Logo
@AKASUYA.COM
INTWIG
Security & Privacy HQ

Privacy
Protocol.

Version 2026.1 — This protocol defines how Akasuya Private Limited engineers the protection of digital assets and user identities across our entire ecosystem.

[01]

Data Sovereignty

All client data processed by Akasuya resides within secure, ISO-certified Indian data regions (AWS/Azure/GCP) to ensure jurisdictional integrity and compliance with national data protection laws.

[02]

Encryption Layer

We utilize AES-256 at-rest and TLS 1.3 in-transit encryption as our baseline. Proprietary Labs assets, including Pipality, utilize additional hardware-security-module (HSM) level protection.

[03]

Zero-Knowledge Policy

Our engineering team operates on a principle of 'Least Privilege.' We do not store plain-text passwords or sensitive PII (Personally Identifiable Information) unless strictly required by the application logic.

[04]

Adversarial Defense

Our privacy protocols are audited by our internal Red Team. We treat data privacy as a cybersecurity challenge, not just a legal checkbox.

Information Collection

We collect minimal telemetry required for operational stability. This includes technical metadata, IP-origination for security logging, and contact parameters provided during the "AI Audit" initialization.

Third-Party Disclosure

Akasuya does not sell, trade, or monetize client data. Information is only shared with verified infrastructure providers (Cloud platforms) strictly to fulfill service delivery protocols.