Privacy & Compliance

Built for global compliance. Designed for privacy by default. Audited and documented for enterprise requirements.

Our Principles

Optimal Nexus is built on privacy-first principles. We process personal data only when necessary, use strong safeguards, and give you full control over data handling.

Privacy by Design

Every system component is designed with data minimization, purpose limitation, and user rights at its core. We collect only what's needed, retain data only as long as required, and provide transparent controls for access and deletion.

Security & Encryption

All data in transit uses TLS 1.3+. Data at rest is encrypted using AES-256. Access is controlled via role-based permissions with audit logging for all operations.

Transparency & Accountability

We maintain detailed records of processing activities, conduct regular audits, and provide clear documentation of our data handling practices. Our DPO is available for any questions or concerns.

Technical & Organizational Controls

We implement comprehensive controls aligned with GDPR, SOC 2, and ISO 27001 requirements.

GDPR Compliance

  • Lawful basis documented for all processing activities (legitimate interest, consent, contract)
  • Data subject rights workflow (access, rectification, erasure, portability, objection)
  • Privacy Impact Assessments (DPIA) for high-risk processing
  • Data breach notification procedures (72-hour authority notification)
  • International transfer safeguards (Standard Contractual Clauses, adequacy decisions)

Technical Safeguards

  • PII redaction and pseudonymization for non-essential contexts
  • Automated data retention and deletion policies
  • Role-based access control (RBAC) with principle of least privilege
  • Multi-factor authentication (MFA) for all admin access
  • Comprehensive audit logging with tamper-proof storage

Regional Compliance

  • CAN-SPAM (US): Opt-out mechanisms, sender identification, honor requests within 10 days
  • CASL (Canada): Express/implied consent tracking, identification requirements
  • PECR (UK): Electronic marketing consent, cookie compliance
  • CCPA/CPRA (California): Consumer rights, opt-out of sale, sensitive data handling
  • Privacy Act (Australia): APP compliance, notification requirements

Data Flow Architecture

Our systems are designed with data minimization and regional boundaries in mind. Below is a simplified representation of data flows:

Client System (CRM/MAP) ↓ [API Gateway - TLS 1.3] ↓ Regional Processing Node ↓ (minimal PII) Signal Intelligence → Scoring → Routing ↓ [Data Store - Encrypted at Rest] ↓ Orchestration Engine ↓ (personalized, compliant delivery) Output Channels (Email/LinkedIn/Ads) ↓ [Audit Log - Immutable] Regional boundaries enforced: - EU data processed in EU-WEST - UK data processed in UK-SOUTH - US data processed in US-EAST - APAC data processed in APAC-SOUTHEAST

All cross-border transfers utilize Standard Contractual Clauses (SCCs) approved by the European Commission. Data subjects retain full rights regardless of processing location.

Regional Data Routing

We enforce geographic boundaries to ensure data residency compliance and minimize cross-border transfers.

Routing Rules

  • EU/EEA contacts: Processed exclusively in EU-WEST region (Ireland/Germany)
  • UK contacts: Processed in UK-SOUTH region with adequacy decision safeguards
  • US contacts: Processed in US-EAST region with state-specific controls (CCPA/CPRA)
  • Canadian contacts: Processed with CASL compliance, consent verification
  • APAC contacts: Processed in APAC-SOUTHEAST with regional safeguards

Automated Detection

Our system automatically detects contact region based on:

  • Account billing address and company registration
  • Contact email domain and IP geolocation (when available)
  • Explicit region flags set by your team
  • Fallback to most restrictive framework (EU/GDPR) when uncertain

Subprocessors & Third Parties

We use carefully vetted subprocessors for specific functions. All subprocessors sign Data Processing Agreements (DPAs) and are subject to regular audits.

Subprocessor Purpose Location Safeguards
AWS (Amazon Web Services) Infrastructure hosting EU, UK, US (regional) DPA, SCCs, ISO 27001, SOC 2
Cloudflare CDN, DDoS protection Global edge network DPA, SCCs, ISO 27001
SendGrid (Twilio) Email delivery US (with EU processing) DPA, SCCs, SOC 2
Stripe Payment processing US (PCI-DSS certified) DPA, SCCs, PCI-DSS Level 1
Datadog Monitoring & logging EU, US (regional) DPA, SCCs, ISO 27001, SOC 2

Note: We notify customers at least 30 days before adding new subprocessors. You may object to new subprocessors within this period.

Contact Our Data Protection Officer

If you have questions about our data practices, want to exercise your data subject rights, or need to report a concern, please contact our DPO:

Email: dpo@optimalnexus.com

Response time: Within 72 hours for urgent requests, 5 business days for standard inquiries

For data subject access requests (DSAR), please include your full name, email address, and specific information you're requesting. We'll verify your identity before processing.

Book a Compliance Review