LEGAL & COMPLIANCE

Privacy Protocol

HASH: 8A2F...99C1  |  LAST UPDATED: MARCH 15, 2025

No Data Mining

We are an infrastructure company, not a data company. We do not touch your weights.

Air-Gapped

Enterprise deployments are physically disconnected from the public internet.

Zero Access

We cannot access your encrypted volumes even under legal compulsion.

Iteronix operates on a zero-knowledge architecture. We provide the infrastructure; you hold the keys. This document details the technical controls that enforce your data sovereignty, rather than just legal promises.

01 Information We Collect

We strictly distinguish between "Public Website Visitors" and "Enterprise Infrastructure Customers".

Website Visitors

Minimal telemetry (User Agent, IP) via Cloudflare solely for DDoS mitigation. Logs are purged every 24 hours.

Enterprise

Business billing details required to ship physical hardware. We do not store any data related to your AI models.

02 The Architectural Guarantee

Unlike public API providers, we do not require a license to your data because we never see it.

Technical Enforcement

We enforce privacy via network topology. Your clusters are configured with a `deny-all` outbound firewall policy. The only telemetry that leaves your premise is hardware health stats (fan speed, temperature), strictly opt-in via a unidirectional gateway.

03 Tracking & Analytics

We do not use Google Analytics, Facebook Pixels, or third-party ad trackers. Our business is selling compute, not selling you. We use a single session cookie for site functionality.

04 Government Requests

Because your data resides on hardware physically located within your facilities (or private VPC), Iteronix possesses no technical means to decrypt or export your data.

We do not hold encryption keys (LUKS/TPM2 managed by client).
We do not have remote root access to air-gapped clusters.

05 Subprocessors

We use the following strict-necessity providers:

Stripe
Payment Processing (PCI-DSS)
Formspree
Form Routing (No Data Storage)

06 Security Contact

For PGP keys or to report a vulnerability in our isolation architecture, contact our security engineer directly.

EMAIL PROTOCOL security@iteronix.com
PGP FINGERPRINT
0x4A2B 99F1 C882 12AB