Privacy
Protocol.
Version 2026.1 — This protocol defines how Akasuya Private Limited engineers the protection of digital assets and user identities across our entire ecosystem.
Data Sovereignty
All client data processed by Akasuya resides within secure, ISO-certified Indian data regions (AWS/Azure/GCP) to ensure jurisdictional integrity and compliance with national data protection laws.
Encryption Layer
We utilize AES-256 at-rest and TLS 1.3 in-transit encryption as our baseline. Proprietary Labs assets, including Pipality, utilize additional hardware-security-module (HSM) level protection.
Zero-Knowledge Policy
Our engineering team operates on a principle of 'Least Privilege.' We do not store plain-text passwords or sensitive PII (Personally Identifiable Information) unless strictly required by the application logic.
Adversarial Defense
Our privacy protocols are audited by our internal Red Team. We treat data privacy as a cybersecurity challenge, not just a legal checkbox.
Information Collection
We collect minimal telemetry required for operational stability. This includes technical metadata, IP-origination for security logging, and contact parameters provided during the "AI Audit" initialization.
Third-Party Disclosure
Akasuya does not sell, trade, or monetize client data. Information is only shared with verified infrastructure providers (Cloud platforms) strictly to fulfill service delivery protocols.
