Back to Platform

Privacy Policy

Krankamango Intelligence Platform - Data Protection & Privacy

Last Updated: December 2024 | Version 2.0

1. Executive Summary

Krankamango Intelligence Platform ("we," "our," or "us") is committed to protecting your privacy and ensuring the security of your personal data. This comprehensive Privacy Policy outlines how we collect, use, store, and protect information in accordance with international data protection laws including GDPR, CCPA, PIPEDA, and other applicable regulations.

Key Privacy Commitments

  • Data Minimization: We collect only the data necessary for intelligence operations
  • Purpose Limitation: Data is used solely for authorized intelligence and security purposes
  • Security by Design: Advanced encryption and security measures protect all data
  • Transparency: Clear disclosure of data practices and user rights
  • Accountability: Regular audits and compliance monitoring

2. Legal Framework & Compliance

GDPR Compliance

Full compliance with EU General Data Protection Regulation (GDPR) including:

  • Right to Access (Article 15)
  • Right to Rectification (Article 16)
  • Right to Erasure (Article 17)
  • Right to Data Portability (Article 20)
  • Data Protection Impact Assessments

CCPA Compliance

California Consumer Privacy Act compliance including:

  • Right to Know (Section 1798.100)
  • Right to Delete (Section 1798.105)
  • Right to Opt-Out (Section 1798.120)
  • Non-Discrimination (Section 1798.125)

PIPEDA Compliance

Personal Information Protection and Electronic Documents Act:

  • Consent and Purpose Limitation
  • Accuracy and Safeguards
  • Openness and Individual Access
  • Challenging Compliance

3. Data Collection & Processing

3.1 Intelligence Data Collection

We collect and process intelligence data for authorized law enforcement and security purposes:

  • Entity Information: Names, aliases, locations, and associated data of tracked entities
  • Blockchain Data: Cryptocurrency addresses, transactions, and wallet analysis
  • Digital Footprints: IP addresses, domain registrations, and online activities
  • Social Media Intelligence: Public social media profiles and activities
  • Crime Reports: Criminal activities, investigations, and threat assessments

3.2 User Account Data

For platform access and authentication:

  • Authentication Data: Username, email, password hash, and session tokens
  • Profile Information: Name, agency affiliation, role, and contact details
  • Access Logs: Login attempts, IP addresses, and activity timestamps
  • Usage Analytics: Platform usage patterns and feature interactions

3.3 Legal Basis for Processing

Data processing is conducted under the following legal bases:

  • Legal Obligation: Compliance with law enforcement and security regulations
  • Public Interest: Protection of public safety and national security
  • Legitimate Interest: Intelligence gathering for authorized purposes
  • Consent: User consent for account management and communications

4. Data Security & Protection

4.1 Encryption Standards

  • Data at Rest: AES-256 encryption for all stored data
  • Data in Transit: TLS 1.3 encryption for all communications
  • Password Security: bcrypt hashing with salt for user passwords
  • API Security: HMAC-SHA256 for API authentication

4.2 Access Controls

  • Role-Based Access: Granular permissions based on user roles
  • Agency Isolation: Data segregation between different agencies
  • Multi-Factor Authentication: Required for all administrative access
  • Session Management: Automatic timeout and secure session handling

4.3 Infrastructure Security

  • Network Security: Firewalls, intrusion detection, and DDoS protection
  • Physical Security: Secure data centers with biometric access
  • Backup Security: Encrypted backups with geographic redundancy
  • Vulnerability Management: Regular security assessments and penetration testing

5. Data Retention & Disposal

5.1 Retention Periods

  • Intelligence Data: Retained for 7 years or as required by law
  • User Account Data: Retained while account is active, deleted 30 days after deactivation
  • Access Logs: Retained for 2 years for security monitoring
  • Backup Data: Retained for 90 days with secure deletion

5.2 Data Disposal

  • Secure Deletion: Overwriting with random data before deletion
  • Physical Destruction: Secure destruction of physical media
  • Verification: Audit trails for all data disposal activities
  • Compliance: Disposal in accordance with legal requirements

6. User Rights & Controls

6.1 Data Subject Rights

  • Right to Access: Request copies of personal data we hold
  • Right to Rectification: Correct inaccurate or incomplete data
  • Right to Erasure: Request deletion of personal data (with exceptions)
  • Right to Portability: Receive data in structured, machine-readable format
  • Right to Object: Object to processing based on legitimate interests
  • Right to Restriction: Limit processing in certain circumstances

6.2 Privacy Controls

  • Account Settings: Manage privacy preferences and data sharing
  • Data Export: Download personal data in standard formats
  • Communication Preferences: Control email and notification settings
  • Session Management: View and terminate active sessions

7. International Data Transfers

7.1 Cross-Border Transfers

Data may be transferred internationally for intelligence cooperation and security purposes:

  • Legal Framework: Transfers conducted under mutual legal assistance treaties
  • Adequacy Decisions: Transfers to countries with adequate data protection
  • Standard Contractual Clauses: EU-approved safeguards for data transfers
  • Binding Corporate Rules: Internal policies for multinational operations

7.2 International Cooperation

  • Law Enforcement: Cooperation with authorized international agencies
  • Intelligence Sharing: Secure sharing with allied intelligence services
  • Mutual Legal Assistance: Compliance with international legal requests
  • Data Localization: Respect for local data sovereignty requirements

8. Incident Response & Breach Notification

8.1 Incident Response Plan

  • Detection: 24/7 monitoring and automated threat detection
  • Response: Immediate incident response team activation
  • Containment: Rapid isolation and containment of security incidents
  • Recovery: Systematic recovery and restoration procedures
  • Lessons Learned: Post-incident analysis and process improvement

8.2 Breach Notification

  • Regulatory Notification: Notification to relevant authorities within 72 hours
  • User Notification: Notification to affected users without undue delay
  • Public Disclosure: Transparent communication about significant incidents
  • Remediation: Implementation of corrective measures and safeguards

9. Third-Party Services & Data Sharing

9.1 Authorized Data Sharing

  • Law Enforcement: Sharing with authorized law enforcement agencies
  • Intelligence Services: Cooperation with national intelligence services
  • Financial Institutions: Sharing for AML/CTF compliance
  • Security Partners: Collaboration with cybersecurity organizations

9.2 Third-Party Vendors

  • Vendor Assessment: Comprehensive security and privacy assessments
  • Data Processing Agreements: Legally binding agreements with all vendors
  • Ongoing Monitoring: Regular audits and compliance monitoring
  • Vendor Management: Centralized vendor risk management program

10. Compliance & Auditing

10.1 Compliance Monitoring

  • Regular Audits: Annual independent privacy and security audits
  • Internal Reviews: Quarterly internal compliance assessments
  • Regulatory Reporting: Regular reporting to relevant authorities
  • Certification: Industry-recognized privacy and security certifications

10.2 Training & Awareness

  • Employee Training: Annual privacy and security training for all staff
  • Role-Specific Training: Specialized training for data handlers
  • Awareness Programs: Ongoing privacy awareness campaigns
  • Compliance Testing: Regular testing of privacy knowledge and procedures

11. Contact Information & Support

11.1 Privacy Office

11.2 Regulatory Authorities

  • EU Data Protection Authorities: Contact your local DPA
  • California Privacy Protection Agency: www.cppa.ca.gov
  • Office of the Privacy Commissioner of Canada: www.priv.gc.ca
  • UK Information Commissioner's Office: ico.org.uk

Last Updated

This Privacy Policy was last updated on December 15, 2024. We may update this policy periodically to reflect changes in our practices or applicable laws. Users will be notified of significant changes through the platform or email.