メインコンテンツに移動
privacyPage.eyebrow

privacyPage.title

privacyPage.description

Effective · privacyPage.effectiveDateClosed-source · AiA · By LyDian

1. Introduction

AiA · By LyDian ("we", "us", "our") is a closed-source disaster coordination platform. We process personal data only as required to deliver the service mandate: incident triage, team dispatch, mesh communication, seismic telemetry, and family reunion logistics. Our governing principles are data minimisation, purpose limitation, and transparency.

2. What we collect

  • Operator account identifiers and authentication signals.
  • Device-level signals for mesh provisioning (no IMEI, no SIM).
  • ICE (In-Case-of-Emergency) data — blood type, allergies, contacts — encrypted at rest.
  • Incident metadata: coordinates, timestamps, severity, narrative text.
  • Communication logs scoped to operational incidents.

3. How we use it

  • Deliver disaster coordination services to partner agencies.
  • Authorise operator actions via RBAC scopes.
  • Produce audit logs for regulatory accountability.
  • Improve service-level objectives through aggregate analytics.

4. Where data lives

AiA is sovereign-hostable. Deployment may be on-premises, in a national cloud, or in a dual-region configuration governed by the engagement agreement. No data leaves the agreed jurisdiction without explicit contractual authorisation.

5. Sharing

Personal data is shared only with civil-protection partner agencies on a need-to-know basis for the active incident. We do not sell, rent, or trade personal data. Anonymised, aggregated statistics may be shared for public-safety research.

6. Your rights

  • Access, correct, or delete your data via the operator console.
  • Restrict processing for specific incidents.
  • Object to automated decision-making (none is currently deployed).
  • File a complaint with your national data protection authority.

7. Children

We do not knowingly process personal data of children below the applicable legal age. If a child's ICE profile is submitted, it requires verifiable parental or guardian consent.

8. Closed-source notice

Implementation details — frameworks, databases, hardware — are proprietary and not published. This policy describes what data we process and why, not how the platform is built.