Data Sovereignty & Privacy Protocol
Last updated on
Data Sovereignty & Privacy Protocol
Last Updated: January 12, 2026
1. Strategic Intent
Intarmour does not trade in user data. We trade in trust, resilience, and strategic intelligence. This document outlines our sovereign approach to data protection, adhering to the strictest standards of digital defense and GDPR compliance. Unlike industry norms, we operate a zero-leakage architecture: your digital footprint remains within our controlled infrastructure.
2. Data Controller
Intarmour di Simone Nogara Via Morazzone 4, 22100 Como (CO), Italy VAT ID: 03817020138 | Tax Code: NGRSMN91P14C933V PEC (Certified Email): info@pec.intarmour.com
3. Sovereign Analytics (No Third Parties)
We have deliberately rejected third-party tracking solutions (such as Google Analytics) to preserve your digital sovereignty.
- Technology: We utilize a self-hosted instance of Matomo located on our dedicated tracking domain (
tracking.intarmour.com). - Infrastructure: All analytical data is processed on servers under our direct control. No data is transferred to US-based entities, external ad-tech networks, or third-party cloud aggregators.
- Data Minimization: We collect only essential telemetry to ensure system integrity and UX optimization.
- Retention Protocol: Raw analytical data is strictly retained for a maximum of 12 months, after which it is permanently purged or irreversibly anonymized.
4. Operational Communications
When you engage with us via email or contact forms for Business Development or General Inquiries, the data provided is used solely for the execution of the requested service or preliminary due diligence.
Authorized Communication Channels:
- General Inquiries: info@intarmour.com
- Business Development: partnerships@intarmour.com
- Security Issues: security@intarmour.com
5. Defense of Data (Security Measures)
We implement military-grade technical and organizational measures to protect your data against unauthorized access, alteration, or destruction. This includes:
- Enforced HTTPS/TLS encryption.
- Strict access controls and segregation of duties.
- Regular vulnerability assessments.
6. Your Rights
Under GDPR, you retain full sovereignty over your personal data. You have the right to access, rectify, erase, or restrict the processing of your data. To exercise these rights, initiate a formal request to our legal channel: info@pec.intarmour.com.