Privacy Policy

Last updated: 2026-04-07

Silo is operated by Diego Sens. This page explains, at a high level, what data Silo processes, why it is processed, and how to request support or deletion.

Authentication and access requests

The sens.legal portal is gated. To request access to the technical data room, you sign in via Google or GitHub OAuth. When you sign in, Silo receives:

This data is stored in a row in the access_requests table on Silo's Supabase project. Diego reviews each request manually and either approves or leaves it pending.

Data room view tracking

When you visit a page under /inside/* (the data room), Silo logs a row in the dd_views table containing your user ID, email, the page path, your IP address, your user-agent, and a timestamp. This is used to understand how reviewers engage with the data room. It is not shared with third parties.

What data Silo may process

Depending on the feature you use, Silo may process:

Why this data is processed

Silo processes data to:

Sharing and subprocessors

Silo may rely on infrastructure and storage providers to run the service, including hosting, databases, object storage, and observability tooling. Data is shared only to the extent needed to operate the service and fulfill the purposes above.

Security summary

Silo is designed to run with access controls and auditability enabled in production, including:

No internet-facing system is perfectly secure, so please avoid sending secrets or unnecessary personal data unless your use case requires it.

Retention

Retention depends on the kind of data and the deployment context. A separate page describes the operational retention model:

Examples:

Requesting deletion

To delete your access_requests and dd_views rows, write to diego@sens.legal with the subject "Silo data deletion".

Changes

This policy may be updated as Silo's product surface, infrastructure, or compliance posture evolves. The latest version will be published at this URL.