PRIVACY & DATA PROTOCOL

1. TELEMETRY AND Q-LEARNING DATA INGESTION

Azet Prime operates on adaptive Q-Learning reinforcement models. By accessing Stage 1 (Observatory), Stage 2 (Challenge), or subsequent live deployment tiers, the User explicitly consents to the continuous collection of their trading telemetry, execution latency, win/loss ratios, and portfolio risk metrics. This data is ingested anonymously to train, optimize, and refine the Software's proprietary execution logic. We collect this data not for marketing, but for mathematical survival.

2. ABSOLUTE DATA INTEGRITY AND CLOSED-LOOP POLICY

We operate a strictly closed-loop architectural system. Azet Prime does not, and will never, monetize, rent, or sell User execution data, personal identification, or trading history to third-party data brokers, hedge funds, marketing agencies, or external analytical firms. Your algorithmic footprint remains locked within our proprietary ecosystem.

3. API KEY ENCRYPTION AND CLOUD SECURITY LIABILITY

While Azet Prime employs institutional-grade cryptographic standards to secure API keys provided by the User for exchange connectivity, no cloud-based infrastructure is entirely immune to sophisticated cyber-intrusions. The User acknowledges that transmitting and storing API keys on any internet-connected server carries inherent risks. Azet Prime shall not be held liable for third-party breaches, unauthorized exchange access, or data exfiltration resulting from state-sponsored or advanced persistent threats (APTs).

4. MINIMIZATION OF TRACKING

We do not track your web browsing habits outside of the Azet Prime terminal interface. Cookies and local storage are utilized strictly for session authentication, maintaining strict security protocols, and ensuring uninterrupted WebSocket connectivity during high-frequency execution cycles.