Privacy Protocol
No Data Mining
We are an infrastructure company, not a data company. We do not touch your weights.
Air-Gapped
Enterprise deployments are physically disconnected from the public internet.
Zero Access
We cannot access your encrypted volumes even under legal compulsion.
Iteronix operates on a zero-knowledge architecture. We provide the infrastructure; you hold the keys. This document details the technical controls that enforce your data sovereignty, rather than just legal promises.
01 Information We Collect
We strictly distinguish between "Public Website Visitors" and "Enterprise Infrastructure Customers".
Website Visitors
Minimal telemetry (User Agent, IP) via Cloudflare solely for DDoS mitigation. Logs are purged every 24 hours.
Enterprise
Business billing details required to ship physical hardware. We do not store any data related to your AI models.
02 The Architectural Guarantee
Unlike public API providers, we do not require a license to your data because we never see it.
Technical Enforcement
We enforce privacy via network topology. Your clusters are configured with a `deny-all` outbound firewall policy. The only telemetry that leaves your premise is hardware health stats (fan speed, temperature), strictly opt-in via a unidirectional gateway.
03 Tracking & Analytics
We do not use Google Analytics, Facebook Pixels, or third-party ad trackers. Our business is selling compute, not selling you. We use a single session cookie for site functionality.
04 Government Requests
Because your data resides on hardware physically located within your facilities (or private VPC), Iteronix possesses no technical means to decrypt or export your data.
05 Subprocessors
We use the following strict-necessity providers:
06 Security Contact
For PGP keys or to report a vulnerability in our isolation architecture, contact our security engineer directly.