privacy-integrity

Privacy & Integrity Addendum

Ethara™ builds intelligence that remembers its humanity. Privacy is non‑negotiable — and so is integrity. This addendum explains how we work together to deliver full outcomes while preventing misuse of privacy rules to hide harm, fraud, or wrongdoing.

Collaboration-first Anti-abuse Public-interest aligned

1) The Collaboration Charter

Your role (client / participant)

  • Share only what’s needed — use redaction and minimization wherever possible.
  • Confirm origin & authority — you have the right to share the data you provide.
  • Assign accountable owners — for inputs, decisions, and sign‑offs.
  • Raise concerns early — report suspected misconduct, fraud, or safety risks promptly.

Our role (Ethara™)

  • Design for data minimization, least‑privilege access, and auditability.
  • Operate within the agreed legal basis and documented instructions.
  • Detect and help prevent harm, fraud, and abuse where signals are credible.
  • Refuse to use “privacy” as a shield to hide serious wrongdoing.

2) Anti‑abuse & public‑interest clause

We respect privacy laws. We refuse to weaponize them. Where the facts and laws allow, we may process or disclose information in order to:

  • Prevent, detect, or report suspected fraud, violence, exploitation, or material safety risks.
  • Comply with legal duties, court orders, or regulatory inquiries.
  • Protect vital interests or the public interest, including good‑faith whistleblowing.

Legal bases may include consent, contract, legal obligation, legitimate interests, or public‑interest tasks, as applicable under frameworks such as GDPR, CPPA, PIPEDA, PIPA, HIPAA, LGPD, and US state laws (e.g., CCPA/CPRA). We assess necessity and proportionality before acting and document our reasoning.

3) Integrity requests (how to raise a flag)

  • Email integrity@ethara.app with a concise summary, relevant dates, and any evidence.
  • We acknowledge within 5 business days and triage within 10 business days where feasible.
  • We maintain an audit trail of actions taken, subject to legal constraints.
  • If data access is needed, we limit it to what’s necessary, share only with appropriate parties, and notify affected individuals when legally permissible.

4) Evidence handling & chain of custody

  • We may fingerprint files (e.g., cryptographic hashes) to help verify integrity where appropriate.
  • We preserve metadata where it is helpful and minimize or strip it where it is not needed.
  • We maintain versioned logs and time‑stamped actions for key evidence‑handling steps.

Goal: materials can stand up to scrutiny without exposing more data than necessary.

5) Boundaries we enforce

  • No selling personal data or metadata.
  • No training of general‑purpose AI models on client content without a signed agreement.
  • No external model exposure of client data except where explicitly agreed (e.g., adversarial testing).
  • No data access beyond what is necessary for the stated purpose or legal requirements.

6) Shared success

The Ethara formula — Humanity × Intelligence × Integrity × Efficiency — works when we collaborate. You bring truth and context; we bring discipline, safeguards, and technical rigor. Together, we deliver outcomes that stand up ethically, legally, and operationally.

Last updated: