Privacy Policy

Personal data processing principles for the Invix platform

Last updated: 20 March 2026

1. Scope of processing

We process data required to operate the Invix administration platform: user account data (such as email), company data, invoicing data, received document data, document attachments, export metadata, and technical operational logs.

2. Purposes of processing

Data is processed for user authentication, company and role management, invoice creation/editing, received document import and processing, document export (PDF/ZIP), statistics display, and secure service operation.

3. Categories of data

The application may process identification and contact data of suppliers/customers (name, address, company ID, tax/VAT IDs, email, phone), banking data (IBAN, SWIFT), invoice and line-item data, received document data (including attachments), IMAP account settings, and data derived from automated document processing.

4. Data storage and browser-local data

Data is stored in the operator infrastructure (database, document file storage, queues, cache). In the browser, we use localStorage for auth token, selected company, date filter, and UI language. Documents and company media (for example logo/stamp) are available only to authorized users.

5. Automated document processing (AI)

When received documents are processed, document content may be sent to an external AI provider to extract structured data (currently Gemini model via Prism integration). Processing is limited to extracting document fields for the user.

6. Third-party services

Depending on configuration, we use third-party services: Gemini API (AI extraction), Frankfurter API (exchange rates), customer email provider IMAP servers (attachment import), and Slovensko Digital public registry datasets (legal entity enrichment). Realtime notifications are implemented via Laravel Reverb (Pusher-compatible protocol) on operator infrastructure.

7. Legal basis

The legal basis is primarily contract performance, legitimate interest in secure platform operation, and compliance with legal obligations (especially invoicing/accounting obligations).

8. Retention period

Data is retained for the duration of the contractual relationship and subsequently according to statutory obligations or internal retention rules. Technical logs are retained proportionally to security needs.

9. Security

We use token-based authentication, authorization rules based on company membership and role, restricted media access, and standard technical and organizational safeguards. IMAP account passwords are stored encrypted in the database.

10. Data subject rights

You have the right of access, rectification, erasure, restriction, portability, objection, and the right to lodge a complaint with the competent supervisory authority. Requests can be submitted by contacting the service operator.

11. Transfers outside the EEA

If AI functionality or other external services are enabled, data may be transferred outside the EEA under the relevant provider terms. In such cases, appropriate GDPR safeguards apply.

12. Contact

Operator contact details and current data-processing information are provided in contractual or client documentation.