Governance
& Data
Agency.
At JadeCrest Research, our commitment to data science excellence is secondary only to our commitment to participant and partner privacy. This policy outlines our rigorous frameworks for handling personal information within the sphere of research analytics.
Collection Thresholds
We limit data ingestion to specific academic or corporate benchmarks. This includes identity markers (name, institutional affiliation), technical metadata (IP addresses, terminal identifiers), and research-specific telemetry. We do not aggregate data for third-party advertising profiles.
Processing Logic
Information is processed under the legal basis of legitimate research interest and contractual necessity. When conducting complex research analytics, we utilize pseudonymization techniques to strip direct identifiers from active analysis sets.
Retention Cycles
JadeCrest Research adheres to Vietnam's cybersecurity decrees and international standards. Data is retained only for the duration of the research project plus a statutory audit period, after which it is subjected to high-entropy cryptographic erasure.
Cross-Border Flow
As part of our global research network, data may be accessed by our lab partners outside of Vietnam. In such instances, we enforce Standard Contractual Clauses (SCCs) to ensure your protection remains consistent with our local Ho Chi Minh City standards.
Personal Data Inventory Controls
The Right to Disclosure
Request a full machine-readable copy of all personal telemetry we have indexed related to your IP or account identity.
Initiate RequestRectification Rights
Maintain the accuracy of our research datasets by updating outdated professional credentials or contact information.
Update DataErasure & Removal
Exercise your "Right to be Forgotten" by requesting the permanent deletion of your profile from our active and backup directories.
Request ErasureObject to Processing
Halt the use of your data for specific advanced insights modeling while maintaining your contact record with our lab.
Restrict Use
Protocol 9.2
Advanced AES-256 encryption at rest and TLS 1.3 in transit for all data science datasets.
Fortifying Scientific
Confidentiality.
Zero-Trust Environment
Access to participant data is strictly gated through multi-factor authentication and role-based permissions, monitored 24/7 by our security operations center.
Regular Vulnerability Audits
We conduct bi-annual penetration testing and compliance reviews to ensure our verification standards meet the highest international research benchmarks.
Non-Disclosure Rigor
Every researcher at JadeCrest signs a lifetime confidentiality agreement regarding the specificities of proprietary datasets and partner identities.
Governance & Compliance Registry
For academic transparency, we provide quick access to our foundational legal documents and contact channels for data controllers.
Official Contact
DPO Office
Vo Van Tan 150, Ho Chi Minh City
+84 28 3903 8710
info@jadecrestresearch.digital
Hours: Mon-Fri: 09:00 - 18:00
Direct InquiryCore Documentation
Current Version: v4.1.0/2026
Updates & Notifications
We may revise this policy to reflect shifts in technology or Vietnamese legislation. Routine visitors are encouraged to review this page periodically.