PRIVACY POLICY

Operational Protocol Revision: January 2026

01. DATA COLLECTION & INTAKE

The 8th Layer Intelligence platform collects minimal telemetry required for operational excellence. This includes identification data provided during operative registration (name, professional email, organizational affiliation) and diagnostic data gathered during authorized security simulations.

02. MISSION USAGE

Collected intelligence is strictly utilized to calibrate social engineering resilience, automate report generation, and enhance the defensive capabilities of your organization. We do not monetize your security posture data with unauthorized third parties.

03. CRYPTOGRAPHIC ENFORCEMENT

All data at rest is encrypted using AES-256 protocols. Transit pathways are secured via TLS 1.3. Your security tokens and authentication hashes are stored using salted hashing algorithms to ensure zero-knowledge integrity.

04. OPERATIVE RIGHTS

Authorized operatives retain the right to request a full disclosure of their collected footprint or total deletion of their profile within the Command Center, subject to organizational retention overrides for compliance (SOC2/ISO).

Legal Clearance Office

For data access requests or privacy inquiries, contact the encryption desk at: privacy@the8thlayer.com