01 Data Collection Scope

Warloom Venture Studio ("The System") collects specific data points required to engineer and launch partner brands. By using our interface, you consent to the collection of:

  • Identity Data: Corporate email, phone number, and entity details provided during intake.
  • Project Data: Technical specifications, CAD files, mood boards, and supply chain requirements.
  • Telemetry Data: IP addresses and interaction logs to ensure infrastructure integrity.

02 Looma AI & LLM Processing

Our proprietary interface, Looma, utilizes Large Language Models (LLMs) to accelerate strategy and communication.

2.1 Input Processing: Data entered into the chat interface is processed by third-party inference providers (OpenAI, Anthropic) via secure API. These providers do not use Warloom Client Data to train their public base models.

2.2 Sensitive Data: We advise against inputting PII or un-patented trade secrets directly into the chat interface unless specifically prompted by a human agent.

03 Network & Supply Chain Sharing

Warloom is an integrated network. To fulfill manufacturing and logistics services, data must be shared with our "Partner Nodes."

3.1 Manufacturing: Tech packs are shared with vetted factories solely for production purposes.

3.2 Logistics: Shipping data is transmitted to 3PLs and freight forwarders (e.g., Flexport, UPS) to facilitate delivery.

3.3 Operational Only: Warloom does not sell, rent, or lease client data to data brokers. Transfers are strictly operational.

04 Cookie & Tracking Protocol

We use essential cookies for session continuity in the Portal and analytical cookies (PostHog, Google) to optimize conversion rates. You may disable these via browser settings, though it may degrade portal performance.

05 Data Retention Architecture

5.1 Active Projects: Data related to active manufacturing is retained indefinitely to facilitate re-orders.

5.2 Inactive Leads: Consultation requests that do not convert are archived for 24 months before being pseudonymized.

06 Security Measures

We employ enterprise-grade protocols to protect your intellectual property:

  • Encryption: TLS 1.3 in transit and AES-256 at rest.
  • Access Control: Data access is restricted to essential Warloom personnel and necessary manufacturing partners on a need-to-know basis.

07 User Rights (GDPR / CCPA)

Warloom extends the Right to Access, Rectification, and Erasure to all partners, provided requests do not conflict with legal or tax record-keeping obligations.