Privacy Policy

Last Updated: January 29, 2025

Welcome to Cortensor or The Cortensor Network, managed and operated by Eliza Labs Inc. (“we”, “us”, “our”, “website” or “platform”). This policy explains how we handle how we handle, use, and protect User (“you” or your”) personal information while maintaining transparency about our data collection practices.

Cortensor is a decentralized AI network providing a platform for users to access AI inference capabilities, participate in validation tasks, and utilize various AI-driven services. At Cortensor, we aim to democratize AI by leveraging the power of decentralized networks and open-source models. Our goal is to provide a scalable, cost-effective solution for AI inference and development.

We recognize the trust you place in us when you use our platform, and we are fully committed to safeguarding your personal information. This Privacy Policy ensures that you understand what information we collect, why we collect it, and how it is used and protected. Our commitment reflects our dedication to complying with the highest standards of privacy laws, ensuring your rights and data are always respected.

By continuing to use our website and our services, you signify your acceptance of this Privacy Policy and consent to the practices described herein.

EFFECTIVE DATE

  1. This Privacy Policy is enacted and comes into full force starting from January 29, 2025. From the said date onwards, the principles and practices outlined within this policy will dictate the manner in which we manage, protect, and utilise your personal information.

USER AGE POLICY

  1. For users who are under the age of Sixteen (16) years, we are committed to ensuring their privacy and safety online. Information from these users is collected strictly in accordance with applicable parental consent mechanisms.

AGE RESTRICTION POLICY

  1. Age Requirement: Our services are designed for and directed towards adults, specifically those who are Sixteen (16) years of age or older. We do not knowingly collect, use, or solicit personal information from anyone who is a minor.

  2. Proactive Measures: In our registration process and at various points of interaction with our services, we take proactive steps to verify the age of our users, ensuring compliance with our Sixteen (16) years of age policy.

  3. Parental Control: If any Parent or guardian discovers that personal information has been collected from an individual who is a minor without verifiable parental consent, please contact us at info@cortensor.network we will take immediate steps to delete such information from our records and terminate the said account.

WHAT INFORMATION DO WE COLLECT?

  1. We are committed to collecting only the information necessary to provide and improve our services while ensuring compliance with privacy regulations. . We collect personal information about you in the following ways:

    1. Information You Provide to Us:

      1. When you use our services, participate in surveys, or interact with our platform, we may collect key personal information, such as your full name, your company name, website link, work email address, Telegram handle, X handle, other social media handles, information our servers automatically collect when you access our decentralized application (DApp), such as your wallet address, transaction history within our DApp, and interaction patterns with our smart contracts and any additional information you choose to share to enhance your personalized experience.

    2. Information from Third Parties:

      1. We may collect information or receive information about users from third-party partners and combine the information of the user.

    3. Automatically Collected Information:

      1. We may automatically collect certain information when you use our website, including your device's IP address, operating system, browser type, and usage patterns within our platform (e.g., pages visited, time spent on each page). We may collect precise geolocation data to provide location-based offers.

WHY DO WE COLLECT THE INFORMATION?

  1. The information we collect is utilized for various purposes that are essential to the operation and enhancement of our services. The purposes for which we collect and process personal data are outlined as follows:

  2. To Operate and Improve Our Services

    1. We specifically use your information to provide, operate, and maintain the website, ensuring that it functions efficiently and effectively for your benefit.

    2. This includes but is not limited to facilitating account creation, providing support, sending communications (marketing, administrative, or feedback requests), and ensuring compliance with our terms of use. Additionally, we process information to respond to legal requests, maintain safety, and fulfil contractual or legal obligations

  3. Registration and Account creation

    1. The information you provide is essential for creating and managing your account on our platform. This includes storing the necessary details to offer you a personalized experience ensuring the proper functioning of our website's features and services.

  4. Customer Support

    1. To provide you with customer support and respond to your Inquiries, Requests, or Complaints, We collect information to ensure that we can provide you with comprehensive and effective customer support.

  5. To Ensure Security and Prevent Fraud

    1. We collect information to protect your data, maintain the security of our website and services, and prevent fraudulent activities. By collecting and using information for security and fraud prevention, we aim to create a safe and secure environment for our users.

  6. To Comply with Legal Obligations

    1. We collect information to ensure compliance with various legal and regulatory requirements, which is crucial for maintaining the integrity and legality of our operations. This includes adhering to applicable data protection laws, financial regulations, and industry standards.

    2. We are required to maintain accurate records, process transactions lawfully, and safeguard user data as mandated by law. Compliance involves cooperating with law enforcement and regulatory authorities, responding to legal requests and court orders, and ensuring our business practices meet all applicable legal standards. By collecting and managing information in accordance with these legal obligations, we protect both our users and our organization from potential legal risks and ensure that our operations remain transparent, accountable, and legally compliant.

  7. To Ensure Confidentiality and Prevent Unauthorized Access

    1. We make every effort, using available resources, to ensure user information's confidentiality and prevent unauthorized access.

    2. However, it is not possible for us to completely and definitively block and/or prevent unauthorized access to the databases, and the user will waive any claim and/or demand against us in this regard, provided that we have taken reasonable measures to prevent such unauthorized access.

  8. Legal Basis for Processing Personal Data

    1. We process your personal data under the following legal bases:

      1. Consent: When you have given clear consent for us to process your data for a specific purpose.

      2. Contractual Necessity: To fulfil contractual obligations or provide the services you requested.

      3. Legal Obligation: When we are legally required to collect or process your information.

      4. Legitimate Interests: For our legitimate business interests, provided that these are not overridden by your data protection rights.

      5. Vital Interests: In rare cases, to protect someone’s life.

  9. We use the collected information to improve, personalize, and expand our services. This involves analyzing user interactions and preferences to tailor the website experience to your needs, and to develop new features and offerings that enhance the overall value of our platform.

  10. We also use the information to communicate with you. This includes sending you updates, promotional materials, and other relevant information related to the website.

USE OF INFORMATION

  1. Local Storage: The data you enter on the website is stored locally on your device. We do not share or transmit this data to our servers or third parties, except where explicitly stated in this Privacy Policy. Any transmission of data to our systems occurs solely for purposes essential to the functionality of our services and is handled in compliance with applicable data protection regulations.

  2. Personalization: The information you provide is utilized to customize the content, features, and services on the website to better align with your preferences and requirements. This includes but is not limited to tailoring interactive elements, exercises, and other functionalities to ensure an optimized and personalized user experience.

SHARING YOUR INFORMATION

  1. We deeply value the trust you place in us when you share your personal information. Our commitment to safeguarding that trust is unwavering, and as such, we adhere to strict principles when it comes to sharing your information. Here is how we ensure your data is handled with the utmost respect and care:

    1. Your information is shared only when you have given us clear and informed consent to do so. This means we may seek your explicit approval before any of your personal data is shared with third parties, ensuring you retain control over your own information.

    2. We may collaborate with carefully selected third-party service providers to deliver and enhance our services effectively. These providers may include hosting and data storage platforms, such as survey analytics and feedback tools, and marketing, advertising, or customer support services. All such collaborations shall be governed by confidentiality agreements to ensure that your information is handled securely and used solely for the purposes specified in this Privacy.

    3. There are circumstances where we may be required by law to share your information, such as in response to a legal process or to comply with governmental requests. Additionally, if it becomes necessary to protect the rights, property, or safety of our website, our users, or the public, we may share information within the bounds of legal requirements. This includes efforts to prevent fraud or potential threats to security.

    4. We may share your information with third-party service providers who assist us in operating our website, processing transactions, and providing our services.

    5. We may share your personal data with the following categories of third-party service providers:

      1. Cloud Storage Providers (e.g., AWS, Google Cloud) for data hosting.

      2. Payment Processors for secure financial transactions.

      3. Blockchain Analytics Tools for monitoring compliance with AML regulations.

      4. Marketing Platforms for sending communications and promotional materials.

    6. All third-party providers are contractually bound to maintain data security and confidentiality and may not use your data for unrelated purposes.

DATA PROTECTION & SECURITY

  1. We implement robust data security measures along with industry-standard security measures to protect your personal information from unauthorized access, alteration, or disclosure, or destruction. Our security protocols include the following:

    1. Encryption: We use encryption technology to protect sensitive data transmitted over the internet and stored in our systems. This ensures that your personal information remains confidential and secure.

    2. Access Controls: We restrict access to personal information to authorized personnel only. Our systems have role-based access controls to limit who can view or modify your data.

    3. Regular Audits: We conduct regular security audits and assessments to identify and address potential vulnerabilities. This helps us maintain a high level of security and adapt to emerging threats.

    4. Integration with Third-Party Services: We ensure that these services comply with our data protection standards and have their own security measures in place. We regularly review their practices to ensure alignment with our commitment to data security.

    5. Incident Response: In the event of a data breach, we will notify affected users promptly, following applicable legal requirements. We will provide information on the nature of the breach, the data affected, and the steps we are taking to mitigate the impact.

  2. However, while we have taken reasonable steps to secure the personal information you provide to us, please be aware that due to the experimental nature of the Cortensor platform, there is an inherent risk of unintended data exposure, such as your wallet address or other details. We continuously work to enhance our security protocols to minimize these risks.

  3. In the event of a data breach that compromises your personal data, we will notify you and relevant authorities within 72 hours in accordance with applicable laws. The notification will include:

    1. The nature and scope of the breach.

    2. The types of data affected.

    3. Actions we are taking to mitigate the impact.

    4. Steps you should take to protect yourself.

EXPERIMENTAL SOFTWARE AND DATA RISKS

  1. Cortensor is an experimental platform. While we strive to maintain a secure and reliable environment, users acknowledge that there may be unforeseen risks associated with the use of our software. These risks include, but are not limited to, accidental data leaks, technical vulnerabilities, or other issues inherent to experimental technologies.

  2. We strongly advise users to exercise caution when using the platform and to refrain from sharing sensitive, confidential, or personally identifiable information unless absolutely necessary. By using the platform, users accept the potential risks associated with experimental software and acknowledge that such risks are outside the full control of Cortensor.

  3. Cortensor is committed to addressing security vulnerabilities and data protection concerns promptly. In the event of any security issues or data incidents, we will take immediate action to mitigate the impact and keep our community informed of the nature of the incident, the risks involved, and any steps users may need to take to protect their information.

  4. While we employ industry-standard security measures to protect user data, Cortensor cannot guarantee absolute security. Users acknowledge and accept that any information shared or stored on the platform may be subject to risks inherent in the use of experimental technologies.

  5. By using the platform, users accept full responsibility for understanding and managing the risks associated with experimental software. Users are encouraged to periodically review this Privacy Policy and any updates provided by Cortensor to stay informed about potential risks and best practices for data protection.

USER RIGHTS AND RESPONSIBILITIES

  1. We are committed to ensuring that your rights concerning data privacy are clearly articulated and easily accessible. As a user, you have the following rights:

    1. Right to Access: You can request access to the personal information we hold about you. We will provide you with a copy of your data and inform you of how it is used.

    2. Right to Rectification: If your personal information is inaccurate or incomplete, you have the right to request that we correct or update it.

    3. Right to Erasure: You can request that we delete your personal information when it is no longer necessary for the purposes for which it was collected, or if you withdraw your consent.

    4. Right to Restriction of Processing: You have the right to request that we restrict the processing of your personal information under certain circumstances.

    5. Right to Withdraw Consent: If we rely on your consent for processing your personal information, you can withdraw your consent at any time.

    6. Right to Data Portability: You have the right to receive your data in a structured, commonly used, and machine-readable format and transfer it to another service provider.

    7. Right to Object: You can object to the processing of your data based on legitimate interests or for direct marketing purposes.

    8. Right to Lodge a Complaint: You have the right to file a complaint with a data protection authority if you believe we have violated your rights.

    9. Right to Non-Discrimination: We will not discriminate against you for exercising your privacy rights.

    10. Right to Withdraw Consent: You can withdraw your consent at any time without affecting the lawfulness of processing based on consent before its withdrawal.

  2. As a user of our platform, you are responsible for taking adequate precautions to safeguard your personal and financial data.

    1. You must securely store your wallet private keys, seed phrases, and access credentials. Sharing these with unauthorized parties may result in irreversible losses.

    2. Your seed phrase is your account recovery mechanism. Store it in multiple secure, offline locations. Avoid storing seed phrases digitally or sharing them with any party, including Cortensor.

    3. You are responsible for monitoring account activity and immediately reporting any suspicious or unauthorized access.

    4. The user should use secure devices, regularly update your software, and enable strong authentication measures, such as two-factor authentication (2FA), wherever possible.

    5. The user should always confirm the legitimacy of any communication claiming to represent Cortensor.

    6. You should research and confirm the credibility of any external tools or services before integrating them with your wallet.

    7. If you detect unauthorized access or unusual activity, immediately report it to Cortensor support or the relevant authority within your jurisdiction. Early reporting may help mitigate potential losses.

LIMITED LIABILITY

  1. We operate on a decentralized blockchain platform, and by its nature, certain limitations apply to our liability regarding user privacy and security.

    1. Data recorded on the blockchain is immutable and cannot be altered or deleted. Cortensor cannot guarantee the privacy of data shared on public blockchains and is not responsible for its misuse by third parties.

    2. Cortensor is not liable for losses or breaches arising from user negligence, including but not limited to the loss or theft of private keys, wallet credentials, or improper handling of sensitive data.

    3. While Cortensor takes reasonable measures to ensure that its service providers adhere to strict privacy and security standards, we cannot be held liable for breaches or mishandling of data by third-party services outside our direct control.

COMPLIANCE

  1. We are committed to complying with all applicable international privacy and data protection laws and regulations to ensure the protection and confidentiality of your personal information, no matter where you are located. This includes, but is not limited to:

    1. General Data Protection Regulation (GDPR): For users in the European Union, we adhere to the GDPR, which sets strict guidelines for data collection, processing, storage, and transfer. This includes ensuring lawful bases for processing personal data, obtaining explicit consent where necessary, and providing rights to access, rectify, and erase personal information.

    2. Panama Personal Data Protection Law (PPDPL): For users in Panama we comply with the PPDPA, which protects the privacy and personal information of residents in Panama.

    3. Other Jurisdictions: We also comply with any other relevant international privacy laws and regulations applicable to users in different regions.

  2. Cross Border Data Transfer:

    1. When transferring personal data across borders, we ensure that appropriate safeguards are in place to protect your information, such as using Standard Contractual Clauses (SCCs) or relying on adequacy decisions by relevant data protection authorities.

    2. If we transfer your personal data outside of the European Economic Area (EEA) or other jurisdictions with similar data protection laws, we will:

      1. Use Standard Contractual Clauses (SCCs) approved by the European Commission.

      2. Rely on adequacy decisions by relevant data protection authorities.

      3. Implement additional safeguards such as encryption and anonymization.

DATA RETENTION AND DELETION

  1. We generally retain personal information to fulfil the purposes for which we collected it, including for the purposes of satisfying any legal, accounting, or reporting requirements, to establish or defend legal claims, or for fraud prevention purposes.

  2. To determine the appropriate retention period for personal information, we may consider factors such as the amount, nature, and sensitivity of the personal information, the potential risk of harm from unauthorized use or disclosure of your personal information, the purposes for which we process your personal information and whether we can achieve those purposes through other means, and the applicable legal requirements.

  3. When we no longer require the personal information we have collected about you, we may either delete it, anonymize it, or isolate it from further processing.

  4. We retain your personal data only for as long as necessary to fulfil the purposes outlined in this policy or as required by applicable laws. Retention periods are determined by:

    1. The duration of your account activity.

    2. Legal, tax, accounting, or regulatory requirements.

    3. Security and fraud prevention needs.

    4. Once data is no longer needed, we securely delete, anonymize, or isolate it.

  5. Cortensor employs a structured approach to detect, respond to, and resolve security incidents.

    1. We utilize advanced threat detection systems to continuously monitor for anomalies, unauthorized activities, or vulnerabilities across its infrastructure. Alerts are generated and reviewed by security teams for swift response to potential incidents.

    2. Routine vulnerability assessments and penetration tests are conducted to identify and mitigate security gaps.

    3. In the event of a confirmed data breach or security incident, Cortensor will notify affected users without undue delay. Notifications will include:

      1. Details of the breach.

      2. Potential impacts on the user.

      3. Steps users should take to mitigate risks (such as changing passwords and securing their wallets).

    4. We will comply with applicable laws by reporting breaches to relevant data protection authorities within the required timeframes.

    5. Upon detection of a breach, we will:

      1. Isolate affected systems to prevent further unauthorized access.

      2. Deploy patches or updates to fix vulnerabilities.

      3. Strengthen affected accounts by resetting passwords or enforcing additional authentication requirements.

    6. We will provide affected users with dedicated support, guiding them through recommended steps to secure their accounts and minimize potential impacts.

    7. After resolving an incident, we will conduct a comprehensive review to:

      1. Identify root causes and contributing factors.

      2. Implement additional safeguards to prevent recurrence.

      3. Update internal protocols and incident response plans based on lessons learned.

    8. We remain committed to evolving its systems and protocols in line with technological advancements and emerging threats to uphold the highest standards of data security.

NO THIRD-PARTY DATA SHARING

  1. We do not share, sell, or transfer any of your personal data to third parties. Your data remains private and is used solely to provide and improve the functionality of the website. Our platform may however contain links to third-party websites or services that are not operated by Cortensor. We are not responsible for the privacy practices of these third-party sites. We encourage you to review their privacy policies before sharing any personal information.

BLOCKCHAIN TRANSPARENCY

  1. All transactions, interactions, and activities performed on the Cortensor platform are recorded on a blockchain. These records include but are not limited to:

    1. Wallet Addresses: The public identifiers used to send and receive transactions.

    2. Transaction Histories: Every transaction carried out, including transfers of tokens, staking activities, and other smart contract interactions.

    3. Smart Contract Interactions: All actions taken within Cortensor’s decentralized applications (DApps), such as executing contracts, voting on proposals, or staking tokens, are logged.

    4. Public Accessibility:

      1. These records are permanently stored on the blockchain and are publicly accessible to anyone with the appropriate tools or knowledge to view them.

      2. While specific data such as wallet addresses may not immediately identify the user, they can be traced, correlated, or linked to external sources under certain circumstances (by following patterns, associating wallet addresses with known identities, or using data analytics tools).

    5. These records are permanently stored on the blockchain and are publicly accessible to anyone with the appropriate tools or knowledge to view them.

    6. While specific data such as wallet addresses may not immediately identify the user, they can be traced, correlated, or linked to external sources under certain circumstances (such as following patterns, associating wallet addresses with known identities, or using data analytics tools).

  2. Immutability of Blockchain Data

    1. Once data is recorded on the blockchain, it becomes immutable. This means:

      1. No Modifications: Users, developers, or administrators cannot modify, alter, or update blockchain data once it has been confirmed.

      2. No Deletions: Similarly, blockchain data cannot be deleted. This ensures that transaction histories and smart contract activities remain transparent and verifiable indefinitely.

      3. The immutability of blockchain data ensures that once actions are taken, they cannot be undone, fostering accountability and trust.

      4. However, this also means that any errors, unintended actions, or security vulnerabilities in transactions are permanent. Users must be cautious and thorough when interacting with blockchain systems to avoid irreversible mistakes.

      5. Once users choose to record data on the blockchain, it cannot be modified or deleted.

      6. Users are fully responsible for the data they record, including their wallet address, transaction history, and interactions with smart contracts.

      7. By using our platform, you acknowledge that Cortensor nor does not have any liability or responsibility for any information shared or recorded on the blockchain.

      8. You agree to exercise caution when sharing personal data and ensure that you understand the permanent, immutable nature of blockchain records.

  3. Acknowledgment of Public Data: By using the Cortensor platform, you acknowledge and accept that certain actions, such as sending tokens, interacting with smart contracts, or participating in governance activities, will result in publicly visible data being recorded on the blockchain. This includes:

    1. Your wallet address, which can be traced on the blockchain and may be associated with your transaction history.

    2. The tokens you send or receive, which are visible to anyone with access to blockchain explorers.

    3. Your participation in network activities, such as staking, voting, or other decentralized actions.

    4. The open and transparent nature of blockchain technology ensures that anyone can verify the history and authenticity of transactions, creating a transparent environment where all actions are visible. However, users should be aware that this openness means their blockchain activity is publicly recorded for scrutiny by others.

  4. Risks of Sharing Sensitive or Personal Information: While blockchain technology provides an open ledger, users should exercise extreme caution when interacting with it. Sensitive information, such as:

    1. Private wallet addresses or private keys.

    2. Personal identifiers or transaction details that can reveal identities.

    3. Users should refrain from sharing or linking personally identifiable information (PII) to their public blockchain addresses or transaction activities to maintain privacy. Though blockchain transactions are pseudonymous, certain advanced techniques, such as blockchain analysis, can link wallet addresses to real-world identities.

  5. User Responsibility to Maintain Anonymity: In a public blockchain ecosystem, users should proactively protect their privacy by taking steps such as:

    1. Using different wallet addresses for different types of transactions.

    2. Avoiding sharing wallet addresses or transaction details unnecessarily in public forums or online discussions.

    3. Taking advantage of privacy tools, such as coin mixers or privacy-focused blockchain solutions, if necessary, to enhance anonymity when transacting.

    4. Users must understand that blockchain technology does not guarantee full privacy or anonymity. Even though blockchain networks allow for pseudonymous interactions, all transactions are traceable and permanently recorded.

AUTOMATED DECISION-MAKING AND PROFILING

  1. We are committed to maintaining a fair and transparent digital environment for all users. In alignment with this commitment:

    1. We employ automated decision-making and profiling processes judiciously, ensuring they do not significantly affect our users or lead to unjust or biased outcomes. Such technologies are utilised to enhance service efficiency and user experience, under stringent oversight.

    2. Decisions that have a significant impact on users, including those pertaining to eligibility for services or personalised content, are subject to human oversight. This ensures that any automated processes are monitored and can be adjusted to prevent unfair biases or errors.

    3. We are transparent about the use of automated systems and profiling within our operations, providing users with information on how such technologies might impact their interaction with our services. Users have the right to inquire about and contest decisions made by automated means, reinforcing our accountability.

    4. We do not make decisions that produce legal or similarly significant effects solely based on automated processing. Where automated decision-making is used, we provide meaningful information about the logic involved and the significance and consequences of such processing. You have the right to request human intervention.

COOKIES AND TRACKING TECHNOLOGIES

  1. We may use cookies and similar tracking technologies to collect and use personal data about you, including to serve interest-based advertising. Our use of cookies and tracking technologies includes:

    1. Essential Cookies: These cookies are necessary for the operation of our website. They enable you to move around our website and use its features.

    2. Performance and Analytics Cookies: These cookies collect information about how you use our platform, allowing us to improve its functionality and user experience. For example, these cookies help us understand which pages are visited most frequently and how users navigate the site.

    3. Functionality Cookies: These cookies allow our website to remember your choices (such as your username, language, or the region you are in) and provide enhanced, more personalized features.

    4. Advertising Cookies: These cookies are used to deliver advertisements more relevant to you and your interests. They also help limit the number of times you see an ad and measure the effectiveness of advertising campaigns.

  2. You have choices regarding the use of cookies and tracking technologies, including adjusting browser settings to refuse cookies, using opt-out mechanisms from industry-wide initiatives, and setting privacy preferences for specific tracking technologies.

  3. Before placing non-essential cookies on your device, we will request your explicit consent. You can manage your cookie preferences through our Cookie Consent Banner or adjust your browser settings.

    1. Essential Cookies: Always active for platform functionality.

    2. Analytics Cookies: Used only with your consent.

    3. Advertising Cookies: Used to deliver personalized ads and require consent.

  4. We are committed to implementing a robust cookie and consent mechanism to ensure transparency and user control. Key features of our cookie management system include:

    1. Explicit Opt-In: Before placing any non-essential cookies on your device, we will request your explicit consent via a Cookie Consent Banner. The banner will provide clear, specific information about the types of cookies we use and their purposes.

    2. Granular Cookie Preferences: You can manage your cookie preferences by selecting which categories of cookies you consent to (such as performance, functionality and advertising). These preferences can be managed directly through the Cookie Consent Banner.

    3. Continuous Access to Cookie Settings: Users can access and update their cookie preferences at any time through a dedicated Cookie Management Tool available on our website.

    4. Browser Settings: You can also adjust your browser settings to refuse cookies or alert you when cookies are being placed. Please note that refusing essential cookies may impact the functionality of our platform.

    5. Opt-Out Mechanisms: We participate in industry-wide initiatives that provide mechanisms for opting out of certain types of cookies, such as interest-based advertising cookies.

  5. We will clearly indicate:

    1. Which cookies are active on the platform.

    2. The purposes of each cookie type.

    3. The duration for which each cookie will remain on your device.

  6. You can manage your cookie preferences at any time:

    1. By revisiting our Cookie Consent Banner.

    2. Through your browser’s cookie settings.

    3. Using the Cookie Management Tool accessible on our website.

  7. We value your privacy and aim to provide you with full control over your data. By providing your consent to non-essential cookies, you agree to their placement and use in accordance with this policy. You may withdraw your consent at any time without affecting the lawfulness of processing based on consent before its withdrawal.

DO-NOT TRACK (DNT) FEATURES

  1. Many web browsers and some mobile operating systems provide a Do-Not-Track (“DNT”) feature or setting that users can enable to signal a privacy preference not to have their online activities tracked. This feature allows users to communicate their choice to limit data collection about their browsing behavior across websites.

  2. As of now, no uniform technology standard for recognizing and implementing DNT signals has been established. Due to the lack of a consistent standard, our systems are not currently configured to respond to DNT browser signals or other automated mechanisms indicating a user’s preference not to be tracked online.

  3. While we do not recognize DNT signals at this time, we remain committed to protecting user privacy and providing transparent information about our data collection and usage practices. Users can learn more about our privacy practices in this Privacy Policy and can adjust their privacy settings on our platform where applicable.

  4. If a standard for recognizing and implementing DNT signals is finalized, we will review and update our practices to ensure compliance and will notify users of any changes to this policy.

AUTOMATED DECISION-MAKING AND PROFILING

  1. We may employ automated decision-making and profiling processes judiciously, ensuring they do not significantly affect our users or lead to unjust or biased outcomes. Users have the right to inquire about and contest decisions made by automated means.

JURISDICTION AND DISPUTE RESOLUTION

This Privacy Policy, and any disputes related to it or to our services, shall be governed by and construed in accordance with the laws of the Republic of Panama, without regard to its conflict of law principles.

  1. Jurisdiction: Any disputes arising out of or relating to this Privacy Policy shall be submitted to the exclusive jurisdiction of the competent courts located in Panama. By using our website, you agree to submit to the personal jurisdiction of such courts for the purpose of litigating any such disputes.

  2. Dispute Resolution: We encourage you to first contact us at info@cortensor.network to seek resolution of any issues before pursuing legal action. We are committed to resolving any concerns promptly and effectively.

ACKNOWLEDGMENT AND ACCEPTANCE OF TERMS

  1. Understanding and Agreement:

    1. By accessing and utilizing our services, you affirm that you have thoroughly read, understood, and embraced the terms laid out in this Privacy Policy as well as our Terms of Use. This acknowledgment is crucial, as it forms the basis of our mutual understanding and agreement regarding your data and privacy.

POLICY UPDATES

  1. We are committed to regularly reviewing and updating this Privacy Policy. Our aim is to stay aligned with emerging legal standards, technological advancements, and shifts in our service offerings.

  2. If any significant modifications, revision, amendment, are made to this policy, we pledge to provide you with timely notifications. This ensures that you are always well-informed about how we handle your personal data, thereby empowering you to make choices that are best suited to your privacy preferences.

This Privacy Policy outlines how Cortensor collects, uses, and protects your information, ensuring transparency and commitment to your privacy. Please be aware of the experimental nature of our software and the associated risks, and know that we are dedicated to safeguarding your data to the best of our ability.

CONTACT US:

If you have questions regarding this Privacy Policy or your data rights, please contact our Data Protection Officer (DPO):

Email: info@cortensor.network

Address: Via España, Delta Bank Building, 6th Floor, Suite 604D, Panama City, Republic of Panama

Last updated