Privacy Protocol v2.6

At UXAtelierX, we treat your personal data with the same tactical precision we apply to high-stakes interface design. This is not a legal labyrinth; it is our commitment to transparency.

Status: Last Updated

Our Collection Methodology

UXAtelierX operates under the principle of Minimal Data Loadout. We only solicit information that is strictly required to execute high-fidelity design sprints or fulfill legal obligations in the United Kingdom. We do not engage in the shadow-market of data brokering; your information remains within our internal secure perimeter.

When you interact with our The Hub, we log functional session data to optimize the interface for your specific terminal. This includes monitoring for layout breakages and ensuring the pixel-perfect rendering of our portfolio assets.

LOG_ENTRY

"We use the collected metadata to improve the UX of our own studio site—treating our own platform as a continuous living prototype. Every click informs a better grid."

Command Your Data

User Control Protocols

Skill: Access

Request Data Inventory

You hold the key to your own vault. At any time, you may request a complete export of all personal identifiers we have archived. We fulfill all SAR (Subject Access Requests) within 30 solar days.

Skill: Purge

The Right to Forget

If a project concludes or our alliance ends, you may initiate a "Hard Purge." We will scrub your data from our active mirrors, leaving only what is required by UK tax and contract law.

Skill: Fortify

Object to Processing

Halt specific data activities. If you value our design work but wish to remain invisible to our analytics suites, you can exercise your right to object without losing access to our core content.

Skill: Rectify

Corrective Action

Inaccurate metadata is a bug. Use Signal Tower to patch your profile. We ensure all records reflect reality within 48 hours of verification.

Empowerment through data ownership
[ TERMINAL: SECURE_STORAGE ] ENCRYPTION: AES-256

Physical Perimeter

Our London studio at 35 Wedmore St maintains strict access controls. No client data is stored on unsecured local machines; all project assets reside in encrypted cloud environments with multi-factor authentication.

Digital Fortress

We utilize SSL/TLS termination for all inbound traffic. Data at rest is segmented by project, ensuring that even in the unlikely event of a breach, horizontal movement is technically prohibited.

Vendor Vetting

We only outsource infrastructure to Tier-1 providers (AWS, Google Cloud) who maintain ISO 27001 compliance. We perform biannual audits of our toolchain to ensure no security gaps.

International Data Transfers

While we are headquartered in London, our digital reach is global. If your data crosses the UK border to one of our secure processing nodes, we employ Standard Contractual Clauses (SCCs) to ensure the destination provides an equivalent tier of protection.

For specific information on how our pixel-grid tracking operates, please consult the Cookie Policy.

Compliance Seal

Retention Strategy

UXAtelierX does not believe in infinite archiving. We keep your contact data for exactly as long as our business relationship persists plus 24 months of inactive buffer. After this countdown reaches zero, the system initiates an automated overwrite protocol.

Policy Evolution

As the digital landscape shifts and new UK/EU regulations emerge, this document may receive 'patches'. We notify significant changes via a broadcast on The Hub or direct dispatch to our subscribed partners.

Dispatch a Courier

Questions about your data footprint? Reach out to our Data Protection Officer at the London HQ.

ADDR: 35 Wedmore St, London W2 1BZ

Privacy Resolve Tool

Need immediate clarity? Our Signal Tower is staffed during standard London operating cycles (Mon-Fri: 09:00-18:00). We respond to all privacy-centric inquiries within 2 business days.

ENTER SIGNAL TOWER ->