1. Introduction and Scope
Silontis Guard™ ("we," "our," or "us") is committed to protecting the privacy and confidentiality of our executive members. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our invitation-only platform for encrypted wallet backup and security services.
Given the sensitive nature of our services and our exclusive executive clientele, we maintain the highest standards of data protection and confidentiality. This policy applies to all interactions with our platform, including our website, mobile applications, and related services.
By using our services, you acknowledge that you have read and understood this Privacy Policy and agree to the collection and use of information in accordance with this policy.
2. Information We Collect
2.1 Personal Information
We collect personal information that you voluntarily provide to us when you:
- Request an invitation to our platform
- Complete the executive verification process
- Use our secure wallet backup services
- Contact our support team
- Participate in surveys or feedback sessions
- Attend executive briefings or security consultations
This information may include:
- Full name, executive title, and professional credentials
- Company affiliation, position, and business contact information
- Personal contact information (email, phone, business address)
- Professional verification documents and references
- Encrypted wallet backup files and related metadata
- Financial institution relationships and account preferences
- Security preferences and risk tolerance settings
- Communication preferences and notification settings
2.2 Technical and Usage Information
We automatically collect certain technical information when you access our platform:
- IP address, geographic location, and network information
- Device information, browser type, and operating system
- Access logs, session duration, and usage patterns
- Security event data and risk assessment metrics
- Performance data and system diagnostics
- Cookies and similar tracking technologies
2.3 Third-Party Information
We may receive information about you from third parties, including:
- Professional verification services and background check providers
- Business partners and referral sources
- Public records and professional directories
- Security intelligence feeds and threat databases
3. How We Use Your Information
We use your information exclusively for the following legitimate business purposes:
- Providing secure wallet backup and recovery services
- Conducting executive verification and maintaining platform exclusivity
- Operating our adaptive risk engine and predictive analytics
- Delivering personalized security recommendations and alerts
- Maintaining platform security and preventing unauthorized access
- Providing customer support and technical assistance
- Improving our services and developing new security features
- Complying with legal obligations and regulatory requirements
- Conducting security research and threat analysis
- Communicating important updates and security advisories
4. Legal Basis for Processing
We process your personal information based on the following legal grounds:
- Contract Performance: To provide the security services you have requested
- Legitimate Interests: To maintain platform security and prevent fraud
- Legal Compliance: To comply with applicable laws and regulations
- Consent: Where you have provided explicit consent for specific processing activities
5. Information Sharing and Disclosure
We do not sell, trade, or otherwise transfer your personal information to third parties. We may disclose your information only in the following limited circumstances:
- With Your Consent: When you have provided explicit authorization
- Service Providers: To trusted third parties who assist in operating our platform under strict confidentiality agreements
- Legal Requirements: To comply with court orders, legal processes, or regulatory investigations
- Security Protection: To protect our rights, property, or safety, or that of our users
- Business Transfers: In connection with a merger, acquisition, or sale of assets (with continued privacy protections)
- Emergency Situations: To prevent imminent harm to individuals or property
6. Data Security Measures
We implement comprehensive security measures to protect your information:
- Encryption: 256-bit military-grade encryption for all data at rest and in transit
- Access Controls: Multi-factor authentication and role-based access restrictions
- Infrastructure Security: Secure data centers with 24/7 physical and digital monitoring
- Network Security: Advanced firewalls, intrusion detection, and DDoS protection
- Regular Audits: Quarterly security assessments and penetration testing
- Employee Training: Comprehensive security awareness and confidentiality training
- Incident Response: Dedicated security team with rapid response protocols
- Backup Systems: Redundant data storage with secure recovery procedures
7. Data Retention and Deletion
We retain your personal information only as long as necessary to fulfill the purposes outlined in this policy:
- Active Accounts: Information is retained while your account remains active
- Inactive Accounts: Data is securely archived for up to 7 years after account closure
- Legal Requirements: Some information may be retained longer to comply with legal obligations
- Security Logs: Technical logs are retained for up to 2 years for security analysis
- Backup Files: Encrypted wallet backups are retained according to your specified preferences
8. Your Privacy Rights
As an executive member, you have comprehensive rights regarding your personal information:
- Access: Request a copy of all personal information we hold about you
- Rectification: Request corrections to inaccurate or incomplete data
- Erasure: Request deletion of your information (subject to legal requirements)
- Portability: Receive your data in a structured, machine-readable format
- Restriction: Request limitation of processing in certain circumstances
- Objection: Object to processing based on legitimate interests
- Consent Withdrawal: Withdraw consent for specific processing activities
- Complaint: Lodge complaints with relevant data protection authorities
9. International Data Transfers
Your information may be transferred to and processed in Hong Kong and other jurisdictions where we operate. We ensure appropriate safeguards are in place:
- Standard contractual clauses approved by relevant authorities
- Adequacy decisions recognizing equivalent protection levels
- Binding corporate rules for intra-group transfers
- Certification schemes and codes of conduct
10. Cookies and Tracking Technologies
We use cookies and similar technologies to enhance your experience and maintain security:
- Essential Cookies: Required for platform functionality and security
- Functional Cookies: Remember your preferences and settings
- Analytics Cookies: Help us understand usage patterns and improve services
- Security Cookies: Detect and prevent unauthorized access attempts
11. Children's Privacy
Our services are designed exclusively for senior executives and business professionals. We do not knowingly collect personal information from individuals under 18 years of age. If we become aware that we have collected such information, we will take immediate steps to delete it.
12. Changes to This Privacy Policy
We may update this Privacy Policy periodically to reflect changes in our practices, technology, or applicable laws. We will notify you of any material changes through:
- Email notifications to your registered address
- Prominent notices on our platform
- Direct communication during your next login
Your continued use of our services after such changes constitutes acceptance of the updated policy.
13. Contact Information and Data Protection Officer
For questions about this Privacy Policy, to exercise your privacy rights, or to contact our Data Protection Officer, please reach out to us: