Privacy Protocol
1. Data Architecture
Tinko is built with security as a primary foundation. We collect transaction metadata (amount, status, customer email) solely for the purpose of executing revenue recovery flows and providing analytics. We do not store sensitive payment credentials (CVVs, full card numbers).
2. Intelligence Processing
Our AI Concierge processes transaction failure signals to determine the optimal recovery path. This analysis is performed in secure, isolated environments. Your data is never sold or shared with third-party advertisers.
3. Institutional Security
We employ bank-grade encryption (AES-256) for data at rest and TLS 1.3 for data in transit. Access to production data is restricted to essential services and audited strictly.
4. Your Rights
Merchants and their customers have the right to request data deletion or portability. We provide tools within the Tinko dashboard to manage these compliance requests directly.
Compliance Office
Blocks & Loops Technologies Pvt Ltd
privacy@tinko.in