TRAJECIENT PRIVACY POLICY (UNDER CONSTRUCTION)

The Privacy Policy relates to how personally sensitive data is collected, used, retained and secured by Trajecient.

The Privacy Policy may operate in conjunction with the EULA or the Terms of Service.

TL;DR: Trajecient takes privacy extremely seriously. Please read the full Privacy Profile to learn about the specifics of what may be collected and what may be retained.

Trajecient only collects personally sensitive data, including personally identifiable data, when absolutely necessary. This is because it is either:

(1) required for the purposes of identity verification;

(2) in order for financial transactions which you have initiated to occur;

(3) in order to enable replacements, repairs, upgrades and discounts; or

(3)because it is otherwise a legal requirement, such as for tax purposes;

Trajecient permits pseudonyms to be used where possible.

Please note that if information is submitted on a third-party platform, the Privacy Policy of that platform will apply in relation to their collection, handling and storage of data.

Information is only disclosed when legally necessary or to the individuals concerned, both for transparency and accountability or as part of fulfilling the purposes for which information was collected.

Information is not shared with third-parties except when absolutely necessary, such as in order for financial transactions to occur. Personally sensitive information may also originate from third-party platforms on which Trajecient operates and on which individuals may have chosen to submit data in order to enter into financial transactions with Trajecient.

You can contact Trajecient to update personal data if a correction is desired.

You can contact Trajecient to have your data be deleted, provided it is legal to do so. This may result in forfeiting all rights to replacements, repairs, upgrades and discounts if you will be left unable to supply Trajecient with proof of purchase in circumstances when any of the aforementioned are potentially available.

Personally sensitive data, to the extent it is retained by Trajecient, is cryptographically encrypted within the file in which the information is stored (using old-fashioned cryptographic techniques implemented through modern technology). Even if through a cybersecurity breach the file is directly accessed, the personally sensitive information will not be readable without the answer to the cryptographic combination lock needed to decrypt the information so it becomes readable. The key to this cryptographic encryption is itself coded, with hints that refer to specific references unlikely to be remotely worked out.

The downside is that information could eventually be lost in certain circumstances, but that is true regardless, as information can be lost if a computer suddenly stops working, for example.

Why does Trajecient go to such lengths to protect your personal information collected, used and retained in the course of business? Partly because it is fun to act like a spy, partly out of a love for cryptography and partly because Trajecient believes this is ultimately a cheaper and more reliable means of securing data that relying on methods prone to being bypassed by hacking or phishing.