SECURITY & PRIVACY

Your Data. Your Rules.

How we protect your information and respect your privacy.

INFRASTRUCTURE

Security Architecture

SECURITY.SYS

> AES-256-GCM encryption at rest and in transit

> Air-gap compatible deployment - no internet required

> Sovereign infrastructure - your data never leaves your agreed boundary

> Zero third-party data sharing - we do not sell, trade, or share client data

> Role-based access control on all systems

> Regular security audits and penetration testing

> SOC 2 Type II compliance pathway

COMMITMENT

Privacy Commitment

01

We collect only what is necessary to deliver our services.

02

Your data is used exclusively for the purpose you engaged us.

03

No analytics trackers, no third-party cookies on this site.

04

All client data is deleted upon contract termination unless otherwise agreed.

05

We comply with UK GDPR and Data Protection Act 2018.

06

Data Processing Agreements available on request.

SOVEREIGNTY

Data Sovereignty

Every system we build is designed for data sovereignty. Your Shard units run entirely offline. Your Vault data stays within your infrastructure boundary. Your intelligence never touches our servers.

“If it leaves the building, it’s not sovereign.”

Questions about our security or privacy practices?

We are happy to discuss our approach in detail.

enquiries@third-ark.com
THIRD ARK LIMITED | 14898457