
1. DATA MINIMIZATION PHILOSOPHY
DarieX Systems operates on a "Need-to-Know" basis. We do not collect data to sell ads; we collect data solely to execute the requested forensic analysis. Once the intelligence cycle is complete, data retention is minimized accordence with our Data Retention Policy
2. INFORMATION COLLECTION VECTORS
We collect the following categories of intelligence:
Identity Data: Name, email, and encrypted payment tokens (processed via secure third-party gateways).
Target Data: The text logs, transcripts, and files you upload for analysis.
Metadata: Timestamps and device telemetry required for security verification.
3. OPERATIONAL SECURITY (OPSEC)
We utilize military-grade encryption standards (AES-256) for data at rest and in transit.
Compartmentalization: Your case data is isolated. Analyst access is granted on a strict, single-case basis.
The "Burn" Protocol: Unless a Client purchases the "Evidence Vault" add-on, source data (chats/logs) is scheduled for deletion 30 days after report delivery to ensure your privacy.
4. THIRD-PARTY DISCLOSURE
We do not sell your data. Ever. We may disclose data only under two conditions:
Legal Compulsion: If presented with a valid court order or subpoena from a jurisdiction with authority.
Imminent Threat: If the analyzed data reveals a credible, immediate threat to human life (e.g., suicide, homicide, or terrorism), we reserve the ethical right to alert appropriate authorities.
5. COOKIES & TRACKING
We use essential cookies for site security and session management. We do not use invasive tracking pixels to follow you across the internet. Your movements outside of the DarieX perimeter are your own.
6. CLIENT RIGHTS
You have the right to:
Request Access: See what data we hold on you.
Request Deletion: Invoke the "Burn Protocol" immediately for your personal data.
Opt-Out: Unsubscribe from non-critical communications.
7. CONTACT THE SECURITY OFFICER
For privacy concerns or data deletion requests, contact strictly via: Email: security@dariex.icu Subject Line: PRIVACY PROTOCOL

