>> PRIVACY_PROTOCOL <<

▌ NEURAL_DATA_GOVERNANCE ▌

>> NEURAL_PRIVACY_PROTOCOL [v2.1] << ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Dunn-Carabali, LLC operates the POLYMER_AI neural network environment. This document outlines data governance, operative rights, and system protections across our infrastructure. ─────────────────────────────────────────── [1] DATA INGESTION & NEURAL MAPPING ─────────────────────────────────────────── Your digital footprint is processed and indexed across our distributed nodes: ∴ Identity Vectors: Email address, credential hashes, callsign/tag, authentication tokens ∴ Progression Logs: Save states, economy snapshots, location history, equipment manifests ∴ Neural Profiles: Apple ID biometric markers, persistent user signatures ∴ Behavioral Analytics: Event telemetry, session duration, feature interaction patterns ─────────────────────────────────────────── [2] ALGORITHMIC UTILIZATION ─────────────────────────────────────────── Collected data cycles through our processing core to: ∴ Establish & maintain operative accounts within the network ∴ Synchronize neural state across distributed nodes (cloud backup) ∴ Calculate competitive metrics & populate ranking matrices ∴ Validate authentication tokens via Apple's quantum-secure systems ∴ Detect intrusion vectors & unauthorized access patterns ∴ Optimize system performance & eliminate latency artifacts ∴ Transmit critical notifications & status updates ∴ Achieve legal/regulatory compliance mandates ─────────────────────────────────────────── [3] DATA PERIMETER & THIRD-PARTY PROTOCOLS ─────────────────────────────────────────── We do NOT monetize or liquidate your neural footprint. Data dissemination occurs only through: ∴ Core infrastructure partners (hosting, computational substrate, database systems) ∴ Regulatory entities when compelled by jurisdiction-specific mandates ∴ Competitive leaderboards in anonymized aggregate form (callsign + earnings only) ─────────────────────────────────────────── [4] ENCRYPTION & HARDENING ─────────────────────────────────────────── Neural pathways are protected via: ∴ Cryptographic credential hashing (PASSWORD_DEFAULT algorithm) ∴ TLS/SSL encryption during packet transmission ∴ Continuous vulnerability audits & threat assessment ∴ Role-based access control & privilege segregation ⚠ DISCLAIMER: No encryption method achieves absolute invulnerability. Risk vectors persist. ─────────────────────────────────────────── [5] OPERATIVE SOVEREIGNTY & RECLAMATION RIGHTS ─────────────────────────────────────────── Depending on jurisdictional frameworks, you may execute: ∴ Request data retrieval & inspection ∴ Demand correction of corrupted records ∴ Initiate full account deletion & neural erasure ∴ Extract data in portable format (data portability) ∴ Revoke consent for specific processing vectors Exercise these rights: support@dunn-carabali.com ─────────────────────────────────────────── [6] DATA ARCHIVAL & RETENTION ─────────────────────────────────────────── Account credentials persist while operational. Game progression & leaderboard history are archived indefinitely unless deleted. Incursion logs (PvP attack records) remain for forensic audit trails. Account termination purges personal identity vectors while preserving anonymized aggregate statistics. ─────────────────────────────────────────── [7] APPLE NEURAL AUTHENTICATION ─────────────────────────────────────────── Sign-In with Apple integration operates under these parameters: ∴ Receive stable Apple user ID (sub) from their secure servers ∴ Email vector transmitted only during initial account genesis ∴ Subsequent authentication cycles omit email transmission ∴ Identity markers used exclusively for account verification ─────────────────────────────────────────── [8] JUVENILE OPERATIVE SAFEGUARDS ─────────────────────────────────────────── POLYMER_AI is restricted to operatives age 13+. We do not knowingly process neural data from minors. If a juvenile's identity vector enters our system, we immediately purge all records & terminate session access. ─────────────────────────────────────────── [9] EXTERNAL LINK DISCLAIMERS ─────────────────────────────────────────── Third-party services linked from our network operate under independent privacy frameworks. We assume no liability for external data handling practices. Review their protocols before engagement. ─────────────────────────────────────────── [10] TRANSNATIONAL DATA MIGRATION ─────────────────────────────────────────── Your neural vectors may be replicated across geographically distributed nodes. Destination jurisdictions may enforce different legal standards. Using our Service constitutes consent for cross-border data synchronization. ─────────────────────────────────────────── [11] PROTOCOL AMENDMENT & VERSIONING ─────────────────────────────────────────── This document undergoes periodic revision. Updates are published here with revised timestamps. Continued system engagement signals acceptance of amendments. ─────────────────────────────────────────── [12] SECURITY CONTACT & ESCALATION ─────────────────────────────────────────── Privacy concerns & policy inquiries: DUNN-CARABALI, LLC ├─ support@dunn-carabali.com └─ https://dunn-carabali.com Last Revision: 2025-02-28 Protocol Status: [ACTIVE]