Sayonara

Privacy Policy

Last updated: September 28, 2025

Introduction

At Sayonara, we are committed to protecting your privacy and ensuring the secure handling of your data. This Privacy Policy explains how we collect, use, and safeguard information when you use our secure data wipe software and related services. Given the nature of our software - which permanently destroys data - privacy and security are fundamental to our operations.

Information We Collect

Device Information

  • • Hardware specifications (drive model, capacity, serial numbers)
  • • System configuration details
  • • SMART data and health metrics
  • • Wipe operation logs and completion status

Usage Data

  • • Software version and configuration settings
  • • Wipe method selections and completion times
  • • Error logs and diagnostic information
  • • Performance metrics (for software improvement)

Personal Information (Optional)

  • • Email address (for support and updates)
  • • Organization name (for enterprise licensing)
  • • Contact information (for customer support)

How We Use Your Information

Primary Uses:

  • • Execute secure data wiping operations
  • • Generate wipe completion certificates and reports
  • • Provide technical support and troubleshooting
  • • Improve software performance and compatibility

Secondary Uses:

  • • Send important software updates and security patches
  • • Analyze usage patterns for product development
  • • Comply with legal and regulatory requirements

Data Protection & Wiping

Our Wipe Standards:

  • • DoD 5220.22-M (3-pass overwrite)
  • • NIST 800-88 compliant methods
  • • Gutmann 35-pass method (for maximum security)
  • • Cryptographic erasure for encrypted drives

Verification Process:

  • • Post-wipe verification scans
  • • Digital certificates of destruction
  • • Audit trail generation
  • • Compliance reporting for enterprises

Information Sharing

Limited Sharing Only When:

  • • Required by law or legal process
  • • Necessary for technical support (with your consent)
  • • Part of business transfer (with privacy protections)
  • • Essential for service providers (under strict agreements)

Data Retention

Retention Periods:

  • • Wipe completion logs: 7 years (for compliance)
  • • Device reports: 3 years (for warranty support)
  • • Support communications: 2 years
  • • Usage analytics: 1 year (aggregated data only)

Data Deletion:

Upon request or at the end of retention periods, we securely delete personal information using the same rigorous standards we apply to customer data wiping.

Your Privacy Rights

Access & Control:

  • • Request copies of your data
  • • Update incorrect information
  • • Request data deletion
  • • Withdraw consent

Protection Rights:

  • • Object to data processing
  • • Data portability requests
  • • Lodge privacy complaints
  • • Opt-out of communications

Security Measures

Technical Safeguards:

  • • End-to-end encryption for data transmission
  • • Secure boot and code signing
  • • Regular security audits and penetration testing
  • • Multi-factor authentication for admin access

Operational Security:

  • • Staff background checks and training
  • • Physical security of facilities
  • • Incident response procedures
  • • Regular backup and disaster recovery testing