Skip to content Skip to footer
1. Introduction

Ingressive Capital (“we,” “our,” “us”) is committed to protecting the privacy and confidentiality of our clients, partners, and website visitors. This Privacy Policy outlines how we collect, use, disclose, and protect your personal information. By using our services and visiting our website, you agree to the terms of this Privacy Policy.

2. Information we Collect

When you submit a funding application toIngressive Capital, we collect various types of personal and business-related information to help us evaluate your proposal. This information may include, but is not limited to:

  • Contact Information:

    • Full Name: We collect your full name to identify you and personalize our communication.
    • Email Address: We use your email address to correspond with you regarding your application and any related updates.
    • Phone Number: Your phone number allows us to reach out to you for any urgent matters or follow-up questions.
    • Mailing Address: We may require your physical address for official communication, documentation, or legal purposes.
  • Professional Information:

    • Company Name and Details: We collect the name of your company and relevant details to understand your business entity, its structure, and market position.
    • Role/Title: Your role or title within the company helps us gauge your position and responsibilities within the venture.
    • Business Plan and Strategy: We gather information about your business model, strategic plans, target market, and competitive landscape to assess the viability of your venture.
    • Pitch Deck and Presentations: Any materials submitted to support your application, such as pitch decks or executive summaries, are collected for thorough evaluation by our investment team.
  • Financial Information:

    • Financial Statements: We may collect financial statements, including profit and loss statements, balance sheets, and cash flow statements, to evaluate the financial health of your venture.
    • Funding History: Information about previous funding rounds, investors, and the amount of capital raised helps us understand your funding journey and current financial standing.
    • Revenue Projections: We collect your revenue projections and growth forecasts to analyze your potential for scalability and profitability.
  • Business Operations Information:

    • Product or Service Details: Information about your product or service, including features, benefits, and technology stack, is collected to assess its market potential and innovation.
    • Customer and Market Data: We may gather data on your current customer base, market penetration, and user demographics to understand your market position.
    • Team Information: Information about key team members, their backgrounds, and expertise is collected to evaluate the strength and capabilities of your leadership team.
  • Legal and Regulatory Information:

    • Corporate Structure: We collect details about your company’s legal structure, ownership, and any relevant regulatory filings.
    • Intellectual Property: Information on patents, trademarks, or other intellectual property rights that protect your product or service may be collected.
    • Compliance and Certifications: We may require information on industry-specific certifications, compliance with regulatory requirements, or any legal matters involving your company.
  • Additional Information:

    • References and Testimonials: We may collect references or testimonials from previous investors, clients, or partners to corroborate your claims and assess your credibility.
    • Other Supporting Documentation: Any other documents or information you choose to provide as part of your application, which you believe will aid in our evaluation.

This information is essential for us to make informed decisions about potential investments. We ensure that all collected data is handled with the utmost care and confidentiality.

3. How we use your information

We use the information collected from you for the following purposes:

  • Application Review: To assess your funding application and evaluate your business proposal.
  • Communication: To contact you regarding your application, investment opportunities, and related matters.
  • Legal Compliance: To comply with legal obligations and protect our legal rights.
  • Improvement of Services: To analyze and improve our application process and services.
4. Information Sharing and Disclosure

We do not sell or rent your personal information to third parties. However, we may share your information in the following situations:

  • With Our Team: To enable our investment team to review your application.
  • Legal Requirements: If required by law, regulation, or legal process.
  • Business Transfers: In the event of a merger, acquisition, or sale of all or part of our assets, your information may be transferred to the new owner.
5. Data Security

We take appropriate technical and organizational measures to protect your personal information against unauthorized access, loss, or alteration. However, no method of transmission over the internet is entirely secure, and we cannot guarantee absolute security.

6. Your Rights

You have the right to access, correct, or delete your personal information held by us. If you wish to exercise these rights, please contact us at communications@ingressive.vc

7. How Long We Retain Your Data For
When you submit a support ticket or a comment, its metadata is retained until (if) you tell us to remove it. We use this data so that we can recognize you and approve your comments automatically instead of holding them for moderation. If you register on our website, we also store the personal information you provide in your user profile. You can see, edit, or delete your personal information at any time (except changing your username). Website administrators can also see and edit that information.
8. Security Measures
We use the SSL/HTTPS protocol throughout our site. This encrypts our user communications with the servers so that personally identifiable information is not captured/hijacked by third parties without authorization. In case of a data breach, system administrators will immediately take all needed steps to ensure system integrity, will contact affected users and will attempt to reset passwords if needed.
9. Changes to This Policy

We may update this Privacy Policy from time to time. Any changes will be posted on this page with an updated effective date.