01
Our privacy principles
These commitments anchor every workflow at MAR. They apply whether you are running MARAI experiments, onboarding a studio project, or receiving field support from our team. Each point below is backed by internal controls, employee training, and executive accountability.
- 01
First-party data minimization
We only gather first-party signals necessary to provision accounts, secure sessions, and provide contracted services. Optional telemetry is disabled by default so customers can decide when richer analytics justify the trade. When experimental capture is required, we use synthetic or anonymized surrogates until explicit consent is obtained.
- 02
Explicit consent checkpoints
Consent prompts appear at each stage where sensitive data categories shift from storage to processing. We document time-stamped consent proofs and replicate them across primary and disaster-recovery regions. If consent is revoked, workflows fall back to least-privilege functionality rather than suspending access outright.
- 03
Confidential computing boundaries
Production environments segment personally identifiable information from behavioral telemetry using hardware-backed enclaves. Encryption keys are rotated automatically every seven days and can be rotated instantly upon customer request. Access to decrypted data requires quorum approval from privacy, security, and product stakeholders.
- 04
Debugging without exposure
Observability traces, crash dumps, and vendor tickets are scrubbed through automated redaction pipelines before anyone on our side reviews them. Redaction rules are version controlled and tested alongside code so that new data types are covered before they ever appear in logs. Human escalation requires an auditable business justification and expires after each incident is resolved.
- 05
Localized storage guarantees
Customer data stays in the geographic region selected during onboarding, and we maintain active-active replication only within that chosen boundary. Backup media are encrypted with customer-specific keys and never exported to portable drives or third-party data centers. If we must migrate regions, we request written approval and supply a full migration runbook.
- 06
Vendor accountability
Every subprocessor we lean on signs bespoke privacy schedules that mirror or exceed MAR commitments. We map data flows through automated inventories reviewed quarterly by compliance engineering. If a vendor regresses on their posture, we either isolate them behind a proxy service or sunset the integration.
- 07
Child and minor protections
We do not knowingly collect data from individuals under the age of sixteen, and screening heuristics guard intake funnels for youth-oriented signals. If a record is flagged as belonging to a minor, we purge it within twenty-four hours and notify the reporting party with evidence of deletion. Educational deployments receive additional contractual addenda covering guardian consent.
- 08
Shadow copy elimination
Contract engineers and research partners work inside controlled workspaces that prohibit local storage, screenshot export, or copy-paste outside approved sandboxes. This measure keeps shadow databases from emerging on personal devices. Audits run weekly to ensure ephemeral workspaces truly self-destruct after their lease expires.
- 09
Disaster rehearsal with privacy controls
Business continuity exercises always include privacy observers who validate that emergency playbooks respect consent choices even during failover. During these rehearsals we simulate regulator inquiries and customer data subject requests to prove we can honor them while triaging outages. Lessons learned feed straight back into runbooks and policy documentation.
- 10
Research ethics review
Any plan to use customer datasets for model evaluation or product research routes through an internal ethics council chaired by our founder. The council can veto experiments that stretch privacy expectations or demand stronger anonymization. Summaries of approved research are logged for inspection by customer security teams.
- 11
Consent lifecycle notifications
Customers receive transparent notices whenever a new feature introduces additional data processing. Notices explain what is changing, why it matters, and how to opt out without breaking core functionality. We log acknowledgement status so account owners can confirm their teams understand the shift.
- 12
Annual red-team reviews
Privacy red-teams attempt to pierce isolation boundaries, escalate privileges, and correlate pseudonymized records. Findings are shared with customer security contacts, along with the remediation roadmap and completion proof. We treat these reviews as obligations, not marketing exercises.