Security of Personal Data and Advanced Mitigation Warning

1. Unauthorized access. The security of your personal data is important to us. While we take very complex steps that are well above industry standards that are considered more than reasonable precautions to safeguard your personal data in our possession or under our control, achieving complete security (whether in transmission or storage of data) is impossible or impractical. We cannot be held responsible for unauthorized or unintended access that is beyond our control, such as hacking or cybercrime.  At the time of writing this document we have taken steps to mitigate most known methods of data theft by removing certain known ways that encrypted data might be able to be read in plain text. We will, in good  faith,  take more precautions as technology advances and we are better able to create certain preventative steps to protecting the data as it relates to this document.  Please understand that, even though we take precautions that are known to exceed that of even the most secure govt agency that are local to us on even a national level,  the future is unknown to all.  For that very reason, we cannot be held liable for any data breech, theft, hacking,  advanced decryption,  that take place for which we have no control or ability to defend against, or uses new or advancements in certain fields for which we have no access or no known method of defense. Hindsight is always something one likes to apply to  situations after the fact.  Just know that we do all we can with what we have at our disposal to secure all things that we are required to secure, and as the landscape changes and we are able to do better in that regard, expect us to do so within reasonable limits placed on us by society, laws, regulations, monetary limitations,  or any other that are outside of our control.


2. Vulnerabilities. We do not provide any guarantee against security breaches, nor do we make any warranty, guarantee, or representation that your use of our websites, systems, assets and/or applications is safe and protected from viruses, worms, Trojan horses, and other vulnerabilities. We also do not guarantee the security of data that you choose to send us electronically. Sending such data is entirely at your own risk. We, in good faith,  take all possible precautions that are at our disposal, and even have created new and more secure avenues that allow us to apply even more security that exceeds industry standards in some areas, but we cannot force regulations or advancement of technologies for which we have no control over.  As advancements happen that are within our ability to apply, we will always be ready to create an even safer and secure situation within what we are able to do do,  short of monetary limitations as it relates to this subject.


3. Period of retention. We retain your personal data only for as long as is necessary to fulfil the purposes we collected it for, and to satisfy our business and/or legal purposes, including data analytics, audit, accounting or reporting purposes. How long we keep your personal data depends on the nature of the data, e.g. we keep personal data for at least the duration of the limitation period for bringing claims if the personal data may be required to commence or defend legal proceedings. Some information may also be retained for longer, e.g. where we are required to do so by law. Typically, our data retention periods range from 7 to 15 years but we do take steps to mitigate some known threats which allow us to destroy some data which doesn't have retention periods placed on them by regulatory requirements.  


4. Anonymized data. In some circumstances we may anonymize your personal data so that it can no longer be associated with you, in which case we are entitled to retain and use such data without restriction.

5. Data Theft Mitigation. We take many steps to mitigate the various risks associated with data breech, data theft,  "doxing" without the permission of the person being unmasked,  and other known problems related to illegal data tampering by outside entities.  Our methods taken are tested and trusted by industry leaders in data security.

In fact, we have taken other steps to advance this area of science and we are leaders in advancement in methods and techniques of encryption, handling and temporary storage. We have a strict protocol that is followed for each and every byte of data that we are charged with protecting.  The layer upon layer of encryption, changing each layer's method,  and for each layer requiring new multi=split key technology, with blockchain level tamper resistant technology and audit capabilities are advancements in the area.  The new and exciting temper-proof defensive technology built into our encryption, which we have developed,  ensures that even if data is taken by a third party is will be useless once attempts are made to access what is inside. 

There is no reverse-engineering this mechanism. Any attempts to do so, will render the data useless, with any externally related keys and/or layers of encryption within said data to be rendered useless and the finality of this mechanism is absolute.

Taking those steps and informing the public within this document of the use of new technology we have developed has left out important details of the function and application, for security reasons.

Warning:

If you are a bad actor or represent an organization with a mission that in any way plans or seeks to misuse or steal this advancement in technology or the data that is protected by it,  we advise you that steps have also been taken to mitigate any related challenges that may arise due to any forced or hostile takeover of any asset or system which we have secured.  Rest assured,  those protective measures will not only unmask the actions but also any attempts to hide actions taken, force the unmasking of the origin of the attempt and start a domino effect ensuring that not only will the data be protected at all costs but those who tampered with it are held accountable.  Even if our ability to access or control the process which we have explain in this section is somehow taken from us, the security mechanisms will remain and further safeguards that are not mentioned will be triggered.  This is to ensure that no matter where the origin of threat resides or the attempts to otherwise negate chances of unmasking are taken,  the finality of the data destruction and unmasking of those responsible for its breech will not be thwarted, including cold storage or movement of data in an attempt to create separation. Returning the data and just not trying to begin with is the best chance one has at an eventless outcome for all involved.

Did you find this article useful?