Data Portal Policy of Aegis Vault Ltd.

Last Updated: December 10, 2024

1. INTRODUCTION

Aegis Vault Ltd. (“Company,” “we,” “our,” or “us”), a company incorporated under the laws of the British Virgin Islands with registration number 2163500, is committed to ensuring transparency and the responsible management of data. This Data Portal Policy (“Policy”) sets out the guidelines for accessing, using, and sharing information through our Data Portal.

2. PURPOSE OF THE DATA PORTAL

2.1 Primary Objectives

The Data Portal aims to provide stakeholders with:

  • Access to real-time financial and operational data
  • Insight into key metrics and performance indicators
  • Monitoring capabilities for market positions
  • Transparency in ecosystem operations
  • Compliance verification tools
  • Risk monitoring capabilities

2.2 Scope of Data

The Portal includes:

  • Reserve balances and allocations
  • Transaction histories
  • Profit calculations
  • Market positions on exchanges
  • Performance metrics
  • Compliance reports
  • Risk assessments
  • Audit trails
  • System health metrics

3. DATA ACCESS AND SECURITY

3.1 Access Rights

Authorized Users include:

  • Verified platform users
  • AEG token holders
  • Authorized partners
  • Compliance personnel
  • Auditors and regulators
  • Technical support staff

Access Levels:

  1. Basic Access
  • Public data
  • General metrics
  • System status
  1. Enhanced Access
  • Transaction details
  • Performance analytics
  • Historical data
  1. Administrative Access
  • Full system access
  • Configuration controls
  • User management

3.2 Security Measures

We implement:

  • End-to-end encryption (AES-256)
  • Multi-factor authentication (MFA)
  • Regular security audits
  • Access logging and monitoring
  • Intrusion detection systems
  • Hardware security modules (HSMs)
  • DDoS protection
  • API security controls

4. JURISDICTIONAL RESTRICTIONS

4.1 Restricted Jurisdictions

The Data Portal is not available to persons who are:

a) United States Restricted Persons:

  • Residents of the United States of America
  • Citizens of the United States of America
  • Persons located in the United States of America
  • Entities incorporated or organized under US laws
  • Persons subject to US jurisdiction

b) Sanctions Restricted Persons:

  • Residents or nationals of comprehensively sanctioned jurisdictions:
  • Cuba
  • Iran
  • North Korea
  • Syria
  • The Crimea, Donetsk, and Luhansk regions
  • Russia and Belarus (subject to applicable sanctions programs)
  • Persons listed on restricted party lists:
  • US Treasury OFAC’s SDN List
  • UN Security Council Consolidated List
  • EU Consolidated Financial Sanctions List
  • UK HM Treasury Consolidated List

4.2 Access Verification

We verify access eligibility through:

  • IP geolocation
  • Document verification
  • Identity validation
  • Sanctions screening
  • Ongoing monitoring
  • Regular re-verification

5. ACCEPTABLE USE

5.1 User Obligations

Users must:

  • Maintain credential security
  • Report suspicious activities
  • Respect data confidentiality
  • Comply with usage terms
  • Update contact information
  • Implement security best practices
  • Report security incidents
  • Maintain system integrity

5.2 Prohibited Activities

Users must not:

  • Share access credentials
  • Attempt unauthorized access
  • Modify or falsify data
  • Use data for harmful purposes
  • Circumvent security measures
  • Reverse engineer systems
  • Deploy automated scraping tools
  • Interfere with other users

6. DATA PROTECTION AND PRIVACY

6.1 Data Processing

We process data in accordance with:

  • BVI Data Protection Act
  • GDPR principles where applicable
  • Industry best practices
  • Privacy by design principles

6.2 Data Security Measures

  • Encryption in transit and at rest
  • Regular security assessments
  • Penetration testing
  • Vulnerability scanning
  • Access control reviews
  • Security awareness training

7. MONITORING AND COMPLIANCE

7.1 System Monitoring

We monitor:

  • Access patterns
  • Usage behaviors
  • Security events
  • Performance metrics
  • System availability
  • Data integrity
  • User activities
  • API usage

7.2 Compliance Requirements

Users must comply with:

  • BVI data protection laws
  • International regulations
  • Platform security standards
  • Usage agreements
  • Sanctions regulations
  • AML/KYC requirements
  • Industry standards

8. INCIDENT RESPONSE

8.1 Security Incidents

We handle incidents through:

  • Immediate investigation
  • Containment measures
  • Impact assessment
  • User notification
  • Remediation actions
  • Post-incident review

8.2 Reporting Procedures

Report issues to:

9. LIABILITY AND DISCLAIMERS

9.1 Limitation of Liability

  • No guarantee of data accuracy
  • Technical limitation disclaimers
  • Service interruption provisions
  • Force majeure clauses

9.2 User Responsibilities

Users are responsible for:

  • Maintaining secure access
  • Verifying data accuracy
  • Reporting discrepancies
  • Compliance with terms

10. UPDATES AND MODIFICATIONS

10.1 Policy Updates

We may update:

  • Access requirements
  • Security measures
  • Usage terms
  • Compliance standards
  • Technical specifications
  • Jurisdictional restrictions

10.2 Notification Process

Users receive:

  • Update notifications
  • Change summaries
  • Implementation timelines
  • Compliance requirements
  • Technical documentation

11. GOVERNING LAW AND JURISDICTION

11.1 Governing Law

  • BVI law applies
  • International regulations, where applicable
  • Industry standards and practices

11.2 Dispute Resolution

  • BVI courts have jurisdiction
  • Alternative dispute resolution is available
  • Mediation procedures
  • Arbitration options

Updated on December 10, 2024