Privacy Policy
Your trust is the foundational architecture of our innovation.
1. Introduction
Welcome to Delstarford Works ("we," "our," or "us"). We are committed to protecting your corporate and personal information, and your right to privacy. This Privacy Policy explains how we collect, use, process, disclose, and safeguard your information when you visit our website, deploy models from our AI Marketplace, or engage our custom agricultural technologies.
By accessing or using our high-level architectural services, you signify that you have read, understood, and mathematically agree to our collection, storage, and use of your data as described in this framework.
2. Information We Collect
We systematically collect information that identifies, relates to, describes, or could reasonably be linked, directly or indirectly, with a particular client or organizational entity.
- Identifiers: Legal name, corporate email address, contact number, and operational location (for Kakamega HQ hardware deployment coordination).
- Authentication Data: Secure passwords (encrypted via Firebase AES-256), login timestamps, IP addresses, and terminal usage logs.
- Proprietary Project Data: Information you securely transmit regarding custom AI parameters, biotechnology thresholds, or biometric logs uploaded to our testing environments.
- Financial Nodes: We do not store raw credit card data. All financial processing is securely vaulted and handled by third-party PCI-DSS compliant providers (Stripe, PayPal, M-Pesa).
3. How We Utilize Your Data
We process the inputs we collect exclusively to engineer superior technological solutions for you:
- To authenticate, provide, and manage your access to the secure Client Dashboard.
- To execute localized training and epoch runs for custom AI models (utilizing strictly anonymized or synthetic data clones).
- To dispatch system status updates, respond to support tickets, and resolve technical anomalies.
- To transmit administrative protocol updates, such as security patches or pricing schedule modifications.
4. Data Storage and Cyber Security
We deploy rigorous, industry-standard security architectures to protect your payloads. Our application backend is hosted on secure cloud infrastructure, and our client database utilizes Google Firebase's real-time AES encryption standards in transit and at rest.
However, please note that no electronic transmission over the global Internet or deep-storage technology can be mathematically guaranteed to be 100% secure. While we deploy advanced countermeasures, we cannot absolutely guarantee that hostile cybercriminals or unauthorized third parties will not attempt to defeat our firewalls.
5. Disclosure and Sharing
We never sell your corporate or personal data. We may execute secure data transfers only in the following specific operational scenarios:
- Infrastructure Partners: With verified third-party vendors who perform infrastructural services for us (e.g., SMTP email delivery, cloud server hosting).
- Legal Compliance: If legally compelled to do so by a court of competent jurisdiction or in response to valid subpoenas by public authorities.
6. Your Corporate Rights
Depending on your global operational jurisdiction, you maintain the fundamental right to:
- Request a full payload extraction of the personal data we hold regarding your entity.
- Request immediate corrections to any inaccurate system records.
- Request absolute deletion of your dashboard account and total wiping of associated data ("Right to be Forgotten").
To execute a command for any of these rights, please initiate a request via our official communication nodes below.
7. Official Contact Nodes
If you require clarification on any clauses within this architectural policy, you may establish contact with our High Council at:
Secure Email: delstarfordisaiah@gmail.com
Voice / Direct: +254 707 605 751
HQ Node: Innovation Hub, Kakamega, Kenya