Privacy Protocol

1. Data Architecture

Tinko is built with security as a primary foundation. We collect transaction metadata (amount, status, customer email) solely for the purpose of executing revenue recovery flows and providing analytics. We do not store sensitive payment credentials (CVVs, full card numbers).

2. Intelligence Processing

Our AI Concierge processes transaction failure signals to determine the optimal recovery path. This analysis is performed in secure, isolated environments. Your data is never sold or shared with third-party advertisers.

3. Institutional Security

We employ bank-grade encryption (AES-256) for data at rest and TLS 1.3 for data in transit. Access to production data is restricted to essential services and audited strictly.

4. Your Rights

Merchants and their customers have the right to request data deletion or portability. We provide tools within the Tinko dashboard to manage these compliance requests directly.

Compliance Office

Blocks & Loops Technologies Pvt Ltd

privacy@tinko.in