TTolr
Product Security Deployment Pricing FAQ Contact
Watch Demo Try Tolr Free

Legal

Data Processing + Subprocessors

Effective date: 2026-02-19

1) Processing roles

In most customer relationships, the customer is the controller of their data and UseTolr LLC acts as processor for service delivery.

2) What we process

  • Uploaded PDF drawings and generated outputs
  • Account and workspace metadata
  • Audit and operational records required for support and security

3) Security controls summary

  • Tenant-aware data isolation patterns
  • Role-based access controls
  • Immutable audit event design
  • Encryption in transit and at rest
  • Configurable retention and scheduled cleanup

4) Subprocessor categories

Tolr may use contracted providers for hosting, storage, and database operations. These providers act as subprocessors under data protection terms and only for service delivery.

5) OCR and sharing commitments

Customer files are not sold or shared. The default processing path does not require third-party OCR SaaS. For sensitive programs, private or dedicated processing options are available.

6) ITAR-oriented deployments

Tolr supports deployment patterns designed for controlled environments, including U.S.-controlled and customer-controlled processing paths where required.

TTolr

Automated print ballooning for quality teams.

Designed for controlled manufacturing workflows. Security and traceability first.

Pages

  • Product
  • Security
  • Deployment
  • Pricing
  • FAQ

Legal + Contact

  • [email protected]
  • Privacy
  • Terms
  • Data Processing
  • Retention

© UseTolr LLC. All rights reserved.