Data_Sovereignty_Protocol

PRIVACY POLICY

Last Updated: March 2026.
We engineer absolute data security. Zero compromises.

1. Data Ingestion Architecture

Syrex Tech operates on a strictly "need-to-process" architecture. Any telemetry, voice data, or database payload routed through our AI models is immediately encrypted at rest using AES-256 protocols.

If a client requests an on-premise deployment, **Zero Data** ever hits our centralized servers. It remains fully siloed within your VPC (Virtual Private Cloud).

2. WebRTC & Voice Streams

When utilizing our live Call Engine or AI Intercom features, audio streams are handled peer-to-peer or routed through our proprietary secure TURN servers. Audio streams are transcribed in memory and the raw audio packet is instantly destroyed unless compliance logging is explicitly requested by the enterprise administrator.

3. Third-Party Intelligence Overlays

We integrate with top-tier LLM providers (e.g., OpenAI, Anthropic, Meta). However, through our Enterprise API agreements, **none of your data is used to train their foundational models**. Your contextual IP remains yours.

4. Cookies & Edge Telemetry

We deploy minimal cookies strictly for authentication tracking and edge-node performance telemetry. We do not sell user data to advertising syndicates. You are deploying an enterprise engine, not joining a social network.

5. Protocol Queries

For immediate assistance regarding data erasure (GDPR/CCPA compliance) or security audits, route your queries to our security operations center at: [email protected].