Security Protocol v2.5

Privacy Policy.

Effective Date: December 26, 2025

1. Data Acquisition

We process information necessary for the execution of high-fidelity data annotation and AI automation services. This includes voluntarily provided business intelligence, system integration parameters, and raw datasets intended for labeling.

2. Security Posture

Jyutrix operates under a zero-trust architecture. All client data is encrypted using AES-256 at rest and TLS 1.3 in transit. We maintain strict physical and digital isolation for every project environment.

3. Confidentiality Mandate

Non-Disclosure Agreements (NDAs) are absolute. Our team members undergo rigorous security clearance and are restricted by project-specific access control lists (ACLs).

4. Data Processing & Security

Jyutrix acts as a Data Processor under GDPR. We implement technical and organizational measures to ensure a level of security appropriate to the risk. You retain 100% ownership of your raw and processed data. Upon project termination, all datasets are purged according to DoD 5220.22-M sanitation standards, unless archival is explicitly requested.

5. Global Compliance

We are committed to ISO 27001 standards and SOC2 readiness. Our infrastructure is hosted on hardened cloud environments with regional data residency options (EU, US, APAC).

Contact Privacy Officer

Inquiries regarding data subjects or compliance should be routed to security@jyutrix.com.