Public routes
Loading marketing content.
We are preparing the public shell, editorial content, and calculator routes for display.
A route-first foundation for marketing, member, and admin sections with Supabase Auth, a row-level-secured database foundation, and a Sanity-powered content layer.
Public routes
We are preparing the public shell, editorial content, and calculator routes for display.
This policy explains what information Northstar collects, how it is used, and the choices available to visitors, members, and admins.
We may collect account details such as email address and profile information, product data you enter into portfolios and journals, file uploads such as trade screenshots or CSV imports, and operational usage information needed to keep the service reliable and secure.
Northstar uses third-party infrastructure to operate, including Supabase for authentication, database, and storage services, and Sanity for CMS content management. Information stored in those systems is processed according to the configuration and permissions set by the application.
The application uses cookies or similar session technologies to keep you signed in, refresh protected sessions, and preserve essential app behavior. We may also use local browser storage where needed to improve UX, such as preserving interface preferences.
We do not sell personal information. We may share limited data with infrastructure providers that process data on our behalf, or when required by law, to enforce terms, or to protect the security of the service and its users.
We retain information for as long as needed to provide the service, maintain audit history, resolve disputes, or meet legal, operational, and security obligations. Retention periods may vary depending on the type of data involved.
You may request updates to profile details, ask about stored data, or request deletion where available and appropriate. Some data may need to be retained for security, compliance, or legitimate business reasons even after a deletion request.
We use authentication, access control, and role-based protections to reduce unauthorized access risk, but no internet-based system can be guaranteed fully secure. You should use strong credentials and protect your own devices and sessions as well.