PRIVACY
LOGIC.
Trust is not a marketing term; it is an engineering requirement. Our privacy framework is built to mirror our code: clean, efficient, and secure.
DATA ARCHITECTURE & COLLECTION
Our systems are engineered on a 'Privacy by Design' framework. We operate with minimal data entropy, meaning we do not harvest personal identifiers (PII) unless you voluntarily provide them via our contact nodes. Technical metadata—such as IP addresses and device headers—are utilized solely for load balancing and preventing malicious intrusion across our global edge network.
COOKIE LOGIC & PERSISTENCE
Joraxis utilizes technical cookies to maintain the structural integrity of your user experience. These cookies store variables related to animation states (such as skipping the Brand Reveal for returning users) and localized interface scaling. We do not utilize cross-site tracking pixels or third-party advertising beacons. Your choice to 'Reject' cookies will only disable non-essential UI logic.
GLOBAL DATA PROCESSING
As a firm with operations in Lahore, Dubai, and London, your data may be processed across different legal jurisdictions. We ensure that all data transfers comply with international standards, including the General Data Protection Regulation (GDPR) and the UK Data Protection Act. We implement Standard Contractual Clauses (SCCs) to ensure your digital assets remain under the same level of protection regardless of the physical node location.
RETENTION & DELETION
We do not believe in data hoarding. Project inquiries and communication logs are retained only for the duration of the engagement or as required by statutory legal obligations. Once the logical purpose for data retention has expired, our systems execute a permanent binary wipe, ensuring that information cannot be recovered or reconstituted.
USER SOVEREIGNTY (YOUR RIGHTS)
You maintain absolute sovereignty over your digital footprint. This includes the Right to Access (requesting a copy of your data), the Right to Rectification (correcting inaccuracies), and the Right to Erasure (the 'Right to be Forgotten'). To trigger any of these logical overrides, please contact our privacy node at info@joraxis.com.
INFRASTRUCTURE SECURITY
Security is the core variable of our engineering logic. We utilize TLS 1.3 encryption for all data in transit and AES-256 for data at rest. Our infrastructure undergoes regular penetration testing and vulnerability assessments to ensure that the 'Trust Built on Logic' we promise is technically validated against modern threat vectors.
Need technical clarification?
Our Data Protection Officer is available to discuss our logical infrastructure and security protocols.
Contact Nodes