
Privacy Policy
Privacy Policy – XTLK™ (CrossTalk)
Effective Date: [December 31, 2025]
Last Updated: [March 31, 2026]
1. Introduction
Integrated Communications Solutions, Inc. (“ICS,” “Company,” “we,” “our,” or “us”) operates XTLK™ (CrossTalk), a secure, interoperable communications and command platform designed for first responders, emergency management agencies, and authorized personnel (the “App”).
This Privacy Policy describes how we collect, use, disclose, and safeguard information when users access and use the App.
This policy is designed to comply with applicable privacy laws and the requirements of Google Play.
By using XTLK™, you agree to the terms of this Privacy Policy.
2. Nature of the Platform
XTLK™ is a mission-critical communications platform that enables:
​
-
Real-time multi-agency communication
-
GPS-based personnel and asset tracking
-
Geo-fenced operational zones
-
Incident coordination and command structure visibility
-
After-action reporting and audit trails
-
Use of the App may involve operational, situational, and emergency response data.
3. Information We Collect
A. Account & Identity Information
-
Full name
-
Email address
-
Phone number
-
Agency / department affiliation
-
Role or authorization level
B. Sensitive Operational Data
Due to the nature of XTLK™, we may collect:
​
-
Real-time GPS location
-
Movement and positioning data
-
Communications content (text, voice, alerts, status updates)
-
Incident-related operational data
-
Resource allocation and deployment data
C. Device & Technical Information
-
Device model and OS
-
Unique device identifiers
-
IP address
-
App version
-
System logs and diagnostics
D. Usage & Analytics Data
-
Session activity
-
Feature usage
-
Performance metrics
-
Error reporting
4. How We Use Information
We use collected data strictly for operational and platform purposes:
-
Core Functions
-
Enable real-time communication across agencies
-
Provide command-and-control visibility
-
Support emergency response coordination
-
Deliver geolocation-based situational awareness
-
Security & Integrity
-
Authenticate users and control access
-
Prevent unauthorized use
-
Monitor system integrity
-
Operational Improvement
-
Improve platform reliability and performance
-
Debug and optimize system functionality
-
Compliance
-
Meet contractual, legal, and regulatory obligations
5. Location Data
​
XTLK™ collects precise location data to support:
-
Real-time tracking of personnel and assets
-
Incident mapping and geofencing
-
Operational command coordination
Important Conditions:
-
Location data is collected only with user and/or agency authorization
-
May be collected in foreground and background when operationally required
-
Visibility of location data may be controlled by agency administrators
Users may adjust permissions in device settings; however, disabling location may impair core functionality.
6. Communications Data
XTLK™ processes communications transmitted within the platform, including:
-
Messages
-
Alerts
-
Status updates
-
Incident communications
These communications are used solely for:
-
Operational coordination
-
Recordkeeping and after-action reporting
-
System integrity and troubleshooting
7. Data Sharing and Disclosure
We do not:
-
Sell personal data
-
Share your photos with third parties without your explicit consent
We may share data under the following limited circumstances:
A. Agency / Organizational Control
If you access XTLK™ through an agency:
-
Your data may be visible to authorized supervisors and administrators
-
Agencies may control access, retention, and usage policies
B. Service Providers
We may use trusted third-party providers for:
-
Amazon (AWS) for cloud hosting
-
Infrastructure and storage
-
Analytics and diagnostics
All providers are contractually bound to maintain confidentiality and security.
C. Legal & Safety Requirements
We may disclose information where necessary to:
-
Comply with legal obligations
-
Respond to lawful requests
-
Protect public safety and operational integrity
D. Camera & Microphone Access Permissions
​
​Our application may request access to your device’s camera and microphone to enable core functionality related to real-time communication, incident documentation, and situational awareness.
Purpose of Access:
We use these permissions strictly for the following purposes:
​
-
Camera Access: To capture photos and video during active sessions, including incident reporting, live streaming, and documentation of events relevant to emergency response or operational coordination.
-
Microphone Access: To enable real-time voice communication, audio recording, and transmission between authorized users within the platform.
User Control and Consent:
​
-
Camera and microphone access are only activated with your explicit interaction (e.g., initiating a video stream, recording, or voice communication).
-
You may enable or disable these permissions at any time through your device settings.
-
The application does not access the camera or microphone in the background without your knowledge.
Data Usage and Handling:
​
-
Audio and video data are used solely to provide the intended in-app functionality and are not accessed, recorded, or transmitted outside of active user-initiated sessions.
-
Any captured content is handled in accordance with applicable data protection laws and is only shared with authorized participants or stored as necessary for operational or after-action purposes.
-
We do not use camera or microphone data for advertising purposes.
Data Security:
We implement industry-standard safeguards, including encryption and access controls, to protect audio and video data from unauthorized access, disclosure, or misuse.
Third-Party Access:
We do not sell or rent audio or video data. Any third-party service providers involved in processing such data are contractually obligated to maintain confidentiality and comply with applicable privacy and security standards.
8. Data Retention
We retain data based on:
-
Operational necessity
-
Agency requirements
-
Legal and regulatory obligations
Retention periods may vary depending on:
-
Incident reporting requirements
-
Government or agency contracts
-
Compliance mandates
9. Data Security
ICS implements industry-standard safeguards, including:
-
End-to-end encryption (where applicable)
-
Encryption in transit (TLS/HTTPS)
-
Role-based access controls
-
Secure cloud infrastructure
-
Audit logging and monitoring
​
Despite these measures, no system is completely secure.
​
10. User Rights & Data Controls
Users may have rights to:
-
Access personal data
-
Request correction
-
Request deletion (subject to agency and legal constraints)
-
Withdraw consent where applicable
Requests can be submitted to: [info@icscoms.com]
​
11. Data Deletion
Users may request deletion of their account and personal data by:
Contacting: [info@icscoms.com
Using in-app deletion tools (if enabled)
Important:
Certain data may be retained where required for:
-
Legal compliance
-
Incident reporting
-
Agency recordkeeping obligations
12. Children’s Privacy
XTLK™ is not intended for use by individuals under 13 years of age.
We do not knowingly collect data from minors.
13. Third-Party Services
XTLK™ may rely on third-party infrastructure providers. These providers operate under their own privacy policies and contractual obligations.
14. International Data Transfers
Data may be processed in jurisdictions outside the user’s location, subject to appropriate safeguards and contractual protections.
15. Changes to This Policy
We may update this Privacy Policy periodically.
Changes will be reflected by the “Last Updated” date.
Continued use of the App constitutes acceptance of updates.
16. Contact Information
Integrated Communications Solutions, Inc.
Email: info@icscoms.com
Website: https://icscoms.com
[PO Box 2491, Georgetown, TX 78627]