Privacy Policy
This document outlines the systematic handling of personal information within the Jade Cloud Research infrastructure. As a laboratory dedicated to cloud excellence, we treat data integrity as a foundational requirement.
Information Capture & Acquisition
Our research environment requires specific data points to maintain secure cloud operations and provide tailored analytics. We do not engage in broad-spectrum data harvesting.
SECURE LOG: All captured metrics are encrypted at rest using industry-standard protocols.
Direct Interactions
When you engage with our laboratory—whether requesting research insights or contacting our KL 4 facility—we collect identifiers such as your name, corporate email address, and professional phone number. This allows us to maintain a precise record of communication.
Infrastructure Telemetry
To optimize our cloud interfaces, we automatically log technical metadata including IP addresses, browser specifications, and engagement duration. This data is strictly used for diagnostic and performance mapping.
Analytics Parameters
We process behavioral patterns within our research portal. This helps our data scientists understand which technological infrastructure topics are most relevant to our audience, facilitating more focused research outputs.
Operational Utility
Jade Cloud Research utilizes collected data for the following specific operational objectives. We never sell your personal information to third parties.
Validating user identity for secure access to sensitive research modules.
Enhancing UI/UX delivery based on aggregated interaction modeling.
Creating anonymized reports on industry-wide infrastructure trends.
Delivering technical notifications and research updates to subscribers.
User Sovereignty & Rights
Global compliance standards and data control procedures.
We recognize your right to control your personal digital footprint. Regardless of your geographic location, Jade Cloud Research offers high-transparency access to the data we hold.
Request for Access
You may request a complete export of the personal data we have stored related to your identity.
Rectification Protocol
Should any data in our research database be inaccurate, you have the right to demand immediate correction.
Erasure (Right to be Forgotten)
Under certain conditions, you may request the permanent deletion of your data from our active systems.
Processing Restriction
You can limit how we use your data, specifically in contexts of automated profiling or marketing.
To exercise these rights, please contact our Data Protection Officer at info@jadecloudresearch.digital with the subject line "Privacy Rights Request".
Security & Storage Infrastructure
Personal data processed by Jade Cloud Research is stored within high-availability cloud environments. We employ multi-layer encryption both during transit (TLS 1.2+) and at rest (AES-256).
Our research partners and service providers are vetted for compliance with international standards such as SOC2 and GDPR. We do not transfer data outside of secure jurisdictions without adequate protective measures.
Compliance Inquiries
If you have questions regarding our data governance policies or need to report a security incident, our technical team is available during standard laboratory hours.
Direct Mail
info@jadecloudresearch.digital
Lab Location
KL 4, Kuala Lumpur
Support Line
+60 3 2000 0004
Operations
Mon–Fri: 09:00–18:00
Jade Cloud Research reserves the right to modify this protocol. Significant changes will be announced via our research newsletter or technical insights feed. Last updated March 17, 2026.