Skip to main content
F2 Core
Platform
Platform
  • Operating Record
  • How It Works
  • Integrations
  • Security & Implementation
Solutions
Solutions
  • Facility Operations
  • Environmental Operations
  • Energy & Connected HardwareIncludes AFMS, Compressor, Dryer Logic, Pelican HVAC, EO3, Catalog.
  • SpendGuard
Partners
Partners
  • Find a Partner
  • Become a Partner
  • Environmental Partners
  • Energy / Hardware Installers
Resources
Resources
  • Guides
  • FAQ
  • Case Studies
  • Resource Library
  • Blog
Pricing
Log inTalk to Sales
Home›Legal›Privacy Policy

Privacy Policy

Last updated: April 28, 2026

This Privacy Policy explains how F2 Core collects, uses, discloses, stores, and protects personal information when you visit or use f2core.com, our forms, calculators, partner directory, portals, mobile or field workflows, connected-hardware workflows, and related business services.

For purposes of this Policy, "F2 Core," "we," "us," and "our" means FLEX2 LLC., with principal contact information listed in the Contact Us section below.

F2 Core is a business-to-business platform for dealership operations, facility operations, environmental workflows, SPCC documentation support, partner routing, vendor workflows, connected hardware workflows, AFMS, and audit-ready evidence management. Our services are not intended for personal, household, or children’s use.

Contents
  1. Scope of this Policy
  2. Our Role: Controller, Processor, Service Provider, or Partner Intermediary
  3. Personal Information We Collect
  4. Sources of Personal Information
  5. How We Use Personal Information
  6. Legal Bases for Processing in the EEA, UK, and Similar Regions
  7. Cookies, Analytics, and Similar Technologies
  8. How We Disclose Personal Information
  9. Sales, Sharing, Targeted Advertising, and Profiling
  10. Notice at Collection for California and Similar U.S. State Laws
  11. Privacy Rights and Choices
  12. Regional Privacy Disclosures
  13. International Transfers
  14. Retention
  15. Security
  16. Customer Data, Tenant Data, and Organization-Controlled Records
  17. Partner Directory and Routed Requests
  18. Connected Hardware, Sensors, and Field Apps
  19. Automated Workflows, Analytics, and AI-Assisted Features
  20. Marketing Communications
  21. Do Not Track and Global Privacy Control
  22. Children’s Privacy
  23. Third-Party Links and Services
  24. Changes to this Policy
  25. Contact Us

1. Scope of this Policy

This Policy applies to personal information we process through:

  • public websites, including pages for platform, compliance, AFMS, hardware, resources, pricing, partner directory, and contact;
  • forms such as Request Concierge, Request Demo, Talk to Sales, Request Quote, partner applications, downloads, checklist requests, and support requests;
  • free tools and calculators, including SPCC screening and containment calculators;
  • authenticated portals, customer dashboards, partner portals, field apps, and role-based workflows;
  • partner, vendor, dealer, installer, compliance, waste/pickup, and hardware routing workflows;
  • connected hardware and operational telemetry workflows where personal information is included or associated with a user, site, device, asset, partner, or work record;
  • support, training, implementation, billing, security, and administrative communications.

This Policy does not replace any separate written customer agreement, data processing agreement, partner agreement, order form, or service terms. Where a separate agreement applies, that agreement controls to the extent it conflicts with this Policy.

2. Our Role: Controller, Processor, Service Provider, or Partner Intermediary

Depending on the context, F2 Core may act in different privacy roles.

For website visitors, demo requests, marketing contacts, partner applications, directory submissions, and direct business inquiries, F2 Core generally acts as an independent controller or business that determines how personal information is used.

For customer platform data submitted by an organization through an authenticated account, F2 Core may act as a processor, service provider, contractor, or data intermediary processing information on behalf of that customer and under that customer’s instructions.

For partner-routed requests, F2 Core may act as a routing intermediary. The partner, dealer, installer, waste vendor, compliance provider, or service provider that receives the request may separately act as an independent controller or business for its own follow-up, quoting, scheduling, service delivery, billing, and compliance obligations.

3. Personal Information We Collect

We collect personal information directly from you, from your organization, from authorized users, from partners or vendors, from connected systems, and from automated website or platform technologies.

A. Contact and business identity information

We may collect your name, business email, phone number, job title, company, dealership group, department, role, work location, mailing address, region, and preferred contact method.

B. Account and access information

We may collect login identifiers, account credentials or authentication tokens, role assignments, organization membership, site access, permission settings, SSO or identity-provider details, access logs, and security events.

C. Website, form, and marketing information

We may collect form submissions, demo requests, quote requests, partner applications, download requests, calculator submissions, newsletter or marketing preferences, UTM/source data, campaign attribution, page views, referral URLs, search terms, click activity, device identifiers, browser type, IP address, approximate location, cookie identifiers, and analytics events.

D. Site, facility, asset, and workflow information

We may collect information about dealership sites, facilities, assets, tanks, equipment, connected devices, vendors, service categories, work orders, tickets, RFQs, schedules, inspections, labels, QR codes, manifests, documents, photos, notes, approvals, invoices, credits, closeout records, audit packets, and related operational history.

Some of this information may relate to individuals if it includes names, contact details, signatures, photos, role assignments, user actions, timestamps, device usage, or location-related workflow records.

E. Compliance and environmental workflow information

We may collect information submitted through SPCC, containment, labeling, inspection, audit-readiness, incident, spill-reporting, waste pickup, used-oil, and environmental documentation workflows. This may include state, facility location, tank/container details, fluid types, capacities, spill history responses, inspection notes, label records, partner review status, and evidence exports.

F. Connected hardware, telemetry, and field workflow information

Where enabled, we may process device heartbeat, tank level, sensor readings, runtime, cycle counts, pressure, dew point, current sensing, alarms, thresholds, transfer events, stop events, pickup events, photos, signatures, route context, mobile app activity, offline store-and-forward events, timestamps, and related diagnostic information.

G. Partner, vendor, dealer, and directory information

We may collect partner profile details, service coverage, capabilities, certifications, service categories, contact endpoints, territories, response SLAs, application details, qualification information, performance metrics, quote responses, scheduling records, documents, invoices, and closeout information.

H. Payment, commercial, and billing information

If paid services, hardware orders, subscriptions, or partner services are enabled, we may collect billing contacts, invoice information, payment status, purchase history, commercial terms, subscription details, order details, and related financial workflow records. Payment card or bank information, if collected, should be handled by a payment processor and not stored by F2 Core unless expressly disclosed.

I. Support and communications information

We may collect messages, emails, chat records, helpdesk tickets, call notes, meeting notes, implementation notes, training records, troubleshooting information, attachments, and feedback.

J. Sensitive personal information

F2 Core is designed for business and operational workflows, not for collecting sensitive personal information. However, some information may be considered sensitive under certain laws, such as account credentials, precise location if enabled in field apps, contents of communications submitted to us, incident-related records, photos, or signatures.

We do not use sensitive personal information to infer characteristics about individuals. We use it only as needed to provide the service, maintain security, comply with law, complete requested workflows, or as otherwise permitted by applicable law.

4. Sources of Personal Information

We may collect personal information from:

  • you directly;
  • your employer or organization;
  • authorized account administrators;
  • dealerships, dealer groups, partners, vendors, installers, waste/pickup providers, compliance providers, and service providers;
  • connected devices, sensors, field apps, and platform integrations;
  • identity providers, SSO providers, CRM tools, support tools, analytics providers, hosting providers, and security tools;
  • public business sources, partner websites, or professional directories;
  • systems integrated at your organization’s direction, such as maintenance, ERP, accounting, partner, or vendor systems.

5. How We Use Personal Information

We use personal information for the following purposes.

A. Provide and operate the services

To provide websites, calculators, portals, dashboards, partner directory features, FacilityOps Concierge, SPCC workflows, AFMS workflows, hardware workflows, work routing, partner routing, field apps, evidence records, exports, support, account administration, and customer-requested services.

B. Respond to inquiries and route requests

To respond to demo requests, quote requests, contact forms, partner applications, concierge intake, support requests, download requests, checklist requests, and related communications.

Where a request involves a partner, dealer, installer, compliance provider, waste/pickup provider, or vendor, we may route relevant details to that party so they can respond, quote, schedule, deliver, or support the requested service.

C. Manage accounts, roles, and access

To authenticate users, assign permissions, support SSO, enforce role-based access, maintain organization and site access, manage customer or partner accounts, and protect against unauthorized use.

D. Operate workflows and maintain records

To create, route, assign, schedule, approve, document, close out, audit, export, and report on tickets, work orders, RFQs, inspections, pickups, labels, QR codes, documents, invoices, credits, incidents, and asset records.

E. Support compliance-readiness and documentation workflows

To support SPCC inventory, containment calculations, state-aware workflow guidance, labeling records, inspection schedules, audit packets, document retention, and environmental workflow organization.

F2 Core provides workflow, documentation, visibility, and audit-readiness support. It does not provide legal, engineering, environmental, tax, or professional advice.

F. Improve, secure, and monitor the services

To analyze usage, improve features, debug errors, maintain performance, prevent fraud or abuse, detect security incidents, enforce terms, protect systems, monitor uptime, test functionality, and develop new services.

G. Marketing and business development

To send business communications, newsletters, product updates, event information, partner program information, demo follow-ups, and other marketing communications, where permitted by law. You may opt out of marketing emails at any time.

H. Analytics and attribution

To understand website traffic, page performance, resource downloads, form activity, funnel conversion, partner directory searches, and product interest.

I. Legal, contractual, and administrative purposes

To comply with laws, enforce agreements, manage billing, resolve disputes, respond to lawful requests, maintain audit records, protect rights and safety, and support mergers, acquisitions, financing, reorganization, or similar business transactions.

6. Legal Bases for Processing in the EEA, UK, and Similar Regions

Where applicable law requires a legal basis for processing, we rely on one or more of the following:

  • Contract: to provide services, accounts, portals, support, subscriptions, orders, and requested business workflows.
  • Legitimate interests: to operate, secure, improve, market, and administer our B2B services; route requests; prevent fraud; understand product interest; and support business communications.
  • Consent: for certain cookies, marketing communications, optional location features, or other processing where consent is required.
  • Legal obligations: to comply with tax, accounting, audit, security, regulatory, or lawful request obligations.
  • Vital interests or public interest: only where applicable and necessary, such as safety or emergency-related circumstances.

You may withdraw consent where processing is based on consent. Withdrawal does not affect processing that occurred before withdrawal or processing that continues under another lawful basis.

7. Cookies, Analytics, and Similar Technologies

We may use cookies, pixels, tags, SDKs, local storage, and similar technologies to:

  • operate the website and portals;
  • keep users logged in;
  • remember preferences;
  • secure accounts and prevent abuse;
  • measure page performance and product interest;
  • understand form activity and conversion paths;
  • support analytics, attribution, and marketing where permitted.

Cookie categories may include:

  • Strictly necessary cookies for security, authentication, routing, form protection, and core functionality.
  • Functional cookies for preferences and usability.
  • Analytics cookies for traffic, performance, diagnostics, and product interest.
  • Marketing or advertising cookies, if enabled, for attribution, retargeting, campaign measurement, or cross-context behavioral advertising.

Where required, we will request consent before using non-essential cookies. You can manage cookies through browser settings and any cookie preference tool we provide.

We honor applicable opt-out signals where required by law, including Global Privacy Control where it is legally required and technically recognized.

8. How We Disclose Personal Information

We may disclose personal information to the following categories of recipients.

A. Service providers and subprocessors

Hosting, cloud infrastructure, database, storage, security, monitoring, analytics, email, CRM, support, identity, SSO, payment, communications, workflow, document, form, mapping, search, and professional service providers.

B. Customers and account administrators

If you use the services through an organization, your organization and its administrators may access information associated with your account, role, activity, records, permissions, workflows, and submitted content.

C. Partners, dealers, installers, vendors, and service providers

We may share request details, site information, contact information, asset context, urgency, service category, documents, quote details, schedule details, closeout records, and related workflow information with partners or vendors involved in the requested service.

D. Integrated systems

At a customer’s direction, we may share information with ERP, maintenance, accounting, identity, partner, vendor, CRM, compliance, hardware, or other integrated systems.

E. Professional advisors and legal recipients

We may share information with lawyers, auditors, insurers, accountants, consultants, regulators, courts, law enforcement, or other parties when necessary for legal, compliance, security, or dispute-resolution purposes.

F. Business transaction parties

We may disclose information in connection with a merger, acquisition, financing, sale, restructuring, bankruptcy, or transfer of all or part of our business.

G. Public or directory-facing information

Partner directory profiles, business listings, capability badges, service coverage, certifications, and public business contact details may be displayed publicly where submitted or approved for publication.

9. Sales, Sharing, Targeted Advertising, and Profiling

We do not sell personal information for money.

Some analytics, advertising, attribution, or marketing technologies may be considered "sharing," "targeted advertising," or "cross-context behavioral advertising" under certain U.S. state privacy laws. Where applicable, you may opt out through our cookie preference tool, a "Do Not Sell or Share My Personal Information" or similar link, or by sending a request using the Contact Us section below.

We do not use personal information to make solely automated decisions that produce legal or similarly significant effects concerning individuals without appropriate human review.

10. Notice at Collection for California and Similar U.S. State Laws

The table below summarizes categories of personal information we may collect, the purposes for collection, and categories of recipients.

CategoryExamplesPurposesCategories of recipients
IdentifiersName, email, phone, company, account ID, IP addressRespond to requests, create accounts, provide services, security, support, marketingService providers, customers, partners, vendors, integrated systems
Commercial and business informationOrders, subscriptions, services requested, quote requests, partner applications, billing contactsProvide services, route requests, billing, support, analyticsService providers, partners, customers, professional advisors
Internet or electronic network activityPage views, cookie IDs, device/browser data, referrer, analytics eventsSecurity, analytics, troubleshooting, attribution, product improvementAnalytics, hosting, security, and marketing providers
Professional or employment-related informationRole, title, department, organization, permissionsAccount management, workflow routing, authorization, supportCustomers, service providers, partners where relevant
Geolocation informationApproximate website location; precise field-app or workflow location if enabledDirectory search, partner routing, field workflow support, fraud preventionService providers, customers, partners involved in workflow
Audio, visual, or similar informationPhotos, signatures, uploaded documents, field evidenceService delivery, closeout proof, audit-ready records, supportCustomers, partners, service providers
Sensitive personal informationAccount credentials, precise location if enabled, contents of submitted communications, signatures, incident detailsSecurity, authentication, requested services, legal compliance, workflow completionService providers, customers, partners as needed
InferencesProduct interest, workflow status, partner match, lead routing signalsImprove routing, personalize business follow-up, analyticsService providers, customers, partners as needed
Customer records and operational dataSites, assets, tanks, devices, inspections, labels, QR records, tickets, RFQs, invoices, manifestsProvide platform, compliance, partner, vendor, and hardware workflowsCustomers, service providers, partners, integrated systems

We retain each category for the period described in the Retention section below.

11. Privacy Rights and Choices

Depending on where you live and how we process your information, you may have rights to:

  • access or know what personal information we process;
  • receive a copy of personal information;
  • correct inaccurate information;
  • delete information;
  • restrict or object to processing;
  • withdraw consent;
  • opt out of marketing communications;
  • opt out of sale, sharing, targeted advertising, or certain profiling;
  • limit use of sensitive personal information;
  • request portability;
  • appeal a denied request where required by law;
  • lodge a complaint with a privacy regulator.

We will not discriminate against you for exercising privacy rights.

To make a request, contact us using the Contact Us section below. We may need to verify your identity and authority before responding. If you submit a request involving information controlled by your employer, customer organization, or another business, we may direct the request to that organization or respond as required by our contract and applicable law.

Authorized agents may submit requests where permitted by law. We may require proof of authorization.

12. Regional Privacy Disclosures

EEA, UK, and Switzerland

Individuals in the EEA, UK, and Switzerland may have rights under applicable data protection laws, including rights of access, rectification, erasure, restriction, portability, objection, withdrawal of consent, and complaint to a supervisory authority.

If we transfer personal information outside the EEA, UK, or Switzerland, we use appropriate safeguards where required, such as standard contractual clauses, UK addenda, adequacy mechanisms, data processing agreements, or other lawful transfer mechanisms.

California and other U.S. states

Residents of California and other U.S. states may have rights to know, access, correct, delete, opt out of sale or sharing, opt out of targeted advertising, limit certain sensitive personal information uses, and appeal certain decisions.

We do not knowingly sell personal information for money. If our use of analytics or advertising technologies is considered sharing or targeted advertising, we provide applicable opt-out mechanisms.

Canada

Canadian residents may request access to and correction of personal information, ask questions about our privacy practices, or submit complaints. We use contractual and organizational safeguards when personal information is processed by service providers.

Brazil

Brazilian residents may have rights under the LGPD, including confirmation of processing, access, correction, anonymization, blocking, deletion, portability, information about sharing, withdrawal of consent, and review of certain decisions.

Australia and New Zealand

Residents of Australia and New Zealand may request access to or correction of personal information and may submit privacy complaints. We aim to maintain a clearly expressed, up-to-date privacy policy and reasonable safeguards for personal information.

India

Where India’s Digital Personal Data Protection Act applies, individuals may have rights to notice, access information, correction, erasure, grievance redressal, withdrawal of consent, and nomination rights, subject to applicable rules and exceptions.

Singapore and other regions

Where other privacy laws apply, we will honor applicable rights and requests as required by law.

13. International Transfers

F2 Core may process personal information in the United States and other countries where we, our service providers, partners, customers, or vendors operate. These countries may have privacy laws that differ from the laws where you live.

Where required, we use legal transfer mechanisms and safeguards such as data processing agreements, contractual commitments, standard contractual clauses, security controls, access controls, and vendor due diligence.

14. Retention

We retain personal information only as long as reasonably necessary for the purposes described in this Policy, unless a longer period is required or permitted by law, contract, audit, tax, accounting, security, dispute-resolution, or compliance obligations.

Retention periods vary by context. We use the following criteria:

Information typeTypical retention approach
Website analytics and cookiesBased on cookie type, consent settings, browser settings, and analytics configuration
Marketing and lead recordsUntil no longer needed for business follow-up, unless you opt out or request deletion where applicable
Demo, quote, and contact requestsAs long as needed for sales, support, partner routing, audit, and business records
Partner directory and application recordsAs long as the partner relationship, review, publication, or application process remains active, plus a reasonable records period
Account and platform recordsFor the account term and a reasonable period afterward, subject to customer agreement and legal obligations
Operational workflow recordsAs needed for service delivery, audit-ready history, customer reporting, legal obligations, and customer agreements
Compliance, environmental, SPCC, inspection, label, incident, and evidence recordsAs needed for customer-directed compliance-readiness, audit, legal, and documentation purposes
Security logsAs needed for security, fraud prevention, incident investigation, and platform integrity
Billing and tax recordsAs required for accounting, tax, audit, and legal purposes

When information is no longer needed, we delete, de-identify, aggregate, or retain it only as legally permitted.

15. Security

We use administrative, technical, and organizational safeguards designed to protect personal information from unauthorized access, disclosure, alteration, misuse, or loss.

Safeguards may include encryption, access controls, role-based permissions, least-privilege access, audit logging, secure development practices, monitoring, backups, vendor review, incident response procedures, and contractual protections.

No system is completely secure. You are responsible for using strong passwords, protecting credentials, configuring user access appropriately, and notifying us promptly of suspected unauthorized access.

16. Customer Data, Tenant Data, and Organization-Controlled Records

Where personal information is submitted to F2 Core by or on behalf of a customer organization, that organization may control the relevant record. This may include user accounts, site records, asset records, partner workflows, compliance records, field evidence, documents, tickets, work orders, RFQs, invoices, and audit exports.

If you are an end user of a customer organization and want to exercise rights regarding organization-controlled records, contact your organization first. We will support customer organizations as required by our agreements and applicable law.

17. Partner Directory and Routed Requests

If you use the partner directory, request a quote, submit a partner application, request dealer/installer contact, request compliance services, or request waste/pickup coverage, we may share relevant information with eligible partners or vendors.

Information shared may include your contact details, company, location, site count, service need, requested product or service, preferred timeline, notes, and related workflow context.

Partners and vendors may use that information to respond, quote, schedule, provide services, maintain their own records, or comply with their own legal obligations. Their use of information may be governed by their own privacy notices and agreements.

18. Connected Hardware, Sensors, and Field Apps

If connected hardware, AFMS, monitoring kits, controls, field apps, or related workflows are enabled, we may process operational telemetry and field records. This may include device readings, alerts, thresholds, user actions, QR scans, before/after photos, signatures, route context, offline app events, timestamps, and closeout details.

We use this information to operate hardware-related workflows, route service, support safety workflows, document closeout, troubleshoot devices, improve reliability, and maintain asset history.

19. Automated Workflows, Analytics, and AI-Assisted Features

F2 Core may use rules, workflow automation, analytics, anomaly detection, ranking, recommendations, and AI-assisted tools to support operational workflows. Examples may include partner matching, request routing, exception detection, document organization, ticket prioritization, summary generation, and dashboard insights.

These tools are intended to support human decision-making and operational follow-through. We do not use them to make solely automated decisions about individuals that produce legal or similarly significant effects without appropriate human review.

20. Marketing Communications

You may opt out of marketing emails by using the unsubscribe link in the email or by contacting us. Even if you opt out of marketing, we may still send transactional, security, account, service, legal, or administrative communications.

21. Do Not Track and Global Privacy Control

Some browsers offer "Do Not Track" signals. There is not a uniform industry standard for responding to those signals.

Where legally required, we honor recognized opt-out preference signals such as Global Privacy Control for applicable sale, sharing, or targeted advertising opt-outs.

22. Children’s Privacy

F2 Core is intended for business users and is not directed to children. We do not knowingly collect personal information from children. If you believe a child has provided personal information to us, contact us so we can take appropriate action.

23. Third-Party Links and Services

Our websites and services may link to third-party websites, partner websites, integrations, payment processors, identity providers, map providers, support tools, or external resources. We are not responsible for the privacy practices of third parties. Review their privacy notices before submitting information to them.

24. Changes to this Policy

We may update this Policy from time to time. The "Last updated" date shows when this Policy was last revised. If we make material changes, we will provide notice as required by law, such as by posting the updated Policy, notifying account administrators, or providing in-product notice.

25. Contact Us

For privacy questions, requests, or complaints, contact the F2 Core Privacy Team using the details below.

F2 Core Privacy Team

For privacy questions, requests, or complaints:

Email: [email protected]

Mailing address: 416 Market St, Suite 202, Lewisburg PA 17837

Use the contact form →
← Back to HomeBack to top ↑
Ready when you are
See F2 Core inside a real dealership operating model.

Walk through work, vendors, spend, environmental workflows, and manager briefings using a multi-location dealership use case.

Request DemoTalk to Sales
F2 Core

The dealership operating platform for facility, service, and environmental operations — with built-in workflow orchestration across every location.

Platform
PlatformIntegrationsSecurityImplementation
Solutions
Facility OperationsEnvironmental OperationsEnergy & Connected HardwareSpendGuard
Hardware
Connected hardware is the signal layer
AFMSCompressor ControllerDryer LogicPelican HVACEO3 Sensor HubHardware Catalog
Partners
Find a PartnerBecome a PartnerPartner FAQApply
Resources
GuidesFAQCase StudiesResource LibraryBlog
Company
About F2 CoreContactPortal LoginPrivacyTerms

Disclaimer: Guidance-only content. Regulatory and engineering determinations should be reviewed by qualified professionals. F2 Core supports readiness, documentation support, visibility, and audit-ready proof — not guaranteed compliance.

© 2026 F2 Core. All rights reserved.
PrivacyTermsContact