Blue Ink
Blue InkHomeBlue Ink SolutionsArticlesBlue Ink Net CommunityBlue Ink Demo ApplicationAbout Automated Architecture
My Profile

Privacy Policy

This privacy policy has been created to show the integrity of Automated Architecture, Inc and any subsidiaries and to inform you of our level of commitment to the privacy of customer and non-customer information. To better protect your privacy we provide this notice explaining our online information practices and the choices you can make about the way your information is collected and used. To make this notice easy to find, we make it available on from every page on this site. This privacy policy is effective May 2005.

The Information We Collect

This notice applies to all information collected or submitted on the Blue Ink website as well as with the Blue Ink application.

User Account

A user account is required to use the Blue Ink application and on some pages on this website in order to make requests, use community services, download products, or register to receive materials. The types of personal information collected for in order to create a user account at a minimum are:

  • User Name
  • First Name
  • Last Name
  • Company (optional)
  • E-mail
  • Password (hashed)
  • Mother's Maiden Name (hashed)
  • Address 1
  • Address 2 (optional)
  • City
  • State
  • Country
  • Phone
  • Zip

Company Information

Should an organization wish to establish a relationship with Automated Architecture, Inc for the purposes of invoicing or other reasons, Automated Architecture will track the following additional information:

  • Company Name
  • Address 1
  • Address 2 (optional)
  • City
  • State
  • Country
  • Zip Code
  • Phone
  • Fax (optional)


Automated Architecture will additionally require a billing contact and account contact for a company, as well as other contacts. For each contact we track the following information:

  • First Name
  • Last Name
  • Title
  • E-mail
  • Address 1
  • Address 2 (optional)
  • City
  • State
  • Zip
  • Country
  • Phone
  • Fax (optional)

Security Auditing

Automated Architecture, Inc audits security related information on our website and with the Blue Ink application primarily for security, but potentially also to track usage trends. The types of security auditing information collected on a per user basis are:

  • Last Successful Login Date
  • Last Failed Login Date
  • Last Good IP Address Connected From
  • Current Number of Invalid Login Attempts

Login Attempts

For all login attempts we track:

  • Username
  • Success or Failure
  • Logging in via web or via Blue Ink application
  • IP Address Connecting From
  • Date of Attempt
  • Password (if attempt failed)

Database Project Access Attempts

We audit information on database project access attempts (in conjunction with providing security on a per database project basis). In addition to providing security we may use this information to evaluate usage patterns in order to improve our product. We track the following information when anyone attempts to open a database project:

  • Username
  • Database Project Attempted to Access
  • Success or Failure
  • Date of Attempt

Reset Password Attempts

For all attempted password reset requests (which require an e-mail and the mother's maiden name provided when creating an account) we track:

  • Date of Attempt
  • User Attempted For
  • IP Address Connecting From
  • Email (if attempt failed)
  • Mother's Maiden Name (if attempt failed)

Defect Tracking

Should errors occur in Blue Ink, Automated Architecture may store information about the defect for the purposes of improving the product. We track the following information about defects:

  • User Account That Encountered the Error
  • Date the Error Occurred
  • Detailed Debug Information About the Error

Licensing and Financial Information

Should a user obtain or purchase a Blue Ink license certain information will be tracked about the project and about payment information.

Project Information

Blue Ink tracks the following information about your project in order to validate license purchases:

  • Project Name
  • Project Description (optional)
  • Database Name

Database Tables

We additionally track the tables in the database in order to verify that license terms are not being abused by using one license for multiple projects. We track the following information about database tables:

  • Table Name
  • Table Deleted Date (optional)

Financial Information

Should you purchase a Blue Ink license with Automated Architecture, we will never store your credit card information. We will however track information about the purchase, such as promotions used, price paid, and any e-mail notifications sent.

Template Sharing

Within the Blue Ink application users have the ability to share template solutions. Upon sharing this information all templates, template projects, and the template solution become the domain of Automated Architecture and our user base.

Transmission of Information

When we transfer and receive certain types of sensitive information on our website such as financial information, we redirect visitors to a secure server and will notify visitors through a security icon that appears in the visitor's browser. All information including financial information transmitted between the Blue Ink application and the Blue Ink Net server is encrypted and digitally signed.

The Way We Use Information

We use the information you provide about yourself when placing an order only to complete that order. We do not share this information with outside parties except to the extent necessary to complete that order.

We use return email addresses to answer the email we receive. We will occasionally send our customers emails regarding new features and upgrades to our services that will benefit them, and that is the extent of the "marketing" that is done to customers. We DO NOT send email to non-customers, except in cases where those email addresses are used as points-of-contact when a site is set up. We do not harvest emails. If we mine data it is solely for the purposes of product development, we would never provide the information to a third party.

We use non-identifying and aggregate information to better design our website and to share with advertisers. For example, we may tell an advertiser that X number of individuals visited a certain area on our website, or that Y number of men and Z number of women filled out our registration form, but we would not disclose anything that could be used to identify those individuals. With respect to cookies, we use cookies to record session information, such as items that consumers add to their shopping cart. With respect to ad servers, we do not partner with or have special relationships with any ad server companies.

Finally, we never use or share the personally identifiable information provided to us online in ways unrelated to the ones described above without also providing you an opportunity to opt-out or otherwise prohibit such unrelated uses.

Our Commitment To Data Security

To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online. As stated, when we transfer and receive certain types of sensitive information such as financial information, we always use encryption and digital signatures. Our systems ignore any information sent if the signatures do not match.

Regarding sensitive information such as a user's password or mother's maiden name we perform an operation known as a one way hash on the information. This means that while we can confirm if a given password is correct or not, no one, including Automated Architecture employees will ever know your password from the information we store.

Our Commitment To Children's Privacy

Protecting the privacy of the very young is especially important. For that reason, we never collect or maintain information at our website from those we actually know are under 13, and no part of our website is structured to attract anyone under 13.

Links and Linked Internet Websites

Our website may provide links to sites that are separate from the Blue Ink website. These external sites may have their own privacy provisions in place that are different from those provisions listed in this document. Automated Architecture is not responsible for the collection, use or disclosure of information collected on these external sites and we expressly disclaim any and all liability related to any collection, disclosure or use of such information. In addition, we encourage visitors to seek out and read the privacy policies of any and all sites they visit on the Internet.

How You Can Access Or Correct Your Information

You can access all your personally identifiable information that we collect online and maintain by contacting us in writing at and providing your UserId. You can correct factual errors in your personally identifiable information by sending us a request that credibly shows error using the address above.

To protect your privacy and security, we will also take reasonable steps to verify your identity before granting access or making corrections.

How To Contact Us

Should you have other questions or concerns about these privacy policies, please call us toll-free at (877) 756-3595 or send us an email at

Enforcement and Dispute Resolution

Should you perceive that Automated Architecture is failing to follow the above guidelines please contact us at the above mentioned toll-free phone number or via the email address provided.


What is Rapid Application Development?


Call us toll free:
(877) 756-3595

Or Visit Forums


Copyright © 2022 Automated Architecture, Inc. All rights reserved.