentHI.

Examples:

  • Authenticating users

  • Saving user-generated reports to Google Drive

  • Enabling file export functionality

❌ No Unauthorized Use

We do NOT:

  • Sell Google user data

  • Use Google data for advertising purposes

  • Use Google data to build user profiles unrelated to the service

  • Share Google data with data brokers

❌ No AI Training Using Google Data

We do NOT use Google user data to train generalized AI or machine learning models.

Specifically:

  • Google Drive files are not used to improve or train AI models

  • Google user data is not included in datasets for model training

  • AI processing is limited strictly to user-requested operations

❌ No Human Review (Except When Required)

We do not allow human access to Google user data except:

  • When required for security or fraud prevention

  • When necessary to comply with applicable law

  • With explicit user consent for support purposes

17.4 Data Minimization Principles

AscentHI follows strict data minimization practices:

  • We request only the minimum scopes necessary

  • We access only data required for the feature being used

  • We retain only data necessary to deliver the service

We intentionally avoid requesting:

  • Full Google Drive access

  • Gmail access

  • Calendar access (unless explicitly enabled in future features)

17.5 Data Storage and Retention

A. Storage of Google Data

  • Authentication data (email, profile info) may be stored securely for account management

  • Google Drive files remain within the user’s Google account, not copied into AscentHI systems unless explicitly required

B. Temporary Processing

If Google data is processed:

  • It is handled in secure, encrypted environments

  • It is not retained longer than necessary

  • It is not used outside the requested function

C. Retention Period

  • Minimal data is retained only as long as needed to provide services

  • Users may request deletion at any time

17.6 Data Sharing Restrictions

AscentHI does not share Google user data except in the following limited cases:

A. Service Providers

We may share limited data with trusted infrastructure providers (e.g., cloud hosting) solely to operate the service.

These providers:

  • Are bound by strict data protection agreements

  • Cannot use data for their own purposes

B. Legal Compliance

We may disclose data if required to:

  • Comply with legal obligations

  • Respond to lawful government requests

  • Protect user safety or platform integrity

C. No Third-Party Monetization

We do not sell, rent, or monetize Google user data.

17.7 User Control and Revocation

Users maintain full control over their Google data.

Users can:

  • Revoke access at any time via their Google Account permissions

  • Disconnect Google integration within AscentHI settings

  • Request deletion of associated data

Once access is revoked:

  • AscentHI immediately loses access to Google data

  • No further data can be retrieved

17.8 Security Measures for Google Data

We apply enterprise-grade security controls to all Google-integrated data:

  • Encryption in transit (TLS 1.3)

  • Encryption at rest (AES-256)

  • Role-based access controls

  • Secure token storage

  • Continuous monitoring and logging

We follow best practices aligned with:

  • SOC 2 standards

  • Cloud security frameworks

  • Zero-trust access principles

17.9 Alignment with Google Policies

AscentHI’s use of information received from Google APIs adheres to:

  • Google API Services User Data Policy

  • Limited Use requirements

  • Applicable privacy and data protection regulations

If there is any conflict between this Privacy Policy and Google’s requirements, Google’s policies take precedence for Google user data.

17.10 Changes to Google Data Usage

If we expand or modify how Google data is used:

  • We will update this policy

  • We will request additional user consent if required

  • We will undergo Google re-verification if necessary


Contact Us
If you have questions about this Privacy Policy or our privacy practices, please contact us:
Email: privacy@ascenthi.com
Data Protection Officer: dpo@ascenthi.com
Website: ascenthi.com
Address: Ascent HI LLC
527 Mills Ave Suite 102A
Greenville, SC 29605
United States

bottom of page