Privacy Policy.
Last Updated: April 06, 2026
At Aeglis, our core philosophy is built on a "Zero-Trust" architecture. We believe that security tools should protect your data, not harvest it. This Privacy Policy outlines exactly how we handle your information with absolute transparency.
1. Zero Permanent Storage (The Aeglis Guarantee)
Unlike traditional antivirus companies that horde your personal files for "training data", Aeglis operates on a strict volatile-memory protocol:
- File Autopsy: When you upload a file (PDF, APK, Image), it is processed in a secure, isolated sandbox.
- Instant Deletion: The exact millisecond our AI engine extracts the threat verdict, your file is permanently wiped from our servers using strict OS-level deletion commands. We keep absolutely zero copies.
- Link Scanning: Scanned URLs and text messages are processed purely for threat detection. We do not link the content of your messages to your personal identity.
2. Information We Collect
To provide our services and maintain the integrity of our security infrastructure, we collect the bare minimum:
- Account Information: When you register, we collect your email address and an encrypted password hash to manage your access and credits.
- Telemetry Data: We monitor API request volumes, latency, and error rates to prevent DDoS attacks and ensure 99.9% uptime.
- Threat Indicators: If a file or link is flagged as DANGER, we save a cryptographic hash (e.g., SHA-256) or the malicious URL in our global threat cache to protect other users. Your original file/message is never saved.
3. Third-Party Intelligence Partners
To provide cutting-edge zero-day detection, we route specific metadata (never PII) through trusted intelligence partners:
- Advanced AI Intelligence: We utilize state-of-the-art LLMs (Large Language Models) strictly via secure API endpoints to analyze the context of suspicious messages.
- Global Threat Databases: We cross-reference file hashes and URLs with trusted security vendors (like VirusTotal or AlienVault) to ensure comprehensive protection.
We ensure that our partners adhere to strict data processing agreements and do not use our payload for their own data harvesting.
4. Developer (B2B) Data Processing
If you are integrating Aeglis via our API, you may pass an end_user_id to track threats within your platform. We require developers to use anonymized IDs (e.g., UUIDs). Aeglis does not possess the ability to reverse-engineer these IDs to identify your actual customers.
5. Your Rights & Data Sovereignty
You own your data. At any time, you have the right to:
- Request a complete export of your account data and scan history.
- Delete your account instantly from your dashboard, which purges all associated telemetry and billing profile data from our active databases.
6. Contact the Security Team
If you have questions about our zero-trust architecture or privacy practices, bypass the bots and speak directly to our engineers at: privacy@Aeglis.com
Aeglis.