Privacy
Protocols.
Effective Date: 2026
Version: 2.0.4-Stable
Qintela prioritizes data minimization and end-to-end encryption across all autonomous architectures.
1. Information Collection
We collect personal identifiers (name, email, company metadata) only when voluntarily provided through secure ingestion points. Technical telemetry is captured to ensure system health and prevent unauthorized access attempts.
2. Data Utilization
Information is strictly used to provision automation services, refine RAG model accuracy for your specific deployment, and maintain operational reliability. Qintela does not utilize client data to train public models.
3. Security Protocols
We implement hardened technical safeguards including:
- TLS 1.3 Encryption in transit
- AES-256 Encryption at rest
- Role-Based Access Control (RBAC)
- Isolated VPC Environments
4. Data Sovereignty
Users maintain full sovereignty over their data. Requests for export, correction, or permanent erasure from our production environments are processed within standard engineering sprint cycles (typically < 30 days).