Data Privacy

1. MINIMAL FOOTPRINT

AKSHON operates on a principle of least-required data. We only capture the communication channels you explicitly provide (email) to facilitate authentication.

2. SECURITY AUDITS

Every interaction with the Research Corpus is logged to prevent unauthorized extraction. These logs are stored in encrypted GCP buckets and purged every 90 days.

3. ANALYTICS TELEMETRY

We utilize high-integrity, anonymous telemetry to optimize the matrix performance. You have the sovereign right to opt-out of all tracking via the telemetry console. No personal identifiers or IP addresses are linked to your research sessions.

4. COOKIES & LOCAL STORAGE

We use session-based identifiers and localStorage to maintain your connection to the Synthesis engine and remember your telemetry preferences. No third-party tracking pixels are utilized.

Compliance: SOC2 / GDPR_ALIGNED // AKSHON_SECURE_GUARD