Data Handling Protocol
Effective Date: January 1, 2025
Netora operates as a critical infrastructure layer for your business. We do not just process data; we act on it. This responsibility demands absolute security, transparency, and alignment.
1. Data Collection Scope
To function as an Operating System, Netora ingests high-frequency data from your configured endpoints. This includes:
- Transactional Data: Real-time POS streams, invoice line items, and payment gateway signals.
- Operational Metadata: Staff clock-ins/outs, inventory movement logs, and sensor telemetry (IoT for cold chain).
- Customer Interaction Data: Anonymized purchase history required for demand forecasting and loyalty automation.
2. How We Use Intelligence
Data is fuel for the Neural Core. We utilize it strictly for:
- Optimization: Calculating ideal par levels, dynamic pricing curves, and labor forecasts.
- Liquidation: Grading inventory and generating listings for external marketplaces.
- System Defense: Detecting margin anomalies or theft patterns ("Shrinkage").
We do not sell your raw data to third parties. Your operational intelligence is your competitive advantage, and we treat it as trade secrets.
3. Integration Security
Netora employs a Zero-Trust architecture for all integrations (Toast, Shopify, Epic Systems).
- All data in transit is encrypted via TLS 1.3.
- Data at rest is encrypted using AES-256 standards.
- API Tokens and Secrets are stored in isolated vaults, never in code repositories.
4. Autonomous Action & Liability
When you enable "Autonomous Mode" (Agent Action), you grant Netora permission to execute write operations (e.g., updating a price on UberEats, placing a Sysco order). While our models are 99.9% deterministic, distinct guardrails (budget caps, approval thresholds) must be configured by the Client.
5. Data Retention & Purging
You own your data. Upon contract termination:
- SaaS Subscription: All tenant data is archived for 30 days then permanently purged.
- Compliance Limits: Certain financial transaction records may be retained for 7 years as mandated by tax law.
Protocol Contact
For security audits or data requests, initiate a secure channel request at:
security@netora.biz