← Back
Hi None
Avatar

Privacy Policy

Last updated: May 2026

1. What Data We Collect

Rythm collects the following data to operate the platform:

  • Account details — name, email address, and role.
  • Device and login data — device labels, IP addresses, browser fingerprints, and login timestamps used for security monitoring.
  • Location data — country of access, used to detect unusual login patterns.
  • Task and activity data — sales tasks synchronised from Lemlist, and your interactions with those tasks within Rythm.
  • Push notification tokens — endpoint details required to deliver notifications to your device.
  • Admin audit events — a log of administrative actions taken on or by your account.

2. How We Use Your Data

  • To authenticate you and keep your account secure.
  • To display your Lemlist sales tasks and record your actions on them.
  • To send you push and Ntfy notifications about your tasks.
  • To detect and respond to suspicious login activity.
  • To maintain an audit trail for admin actions.

3. Third-Party Services

Rythm integrates with Lemlist to synchronise your task data, and with Ntfy to deliver push notifications. Your name and contact data may be passed to these services as part of normal operation. Please refer to their respective privacy policies for details of how they handle your data.

4. Data Retention

Account and activity data is retained for as long as your account is active and for a reasonable period afterwards for audit and legal compliance purposes. Push notification logs are pruned automatically after 3 days.

5. Data Access

Your data is accessible only to you and to authorised administrators of the Rythm platform. Admin access to your data is logged in the audit trail. We do not sell or share your data with any third party beyond the integrations described above.

6. Your Rights

You may request access to, correction of, or deletion of your personal data at any time by contacting your admin. Account deletion requests will be processed within a reasonable timeframe subject to any legal retention obligations.

7. Security

Rythm employs device fingerprinting, geographic monitoring, failed-login tracking, and TLS encryption to protect your account. If you believe your account has been compromised, contact your admin immediately.


Questions? Contact your admin or use the feedback form.  ·  Terms of Service