Privacy & Data
Protection Policy.
Last Revised
February 01, 2026
Status
Active_Protocol
Introduction
At Buraq, we architect high-performance software with the core philosophy that data privacy is a structural requirement, not an elective feature. This policy defines our commitment to safeguarding the assets of our enterprise partners.
Information Collection
Personal Identifiable Information (PII)
We collect information that identifies you as an individual, including name, corporate email, professional phone number, and institutional affiliation during consultation requests or service onboarding.
Technical Telemetry
Our systems automatically log IP addresses, browser configurations, and session data to optimize infrastructure performance and maintain security integrity.
Data Utilization
Service Orchestration
Data is utilized to deploy and maintain AI workflows, Enterprise ERP systems, and secure cloud environments tailored to your specific operational requirements.
System Optimization
Aggregated, non-identifiable data is analyzed to enhance our proprietary algorithms and infrastructure scalability.
Security Protocols
Encryption Standards
All data is subject to AES-256 encryption at rest and TLS 1.3 encryption in transit, adhering to institutional-grade security benchmarks.
Access Governance
Strict 'Least Privilege' access controls are enforced, ensuring only authorized engineering personnel can interact with sensitive data layers.
Regulatory Rights
Sovereignty & Access
Clients maintain full sovereignty over their data. You have the right to request full data exports, corrections, or permanent erasure within 30 days of notice.