top of page

Privacy Policy

1. Overview

Wozniak AI Systems ("Company," "we," "us," or "our") is committed to protecting the privacy and security of personal information collected through our AI automation consulting services and website. This Privacy Policy explains how we collect, use, disclose, and protect information when you use our services or visit our website.

Our Business: We provide AI automation consulting and implementation services to manufacturing, industrial, and distribution companies, helping them streamline operations through custom AI solutions and ongoing support.

Our Commitment: We maintain the highest standards of data protection and comply with applicable federal and state privacy laws, including the Texas Identity Theft Enforcement and Protection Act and other relevant regulations.

​

​

2. Information We Collect
​
2.1 Personal Information

We may collect the following types of personal information:

Contact Information:

  • Names, job titles, and business contact details

  • Email addresses and phone numbers

  • Business addresses and company information

Business Information:

  • Company operational data and processes

  • Employee roles and responsibilities (for process mapping)

  • Vendor and customer communication patterns

  • Financial information related to operational efficiency

Website Information:

  • IP addresses and browser information

  • Pages visited and time spent on our website

  • Referral sources and search terms used

​

2.2 Business Data During Services

During our consulting and implementation services, we may access:

  • Internal business processes and workflows

  • Operational performance data and metrics

  • Communication patterns and response times

  • Inventory, purchasing, and vendor information

  • Customer interaction data (for automation implementation)

​

2.3 Technical Information
  • System integration requirements and capabilities

  • Software platforms currently in use

  • IT infrastructure relevant to AI implementation

  • Performance data from implemented AI solutions

​

​

3. How We Collect Information
​
3.1 Direct Collection
  • Initial consultations and discovery meetings

  • On-site assessments and process analysis sessions

  • Service agreements and contracts

  • Quarterly reviews and ongoing support interactions

  • Website forms and contact requests

​

3.2 Automatic Collection
  • Website analytics through Google Analytics and similar tools

  • Cookies and tracking technologies to improve website experience

  • Performance monitoring of implemented AI solutions (with client permission)

​

3.3 Third-Party Sources
  • Business directories for prospective client research

  • Industry databases for market analysis

  • Referral partners and professional networks

​

4. How We Use Information
​
4.1 Service Delivery
  • Process analysis and operational assessment

  • Custom AI solution development and implementation

  • Training and change management support

  • Ongoing optimization and quarterly reviews

  • Technical support and troubleshooting

​

4.2 Business Operations
  • Client communication and relationship management

  • Invoicing and payment processing

  • Service improvement and solution enhancement

  • Legal compliance and record keeping

​

4.3 Marketing and Growth
  • Website optimization and user experience improvement

  • Service marketing to prospective clients in our target industries

  • Case study development (with explicit client permission)

  • Industry research and trend analysis

​

4.4 Legal and Security
  • Compliance with legal obligations and regulations

  • Security monitoring and threat prevention

  • Dispute resolution and legal proceedings if necessary

​

​

5. Information Sharing and Disclosure
​
5.1 We DO NOT Sell Personal Information

We do not sell, rent, or trade personal information to third parties for marketing purposes.

​

5.2 Authorized Sharing

We may share information in the following circumstances:

Service Providers:

  • Technology platforms (n8n, Claude AI) necessary for solution implementation

  • Professional services (legal, accounting, IT support)

  • Cloud hosting providers for secure data storage

Legal Requirements:

  • Legal compliance when required by law or regulation

  • Court orders or government investigations

  • Protection of rights and safety of our business or others

Business Transfers:

  • Merger or acquisition of our business

  • Asset sale or business restructuring (with appropriate protections)

​

5.3 Client Authorization
  • Case studies and testimonials only with explicit written consent

  • Reference sharing with prospective clients (with permission)

  • Industry presentations using anonymized data only

​

​

6. Data Security and Protection
​
6.1 Security Measures

We implement comprehensive security measures to protect personal information:

Technical Safeguards:

  • Encryption of data in transit and at rest

  • Secure cloud storage with enterprise-grade protection

  • Access controls and multi-factor authentication

  • Regular security updates and vulnerability assessments

Administrative Safeguards:

  • Employee training on data protection and confidentiality

  • Access limitations based on business need-to-know

  • Incident response procedures for security breaches

  • Regular security policy reviews and updates

Physical Safeguards:

  • Secure facilities and controlled access to physical records

  • Device security for laptops and mobile equipment

  • Secure disposal of physical documents and electronic media

​

6.2 Data Breach Response

In the event of a data security incident:

  • We will investigate and contain the incident promptly

  • Affected individuals and clients will be notified as required by law

  • Appropriate authorities will be contacted if legally required

  • We will take steps to prevent similar incidents in the future

​

​

7. Data Retention and Disposal
​
7.1 Retention Periods

Client Service Data: Retained for the duration of our service relationship plus 7 years for business records Website Analytics: Retained for 26 months in accordance with Google Analytics settings Marketing Information: Retained until you opt out or request deletion Legal Documents: Retained as required by applicable business record laws

​

7.2 Secure Disposal

When information is no longer needed, we securely delete or destroy it using industry-standard methods to prevent unauthorized access or recovery.

​

8. Your Privacy Rights
​
8.1 Access and Control

You have the right to:

  • Access personal information we hold about you

  • Correct inaccurate or incomplete information

  • Request deletion of your personal information (subject to legal requirements)

  • Opt out of marketing communications

  • Restrict processing in certain circumstances

​

8.2 California Residents (CCPA Rights)

If you are a California resident, you have additional rights under the California Consumer Privacy Act:

  • Right to know what personal information is collected and how it's used

  • Right to delete personal information (subject to exceptions)

  • Right to opt out of sale of personal information (we do not sell personal information)

  • Right to non-discrimination for exercising your privacy rights

​

8.3 Exercising Your Rights

To exercise your privacy rights:

We will respond to your request within 30 days and verify your identity before processing requests.

​

​

9. Cookies and Website Technologies
​
9.1 Types of Cookies

Our website uses the following types of cookies:

Essential Cookies: Required for basic website functionality Analytics Cookies: Help us understand website usage and improve performance Marketing Cookies: Used to provide relevant content and track marketing effectiveness

​

9.2 Cookie Management

You can control cookies through your browser settings. Note that disabling certain cookies may limit website functionality.

​

​

10. International Data Transfers

While we primarily serve clients in Texas and Louisiana, some of our technology providers may process data internationally. We ensure appropriate safeguards are in place for any international data transfers in compliance with applicable laws.

​

​

11. Children's Privacy

Our services are designed for businesses and we do not knowingly collect personal information from individuals under 18 years of age. If we become aware of such collection, we will delete the information promptly.

​

​

12. Changes to This Privacy Policy

We may update this Privacy Policy periodically to reflect changes in our practices or legal requirements. We will:

  • Post the updated policy on our website

  • Indicate the "Last Updated" date

  • Notify clients of material changes via email or through our services

  • Obtain consent for material changes where required by law

​

​

13. State-Specific Privacy Rights
​
13.1 Texas Residents

Under Texas law, you have rights regarding the security of your personal information. We comply with the Texas Identity Theft Enforcement and Protection Act and maintain appropriate security measures.

​

13.2 Other State Laws

We comply with applicable state privacy laws including but not limited to:

  • Virginia Consumer Data Protection Act (VCDPA)

  • Colorado Privacy Act (CPA)

  • Connecticut Data Privacy Act (CTDPA)

  • Other state privacy laws as applicable

​

​

15. Compliance and Certifications

We are committed to maintaining compliance with:

  • Federal privacy laws and regulations

  • Texas state privacy requirements

  • Industry best practices for data protection

  • Client-specific privacy and security requirements

Effective Date: This Privacy Policy is effective as of 9/2/2025 and applies to all information collected on or after this date.

Questions: If you have questions about our privacy practices that are not addressed in this policy, please contact us.

bottom of page