01Introduction
At Incenta, your trust is our most valuable asset. This policy outlines how we collect, process, and protect data through our infrastructure. We focus on data minimization—collecting only what is necessary to prevent fraud and track conversions.
02Core Data Collection
Account Metadata
Basic identifiers including corporate email, company name, and encrypted authentication credentials.
Network Analytics
Technical logs including IP addresses, user-agent strings, and hardware metadata used exclusively for device fingerprinting and bot detection.
03How We Use Data
- A.To provision secure API endpoints and manage multi-tenant environments.
- B.To prevent sybil attacks and fraudulent reward exploitation via our security engine.
- C.To provide performance analytics for your referral ecosystem.
04Infrastructure Security
We use industry-standard encryption (AES-256) at rest and TLS 1.3 in transit. Data is isolated using hardware-level virtualization to ensure no cross-tenant information leakage occurs.
Privacy Requests
For data deletion requests or portability enquiries, contact our Privacy Officer.
privacy@incenta.com
Dedicated Response: privacy-team-lead