Data Handling Protocol
SentinelX employs a Zero-Retention philosophy for transient threat analysis. We categorize all incoming data packets into three tiers of processing.
Tier 1: Encrypted Metadata
Log signatures and system health metrics are encrypted using AES-256 at rest and stored for a maximum of 30 days.
Tier 2: User Content
Personal identifiers are salted and hashed. We do not store plain-text passwords or sensitive PII in our primary databases.
All data centers utilized by SentinelX are SOC2 Type II certified and maintain 24/7 physical surveillance. Data isolation is maintained through strict logical partitioning at the hypervisor level.
GDPR & International Compliance
For our users in the European Economic Area, SentinelX acts as both a Data Controller and Data Processor under the GDPR.
- check_circle Right to Erasure: Users may trigger the Permanent Purge protocol through account settings at any time.
- check_circle Data Portability: Request your full digital footprint in a machine-readable JSON format via secure API.
- check_circle Impact Assessments: We conduct bi-annual Data Protection Impact Assessments to identify and mitigate risks.
AI & Model Data Usage
SentinelX utilizes advanced machine learning models to detect emerging cyber threats. We maintain a strict boundary between intelligence training and user privacy.
Core Model Principles
-
Anonymized Synthesis
Threat patterns are abstracted. Our models learn from malware behavior, not private user file contents.
-
No Direct Training
Individual user data is never used directly to train models unless explicit Safe Harbor consent is provided.
Your Sovereignty
Access
You have the right to view every data point SentinelX has collected within 72 hours of request.
Correction
Update or rectify inaccurate information through our Identity Portal without administrative delay.
Restriction
Object to specific processing activities, such as telemetry or behavioral analytics.
Standard Terms of Service
1. Acceptable Use
You agree not to use SentinelX for illegal network penetration, unauthorized data scraping, or the creation of automated botnets. Violation results in immediate account revocation.
2. Liability Limitation
While SentinelX provides enterprise-grade protection, no system is impenetrable. SentinelX is not liable for indirect damages resulting from zero-day vulnerabilities beyond current intelligence signatures.
3. Subscription & Billing
Service is provided on a recurring basis. Cancellations take effect at the end of the current billing cycle. No partial refunds are issued for mid-cycle terminations.