Privacy-first by design

We built Etho because we believe you shouldn't have to compromise user privacy to build great features. Privacy isn't an afterthought—it's our foundation.

Our privacy principles

Events only, never email bodies

We extract structured data objects and discard the raw email content. We never store, read, or retain full email bodies.

Never sold for ads or marketing

Your users' data is never monetized through advertising, data brokerage, or any form of third-party sale. Ever.

User-controlled deletion

Users can disconnect their inbox and request full data deletion at any time. We honor deletion requests within 24 hours.

Encryption at rest and in transit

All data is encrypted using AES-256 at rest and TLS 1.3 in transit. Access is strictly controlled and audited.

How we handle email data

What we DO extract

  • Structured transaction data (merchant, amount, date, items)
  • Travel itineraries (flights, hotels, reservations)
  • Subscription and billing information
  • Event tickets and calendar-relevant data

What we NEVER store

  • Full email body content or HTML
  • Email attachments
  • Personal correspondence or non-transactional emails
  • User credentials or OAuth tokens after processing

Compliance & certifications

SOC 2 Type II

Audited annually for security, availability, and confidentiality controls.

GDPR Compliant

Full compliance with EU data protection regulations including right to erasure.

CCPA Compliant

California Consumer Privacy Act compliance for US users.

For integrators

We provide all the tools you need to maintain user trust and meet your own compliance requirements.

Tenant Dashboard

Full visibility into connected users, data access, and deletion requests.

Data Processing Agreement

Standard DPA available for enterprise customers with custom terms.

Audit Logs

Complete audit trail of all API access and data operations.

Sub-processor List

Transparent list of all sub-processors with update notifications.

Questions about privacy?

We are happy to discuss our privacy practices, provide additional documentation, or complete your security questionnaire.