Legal
Data Processing + Subprocessors
Effective date: 2026-02-19
1) Processing roles
In most customer relationships, the customer is the controller of their data and UseTolr LLC acts as processor for service delivery.
2) What we process
- Uploaded PDF drawings and generated outputs
- Account and workspace metadata
- Audit and operational records required for support and security
3) Security controls summary
- Tenant-aware data isolation patterns
- Role-based access controls
- Immutable audit event design
- Encryption in transit and at rest
- Configurable retention and scheduled cleanup
4) Subprocessor categories
Tolr may use contracted providers for hosting, storage, and database operations. These providers act as subprocessors under data protection terms and only for service delivery.
5) OCR and sharing commitments
Customer files are not sold or shared. The default processing path does not require third-party OCR SaaS. For sensitive programs, private or dedicated processing options are available.
6) ITAR-oriented deployments
Tolr supports deployment patterns designed for controlled environments, including U.S.-controlled and customer-controlled processing paths where required.