diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..07f9e78 --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +/data-engine/rust/target/ diff --git a/frontend/landing.html b/frontend/landing.html index 540fb6c..9a8e2e7 100644 --- a/frontend/landing.html +++ b/frontend/landing.html @@ -783,6 +783,7 @@ Registration → Sign In → Book Demo → + Privacy Policy →
- Prexus Intelligence operates as a sovereign-grade intelligence infrastructure environment designed for governments, strategic institutions, regulated enterprises, and authorized operational entities functioning within high-security and mission-critical environments. + This Privacy Policy explains how Prexus Intelligence collects, uses, stores, and protects information when operating our probability predictive intelligence engine and related platform services. It is designed for institutional and enterprise contexts and does not create legal guarantees beyond applicable law and contract terms.
- Prexus Intelligence operates as a controlled sovereign-style intelligence infrastructure environment. Access to Prexus systems is conditional, continuously evaluated, compartmentalized, and subject to institutional governance enforcement. -
- -- Prexus is not a public social network, unrestricted software environment, or anonymous operational platform. Every identity, institution, operator, and deployment environment entering Prexus infrastructure does so under governed authority. -
- -We may collect information you provide directly, such as account registration data, organization details, contact information, support requests, and communications.
+We may also process telemetry and platform usage data, such as log events, authentication metadata, device/browser characteristics, IP-derived region, and request timing needed for system reliability and security.
+- All entities entering Prexus infrastructure are classified under defined operational roles including Authorized Operators, Institutional Personnel, Governmental Entities, Restricted Guests, or Approved Strategic Partners. -
- +We use information to provide and improve the Prexus platform, support predictive analytics workflows, secure accounts, troubleshoot incidents, and fulfill contractual obligations with institutional customers.
- No identity is guaranteed unrestricted visibility inside Prexus infrastructure. -
- Institutional and sovereign operational datasets processed inside Prexus environments remain under the authority of the deploying governmental, institutional, or authorized enterprise entity. -
- -- Prexus does not claim ownership over sovereign operational data, mission directives, classified institutional intelligence, or client-controlled strategic information. -
- -- Prexus retains ownership exclusively over its core infrastructure architecture, orchestration systems, predictive engines, analytical frameworks, and security environments. -
+We do not sell personal information. We may share information with service providers, infrastructure processors, or authorized partners where necessary to operate the platform, subject to appropriate safeguards and contractual restrictions.
+We may disclose information when required by law, legal process, or to protect platform security, rights, and safety.
- Raksha is a restricted strategic operational environment available exclusively to authorized governmental departments, sovereign defense agencies, and approved institutional operators. -
- -- Raksha provides secure orchestration architecture, autonomous systems coordination environments, tactical simulation frameworks, encrypted synchronization systems, and sovereign operational tooling. -
- -- Prexus does not initiate tactical actions, supervise sovereign decisions, authorize operational deployment, define engagement protocols, or participate in command authority structures. -
- -We may use cookies, local storage, and similar technologies for authentication state, security controls, performance monitoring, and user experience continuity.
+You can control cookies through browser settings, though disabling some technologies may limit platform functionality.
- Unless explicitly required by lawful agreement or infrastructure protection obligations, Prexus does not inspect sovereign mission payloads, review tactical intent, monitor operational execution, or access classified strategic directives generated within Raksha-controlled environments. -
- -We use administrative, technical, and organizational controls intended to protect information, including access controls, encryption in transit, and audit-oriented monitoring. No method of transmission or storage is guaranteed to be perfectly secure.
- If anomalous behavior, hostile intrusion attempts, infrastructure manipulation, unauthorized extraction activity, or identity compromise is detected, Prexus may autonomously activate containment mechanisms. -
- -- Protection of sovereign operational integrity takes precedence over uninterrupted access continuity. -
+We retain information for as long as needed to provide services, meet contractual and compliance obligations, resolve disputes, and enforce our agreements. Retention periods may vary by data category and customer configuration.
- Entities operating within North America, South America, Europe, Asia, Africa, Oceania, and associated sovereign jurisdictions acknowledge that operational access to Prexus infrastructure remains subject to: -
+Where information is transferred across borders, we apply appropriate mechanisms and safeguards in line with applicable regulations and contractual requirements.
+Depending on your jurisdiction, you may have rights to access, correct, delete, restrict, or object to certain processing, and to request data portability where applicable.
+Requests can be submitted through the contact details below. We may verify identity before processing requests.
+- Prexus reserves autonomous authority regarding operational eligibility, trust classification, infrastructure segmentation, and platform protection measures. -
+Prexus services are designed for professional and institutional use and are not directed to children. We do not knowingly collect personal information from children in violation of applicable law.
- By accessing, integrating, licensing, evaluating, deploying, or operating within Prexus infrastructure environments, all entities acknowledge and accept the sovereign operational nature of the platform and all governance, security, jurisdictional, and enforcement standards defined within this Charter. -
+We may update this Privacy Policy periodically to reflect operational, legal, or regulatory changes. Updated versions will be posted on this page with a revised effective date when appropriate.
+For privacy inquiries or data requests, contact Prexus Intelligence through official support or account channels associated with your organization.