Back to Legal DirectoryLEGAL DIRECTIVE // 02

PRIVACY
POLICY.

How we protect, process, and permanently record your data signatures on the protocol.

01

Introduction

TALA operates as a zero-knowledge, non-custodial vault platform.

This Privacy Policy explains how we collect, use, disclose, and otherwise handle information. Since TALA is non-custodial, we do not have access to your vault contents or encryption keys. We are committed to protecting your privacy and ensuring you have a positive, secure experience on our protocol.

02

Information We Collect

We collect minimal information and exactly only what is fundamentally necessary to operate the Service:

  • Wallet AddressPUBLICLY VISIBLE ON-CHAIN

    Your blockchain wallet address, collected identically to standard Web3 dApps when connecting.

  • Transaction DataIMMUTABLE / PERMANENT

    Records of vault creation, access times, and transaction hashes permanently stored on-chain.

  • Analytics DataANONYMOUS

    Usage statistics including pages visited, features used, and device information for security.

03

Information We DO NOT Collect

The following information is explicitly NOT collected, seen, or stored by TALA:

  • Encryption keys
  • Private keys or seed phrases
  • Vault contents or encrypted datasets
  • File contents or detailed unencrypted metadata
  • Personal identification info (unless voluntarily given via support)
✓ Your data stays entirely under your control. We cannot access what happens inside your vault.
04

Collection Vectors

We collect information inherently through:

  • Wallet Connections when authorizing the dApp.
  • Smart Contract Interactions when writing state.
  • Website Browsing via cookies/analytics.
  • Voluntary Comms when contacting support.
05

Data Utilization

We use collected diagnostic info for:

  • Service Operation: Processing logic.
  • Security: Detecting fraud / abuse.
  • Improvement: Usage analytics.
  • Compliance: Legal obligations.
06

Data Storage & Security

Your data is architected and secured as follows:

ON-CHAIN

All vault metadata transactions are permanently stored on the Polygon ledger and cannot be deleted or modified by anyone, including us.

OFF-CHAIN

Telemetry and generic server data are secured using industry-standard firewalls, strict IAM access controls, and audited encryption at rest.

⚠️ No security system is impenetrable. We cannot guarantee absolute security against zero-day exploits, and you use TALA at your own risk.

07

Blockchain Transparency

By interacting with Web3, your actions are public.

  • Public VisibilityAll vault transactions are publicly visible on the blockchain scanner. Anyone can view them.
  • Wallet LinkageYour wallet address is permanently associated with all vault transactions you deploy or decrypt.
  • ImmutabilityBlockchain data cannot be deleted, modified, or scrubbed once recorded in a block.
Consider using wallet mixers or privacy networks if you want to obfuscate transaction history (though this may have severe legal implications depending on jurisdiction).
08

Third-Party Integrations

We integrate with massive infrastructure providers. Their privacy policies govern the data they index:

  • IPFS / PINATAYour encrypted payloads are stored on IPFS via Pinata gateways.
  • RPC ProvidersBlockchain node providers like Alchemy/Infura will see and may log your IP address.
  • WalletsMetaMask, Phantom, etc., operate under isolated data practices.
09

Your Global Privacy Rights

Depending on your jurisdiction (e.g., GDPR in the EU, CCPA in California), you may have the following sovereign rights:

ACCESS

Request a copy of personal data we explicitly hold off-chain.

CORRECTION

Request we correct inaccurate off-chain databases.

DELETION

Delete personal data (on-chain data CANNOT be deleted).

EU Users: Blockchain data processing relies on legitimate interest and absolute network immutability, bypassing typical "Right to be Forgotten" mandates where mathematically impossible.

10

Protection Imperatives

  • Cookies & AnalyticsWe use minimal functional cookies. See Cookie Policy for detailed tracking matrices.
  • Minors & ChildrenTALA is engineered for 18+ protocol usage. We will aggressively delete any off-chain data identified as belonging to minors.
  • Breach ProtocolsIn the event of an off-chain structural breach, we will initiate public notifications detailing affected data silos and remediation vectors.
11

Resolution & Agreement

We may update this Privacy Policy periodically to reflect protocol evolutions or legal compliance shifts. Changes are effective immediately. Continual interactions with TALA proxy contracts constitute unyielding acceptance.

For privacy escalations or GDPR/CCPA requests, initialize contact.

Contact Privacy
T.A.R.A. - Trustworthy AI Response Assistant