Institutional Governance

Privacy & Data
Protection Policy.

Last Revised

February 01, 2026

Introduction

At Buraq, we architect high-performance software with the core philosophy that data privacy is a structural requirement, not an elective feature. This policy defines our commitment to safeguarding the assets of our enterprise partners.

Information Collection

Personal Identifiable Information (PII)

We collect information that identifies you as an individual, including name, corporate email, professional phone number, and institutional affiliation during consultation requests or service onboarding.

Technical Telemetry

Our systems automatically log IP addresses, browser configurations, and session data to optimize infrastructure performance and maintain security integrity.

Data Utilization

Service Orchestration

Data is utilized to deploy and maintain AI workflows, Enterprise ERP systems, and secure cloud environments tailored to your specific operational requirements.

System Optimization

Aggregated, non-identifiable data is analyzed to enhance our proprietary algorithms and infrastructure scalability.

Security Protocols

Encryption Standards

All data is subject to AES-256 encryption at rest and TLS 1.3 encryption in transit, adhering to institutional-grade security benchmarks.

Access Governance

Strict 'Least Privilege' access controls are enforced, ensuring only authorized engineering personnel can interact with sensitive data layers.

Regulatory Rights

Sovereignty & Access

Clients maintain full sovereignty over their data. You have the right to request full data exports, corrections, or permanent erasure within 30 days of notice.