Privacy Policy

When you operate on AutoScale, you trust us with your enterprise intelligence. We recognize the weight of this responsibility and are committed to safeguarding your data while empowering your control.

Your privacy is important to us. This policy explains how AutoScale collects, uses, and protects your information.

Last Updated: January 28, 2026

1. Executive Summary and Scope

Our Privacy Commitment

NeuronX Research Private Limited ("NeuronX," "Company," "we," "us," or "our"), the developer and operator of the AutoScale enterprise AI automation platform, is committed to protecting the privacy, security, and confidentiality of all data entrusted to our platform. We recognize that in the enterprise environment, data privacy is not merely a compliance requirement but a fundamental business imperative that enables trust, innovation, and competitive advantage.

Platform Purpose and Context

AutoScale is a sophisticated enterprise AI agent-powered automation platform designed to integrate with, enhance, and orchestrate complex business processes across multiple organizational systems. Our platform serves as a central nervous system for enterprise operations, processing vast amounts of business-critical data to deliver intelligent automation, predictive analytics, and process optimization.

Scope of Application

This Privacy Policy applies comprehensively to:

Direct Platform Usage

  • All interactions with the AutoScale web application, mobile applications, and desktop clients
  • API integrations, webhooks, and programmatic access to platform services
  • Administrative consoles, reporting dashboards, and analytics interfaces
  • Developer tools, sandbox environments, and testing platforms

Enterprise Integrations

  • ERP system connections (SAP, Oracle, Microsoft Dynamics, NetSuite)
  • CRM platform integrations (Salesforce, HubSpot, ServiceNow, Microsoft Dynamics 365)

2. Definitions and Key Terms

Data Classification Terms

  • Personal Data: Any information relating to an identified or identifiable natural person, including but not limited to names, email addresses, phone numbers, employee identification numbers, biometric data, location data, and online identifiers.
  • Business Data: Information related to business operations, processes, transactions, and activities that may or may not contain personal data, including financial records, operational metrics, process documentation, and analytical insights.
  • Sensitive Personal Data: Special categories of personal data requiring enhanced protection, including biometric data, health information, financial account details, government identification numbers, and any data classified as sensitive under applicable privacy laws.
  • Aggregated Data: Information that has been combined and processed to remove individual identifiers, creating statistical or analytical insights that cannot reasonably be used to identify specific individuals.
  • Pseudonymized Data: Personal data processed in such a manner that it can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to appropriate security measures.

Technical and Legal Terms

  • Data Controller: The entity that determines the purposes and means of processing personal data. In most enterprise deployments, the customer organization acts as the data controller for employee and business data processed through AutoScale.
  • Data Processor: An entity that processes personal data on behalf of a data controller. NeuronX typically acts as a data processor when providing AutoScale services to enterprise customers.
  • Data Subject: An identified or identifiable natural person whose personal data is processed through the AutoScale platform.
  • Cross-Border Transfer: The movement of personal data from one country or jurisdiction to another, subject to specific legal requirements and safeguards.

3. Data Controller Information

Company Information

  • Legal Entity: NeuronX Research Private Limited
  • Incorporation: Private Limited Company incorporated under the Companies Act, 2013
  • Registered Office Address: NeuronX Research Private Limited Sahar Road, Andheri East Mumbai, Maharashtra 400099 India

Contact Information:


4. Platform Overview and Data Context

AutoScale Platform Architecture

AutoScale operates as a comprehensive enterprise automation ecosystem designed to integrate with and enhance existing business technology infrastructure. Our platform processes data across multiple dimensions:

Core Processing Engines

  • Workflow Automation Engine: Orchestrates complex business processes across multiple systems and departments
  • AI Decision Engine: Provides intelligent routing, classification, and decision-making capabilities
  • Data Integration Hub: Manages real-time and batch data synchronization across enterprise systems
  • Analytics and Reporting Engine: Generates insights, forecasts, and performance metrics from operational data
  • Security and Compliance Module: Ensures data protection, access control, and regulatory adherence

Integration Capabilities

  • API Gateway Management: Handles thousands of concurrent API connections with rate limiting and security controls
  • Event Streaming Platform: Processes real-time event data from multiple business systems
  • Data Transformation Services: Normalizes, cleanses, and transforms data across different formats and schemas
  • Machine Learning Operations (MLOps): Manages model deployment, monitoring, and continuous learning processes

Enterprise Data Ecosystem

Business Process Data Categories:

Financial and Accounting Data

  • General ledger entries, journal transactions, and financial statements
  • Accounts payable/receivable records, invoice processing, and payment histories
  • Budget planning data, cost center allocations, and expense management
  • Tax records, compliance filings, and audit documentation
  • Banking information, payment methods, and financial institution connections

Human Resources and Workforce Data

  • Employee personal information, contact details, and emergency contacts
  • Organizational charts, reporting structures, and team assignments
  • Performance evaluations, goal tracking, and development plans
  • Compensation data, benefits administration, and payroll processing
  • Time tracking, attendance records, and leave management
  • Recruitment data, candidate information, and hiring processes

Customer and Sales Data

  • Customer profiles, contact information, and communication preferences
  • Sales pipeline data, opportunity tracking, and revenue forecasting
  • Service tickets, support interactions, and resolution histories
  • Contract information, terms, pricing, and renewal schedules
  • Marketing campaign data, lead tracking, and conversion analytics

Supply Chain and Operations Data

  • Inventory levels, stock movements, and warehouse management
  • Supplier information, vendor relationships, and procurement processes
  • Manufacturing data, production schedules, and quality control metrics
  • Logistics information, shipping details, and delivery tracking
  • Asset management, equipment maintenance, and facility operations

Intellectual Property and Strategic Data

  • Product development information, research data, and innovation pipelines
  • Strategic planning documents, market analysis, and competitive intelligence
  • Legal documents, contracts, compliance records, and regulatory filings
  • Business intelligence, analytics models, and performance dashboards

AI and Machine Learning Data Processing

Training Data Management

  • Historical business data used for model training and algorithm development
  • Synthetic data generation for testing and validation purposes
  • Feature engineering and data preparation for machine learning models
  • Model performance metrics, accuracy measurements, and validation results

Inference and Prediction Data

  • Real-time data processed for predictive analytics and forecasting
  • Decision support data for automated business process routing
  • Anomaly detection data for fraud prevention and risk management
  • Natural language processing data for document analysis and categorization

Continuous Learning Systems

  • Feedback loops for model improvement and algorithm optimization
  • A/B testing data for feature development and user experience enhancement
  • Performance benchmarking data across different business scenarios
  • Algorithm bias detection and fairness monitoring data

5. Information Collection Framework

Direct Data Collection Methods

User Registration and Account Management

  • Professional identity verification including full legal name, job title, and professional email address
  • Organizational affiliation including company name, department, division, and reporting structure
  • Professional credentials including certifications, licenses, and areas of expertise
  • Contact information including business phone numbers, office locations, and mailing addresses
  • Professional social media profiles and networking platform connections (LinkedIn, professional forums)

System Configuration and Preferences

  • User interface customizations, dashboard layouts, and display preferences
  • Notification settings, alert configurations, and communication preferences
  • Language, timezone, currency, and regional localization settings
  • Security preferences including multi-factor authentication setup and access controls
  • Integration preferences and third-party system connection authorizations

Business Process Configuration

  • Workflow definitions, process mappings, and automation rule configurations
  • Custom field definitions, data validation rules, and business logic specifications
  • Approval workflows, escalation procedures, and exception handling rules
  • Performance metrics definitions, KPI tracking, and reporting requirements

Automatic Data Collection Systems

Technical Infrastructure Monitoring

  • Server performance metrics, resource utilization, and capacity planning data
  • Network traffic patterns, bandwidth utilization, and connection quality metrics
  • Database performance indicators, query execution times, and optimization metrics
  • Application performance monitoring including response times and error rates
  • Security event logs, access patterns, and threat detection indicators

User Behavior and Interaction Analytics

  • Feature usage patterns, click-through rates, and user journey mapping
  • Time spent in different platform sections, frequency of use, and engagement levels
  • Search queries, filter applications, and data exploration patterns
  • Error encounters, help documentation usage, and support request patterns
  • Mobile application usage patterns and cross-device synchronization data

Device and Environmental Data

  • Device specifications including operating system, browser type, and hardware capabilities
  • IP address information, geographic location (where permitted), and network provider details
  • Screen resolution, color depth, and accessibility feature usage
  • Input method preferences, keyboard shortcuts, and interaction patterns
  • Session duration, concurrent sessions, and multi-device access patterns

Third-Party Data Sources

Enterprise System Integrations

  • User directory information from Active Directory, LDAP, and identity management systems
  • Employee data from HR information systems including organizational hierarchy and role assignments
  • Financial data from accounting systems, ERP platforms, and financial management tools
  • Customer data from CRM systems, sales platforms, and marketing automation tools
  • Operational data from business intelligence platforms, analytics tools, and performance monitoring systems

External Data Enhancement Services

  • Business verification services for company and contact validation
  • Geographic and demographic data for analytics and reporting purposes
  • Industry benchmarking data for performance comparison and analysis
  • Regulatory and compliance data for automated monitoring and reporting
  • Market intelligence data for business insights and strategic planning

Business Partner Data Sharing

  • Implementation partner and consultant access logs and activity records
  • Training provider interactions and certification progress tracking
  • Support vendor communications and technical assistance records
  • Integration partner data flows and API usage statistics

7. Data Usage and AI Processing

Core Platform Functionality

Intelligent Business Process Automation

  • Workflow orchestration and task routing based on business rules and AI algorithms
  • Document processing, classification, and automated data extraction
  • Decision tree automation with machine learning-enhanced routing capabilities
  • Exception handling and escalation management with predictive prioritization
  • Quality control and validation processes with automated anomaly detection

Real-Time Analytics and Reporting

  • Performance dashboard generation with customizable metrics and KPIs
  • Trend analysis and forecasting using historical data and predictive models
  • Comparative analytics across departments, processes, and time periods
  • Real-time alerting and notification systems based on threshold monitoring
  • Executive reporting and business intelligence generation

System Integration and Data Synchronization

  • Real-time data synchronization across multiple enterprise systems
  • Data format transformation and schema mapping between different platforms
  • Conflict resolution and data validation during integration processes
  • API management and rate limiting for optimal performance
  • Error handling and retry mechanisms for reliable data flow

Artificial Intelligence and Machine Learning Operations

Natural Language Processing (NLP)

  • Document analysis and content extraction from various file formats
  • Email and communication analysis for routing and categorization
  • Contract analysis and clause identification for legal and compliance purposes
  • Customer feedback analysis and sentiment detection
  • Multi-language support and translation capabilities for global operations

Predictive Analytics and Forecasting

  • Financial forecasting based on historical trends and market indicators
  • Demand planning and inventory optimization using machine learning models
  • Risk assessment and fraud detection using behavioral analysis
  • Customer churn prediction and retention strategy optimization
  • Performance forecasting for business processes and resource planning

Computer Vision and Image Processing

  • Document scanning and optical character recognition (OCR)
  • Quality control inspection using image analysis
  • Asset tracking and management through visual recognition
  • Invoice and receipt processing with automated data extraction
  • Identity verification and security monitoring applications

Behavioral Analytics and Pattern Recognition

  • User behavior analysis for security monitoring and anomaly detection
  • Process optimization recommendations based on usage patterns
  • Resource allocation optimization using historical utilization data
  • Bottleneck identification and process improvement suggestions
  • Compliance monitoring and audit trail analysis

Data Enhancement and Enrichment

Business Intelligence Augmentation

  • External data source integration for enhanced business insights
  • Market intelligence incorporation for competitive analysis
  • Geographic and demographic data enhancement for analytics
  • Industry benchmarking data integration for performance comparison
  • Economic indicator integration for financial forecasting

Data Quality Management

  • Automated data cleansing and normalization processes
  • Duplicate detection and resolution across multiple systems
  • Data validation and integrity checking with automated corrections
  • Master data management and golden record creation
  • Data lineage tracking and impact analysis for changes

Advanced Analytics and Research

Machine Learning Model Development

  • Custom model training using customer data with appropriate privacy safeguards
  • Algorithm optimization and performance tuning for specific business use cases
  • Feature engineering and selection for improved model accuracy
  • Cross-validation and testing procedures to ensure model reliability
  • Continuous learning and model improvement based on new data

Business Process Intelligence

  • Process mining and discovery from system logs and transaction data
  • Bottleneck analysis and process optimization recommendations
  • Resource utilization analysis and capacity planning insights
  • Compliance monitoring and regulatory reporting automation
  • Performance benchmarking and industry comparison analysis

8. Information Sharing and Disclosures

Enterprise Customer Data Sharing

We facilitate data sharing exclusively as configured, authorized, and directed by enterprise customers through their platform administration.

Business System Integrations

  • ERP systems: SAP (all modules), Oracle (E-Business Suite, Fusion Cloud), Microsoft Dynamics (365, AX, NAV), NetSuite, Sage, Epicor
  • CRM platforms: Salesforce (Sales Cloud, Service Cloud, Marketing Cloud), HubSpot, ServiceNow, Microsoft Dynamics 365, Zoho, Pipedrive
  • HR systems: Workday, BambooHR, ADP (Workforce Now, GlobalView), SuccessFactors, Cornerstone OnDemand, Greenhouse
  • Financial systems: QuickBooks (Online, Desktop), Xero, Sage Intacct, Oracle Financials, SAP FICO
  • Collaboration tools: Microsoft 365, Google Workspace, Slack, Microsoft Teams, Zoom, Box, Dropbox, SharePoint

Analytics and Business Intelligence Platforms

  • Tableau, Power BI, QlikSense, Looker, Sisense, Domo
  • Snowflake, Amazon Redshift, Google BigQuery, Azure Data Lake
  • Custom data warehouses and analytics platforms
  • Business intelligence dashboards and reporting systems

Third-Party Service Providers

  • Payment processors and financial service providers
  • Logistics and shipping companies for supply chain integration
  • Marketing automation platforms and advertising networks
  • Compliance and regulatory reporting services

Service Providers and Subprocessors

Cloud Infrastructure Providers

  • Amazon Web Services (AWS): Hosting, storage, compute, and managed services
  • Microsoft Azure: Cloud computing, database services, and AI/ML platforms
  • Google Cloud Platform (GCP): Analytics, machine learning, and data processing services
  • IBM Cloud: Enterprise applications and hybrid cloud solutions

Specialized Technology Providers

  • Content Delivery Networks (CDNs): CloudFlare, Amazon CloudFront, Microsoft Azure CDN
  • Database Management: MongoDB Atlas, Amazon RDS, Azure SQL Database, Google Cloud SQL
  • Security Services: Okta, Auth0, CyberArk, Splunk, LogRhythm
  • Monitoring and Analytics: New Relic, DataDog, Splunk, Elastic Stack

Professional Services Partners

  • Implementation consultants and system integrators
  • Training providers and certification partners
  • Technical support and maintenance providers
  • Legal advisors and compliance specialists
  • Audit firms and security assessment companies

All service providers and subprocessors are bound by comprehensive Data Processing Agreements (DPAs) that include strict data protection and security requirements, purpose limitation, notification obligations, regular audits, and deletion procedures.

Legal and Regulatory Disclosures

Government Authorities and Law Enforcement

  • Compliance with valid legal process including subpoenas, court orders, and search warrants
  • Regulatory inquiries from tax authorities, financial regulators, and industry oversight bodies
  • National security requirements and lawful interception obligations (where applicable)
  • Anti-money laundering (AML) and counter-terrorism financing (CTF) reporting requirements

Regulatory and Compliance Bodies

  • Reserve Bank of India (RBI) for financial services data
  • Securities and Exchange Board of India (SEBI) for investment and trading data
  • Ministry of Corporate Affairs (MCA) for corporate compliance reporting
  • Data Protection Authorities for privacy law compliance and investigation support
  • Industry-specific regulators (insurance, healthcare, telecommunications)

Legal Proceedings and Litigation

  • Civil litigation discovery and evidence preservation requirements
  • Criminal investigations and forensic analysis support
  • Intellectual property disputes and trademark enforcement
  • Employment law proceedings and workplace investigations
  • Contract disputes and commercial litigation support

Business Transfers and Corporate Transactions

Merger and Acquisition Scenarios

  • Due diligence data sharing with potential acquirers or merger partners
  • Asset transfer requirements during corporate restructuring
  • Spin-off or divestiture procedures involving data separation
  • Joint venture formation and partnership data sharing agreements

Corporate Restructuring

  • Internal reorganization and subsidiary data transfers
  • Holding company consolidation and data centralization
  • Business unit separation and data segregation procedures
  • International expansion and cross-border entity establishment

Insolvency and Bankruptcy Proceedings

  • Asset preservation and creditor notification requirements
  • Court-appointed administrator access to business records
  • Liquidation procedures and data asset disposition
  • Customer notification and service continuity planning

9. Enterprise Data Rights and Controls

Administrative Data Governance Dashboard

Comprehensive Data Management Interface

  • Real-time data inventory with classification and sensitivity labels
  • Data flow visualization showing information movement across systems
  • Privacy impact assessment tools with automated risk scoring
  • Compliance monitoring dashboard with regulatory requirement tracking
  • Data retention policy management with automated enforcement capabilities

Access Control and Permission Management

  • Role-based access control (RBAC) with granular permission settings
  • Attribute-based access control (ABAC) for dynamic authorization
  • Privileged access management (PAM) for administrative functions
  • Just-in-time access provisioning for temporary elevated permissions
  • Automated user lifecycle management with onboarding and offboarding workflows

Audit Trail and Compliance Reporting

  • Comprehensive logging of all data access and modification activities
  • Real-time compliance monitoring with automated violation detection
  • Customizable audit reports for internal and external compliance requirements
  • Data lineage tracking with impact analysis for system changes
  • Automated evidence collection for compliance audits and assessments

Individual Data Subject Rights (GDPR and Similar Laws)

Right of Access (Article 15)

  • Comprehensive data export functionality with detailed metadata
  • API access for programmatic data retrieval and integration
  • Self-service data access portal for authorized users
  • Detailed processing activity reports with legal basis documentation
  • Historical data access including archived and backup information

Right to Rectification (Article 16)

  • Self-service profile management with immediate updates across systems
  • Bulk data correction tools for administrative users
  • Automated data validation with error detection and correction suggestions
  • Integration with master data management systems for consistency
  • Change tracking and audit trails for all data modifications

Right to Erasure/Right to be Forgotten (Article 17)

  • Granular deletion controls with dependency analysis and impact assessment
  • Automated retention policy enforcement with scheduled deletion procedures
  • Secure deletion with cryptographic verification and audit trails
  • Business continuity safeguards with impact analysis before deletion
  • Legal hold management to prevent deletion during litigation or investigations

Right to Restrict Processing (Article 18)

  • Selective processing restrictions by data category or processing purpose
  • Automated flagging and routing systems for restricted data
  • Workflow management for processing restriction requests
  • Impact analysis for business processes affected by restrictions
  • Regular review and confirmation procedures for ongoing restrictions

Right to Data Portability (Article 20)

  • Standardized data export formats (JSON, XML, CSV, industry-specific formats)
  • API endpoints for direct data transfer to other systems
  • Secure data transfer protocols with encryption and authentication
  • Data validation and integrity verification for exported data
  • Customer support for data portability technical assistance

Right to Object (Article 21)

  • Granular opt-out controls for different types of processing
  • Marketing communication preference management
  • Automated processing objection with manual review fallback
  • Impact analysis and alternative processing method evaluation
  • Clear notification procedures for processing objection impacts

Enterprise-Specific Data Controls

Data Classification and Labeling

  • Automated data discovery and classification using machine learning
  • Custom classification schemas aligned with business requirements
  • Sensitivity labeling with inheritance and propagation rules
  • Data handling requirements based on classification levels
  • Regular classification review and updating procedures

Cross-Border Transfer Management

  • Real-time monitoring of international data transfers
  • Automated compliance checking against transfer restrictions
  • Data localization enforcement with geographic routing
  • Transfer impact assessments with risk mitigation measures
  • Regulatory notification procedures for cross-border data movement

Vendor and Third-Party Data Sharing Controls

  • Granular control over data sharing with specific vendors
  • Purpose limitation enforcement for shared data
  • Automated vendor compliance monitoring and reporting
  • Data sharing agreement management and renewal tracking
  • Vendor risk assessment integration with sharing decisions

10. Security and Protection Measures

Technical Security Architecture

Encryption and Cryptographic Controls

  • AES-256 encryption for all data at rest with key rotation every 90 days
  • TLS 1.3 encryption for all data in transit with perfect forward secrecy
  • End-to-end encryption for sensitive data flows with customer-managed keys
  • Hardware Security Modules (HSMs) for cryptographic key management
  • Quantum-resistant encryption algorithms preparation for future protection

Network Security Infrastructure

  • Zero Trust Network Architecture with micro-segmentation
  • Web Application Firewalls (WAF) with real-time threat intelligence
  • Distributed Denial of Service (DDoS) protection with automatic mitigation
  • Intrusion Detection and Prevention Systems (IDS/IPS) with behavioral analysis
  • Virtual Private Network (VPN) access for administrative and support functions

Identity and Access Management (IAM)

  • Multi-Factor Authentication (MFA) mandatory for all user accounts
  • Single Sign-On (SSO) integration with enterprise identity providers
  • Risk-based adaptive authentication with behavioral analytics
  • Privileged Access Management (PAM) for administrative functions
  • Regular access reviews and automated deprovisioning for inactive accounts

Application Security Framework

  • Secure Software Development Lifecycle (SSDLC) with security checkpoints
  • Static Application Security Testing (SAST) integrated into development pipeline
  • Dynamic Application Security Testing (DAST) for runtime vulnerability detection
  • Interactive Application Security Testing (IAST) for comprehensive coverage
  • Regular penetration testing and vulnerability assessments by third-party specialists

Data Protection and Privacy Controls

Data Loss Prevention (DLP)

  • Real-time content inspection and classification for sensitive data
  • Automated blocking of unauthorized data transfers and communications
  • Pattern recognition for identification of personal and sensitive information
  • Integration with email, file sharing, and collaboration platforms
  • Policy-based enforcement with customizable rules and exceptions

Privacy-Enhancing Technologies

  • Differential privacy for statistical analysis and reporting
  • Homomorphic encryption for computation on encrypted data
  • Secure multi-party computation for collaborative analytics
  • Zero-knowledge proofs for authentication without data disclosure
  • Privacy-preserving machine learning with federated learning capabilities

Data Anonymization and Pseudonymization

  • Advanced anonymization techniques with k-anonymity and l-diversity
  • Synthetic data generation for testing and development purposes
  • Pseudonymization with cryptographic hashing and salting
  • Data masking and tokenization for non-production environments
  • Regular anonymization effectiveness assessments and reidentification testing

Operational Security Measures

Security Operations Center (SOC)

  • 24/7/365 monitoring and incident response capabilities
  • Security Information and Event Management (SIEM) with machine learning
  • Threat intelligence integration with global cybersecurity feeds
  • Automated incident response with playbook-driven procedures
  • Regular security drills and incident response exercises

Vulnerability Management Program

  • Continuous vulnerability scanning across all infrastructure and applications
  • Risk-based vulnerability prioritization with automated patching
  • Zero-day threat monitoring and rapid response procedures
  • Regular security assessments and code reviews
  • Bug bounty program with external security researcher engagement

Business Continuity and Disaster Recovery

  • Redundant infrastructure across multiple geographic locations
  • Real-time data replication with Recovery Point Objective (RPO) of 15 minutes
  • Recovery Time Objective (RTO) of 4 hours for critical systems
  • Regular disaster recovery testing and business continuity exercises
  • Crisis management procedures with customer communication protocols

Physical and Environmental Security

Data Center Security Controls

  • Tier III/IV certified data centers with redundant power and cooling systems
  • Biometric access controls and multi-factor authentication for physical access
  • 24/7 physical security monitoring with video surveillance and guards
  • Environmental monitoring for temperature, humidity, and power fluctuations
  • Fire suppression systems with early detection and automated response

Equipment and Media Security

  • Secure asset tracking and inventory management for all hardware
  • Encrypted storage devices with automatic key management
  • Secure disposal procedures with cryptographic erasure verification
  • Chain of custody documentation for equipment maintenance and repairs
  • Tamper-evident sealing and monitoring for sensitive equipment

11. International Transfers and Localization

Global Data Center Network

Primary Data Centers (India)

  • Mumbai Primary: Andheri East facility with full redundancy
  • Bangalore Secondary: Disaster recovery and backup operations
  • Hyderabad Tertiary: Development and testing environment
  • Chennai Quaternary: Regional compliance and data localization

Asia-Pacific Regional Centers

  • Singapore: Southeast Asia regional hub with PDPA compliance
  • Tokyo: Japan operations with Personal Information Protection Act compliance
  • Sydney: Australia and New Zealand operations with Privacy Act compliance
  • Hong Kong: Greater China operations with PDPO compliance

European Data Centers

  • Dublin: EU operations with GDPR compliance and adequacy decision benefits
  • Frankfurt: Central Europe hub with German data protection requirements
  • Amsterdam: Benelux region operations with enhanced privacy controls
  • London: UK operations with GDPR and Data Protection Act 2018 compliance

Americas Operations

  • Virginia (US East): North American primary operations
  • Oregon (US West): Pacific time zone operations and disaster recovery
  • Toronto: Canadian operations with PIPEDA compliance
  • São Paulo: Latin American operations with LGPD compliance

Data Localization and Residency Options

Regulatory Compliance Options

  • India: Compliance with Reserve Bank of India data localization requirements
  • Russia: Federal Law on Personal Data with in-country processing requirements
  • China: Cybersecurity Law and Personal Information Protection Law compliance
  • European Union: GDPR Article 45 adequacy decision jurisdictions
  • United States: State privacy law compliance (CCPA, CPRA, and emerging legislation)

Customer-Configurable Data Residency

  • Geographic data residency selection at account setup
  • Real-time data location tracking and reporting
  • Automated compliance checking against local data residency requirements
  • Data migration services for changing residency requirements
  • Audit trails for all cross-border data movements

Industry-Specific Localization

  • Financial services: Compliance with banking regulations and central bank requirements
  • Healthcare: HIPAA compliance with US data residency for protected health information
  • Government: FedRAMP compliance and government cloud deployment options
  • Telecommunications: Compliance with telecom data retention and localization laws
  • Insurance: Regulatory compliance with insurance commission data requirements

International Transfer Mechanisms

GDPR-Compliant Transfer Methods

  • Standard Contractual Clauses (SCCs) with European Commission approved terms
  • Binding Corporate Rules (BCRs) for intra-group transfers within NeuronX
  • Adequacy decisions for transfers to jurisdictions with adequate protection
  • Certification schemes under approved privacy frameworks
  • Codes of conduct with binding and enforceable commitments

Transfer Impact Assessments (TIAs)

  • Automated assessment of data protection laws in destination countries
  • Risk evaluation of government access to data in foreign jurisdictions
  • Implementation of supplementary measures where required
  • Regular monitoring of legal and practical circumstances in destination countries
  • Documentation and audit trails for all transfer decisions

Supplementary Security Measures

  • Additional encryption layers for international transfers
  • Pseudonymization and anonymization before cross-border transfer
  • Technical access controls preventing unauthorized government access
  • Contractual commitments for data protection and incident notification
  • Regular legal review of transfer arrangements and changing legal landscapes

12. AI Ethics and Algorithmic Governance

Responsible AI Development Framework

Ethical AI Principles

  • Fairness and Non-Discrimination: Proactive bias detection and mitigation across all AI models
  • Transparency and Explainability: Clear documentation of AI decision-making processes
  • Accountability and Oversight: Human oversight requirements for automated decision-making
  • Privacy by Design: Privacy-preserving AI techniques integrated from development
  • Robustness and Security: Adversarial attack prevention and model security measures

AI Governance Committee

  • Cross-functional team including data scientists, legal experts, and business stakeholders
  • Regular review of AI model performance and ethical implications
  • Approval processes for new AI capabilities and model deployments
  • Incident response procedures for AI-related issues and biases
  • External advisory board with AI ethics experts and industry representatives

Algorithm Audit and Testing

  • Regular bias testing across protected characteristics and demographic groups
  • Fairness metrics evaluation including equalized odds and demographic parity
  • Adversarial testing for model robustness and security vulnerabilities
  • Performance monitoring across different user groups and use cases
  • Third-party algorithmic audits and independent assessments

Explainable AI and Transparency

Model Interpretability Requirements

  • Local Interpretable Model-agnostic Explanations (LIME) for individual predictions
  • SHapley Additive exPlanations (SHAP) for feature importance analysis
  • Counterfactual explanations for decision boundary understanding
  • Model-agnostic explanations accessible to non-technical users
  • Real-time explanation generation for automated decisions

Algorithmic Transparency Documentation

  • Model cards describing intended use, limitations, and performance characteristics
  • Data sheets documenting training data sources, preprocessing, and known limitations
  • Algorithmic impact assessments for high-risk AI applications
  • Regular transparency reports on AI system performance and improvements
  • Public-facing documentation on AI principles and governance practices

Human-AI Collaboration Framework

  • Human-in-the-loop systems for critical business decisions
  • Override capabilities for automated AI recommendations
  • Escalation procedures for complex or ambiguous AI decisions
  • Training programs for users to understand and work effectively with AI systems
  • Feedback mechanisms for continuous improvement of human-AI interaction

Bias Detection and Mitigation

Comprehensive Bias Monitoring

  • Pre-deployment bias testing across multiple dimensions and intersectionalities
  • Continuous monitoring of model performance across different user groups
  • Statistical parity and equalized opportunity assessments
  • Disparate impact analysis for protected characteristics
  • Regular bias audits with external validation and assessment

Bias Mitigation Techniques

  • Data augmentation and synthetic data generation for underrepresented groups
  • Algorithmic debiasing techniques including adversarial debiasing
  • Fair representation learning and bias-aware model training
  • Post-processing calibration for equalized outcomes
  • Ensemble methods combining multiple bias-mitigation approaches

Inclusive Data Practices

  • Diverse and representative training data collection procedures
  • Data quality assessments with bias and representation analysis
  • Regular data audits for completeness and representativeness
  • Stakeholder engagement in data collection and validation processes
  • Historical bias recognition and correction in legacy data sets

AI Safety and Security

Adversarial Attack Prevention

  • Robust model training against adversarial examples
  • Input validation and sanitization for AI model endpoints
  • Monitoring for unusual patterns and potential attack attempts
  • Model versioning and rollback capabilities for security incidents
  • Regular security assessments of AI infrastructure and models

Model Security Framework

  • Secure model storage and access controls
  • Encryption of model parameters and training data
  • Intellectual property protection for proprietary algorithms
  • Audit trails for model access and modification activities
  • Incident response procedures for AI security breaches

13. Data Retention and Lifecycle Management

Comprehensive Data Retention Framework

Operational Data Retention Policies

  • Active user account data: Retained for duration of subscription plus 90 days
  • Business process data: Configurable retention periods from 1-10 years based on regulatory requirements
  • Transaction and financial data: 7 years retention in compliance with Indian accounting standards
  • Audit and compliance logs: 10 years retention for regulatory compliance and investigations
  • Security event logs: 3 years retention for incident analysis and threat intelligence

Legal and Regulatory Retention Requirements

  • Tax records: 8 years as per Indian Income Tax Act requirements
  • Employment records: As required by applicable labor laws and regulations
  • Financial services data: As mandated by RBI, SEBI, and other financial regulators
  • Healthcare data: HIPAA-compliant retention where applicable (6 years minimum)
  • Government contracts: As specified in contract terms and procurement regulations

Customer-Configurable Retention Options

  • Industry-specific retention templates (banking, healthcare, manufacturing, etc.)
  • Custom retention periods based on business requirements and risk tolerance
  • Automatic policy enforcement with configurable alerts and notifications
  • Legal hold capabilities with litigation and investigation support
  • Data minimization options with automated deletion of unnecessary data

Data Lifecycle Stages

Data Creation and Ingestion

  • Automated classification and tagging of new data based on content and source
  • Data quality validation and enrichment during ingestion process
  • Retention policy assignment based on data type and business requirements
  • Initial security controls and access permissions assignment
  • Integration with data governance workflows and approval processes

Active Data Management

  • Regular data quality assessments and cleansing procedures
  • Access pattern monitoring and optimization for performance
  • Security monitoring and threat detection for active data
  • Business value assessment and usage analytics
  • Compliance monitoring and regulatory requirement verification

Data Archival and Long-term Storage

  • Automated migration to cost-optimized storage tiers
  • Compression and deduplication for storage efficiency
  • Preservation of data integrity and accessibility for compliance requirements
  • Regular testing of archived data retrieval and restoration procedures
  • Metadata preservation for searchability and legal discovery

Secure Data Deletion and Destruction

  • NIST 800-88 compliant data sanitization procedures
  • Cryptographic erasure for encrypted data with key destruction
  • Physical destruction certification for storage media
  • Audit trails and certificates of destruction for compliance verification
  • Regular validation of deletion effectiveness and completeness

Automated Retention Management

Policy Engine and Automation

  • Rule-based retention policy engine with complex condition support
  • Automated scheduling and execution of retention actions
  • Exception handling and manual review workflows for complex cases
  • Integration with legal hold and litigation support systems
  • Performance monitoring and optimization for large-scale deletions

Compliance Monitoring and Reporting

  • Real-time monitoring of retention policy compliance
  • Automated alerts for policy violations and non-compliance issues
  • Regular retention compliance reports for internal and external audits
  • Metrics and analytics on data retention effectiveness and costs
  • Continuous improvement recommendations based on retention analytics

14. Incident Response and Business Continuity

Security Incident Response Framework

Incident Classification and Severity Levels

  • Critical (P0): Data breach affecting sensitive personal or business data
  • High (P1): Security vulnerabilities with potential for data exposure
  • Medium (P2): Service disruptions with limited security implications
  • Low (P3): Minor security events with minimal business impact
  • Informational: Security events requiring documentation but no immediate action

Incident Response Team Structure

  • Incident Commander: Overall response coordination and decision-making authority
  • Security Lead: Technical investigation and threat analysis
  • Legal Counsel: Regulatory compliance and legal implications assessment
  • Communications Lead: Internal and external communications coordination
  • Customer Success: Customer impact assessment and communication

Response Procedures and Timelines

  • Initial detection and triage: Within 15 minutes of alert generation
  • Incident classification and team notification: Within 1 hour of detection
  • Preliminary impact assessment: Within 2 hours of incident confirmation
  • Customer notification (for applicable incidents): Within 24-48 hours
  • Regulatory notification (where required): Within 72 hours as mandated by law

Data Breach Response Procedures

Immediate Response Actions

  • Incident containment and threat neutralization procedures
  • Forensic evidence preservation and investigation initiation
  • Impact assessment and affected data identification
  • Legal and regulatory notification requirement evaluation
  • Customer and stakeholder communication planning

Investigation and Analysis

  • Detailed forensic analysis of breach circumstances and root causes
  • Scope determination and affected individual identification
  • Data sensitivity assessment and risk evaluation for affected individuals
  • Regulatory compliance analysis and notification obligations
  • External expert engagement where required (legal, forensic, PR)

Remediation and Recovery

  • Security control enhancement and vulnerability remediation
  • System restoration and data integrity verification
  • Monitoring enhancement and threat intelligence integration
  • Process improvement and control enhancement implementation
  • Lessons learned documentation and training updates

Business Continuity and Disaster Recovery

Business Impact Analysis

  • Critical business process identification and prioritization
  • Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) definition
  • Dependency mapping and single points of failure identification
  • Resource requirements assessment for continuity operations
  • Regular business impact analysis updates and validation

Disaster Recovery Infrastructure

  • Geographically distributed backup and recovery sites
  • Real-time data replication with automated failover capabilities
  • Hot, warm, and cold standby systems based on criticality levels
  • Network redundancy and alternative communication channels
  • Regular disaster recovery testing and validation procedures

Crisis Communication Framework

  • Internal communication procedures and escalation matrices
  • Customer communication templates and notification procedures
  • Media relations and public communications protocols
  • Regulatory communication and reporting procedures
  • Social media monitoring and response capabilities

15. Third-Party and Vendor Management

Vendor Risk Assessment Framework

Comprehensive Due Diligence Process

  • Security questionnaire and assessment with industry-standard frameworks
  • Financial stability evaluation and business continuity assessment
  • Regulatory compliance verification and certification review
  • Reference checks and customer satisfaction evaluation
  • On-site security audits and facility inspections for critical vendors

Risk Classification and Management

  • High Risk: Vendors processing sensitive data or providing critical services
  • Medium Risk: Vendors with limited data access or non-critical service provision
  • Low Risk: Vendors with minimal data exposure and non-essential services
  • Ongoing Monitoring: Regular reassessment and risk level adjustment based on changes

Vendor Security Requirements

  • Mandatory security standards and certification requirements (ISO 27001, SOC 2)
  • Data encryption and protection standards compliance
  • Incident response and breach notification obligations
  • Regular security assessments and penetration testing requirements
  • Business continuity and disaster recovery capabilities

Data Processing Agreements and Contracts

Standardized DPA Framework

  • Comprehensive data processing agreement templates with GDPR compliance
  • Purpose limitation and data minimization clauses
  • Security requirement specifications and audit rights
  • Subprocessor approval and notification procedures
  • Data breach notification and incident response obligations

Contract Terms and Conditions

  • Service level agreements with performance metrics and penalties
  • Data residency and cross-border transfer restrictions
  • Intellectual property protection and confidentiality requirements
  • Termination procedures and data return/deletion obligations
  • Liability allocation and insurance requirement specifications

Ongoing Contract Management

  • Regular contract review and renewal procedures
  • Performance monitoring and SLA compliance tracking
  • Change management procedures for contract modifications
  • Vendor relationship management and escalation procedures
  • Contract termination and transition planning

Subprocessor Management

Approved Subprocessor Registry

  • Comprehensive list of all subprocessors with processing activities description
  • Regular updates and customer notifications of subprocessor changes
  • Due diligence documentation and risk assessment records
  • Contractual flow-down requirements and compliance monitoring
  • Subprocessor performance monitoring and evaluation procedures

Customer Notification and Consent

  • 30-day advance notice for new subprocessor appointments
  • Customer objection procedures and alternative solution provision
  • Annual subprocessor review and customer approval processes
  • Transparency reporting on subprocessor usage and changes
  • Customer self-service portal for subprocessor information access

16. Compliance and Regulatory Framework

International Privacy Law Compliance

European Union - GDPR

  • Comprehensive compliance program with all GDPR requirements
  • Data Protection Officer appointment and contact information
  • Privacy by design and by default implementation
  • Data protection impact assessments for high-risk processing
  • Regular compliance audits and certification maintenance

United States - State Privacy Laws

  • California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA) compliance
  • Virginia Consumer Data Protection Act (VCDPA) compliance preparation
  • Colorado Privacy Act (CPA) and Connecticut Data Privacy Act compliance
  • Emerging state privacy legislation monitoring and proactive compliance

Asia-Pacific Privacy Frameworks

  • Singapore Personal Data Protection Act (PDPA) compliance
  • Japan Personal Information Protection Act compliance
  • Australia Privacy Act 1988 compliance
  • South Korea Personal Information Protection Act (PIPA) compliance

India Privacy and Data Protection

  • Information Technology Act 2000 and IT Rules 2011 compliance
  • Personal Data Protection Bill compliance readiness
  • Reserve Bank of India (RBI) data localization compliance
  • Sector-specific privacy requirements compliance

Industry-Specific Regulatory Compliance

Financial Services Regulations

  • Payment Card Industry Data Security Standard (PCI DSS) compliance
  • Sarbanes-Oxley Act (SOX) financial controls and reporting
  • Basel III banking regulatory framework compliance
  • Anti-Money Laundering (AML) and Know Your Customer (KYC) requirements

Healthcare Data Protection

  • Health Insurance Portability and Accountability Act (HIPAA) compliance
  • Health Information Technology for Economic and Clinical Health (HITECH) Act
  • FDA 21 CFR Part 11 electronic records and signatures
  • Clinical trial data protection and Good Clinical Practice (GCP) guidelines

Government and Public Sector

  • Federal Risk and Authorization Management Program (FedRAMP) compliance
  • Federal Information Security Management Act (FISMA) requirements
  • Government data classification and handling requirements
  • Public records and freedom of information compliance

Certification and Audit Framework

Security and Privacy Certifications

  • ISO 27001:2013 Information Security Management System certification
  • SOC 2 Type II Service Organization Controls certification
  • ISO 27701:2019 Privacy Information Management System certification
  • Cloud Security Alliance (CSA) STAR certification

Regular Audit Schedule

  • Annual external security audits by certified third-party assessors
  • Quarterly internal compliance assessments and gap analyses
  • Monthly vulnerability assessments and penetration testing
  • Continuous monitoring and real-time compliance validation

Audit Documentation and Evidence

  • Comprehensive audit trail documentation and evidence preservation
  • Regular management review and certification maintenance procedures
  • Corrective action planning and implementation for audit findings
  • Customer and regulatory audit support and documentation provision

17. Enterprise Controls and Administrative Tools

Advanced Administrative Dashboard

Comprehensive Data Governance Interface

  • Real-time data inventory with automated discovery and classification
  • Interactive data flow diagrams showing information movement across systems
  • Privacy risk heatmaps with automated scoring and mitigation recommendations
  • Compliance status dashboards with regulatory requirement tracking
  • Data quality metrics and automated cleansing recommendations

User and Access Management Console

  • Centralized identity and access management with directory integration
  • Role-based access control with fine-grained permission management
  • Automated user lifecycle management with approval workflows
  • Access certification and review processes with manager approval
  • Privileged access monitoring and session recording capabilities

Policy Configuration and Enforcement

  • Drag-and-drop policy builder with business rule configuration
  • Automated policy enforcement with real-time monitoring and alerts
  • Exception management workflows with approval and documentation procedures
  • Policy testing and simulation capabilities before production deployment
  • Version control and rollback capabilities for policy changes

Advanced Analytics and Reporting

Executive Dashboard and KPI Tracking

  • C-suite privacy and security metrics with trend analysis
  • Regulatory compliance scorecards with risk indicators
  • Data breach and incident tracking with cost impact analysis
  • Vendor risk assessment summaries with action recommendations
  • Board-ready reports with executive summary and detailed appendices

Operational Analytics and Insights

  • User behavior analytics with anomaly detection and risk scoring
  • Data usage patterns and optimization recommendations
  • System performance metrics with capacity planning insights
  • Integration health monitoring with automated diagnostics
  • Cost optimization recommendations based on usage analytics

Custom Reporting Framework

  • Self-service report builder with drag-and-drop interface
  • Scheduled reporting with automated distribution to stakeholders
  • API access for integration with business intelligence platforms
  • Custom data export capabilities with format and filter options
  • Advanced visualization tools with interactive dashboards

Enterprise Integration Capabilities

API Management and Developer Tools

  • Comprehensive REST and GraphQL APIs with full documentation
  • API key management with usage monitoring and rate limiting
  • Webhook configuration for real-time event notifications
  • SDKs and client libraries for major programming languages
  • Sandbox environments for development and testing

Advanced Integration Connectors

  • Pre-built connectors for 500+ enterprise applications
  • Custom connector development framework with visual designer
  • Real-time and batch integration capabilities with error handling
  • Data transformation and mapping tools with business rule support
  • Integration monitoring and performance optimization tools

Workflow Automation and Orchestration

  • Visual workflow designer with drag-and-drop interface
  • Complex business logic support with conditional branching
  • Human task integration with approval and review processes
  • SLA monitoring and escalation procedures
  • Workflow versioning and testing capabilities

18. Training and Governance Programs

Employee Privacy and Security Training

Comprehensive Training Curriculum

  • Privacy fundamentals and data protection principles
  • Hands-on GDPR, CCPA, and Indian privacy law training
  • Security awareness with phishing simulation and testing
  • Incident response procedures and escalation protocols
  • Role-specific training for developers, administrators, and support staff

Continuous Education and Certification

  • Annual mandatory training with updated content and assessments
  • Micro-learning modules with regular knowledge reinforcement
  • External certification support (CIPP, CISSP, CISA)
  • Conference attendance and industry best practice sharing
  • Internal expert development and knowledge sharing programs

Training Effectiveness Measurement

  • Pre and post-training assessments with knowledge gap identification
  • Behavioral change tracking through monitoring and analytics
  • Incident correlation with training effectiveness metrics
  • Regular training content updates based on effectiveness data
  • Peer learning and mentorship program development

Customer Education and Enablement

Administrator Training Programs

  • Comprehensive platform training with hands-on laboratories
  • Privacy and security best practices specific to AutoScale
  • Integration and customization training with real-world scenarios
  • Advanced configuration and optimization techniques
  • Certification program with continuing education requirements

End-User Training and Support

  • Self-paced learning modules with progress tracking
  • Interactive tutorials and guided system walkthroughs
  • Webinar series with expert-led training sessions
  • Community forums and peer-to-peer learning opportunities
  • Mobile learning applications with offline capability

Industry-Specific Training Content

  • Financial services compliance and risk management training
  • Healthcare privacy and HIPAA compliance education
  • Manufacturing and supply chain data protection training
  • Government and public sector security requirements training
  • Retail and e-commerce customer data protection training

Privacy Culture and Awareness

Organization-Wide Privacy Culture Development

  • Privacy champions program with department representatives
  • Regular privacy awareness campaigns and communications
  • Privacy impact consideration integration into business processes
  • Recognition and reward programs for privacy excellence
  • Cross-functional privacy collaboration and knowledge sharing

Executive and Leadership Engagement

  • Board-level privacy and security briefings with trend analysis
  • Executive decision-making frameworks with privacy consideration
  • Leadership accountability for privacy and security outcomes
  • Strategic privacy investment and resource allocation guidance
  • External privacy thought leadership and industry engagement

19. Contact Information and Escalation

Company Contact Information

NeuronX Research Private Limited
Sahar Road, Andheri East Mumbai, Maharashtra 400099 India

AutoScale Platform Support

For all privacy-related inquiries, data protection questions, security concerns, customer support, and general business matters, please contact us using the above information. Our team is committed to responding to all inquiries in a timely manner.

Response Time Commitments

  • General inquiries: 2 minutes
  • Privacy and security matters: 2 minutes
  • Urgent issues: 4 hours

20. Policy Changes and Updates

Policy Update Framework

Regular Review Schedule

  • Comprehensive policy review every 6 months
  • Regulatory compliance review quarterly
  • Technology and security update review monthly
  • Customer feedback integration review monthly
  • Legal and regulatory change assessment ongoing

Stakeholder Consultation Process

  • Customer Advisory Board input on significant policy changes
  • Internal stakeholder review including legal, security, and product teams
  • External legal counsel review for regulatory compliance
  • Privacy engineering team technical feasibility assessment
  • Executive approval for material policy modifications

Change Notification Procedures

Advance Notification Requirements

  • Material changes: 60-day advance notice to enterprise customers
  • Non-material changes: 30-day advance notice with summary of modifications
  • Regulatory compliance changes: Immediate notification with explanation
  • Security enhancement changes: 15-day advance notice with benefits explanation

Notification Methods and Channels

  • Direct email to primary account administrators and designated privacy contacts
  • In-application notifications with policy change summaries and impact analysis
  • Website posting with prominent placement and change highlighting
  • API notifications for programmatic access to policy updates
  • Customer success manager outreach for high-value enterprise accounts

Version Control and Documentation

Policy Version Management

  • Semantic versioning with major, minor, and patch version numbering
  • Comprehensive change logs with detailed modification descriptions
  • Previous version archival with access for reference and compliance purposes
  • Legal basis documentation for all changes with regulatory justification
  • Impact assessment documentation for material changes

Effective Date and Transition Procedures

  • Clear effective date specification with transition period where appropriate
  • Grace period provision for customers to review and respond to changes
  • Grandfathering provisions for existing contracts where legally required
  • Migration assistance for customers affected by significant policy changes
  • Regular communication during transition periods with status updates

Customer Rights During Policy Changes

Review and Comment Period

  • 30-day comment period for material policy changes affecting data processing
  • Customer feedback consideration and response procedures
  • Public consultation for changes affecting fundamental privacy rights
  • Alternative solution provision for customers unable to accept changes

Objection and Opt-Out Rights

  • Clear procedures for customers to object to policy changes
  • Service modification options where technically feasible
  • Contract termination rights for customers unable to accept material changes
  • Data portability assistance during transition or termination periods

NeuronX Research Private Limited and the AutoScale platform team remain committed to maintaining the highest standards of privacy protection, data security, and regulatory compliance. This comprehensive privacy policy reflects our ongoing dedication to transparency, accountability, and respect for the privacy rights of all individuals whose data we process.

We recognize that privacy is an evolving landscape with changing regulations, emerging technologies, and shifting customer expectations. Our commitment extends beyond mere compliance to encompass privacy as a fundamental business value and competitive differentiator.

For questions, concerns, or feedback regarding this privacy policy or our privacy practices, please contact us at support@autoscale.tech or via WhatsApp at +91 8591430775.

Document Control Information

  • Document Owner: Chief Privacy Officer, NeuronX Research Private Limited
  • Approved By: Board of Directors, NeuronX Research Private Limited
  • Document Classification: Public
  • Distribution: All employees, customers, partners, and stakeholders
  • Review Frequency: Semi-annual with quarterly compliance updates
  • Next Scheduled Review: December 2025

Legal References and Citations

  • Information Technology Act, 2000 and amendments
  • Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011
  • General Data Protection Regulation (EU) 2016/679
  • California Consumer Privacy Act of 2018 and California Privacy Rights Act of 2020
  • Personal Data Protection Act 2012 (Singapore)
  • Personal Information Protection Act (Japan)
  • Privacy Act 1988 (Australia)

For detailed information about our technical security measures and compliance certifications, please visit our Security and Compliance center. For complete terms of service, licensing agreements, and additional legal documentation, please refer to our Terms of Service and Compliance portal.

© 2026-2027 NeuronX Research Private Limited. All rights reserved. AutoScale is a registered trademark of NeuronX Research Private Limited.

This privacy policy is effective as of October 2025 and supersedes all previous versions. The most current version is always available at https://autoscale.tech/privacy-policy