Privacy Policy

Introduction

Project Greenfly ("we", "our", or "us") respects your privacy. This page explains how we collect, use, and protect information when you visit our website.

Information We Collect

  • Information you provide directly (for example, form submissions).
  • Automatically-collected data such as browser type, device information, and usage analytics (via standard analytics tools).

How We Use Information

We use the data entered into the application to perform aggregated analysis that helps improve the product and provide insights to users. Examples of the kinds of analysis we run include:

  • How long batteries typically last before they are no longer usable.
  • Which battery brands are most commonly used.
  • Which drones, RC planes, or other RC aircraft are most popular among users.

These analyses are performed on aggregated data only. Aggregate reports are summaries derived from multiple users' data and do not include personally identifiable information (PII).

No aggregate report will include personally identifiable data. We remove or anonymize identifiers so that aggregate outputs cannot be traced back to an individual.

What we do NOT share

Your name, the specific batteries you use, or the specific drones / RC aircraft tied to your account will not be shared with anyone for any reason. We do not sell user data.

Put simply: personal details and itemized usage tied to an identifiable person will never be published in public reports or sold to third parties.

Cookies & Tracking

We may use cookies and similar technologies to provide and personalize the site. You can control cookies in your browser settings.

Third-Party Services

We may use third-party services (e.g., analytics or hosting). Those services have their own privacy policies and may collect data independently; we limit the personal data shared with those services to the minimum necessary to provide the service.

Data Security

We take reasonable steps to protect personal information, including access controls and secure hosting.

However, no method of transmission or storage is completely secure.