Back to Hub
Data Sovereignty Framework

Privacy Protocols

A comprehensive framework governing the collection, processing, and protection of personal information across The Utility Network ecosystem.

Effective: December 26, 2024Version 2.0

1. Introduction & Commitment

The Utility Company LLC ("Company," "we," "our," or "us") is committed to protecting the privacy, security, and sovereignty of personal information entrusted to us by our users, customers, partners, and stakeholders ("you" or "your"). These Privacy Protocols establish the comprehensive framework governing our collection, processing, storage, transmission, and disposition of personal and organizational data across all Company operations, subsidiaries, and affiliated entities.

These Protocols supersede traditional privacy policies by establishing affirmative data sovereignty principles that recognize your fundamental rights over your personal information. We do not merely comply with privacy regulations—we exceed them, treating data protection as a core organizational value rather than a compliance obligation.

Effective Date: December 26, 2024 Last Updated: December 26, 2024 Version: 2.0

These Privacy Protocols apply to: - All websites, applications, and digital platforms operated by The Utility Company LLC - All subsidiary operations including but not limited to BasaltHQ, Osiris Protocol, Requiem Electric, The Graine Ledger, DigiBazaar, Cornucopia Robotics, Arthaneeti, and Elysium Athletica - All services, products, and offerings provided under The Utility Network - All communications, marketing activities, and customer relationship management - All business-to-business relationships and partner integrations

2. Core Privacy Principles

Our Privacy Protocols are founded upon seven inviolable principles that govern all data-related activities:

2.1 Data Sovereignty You own your data. Period. We are custodians, not proprietors. Your personal information remains your property at all times, and you retain the absolute right to access, export, correct, or delete it without restriction, penalty, or undue delay.

2.2 Purpose Limitation We collect only the data necessary for explicitly stated purposes. We do not engage in speculative data collection, behavioral profiling for third-party benefit, or accumulation of information beyond operational necessity.

2.3 Transparency by Default Every data collection point, processing activity, and sharing arrangement is documented and accessible to you. We maintain a public Data Processing Registry that catalogs all categories of data we collect and how they are used.

2.4 Security as Architecture Privacy protection is engineered into our systems from inception, not retrofitted as an afterthought. We employ defense-in-depth strategies, zero-trust architectures, and cryptographic protections at every layer.

2.5 Minimal Retention Data is retained only for the duration necessary to fulfill its stated purpose or comply with legal obligations. Automated deletion protocols ensure timely disposition of information no longer required.

2.6 Consent as Contract Your consent is not buried in dense legalese or obtained through dark patterns. Consent requests are presented clearly, separately from other terms, and may be withdrawn at any time without affecting your access to core services.

2.7 Accountability Without Exception We accept full responsibility for data protection across our entire ecosystem, including all vendors, processors, and partners who access data on our behalf. Their compliance is our responsibility.

3. Data Collection Framework

3.1 Categories of Personal Data

We collect and process the following categories of personal data, each subject to the protections outlined in these Protocols:

Identity Data - Full legal name and any aliases or professional names - Date of birth and age verification indicators - Government-issued identification numbers (only when legally required) - Biometric identifiers (only with explicit consent and for specific security purposes)

Contact Data - Email addresses (primary and secondary) - Telephone numbers (mobile and landline) - Physical mailing addresses - Professional contact information

Account Data - Usernames and account identifiers - Authentication credentials (stored only in cryptographically hashed form) - Account preferences and settings - Multi-factor authentication data

Financial Data - Payment card information (tokenized, never stored in raw form) - Banking details for direct transactions - Transaction history and purchase records - Billing and invoicing information

Technical Data - IP addresses (anonymized after 90 days) - Browser type and version - Device identifiers and characteristics - Operating system information - Access timestamps and session data

Usage Data - Service interaction patterns - Feature utilization metrics - Performance and error logs - Search queries within our platforms

Communication Data - Customer support inquiries and responses - Email correspondence with Company representatives - Chat transcripts and support tickets - Feedback and survey responses

3.2 Collection Methods

Data is collected through the following mechanisms:

Direct Provision: Information you actively provide through forms, account creation, purchases, or communications.

Automated Collection: Technical data gathered automatically through cookies, analytics tools, and server logs.

Third-Party Sources: Information received from identity verification services, payment processors, or public databases, always with appropriate legal basis.

Inference: Limited derivations from collected data to improve service delivery, never for behavioral manipulation or discriminatory profiling.

4. Data Processing Activities

4.1 Legal Bases for Processing

All data processing activities are conducted pursuant to one or more of the following legal bases:

Contractual Necessity: Processing required to fulfill our contractual obligations to you, including service delivery, account management, and transaction processing.

Legitimate Interests: Processing necessary for our legitimate business interests, provided such interests do not override your fundamental rights. We conduct balancing tests for all legitimate interest claims and document our reasoning.

Legal Compliance: Processing required to comply with applicable laws, regulations, court orders, or governmental requests.

Explicit Consent: Processing for purposes requiring your affirmative, informed consent, which may be withdrawn at any time.

Vital Interests: Processing necessary to protect vital interests of you or another person, limited to emergency situations.

4.2 Specific Processing Purposes

We process personal data for the following purposes:

Service Delivery - Provisioning and maintaining your accounts - Processing transactions and fulfilling orders - Providing customer support and responding to inquiries - Delivering products, services, and digital content

Security & Fraud Prevention - Detecting and preventing unauthorized access - Identifying and mitigating fraudulent activities - Maintaining system integrity and availability - Conducting security audits and vulnerability assessments

Legal & Compliance - Fulfilling tax reporting obligations - Responding to lawful legal process - Maintaining records as required by applicable law - Defending legal claims and enforcing agreements

Communication - Sending transactional notices and account alerts - Providing service updates and announcements - Delivering marketing communications (with consent) - Conducting surveys and soliciting feedback

Improvement & Analytics - Analyzing service performance and reliability - Identifying and resolving technical issues - Developing new features and enhancements - Conducting aggregated, anonymized research

4.3 Automated Decision-Making

We employ automated decision-making systems in limited circumstances:

  • Fraud Detection: Automated systems analyze transaction patterns to identify potentially fraudulent activity. Flagged transactions are subject to human review before adverse action.
  • Risk Assessment: Automated risk scoring may be used for identity verification. You have the right to request human review of any automated decision affecting your access to services.
  • Content Moderation: Automated systems may flag content for review. Final moderation decisions involving account restrictions require human approval.

We do not engage in fully automated decision-making that produces legal effects or similarly significant impacts without human oversight and the opportunity for you to contest the decision.

5. Data Sharing & Transfers

5.1 Categories of Recipients

We share personal data only with the following categories of recipients, subject to appropriate safeguards:

Service Providers Vendors and contractors who process data on our behalf under written agreements that mandate equivalent privacy protections, including: - Cloud infrastructure providers - Payment processors - Customer support platforms - Analytics services (with anonymization requirements) - Email and communication services

Affiliated Entities Subsidiaries and affiliates within The Utility Network for integrated service delivery, subject to these Protocols.

Legal Authorities Government agencies, courts, and law enforcement when required by valid legal process or to protect vital interests. We evaluate all requests for legal validity and notify affected users unless legally prohibited.

Business Transfers Prospective acquirers or successors in the event of merger, acquisition, or asset sale, subject to confidentiality agreements and notification to affected users.

5.2 What We Never Do

We commit to never engaging in the following practices:

  • Selling personal data to third parties for monetary compensation
  • Sharing data with data brokers or marketing aggregators
  • Providing data to third parties for their independent marketing purposes without explicit consent
  • Disclosing data to government agencies without valid legal process
  • Sharing biometric data without explicit, separate consent
  • Transferring data to jurisdictions lacking adequate protections without supplementary safeguards

5.3 International Data Transfers

When transferring data across international borders, we implement the following safeguards:

Standard Contractual Clauses: All cross-border transfers to processors are governed by EU-approved Standard Contractual Clauses or equivalent binding instruments.

Adequacy Determinations: We prioritize transfers to jurisdictions with recognized adequacy status under GDPR and equivalent frameworks.

Supplementary Measures: Where legal frameworks in destination countries present risks, we implement additional technical and organizational measures including enhanced encryption, pseudonymization, and access restrictions.

Transfer Impact Assessments: We conduct and document assessments of the legal landscape in each destination country, evaluating surveillance laws, judicial remedies, and enforcement practices.

6. Security Protocols

6.1 Technical Security Measures

We implement comprehensive technical safeguards including:

Encryption - AES-256 encryption for data at rest - TLS 1.3 encryption for data in transit - End-to-end encryption for sensitive communications - Cryptographic key management with hardware security modules

Access Controls - Role-based access control (RBAC) limiting data access to authorized personnel - Multi-factor authentication for all administrative access - Privileged access management with just-in-time provisioning - Automated access reviews and deprovisioning

Network Security - Enterprise-grade firewalls and intrusion detection systems - DDoS protection and traffic analysis - Network segmentation isolating sensitive systems - Continuous vulnerability scanning and penetration testing

Endpoint Security - Managed device policies for all corporate endpoints - Data loss prevention (DLP) tools - Mobile device management for remote access - Endpoint detection and response (EDR) capabilities

6.2 Organizational Security Measures

Personnel Security - Background checks for personnel with data access - Comprehensive security awareness training - Confidentiality agreements and acceptable use policies - Disciplinary procedures for policy violations

Vendor Management - Security assessments prior to vendor engagement - Contractual security requirements and audit rights - Ongoing monitoring of vendor security posture - Incident notification requirements in all data processing agreements

Physical Security - Data center facilities with 24/7 security personnel - Biometric access controls for sensitive areas - Environmental controls and redundant power - Video surveillance and access logging

6.3 Incident Response

Our Incident Response Protocol includes:

Detection: Continuous monitoring, automated alerting, and employee reporting channels.

Containment: Immediate isolation of affected systems and preservation of evidence.

Assessment: Rapid determination of scope, affected data subjects, and risk severity.

Notification: Affected individuals notified within 72 hours for high-risk incidents, with clear explanation of the incident, potential impacts, and remediation steps.

Remediation: Root cause analysis, system hardening, and implementation of preventive measures.

Documentation: Comprehensive incident reports maintained for regulatory compliance and continuous improvement.

7. Your Rights & How to Exercise Them

7.1 Enumeration of Rights

You possess the following rights with respect to your personal data:

Right of Access You may request confirmation of whether we process your personal data and, if so, obtain a copy of such data along with information about how it is processed. We will provide this information in a commonly used electronic format.

Right of Rectification You may request correction of inaccurate personal data or completion of incomplete data. We will verify and implement corrections within 30 days.

Right of Erasure You may request deletion of your personal data when it is no longer necessary for its original purpose, when you withdraw consent, when you object to processing, or when processing is unlawful. Certain data may be retained where required by law or for legitimate archival purposes.

Right to Restrict Processing You may request limitation of processing while we verify accuracy contested data, where processing is unlawful but you oppose erasure, where we no longer need the data but you require it for legal claims, or pending verification of overriding legitimate grounds.

Right to Data Portability You may receive your personal data in a structured, commonly used, machine-readable format and transmit it to another controller. This right applies to data processed by automated means based on consent or contract.

Right to Object You may object to processing based on legitimate interests, and we will cease processing unless we demonstrate compelling legitimate grounds. You may object to direct marketing at any time, and we will immediately cease such processing.

Right to Withdraw Consent Where processing is based on consent, you may withdraw that consent at any time. Withdrawal does not affect the lawfulness of processing conducted prior to withdrawal.

Right Regarding Automated Decisions You may request human intervention in automated decisions that significantly affect you, express your point of view, and contest the decision.

7.2 How to Exercise Your Rights

Submit requests through any of the following channels:

Online Portal: privacy.theutilitycompany.co/requests Email: privacy@theutilitycompany.co Mail: The Utility Company LLC, Attn: Privacy Office, [Address]

We will acknowledge your request within 5 business days and provide a substantive response within 30 days. Complex requests may require an additional 60 days, in which case we will notify you of the extension and reasons.

Verification: We will verify your identity before processing requests to prevent unauthorized access. Verification methods include email confirmation, security questions, or government-issued identification for sensitive requests.

No Fee: We do not charge fees for processing rights requests unless requests are manifestly unfounded or excessive, in which case we may charge a reasonable fee or decline to act.

7.3 Appeals Process

If you are dissatisfied with our response to your request, you may: 1. Request reconsideration by our Chief Privacy Officer 2. File a complaint with your local data protection authority 3. Seek judicial remedy in courts of competent jurisdiction

8. Data Retention Schedules

8.1 Retention Principles

Data is retained only for the minimum period necessary to fulfill the purposes for which it was collected or as required by applicable law. Upon expiration of the retention period, data is securely deleted or irreversibly anonymized.

8.2 Retention Schedule by Category

Data CategoryRetention PeriodJustification
Account DataDuration of account + 3 yearsService delivery, legal claims
Transaction Records7 years from transactionTax and financial regulations
Customer Support3 years from resolutionQuality assurance, dispute resolution
Marketing PreferencesUntil consent withdrawnOngoing consent validity
Access Logs90 daysSecurity monitoring
Analytics Data26 months (anonymized)Service improvement
Contract RecordsDuration + 10 yearsStatute of limitations
Employment RecordsDuration + 7 yearsEmployment law compliance

8.3 Deletion Procedures

Automated Deletion: Systems are configured to automatically purge data upon expiration of retention periods. Deletion jobs run nightly with audit logging.

Secure Destruction: Data on physical media is destroyed using NIST 800-88 compliant methods. Certificates of destruction are maintained.

Backup Disposal: Backup media containing expired data is overwritten or destroyed within 90 days of retention period expiration.

Third-Party Deletion: Processors are contractually obligated to delete data upon our instruction and confirm compliance in writing.

9. Cookies & Tracking Technologies

9.1 Cookie Categories

Strictly Necessary Cookies Essential for website functionality, including authentication, security, and accessibility. These cannot be disabled without impairing core functionality.

Functional Cookies Enable personalization features such as language preferences, display settings, and content recommendations. You may disable these, which may reduce personalization.

Analytics Cookies Collect aggregated data about site usage to help us understand traffic patterns and improve user experience. We use privacy-focused analytics that do not track individuals across sites.

Marketing Cookies Used with your consent to deliver relevant advertising and measure campaign effectiveness. These are disabled by default and activated only with explicit opt-in.

9.2 Cookie Management

Consent Banner: Upon first visit, you are presented with a clear consent interface allowing you to accept or reject non-essential cookies by category.

Preference Center: Accessible at any time via the "Cookie Settings" link in our footer, allowing you to modify your choices.

Browser Settings: You may configure your browser to block or delete cookies. Note that blocking strictly necessary cookies may prevent access to some features.

Do Not Track: We honor Do Not Track browser signals by disabling non-essential tracking when detected.

9.3 Third-Party Trackers

We limit third-party trackers on our platforms. Any third-party scripts are vetted for privacy compliance and loaded only with appropriate consent. We do not permit third parties to place tracking cookies for their independent purposes.

10. Children's Privacy

10.1 Age Restrictions

Our services are not directed to individuals under 16 years of age. We do not knowingly collect personal data from children under 16. If you are a parent or guardian and believe your child has provided personal data to us, please contact our Privacy Office immediately.

10.2 Parental Controls

Where services are offered that may be accessed by minors with parental consent, we implement: - Verified parental consent mechanisms compliant with COPPA and equivalent regulations - Enhanced data minimization for minor users - Prohibition on targeted advertising to known minors - Parental access and deletion rights

10.3 Discovery of Minor Data

Upon discovering that we have collected data from a child under 16 without verified parental consent, we will: 1. Immediately suspend processing of such data 2. Attempt to notify the parent or guardian 3. Delete the data within 48 hours unless parental consent is obtained

11. Regional Privacy Frameworks

11.1 European Economic Area (GDPR)

For data subjects in the EEA, UK, and Switzerland: - Our EU representative may be contacted at: eu-privacy@theutilitycompany.co - Legal bases for processing are documented for each activity - Cross-border transfers are governed by Standard Contractual Clauses - You may lodge complaints with your national supervisory authority

11.2 California (CCPA/CPRA)

For California residents: - You have the right to know what personal information we collect, disclose, and sell - You may opt out of the sale or sharing of personal information (we do not sell personal information) - You may limit use of sensitive personal information - We do not discriminate based on exercise of privacy rights - Authorized agents may submit requests on your behalf with written authorization

11.3 Other U.S. States

We comply with state privacy laws including: - Virginia Consumer Data Protection Act (VCDPA) - Colorado Privacy Act (CPA) - Connecticut Data Privacy Act (CTDPA) - Utah Consumer Privacy Act (UCPA) - Additional state laws as they take effect

11.4 Brazil (LGPD)

For data subjects in Brazil: - Processing is conducted in accordance with LGPD principles - You may exercise rights through our standard request process - Our Data Protection Officer is available for inquiries

11.5 Other Jurisdictions

We monitor and comply with privacy regulations in all jurisdictions where we operate. Contact our Privacy Office for jurisdiction-specific information.

12. Protocol Updates

12.1 Notification of Changes

We may update these Privacy Protocols to reflect changes in our practices, technologies, legal requirements, or business operations. When we make material changes:

  • We will post the updated Protocols on this page with a new "Last Updated" date
  • We will notify you via email (if you have provided one) at least 30 days before material changes take effect
  • We will maintain an archive of previous versions accessible upon request

12.2 What Constitutes Material Change

Material changes include: - New categories of personal data collected - New purposes for processing - New categories of third-party recipients - Changes to your rights or how to exercise them - Changes to data retention periods - Changes to international transfer mechanisms

12.3 Continued Use

Your continued use of our services after the effective date of updated Protocols constitutes acceptance. If you do not agree with changes, you may close your account and request deletion of your data.

13. Contact Information

Data Protection Office

For questions, concerns, or requests regarding these Privacy Protocols or your personal data:

The Utility Company LLC Privacy Office Email: privacy@theutilitycompany.co Online: privacy.theutilitycompany.co

Chief Privacy Officer Email: cpo@theutilitycompany.co

Data Protection Officer (EEA) Email: dpo@theutilitycompany.co

Response Times - General inquiries: 5 business days - Rights requests: 30 days (up to 90 days for complex requests) - Complaints: 15 business days

Escalation If you are not satisfied with our response, you may escalate to: 1. Chief Privacy Officer 2. General Counsel 3. Your local data protection authority 4. Courts of competent jurisdiction

  • --

*These Privacy Protocols represent our commitment to respecting your data sovereignty and protecting your information with the highest standards of care. They are not merely legal compliance documents but affirmations of our core values.*

The Utility Company LLC *Building Sovereign Infrastructure*