
TL;DR: Trajecient takes privacy extremely seriously. Please read the full Privacy Profile to learn about the specifics.
Trajecient only collects personally sensitive data, including personally identifiable data, when absolutely necessary.
Please note that if information is submitted on a third-party platform, the Privacy Policy of that platform will apply in relation to their collection, handling and storage of data.
Information is only disclosed when legally necessary or as part of fulfilling the purposes for which information was collected.
Information is not shared with third-parties except when absolutely necessary.
You can contact Trajecient to update personal data if a correction is desired.
You can contact Trajecient to have your data be deleted, provided it is legal to do so. This may result in forfeiting (or complicating) access to replacements, repairs, upgrades and discounts as it limits or may remove proof of purchase.
Personally sensitive data, to the extent it is retained by Trajecient, is cryptographically encrypted within the file in which the information is stored (using old-fashioned cryptographic techniques implemented through modern technology). Even if through a cybersecurity breach the file is directly accessed, the personally sensitive information will not be readable without the answer to the cryptographic combination lock needed to decrypt the information so it becomes readable. The key to this cryptographic encryption is itself coded, with hints that refer to specific references unlikely to be remotely worked out.
The downside is that information could eventually be lost in certain circumstances, but that is true regardless, as information can be lost if a computer suddenly stops working, for example.
Why does Trajecient go to such lengths to protect your personal information collected, used and retained in the course of business? Partly because it is fun to act like a spy, partly out of a love for cryptography and partly because Trajecient believes this is ultimately a cheaper and more reliable means of securing data that relying on methods prone to being bypassed by hacking or phishing.