{"id":3,"date":"2023-11-02T07:13:20","date_gmt":"2023-11-02T07:13:20","guid":{"rendered":"https:\/\/evolvetech.biz.vn\/?page_id=3"},"modified":"2026-04-29T09:52:59","modified_gmt":"2026-04-29T01:52:59","slug":"privacy-policy","status":"publish","type":"page","link":"https:\/\/evolvetech.biz.vn\/index.php\/privacy-policy\/","title":{"rendered":"PRIVACY POLICY"},"content":{"rendered":"\n<style>\n    \/* --- CUSTOM STYLES FOR PRIVACY POLICY \/ LEGAL DOCUMENT --- *\/\n    \n    .legal-container {\n        max-width: 900px;\n        margin: 0 auto;\n        padding: 40px 20px 100px 20px;\n    }\n\n    .legal-header-meta {\n        font-family: var(--font-mono);\n        color: var(--terminal-amber);\n        font-size: 0.85rem;\n        border-bottom: 1px dashed var(--border-color);\n        padding-bottom: 20px;\n        margin-bottom: 40px;\n        display: flex;\n        justify-content: space-between;\n        text-transform: uppercase;\n        letter-spacing: 1px;\n    }\n\n    .legal-section {\n        background: var(--surface-color);\n        border: 1px solid var(--border-color);\n        border-left: 3px solid var(--accent);\n        padding: 40px;\n        margin-bottom: 30px;\n        position: relative;\n        transition: border-color 0.3s ease;\n    }\n\n    .legal-section:hover {\n        border-color: var(--accent);\n        box-shadow: 0 5px 20px rgba(255, 122, 0, 0.05);\n    }\n\n    .legal-section h2 {\n        font-size: 1.5rem;\n        color: var(--accent);\n        border: none;\n        padding: 0;\n        margin-bottom: 20px;\n        text-shadow: none;\n    }\n\n    .legal-section h3 {\n        font-size: 1.1rem;\n        color: var(--text-primary);\n        margin-top: 25px;\n        margin-bottom: 10px;\n    }\n\n    .legal-section p {\n        color: var(--text-secondary);\n        font-size: 1rem;\n        line-height: 1.8;\n        margin-bottom: 15px;\n    }\n\n    .legal-section ul {\n        color: var(--text-secondary);\n        font-size: 1rem;\n        line-height: 1.8;\n        margin-bottom: 20px;\n        padding-left: 20px;\n    }\n\n    .legal-section li {\n        margin-bottom: 8px;\n    }\n\n    .highlight-text {\n        color: var(--text-primary);\n        font-family: var(--font-mono);\n        font-size: 0.9rem;\n        background: rgba(255, 122, 0, 0.1);\n        padding: 2px 6px;\n        border-radius: 3px;\n        border: 1px solid rgba(255, 122, 0, 0.3);\n    }\n<\/style>\n\n<div class=\"monolith-container\">\n\n    <section class=\"hero-wireframe\" style=\"min-height: 30vh;\">\n        <div class=\"hero-content\" style=\"max-width: 900px; padding: 40px;\">\n            <h1 style=\"font-size: 3rem; background: linear-gradient(90deg, #ffb703, #ff7a00); -webkit-background-clip: text; -webkit-text-fill-color: transparent;\">Privacy Protocol<\/h1>\n            <p style=\"font-size: 1.1rem; color: var(--text-secondary);\">How Archonic secures, manages, and protects your operational data.<\/p>\n        <\/div>\n    <\/section>\n\n    <div class=\"legal-container\">\n        \n        <div class=\"legal-header-meta\">\n            <span>DOCUMENT CLASSIFICATION: PUBLIC<\/span>\n            <span>LAST COMPILED: APRIL 2026<\/span>\n        <\/div>\n\n        <div class=\"legal-section\">\n            <h2>01. Introduction &#038; Scope<\/h2>\n            <p>At Archonic, we build high-performance applications and secure automation hubs. Because we handle complex digital infrastructure, we take data privacy and security as seriously as our code. This Privacy Policy dictates how we collect, use, and safeguard the information you provide when using our website, services, and proprietary software solutions.<\/p>\n        <\/div>\n\n        <div class=\"legal-section\">\n            <h2>02. Data Acquisition<\/h2>\n            <p>We only collect the data necessary to architect your systems and maintain secure communication. This includes:<\/p>\n            <ul>\n                <li><strong>Identity &#038; Contact Parameters:<\/strong> Name, email address, phone number, and business details provided via our terminal contact forms.<\/li>\n                <li><strong>Operational Data:<\/strong> Information regarding your business workflows, tax configurations, and management structures required to build custom CRMs and ledgers.<\/li>\n                <li><strong>Telemetry &#038; Usage Data:<\/strong> Anonymized interaction metrics on our website to ensure optimal performance and security.<\/li>\n            <\/ul>\n        <\/div>\n\n        <div class=\"legal-section\">\n            <h2>03. Protocol Execution (How We Use Your Data)<\/h2>\n            <p>Your information is utilized strictly to provide and improve our services. We do not sell, rent, or trade your data to third-party marketing entities. Uses include:<\/p>\n            <ul>\n                <li>Executing software development contracts and deploying customized applications.<\/li>\n                <li>Providing maintenance, bug fixes, and continuous technical support.<\/li>\n                <li>Transmitting important system updates, security patches, and project milestones.<\/li>\n                <li>Ensuring legal compliance with domestic regulations regarding digital transactions.<\/li>\n            <\/ul>\n        <\/div>\n\n        <div class=\"legal-section\">\n            <h2>04. Security Infrastructure<\/h2>\n            <p>We deploy military-grade security protocols to protect your sensitive business information from unauthorized access, alteration, or destruction. Our security matrix includes:<\/p>\n            <ul>\n                <li>End-to-end encryption for all active project communications.<\/li>\n                <li>Secure cloud hosting environments with strict role-based access controls (RBAC).<\/li>\n                <li>Routine vulnerability scanning and database isolation for all deployed applications.<\/li>\n            <\/ul>\n            <p>While we architect robust defenses, no method of digital transmission or server storage is 100% impenetrable. We commit to rapid response protocols in the event of any security anomalies.<\/p>\n        <\/div>\n\n        <div class=\"legal-section\">\n            <h2>05. Third-Party Integrations<\/h2>\n            <p>Our custom software often requires integration with external APIs (e.g., payment gateways, financial platforms). When connecting these modules, data may be processed by these third-party services. EvolveTech ensures that any recommended integration partners adhere to strict, modern data protection standards, but we advise reviewing their respective privacy policies.<\/p>\n        <\/div>\n\n        <div class=\"legal-section\">\n            <h2>06. User Authorization &#038; Rights<\/h2>\n            <p>You maintain full authority over your personal and operational data. At any time, you may request to:<\/p>\n            <ul>\n                <li>Access the raw data we currently hold regarding your profile.<\/li>\n                <li>Request modifications or corrections to inaccurate information.<\/li>\n                <li>Initiate a <span class=\"highlight-text\">&#8211;force deletion<\/span> of your data from our primary servers (subject to legal data retention requirements).<\/li>\n            <\/ul>\n        <\/div>\n\n        <div class=\"legal-section\" style=\"border-left-color: var(--alert-red);\">\n            <h2 style=\"color: var(--alert-red);\">07. Contact Operations<\/h2>\n            <p>If you require clarification on any of the protocols outlined in this document, or need to issue a data request, please initialize a connection with our security team.<\/p>\n            <p style=\"font-family: var(--font-mono); color: var(--text-primary); margin-top: 20px;\">\n                > EMAIL_LINK: evolvetech8@gmail.com<br>\n                > STATUS: MONITORING INBOX 24\/7\n            <\/p>\n        <\/div>\n\n    <\/div>\n\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Privacy Protocol How Archonic secures, manages, and protects your operational data. DOCUMENT CLASSIFICATION: PUBLIC LAST COMPILED: APRIL 2026 01. Introduction &#038; Scope At Archonic, we build high-performance applications and secure automation hubs. Because we handle complex digital infrastructure, we take data privacy and security as seriously as our code. This Privacy Policy dictates how we &#8230; <a title=\"PRIVACY POLICY\" class=\"read-more\" href=\"https:\/\/evolvetech.biz.vn\/index.php\/privacy-policy\/\" aria-label=\"Read more about PRIVACY POLICY\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/evolvetech.biz.vn\/index.php\/wp-json\/wp\/v2\/pages\/3","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evolvetech.biz.vn\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/evolvetech.biz.vn\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/evolvetech.biz.vn\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/evolvetech.biz.vn\/index.php\/wp-json\/wp\/v2\/comments?post=3"}],"version-history":[{"count":5,"href":"https:\/\/evolvetech.biz.vn\/index.php\/wp-json\/wp\/v2\/pages\/3\/revisions"}],"predecessor-version":[{"id":205,"href":"https:\/\/evolvetech.biz.vn\/index.php\/wp-json\/wp\/v2\/pages\/3\/revisions\/205"}],"wp:attachment":[{"href":"https:\/\/evolvetech.biz.vn\/index.php\/wp-json\/wp\/v2\/media?parent=3"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}