Privacy Policy

ZKyNet™ Privacy Infrastructure

Effective Date: August 13, 2025

Last Updated: August 13, 2025

🔒 PIPEDA Compliant

This Privacy Policy complies with Canada's Personal Information Protection and Electronic Documents Act (PIPEDA) and covers both our current MVP VPN service and future ZKyNet technology.

1. Introduction

ZKyNet™ ("ZKyNet", "we", "us", or "our") is committed to protecting your privacy and personal information. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our services, including our MVP VPN service and future ZKyNet privacy infrastructure network.

Our privacy practices are designed to comply with Canada's Personal Information Protection and Electronic Documents Act (PIPEDA) and reflect our core mission: building privacy infrastructure that protects user anonymity while meeting legal compliance requirements.

Privacy Officer: For all privacy-related inquiries, please contact our Privacy Officer at privacy@zkynet.org.

2. Information We Collect

The information we collect varies depending on which ZKyNet service you use. We follow data minimization principles, collecting only the information necessary to provide our services.

2.1 MVP VPN Service

Account Information:

  • Email address (for account creation and support)
  • Payment information (processed through third-party payment providers)
  • Account preferences and settings
  • Support communication history

Temporary Connection Logs (MVP Only):

  • Anonymized user identifier (not linked to your identity)
  • Connection timestamp (start and end times)
  • Data transfer amounts (for bandwidth management)
  • Server location connected to
  • Retention: Automatically deleted within 15 minutes of disconnection

What We DO NOT Collect (MVP):

  • Your real IP address (beyond connection establishment)
  • Websites you visit or browsing history
  • DNS queries while connected to our service
  • Content of your internet traffic
  • Files downloaded or uploaded
  • Any personally identifiable information in traffic logs

2.2 Future ZKyNet Network

Our future ZKyNet privacy infrastructure implements zero centralized logging:

Account Information Only:

  • Email address and account credentials
  • Payment and subscription information
  • Node operator details (if applicable)
  • Service preferences and configurations

Zero Traffic Logging:

  • No connection logs - cryptographic proofs handle abuse prevention
  • No traffic monitoring - zero-knowledge architecture prevents data collection
  • No IP address logging - decentralized nodes cannot track users
  • No activity correlation - mathematical privacy guarantees

2.3 Website and Marketing

  • Email addresses from newsletter signups
  • Contact form submissions
  • Node operator interest registrations
  • Website analytics (anonymized, privacy-respecting)
  • Customer support communications

3. How We Use Your Information

We use your information only for the purposes for which it was collected, in accordance with PIPEDA principles:

3.1 Service Provision

  • Account Management: Creating and maintaining your user account
  • Payment Processing: Handling subscriptions and billing
  • Technical Support: Providing customer assistance and troubleshooting
  • Service Improvement: Analyzing aggregated, anonymized data for performance optimization

3.2 Abuse Prevention (MVP Only)

  • Network Security: Temporary connection logs help identify network abuse patterns
  • Fair Usage: Monitoring bandwidth usage to ensure service quality for all users
  • Legal Compliance: Cooperating with legitimate law enforcement requests when legally required

3.3 Communication

  • Service Updates: Important notifications about service changes or security updates
  • Newsletter: Optional updates about ZKyNet development and privacy news (with explicit consent)
  • Support Communication: Responding to your inquiries and support requests

4. Information Sharing and Disclosure

4.1 General Policy

We do not sell, trade, or rent your personal information to third parties. We only share information in the limited circumstances outlined below:

4.2 Service Providers

We may share information with trusted service providers who assist us in operating our services:

  • Payment Processors: Secure handling of payment information
  • Email Services: Newsletter and transactional email delivery
  • Infrastructure Providers: Hosting and server management (within Canada when possible)
  • Analytics Services: Privacy-respecting usage analytics

All service providers are contractually bound to protect your information and use it only for the specified purposes.

4.3 Legal Requirements

We may disclose information when required by law:

  • Court Orders: Valid subpoenas, warrants, or court orders
  • Law Enforcement: Legitimate requests from Canadian law enforcement agencies
  • Legal Proceedings: To defend our rights or comply with legal processes
  • Emergency Situations: To prevent harm to individuals or property

Important: For our MVP VPN service, we can only provide the minimal temporary connection logs described in Section 2. For our future ZKyNet network, no traffic data exists to be disclosed due to our zero-knowledge architecture.

4.4 Business Transfers

In the event of a merger, acquisition, or sale of assets, personal information may be transferred. We will provide notice before your information becomes subject to different privacy practices.

5. Data Retention and Deletion

5.1 Retention Principles

We retain personal information only as long as necessary for the purposes outlined in this policy or as required by law:

5.2 Specific Retention Periods

MVP VPN Service:

  • Connection Logs: Automatically deleted within 15 minutes of disconnection
  • Account Information: Deleted within 30 days of account cancellation
  • Payment Records: Retained for 7 years for tax and accounting purposes
  • Support Communications: Deleted within 2 years unless ongoing legal matters

Future ZKyNet Network:

  • Traffic Data: Never collected or retained (zero-knowledge architecture)
  • Account Information: Deleted within 30 days of account cancellation
  • Node Operator Records: Retained as long as node participation continues
  • Cryptographic Proofs: Ephemeral, automatically deleted after verification

5.3 User-Initiated Deletion

You can request immediate deletion of your personal information by:

  • Canceling your account through our support system
  • Contacting our Privacy Officer at privacy@zkynet.org
  • Using our automated deletion request form (when available)

6. Your Privacy Rights Under PIPEDA

Under Canada's PIPEDA, you have the following rights regarding your personal information:

6.1 Right of Access

  • Request access to your personal information we hold
  • Receive information about how your data is used and shared
  • Understand the source of your personal information
  • Learn about the purposes for which information is collected

6.2 Right to Correction

  • Challenge the accuracy or completeness of your personal information
  • Request corrections or updates to inaccurate information
  • Have disputed information annotated if accuracy cannot be resolved

6.3 Consent Management

  • Withdraw consent for specific uses of your personal information
  • Opt out of marketing communications at any time
  • Control the sharing of your information with service providers
  • Request deletion of information collected with your consent

6.4 How to Exercise Your Rights

To exercise any of these rights, contact our Privacy Officer:

Privacy Officer

Email: privacy@zkynet.org

Response Time: We will respond to privacy requests within 30 days

No Fee: Privacy rights requests are processed at no charge

7. Security Safeguards

We implement comprehensive security measures to protect your personal information against unauthorized access, disclosure, copying, use, or modification:

7.1 Technical Safeguards

  • Encryption: All data encrypted in transit and at rest using industry-standard protocols
  • Access Controls: Multi-factor authentication and role-based access restrictions
  • Network Security: Firewalls, intrusion detection, and secure server configurations
  • Zero-Knowledge Architecture: Future ZKyNet services mathematically prevent data exposure

7.2 Administrative Safeguards

  • Staff Training: Regular privacy and security awareness training
  • Background Checks: Screening for personnel with access to personal information
  • Incident Response: Procedures for responding to privacy breaches
  • Regular Audits: Periodic security assessments and compliance reviews

7.3 Physical Safeguards

  • Secure Facilities: Controlled access to data centers and offices
  • Equipment Security: Secure disposal of hardware containing personal information
  • Environmental Controls: Protection against physical threats and disasters

7.4 Breach Notification

In the unlikely event of a privacy breach that poses a real risk of significant harm, we will:

  • Notify the Privacy Commissioner of Canada as soon as feasible
  • Notify affected users without unreasonable delay
  • Provide clear information about what happened and what we're doing about it
  • Take steps to reduce the risk of harm and prevent future breaches

8. International Data Transfers

8.1 Data Location

We strive to keep Canadian users' data within Canada whenever possible:

  • Primary Storage: Canadian data centers and cloud providers preferred
  • Service Providers: Canadian vendors prioritized for data processing
  • Backup Systems: Redundant storage within Canadian borders when feasible

8.2 International Transfers

When international transfers are necessary for technical or business reasons:

  • We ensure adequate protection through contractual safeguards
  • We inform users about the destination countries and protection measures
  • We limit transfers to trusted jurisdictions with strong privacy laws
  • We provide users with options to limit international processing where possible

8.3 Future ZKyNet Network

The decentralized nature of the future ZKyNet network means:

  • Traffic may route through nodes in various countries
  • Zero-knowledge architecture prevents nodes from accessing your data
  • Cryptographic privacy guarantees protect data regardless of node location
  • Users can configure routing preferences to avoid specific jurisdictions

9. Children's Privacy

ZKyNet services are not intended for children under 18 years of age. We do not knowingly collect personal information from children under 18. If we become aware that we have collected personal information from a child under 18, we will take steps to delete such information promptly.

Parents or guardians who believe we may have collected information from a child under 18 should contact our Privacy Officer immediately at privacy@zkynet.org.

10. Updates to This Privacy Policy

We may update this Privacy Policy from time to time to reflect changes in our services, legal requirements, or privacy practices. When we make material changes:

  • We will notify users by email at least 30 days before changes take effect
  • We will post the updated policy on our website with the revision date
  • We will highlight significant changes in the notification
  • We will obtain new consent where required by law

Continued use of our services after the effective date constitutes acceptance of the updated Privacy Policy.

11. Contact Information

For questions, concerns, or requests regarding this Privacy Policy or your personal information:

ZKyNet™

Privacy Officer: privacy@zkynet.org

General Inquiries: contact@zkynet.org

Technical Support: support@zkynet.org

Response Time: 30 days maximum for privacy requests

Office of the Privacy Commissioner of Canada

If you are not satisfied with our response to your privacy concern, you may file a complaint with:

Office of the Privacy Commissioner of Canada

Website: www.priv.gc.ca

Phone: 1-800-282-1376

TTY: 1-800-282-1376

🔒 Privacy Technology Evolution

This Privacy Policy covers both our current MVP VPN service and our future ZKyNet privacy infrastructure. As we transition from traditional VPN technology to revolutionary zero-knowledge proofs, our privacy protections will become even stronger.

Current MVP VPN

  • • 15-minute connection log retention
  • • Centralized abuse prevention
  • • Strong encryption and no traffic logging
  • • PIPEDA compliant data practices

Future ZKyNet Network

  • • Zero centralized logging capability
  • • Cryptographic abuse prevention
  • • Mathematical privacy guarantees
  • • Decentralized architecture

Both services adhere to the highest privacy standards, with the future ZKyNet technology representing the evolution toward mathematically guaranteed privacy protection.