Privacy Notice

Current as of February 2026

When someone shares details about their financial situation with us, they're placing considerable trust in our hands. That responsibility shapes how we think about every piece of identifying or personal detail that enters our systems.

This notice walks through how Blroftex handles, safeguards, and ultimately disposes of the information our clients and visitors provide. We've structured it around the lifecycle of data—from the moment it arrives to the point where it no longer serves a purpose. And yes, tracking technologies like cookies are relevant to this conversation, but they're covered separately in our dedicated cookie policy, which you can find linked from our website footer.

Information We Receive and Why It Arrives

Different interactions generate different types of records. Someone filling out an account registration form obviously provides more detail than a casual visitor browsing our market commentary pages. But both actions leave traces—and we want to be clear about what those traces consist of and why they matter to our operations.

Identity and Communication Details

When setting up an account or reaching out through our contact channels, people typically provide their full name, email address, phone number, and sometimes a mailing address. This isn't data we gather for the sake of having it. Without these specifics, we can't authenticate users, respond to inquiries, or fulfill our regulatory obligations tied to financial research services.

We also capture IP addresses and device characteristics during site visits. This technical layer helps us detect unusual patterns—like multiple failed login attempts from unfamiliar locations—and serves as a foundational security measure.

Financial Context and Investment Preferences

Investment research becomes far more useful when it's tailored. To that end, some users share their portfolio composition, risk tolerance, sector interests, or specific securities they're tracking. This detail enables us to deliver relevant insights rather than generic market overviews. It's entirely optional, but the more context we have, the more precisely we can align our research output with individual goals.

Transaction and Subscription Records

Billing information—credit card details, billing addresses, payment history—arrives when someone subscribes to premium research tiers or purchases specialized reports. We process these transactions through third-party payment gateways, which means the card numbers themselves never touch our internal databases. What we do retain: transaction IDs, subscription status, renewal dates, and purchase history. These records let us manage account access, handle refunds, and keep an audit trail for accounting purposes.

Operational Records

Login timestamps, feature usage patterns, document downloads, search queries within our research library. These logs inform system maintenance, performance optimization, and occasionally help us troubleshoot technical issues users report.

Communication Archives

Email exchanges with our support team, chat transcripts, feedback submissions. Keeping these on file allows us to reference past conversations, track resolution of issues, and identify recurring questions that might warrant clearer documentation.

Public Contributions

If someone posts a comment on our blog or participates in a community forum we host, that content becomes part of our public records. Usernames, timestamps, and the content itself remain visible unless the contributor requests removal or we determine the material violates our guidelines.

How We Work With This Information

Data doesn't just sit idle. It flows through various internal processes—some automated, others requiring human judgment. Here's where those details actually go and what happens to them.

Service Delivery and Account Management

At the most basic level, we use account credentials to verify identity during login. Email addresses become the primary channel for delivering research reports, sending renewal reminders, and notifying users of account activity. Phone numbers might be used if we need to verify a suspicious transaction or respond to an urgent support request.

Investment preferences stored in profiles directly influence the research feeds users see when they log in. Someone focused on renewable energy sectors won't receive the same homepage highlights as someone tracking pharmaceutical stocks. This filtering happens through algorithmic tagging and manual curation by our research team.

Operational Analysis and Improvement

Aggregated usage patterns—which reports get downloaded most frequently, where users spend time within our interface, which search terms yield poor results—guide our product development decisions. We're not tracking individuals here; we're looking at collective behavior to identify friction points and opportunities for enhancement.

Occasionally, we conduct A/B testing on interface elements or research presentation formats. If this involves live user data, participants see variations randomly, and we measure engagement metrics across groups. The goal is to refine usability, not to profile individuals.

Regulatory Compliance and Risk Management

Financial services operate under specific legal frameworks, even when the service in question is research rather than direct investment management. Canadian securities regulations require us to maintain records of who accesses certain types of information, particularly if that information could influence trading decisions. Transaction logs, access timestamps, and subscription histories fulfill these documentation requirements.

Risk management also demands attention to anomalies. If we detect patterns suggesting account compromise—repeated access from geographically implausible locations, sudden changes in subscription behavior—we investigate. This might involve temporarily restricting access or reaching out directly to verify the user's intent.

Communication and Customer Support

Support interactions generate their own data trails. When someone emails us with a technical problem, we store that exchange to ensure continuity if the issue requires multiple back-and-forth messages. This archive also helps train new support staff by providing real examples of how issues were resolved previously.

Marketing communications—newsletters, product updates, educational content—go out based on subscription preferences. We track open rates and click-through behavior at an aggregate level to gauge content effectiveness, but we're not monitoring individual recipients' reading habits in a detailed way.

When Information Moves Beyond Our Systems

We don't operate in isolation. Third-party services handle payment processing, host our infrastructure, and provide specialized tools we've integrated into our platform. Each of these relationships involves some degree of data sharing, and we want to be explicit about when and why that happens.

Service Providers and Operational Partners

Our web hosting provider stores the actual servers where our application runs. Payment processors handle billing transactions. Email delivery services route the newsletters and alerts we send. Customer relationship management software tracks support tickets. In each case, these vendors access only the specific data needed to perform their function. They operate under contractual obligations that prohibit using the information for their own purposes or sharing it with unrelated parties.

  • Cloud infrastructure providers receive IP addresses, session data, and server logs as a natural consequence of hosting our application
  • Payment gateways process billing information but never send full credit card numbers back to us—they return tokenized references instead
  • Email platforms receive recipient addresses and message content when we dispatch communications
  • Analytics tools track aggregated usage patterns to help us understand site performance and user behavior trends

Legal Obligations and Official Requests

If a court order, subpoena, or valid regulatory demand requires us to disclose user information, we comply. This doesn't happen often, but when it does, we provide only the specific records requested and notify the affected individual unless legally prohibited from doing so. We also document these disclosures internally to maintain transparency and accountability.

In situations involving suspected fraud, illegal activity, or imminent harm, we may proactively share relevant details with law enforcement or regulatory bodies. These decisions aren't made lightly—they require internal review and legal consultation.

Business Transitions

Should Blroftex merge with another entity, get acquired, or undergo restructuring, user data would likely transfer as part of that transaction. Subscribers would be notified in advance, and the incoming organization would assume the same privacy commitments we've outlined here. If the new entity plans to handle information differently, users would have the opportunity to close their accounts before the transition takes effect.

We don't sell user lists to marketers, rent contact information to third parties, or bundle personal details with data products. Your specifics stay within our operational ecosystem unless one of the scenarios above applies.

Security Measures and Residual Risks

No system is impervious, but that reality doesn't excuse neglecting reasonable safeguards. We've implemented technical and organizational measures designed to protect information throughout its lifecycle—though it's important to acknowledge what protection can and cannot guarantee.

Technical Safeguards

Data in transit between user devices and our servers travels over encrypted connections using current TLS protocols. Passwords undergo hashing with salted algorithms before storage, meaning we never see plaintext credentials even in our own databases. Access to production systems requires multi-factor authentication, and permissions are segmented so staff members can only reach the data necessary for their specific roles.

Regular backups run automatically, stored in geographically separate locations to guard against localized failures. These backups are encrypted and tested periodically to ensure they'd actually restore functional systems if needed. Software dependencies get updated on a disciplined schedule to address known vulnerabilities before they're exploited.

Organizational Practices

Internal policies limit who handles personal information and under what circumstances. New employees sign confidentiality agreements as part of onboarding. Training sessions cover secure handling procedures, social engineering awareness, and incident response protocols. We conduct internal audits to verify compliance with these standards and identify areas where practices may have drifted.

Despite these precautions, breaches remain a possibility. If one occurs and affects user data, we'll notify impacted individuals directly, explain what was exposed, describe steps we're taking in response, and provide guidance on mitigating potential harm. Regulatory authorities would be informed as required by law.

What Protection Cannot Eliminate

Users bear some responsibility for account security. Choosing weak passwords, reusing credentials across multiple services, falling for phishing attempts—these behaviors undermine even robust technical defenses. We can't prevent someone from inadvertently disclosing their login details to a fraudulent site, nor can we control what happens if a user's personal device gets compromised.

External threats evolve constantly. New attack vectors emerge. Software vulnerabilities get discovered in third-party libraries. Zero-day exploits occasionally bypass established protections. We stay vigilant, but absolute security is a myth, not a deliverable promise.

User Rights and Control Mechanisms

Canadian privacy law—specifically PIPEDA and its provincial counterparts—grants individuals certain rights over their personal information. We've built mechanisms to honor those rights, though exercising them sometimes requires navigating practical limitations.

Access and Portability

You can request a copy of the personal information we hold about you. This includes account details, transaction records, communication archives, and stored preferences. We'll provide this in a structured, commonly used format within a reasonable timeframe—typically 30 days, though complex requests might take longer. There's no charge for the first request in a given year; subsequent requests within twelve months may incur a modest administrative fee to cover processing costs.

Correction and Updating

If details on file are inaccurate or outdated, you can update them directly through account settings or by contacting our support team. Some changes—like altering a name associated with billing records—might require additional verification steps to prevent unauthorized modifications.

Objection and Restriction

You can object to certain uses of your information, particularly around marketing communications or optional data processing activities. Opting out of newsletters is straightforward—every promotional email includes an unsubscribe link. Limiting other uses may be more complicated if they're integral to delivering the service you've subscribed to. For instance, we can't provide personalized research feeds if you prohibit us from storing investment preferences.

If you want to restrict processing while we resolve a dispute over accuracy or lawfulness, we'll flag your account accordingly. This might mean temporarily suspending certain features until the matter is settled.

Deletion and Account Closure

You can request full deletion of your account and associated personal information. We'll process this within 30 days, though some records may persist longer due to legal retention obligations—financial transaction logs, for example, must be kept for a minimum period under Canadian tax and accounting regulations. Once those retention periods expire, the data is purged permanently.

Deletion is irreversible. Closed accounts cannot be reactivated with their original data intact. If you later decide to return as a customer, you'll start fresh.

Withdrawal of Consent

Where processing relies on consent rather than contractual necessity or legal obligation, you can withdraw that consent at any time. Be aware that doing so might limit our ability to continue providing certain services. If personalized research depends on analyzing your stated preferences, withdrawing consent for that analysis means reverting to generic content delivery.

Retention Duration and Disposal

Information doesn't linger indefinitely. Each category of data has a defined lifecycle, though the specific durations vary based on operational needs and legal requirements.

Active Account Data

While your subscription remains active, we retain all associated information necessary to deliver service. This includes identity details, communication records, usage logs, and stored preferences. Once an account is canceled, the clock starts on eventual deletion, though the timeline depends on the data type.

Transactional and Billing Records

Canadian tax law requires businesses to maintain financial records for at least six years. That means payment histories, invoices, and related accounting documents stick around well beyond account closure. After the mandatory retention period expires, these records are securely destroyed—digital files are overwritten using data sanitation tools, and any paper records are shredded.

Support and Communication Archives

Most support tickets and email exchanges are purged three years after the last interaction, assuming no ongoing dispute or legal matter requires their preservation. This window allows us to reference past issues if a user returns with a related problem while avoiding indefinite accumulation of outdated correspondence.

Usage Analytics and System Logs

Technical logs—server access records, error reports, performance metrics—are typically retained for 12 to 24 months. After that point, they no longer serve a practical purpose for troubleshooting or optimization, so they're deleted. Aggregated, anonymized analytics that can't be traced back to individuals may persist longer for historical trend analysis.

If a legal dispute arises, relevant information goes on hold regardless of standard retention schedules. This "litigation hold" remains in effect until the matter is fully resolved. Once lifted, normal deletion timelines resume.

Questions, Concerns, or Rights Requests

Privacy isn't a static policy document—it's an ongoing conversation. If something here is unclear, if you want to exercise one of the rights described above, or if you have concerns about how your information has been handled, reach out. We'll respond substantively, not with form letters.

Mail 267 Winona Rd, Stoney Creek, ON L8E 5L3, Canada

If you're not satisfied with our response—or if you believe we've violated your privacy rights—you can escalate the matter to the Office of the Privacy Commissioner of Canada. Their contact information and complaint procedures are available at priv.gc.ca.