Internal Protocol v.2026

Our data boundaries.

At XATARIXV, we build games, not profiles. This privacy policy outlines the technical and legal constraints we place on ourselves to ensure your digital footprint remains yours. No fluff, just the architecture of our data handling.

Privacy Inquiry

Information we actually touch

Status: Minimalist

We do not collect information for the sake of "big data." Every byte we store must have a direct functional purpose for your experience within XATARIXV projects. This typically breaks down into three specific streams:

Account Essentials

Username, email address, and hashed credentials. We use these strictly for security and cross-device sync. Nothing more.

Telemetry & Performance

Hardware specs and crash logs. Essential for debugging the raw edge of our game engines in Malaysia's diverse tech landscape.

Your Control Console

01 //

The Right to Vanish

Full account deletion is not a "request"—it's a button. Once activated, our systems purge all identifiable markers within 72 hours.

Data deletion metaphor
02 //

Extraction Tools

Download every scrap of data we have on you in a machine-readable JSON format. It is your data; you should be able to take it with you.

Data extraction metaphor
03 //

Correction Rights

Inaccurate telemetry or metadata? Update your profile records instantly through our central dashboard without waiting for support.

Correction rights metaphor

Who else sees the wires?

We don't sell your data. We don't trade it. We don't use it for advertising. We only share information with partners that are integral to our operations. These include:

  • Cloud Architects (AWS/Google Cloud for hosting)

All third parties are legally bound to hold your data under standards equal to or exceeding our own policy.

Secure data network

Institutional Compliance

1. Geographic Sovereignty

As a game studio based in Kuala Lumpur, Malaysia, we operate under the PDPA (Personal Data Protection Act 2010). For our international players, we align our systems to respect relevant global frameworks, ensuring that the protection follows the data, regardless of where you log in from.

2. The Defense Strategy

We use AES-256 encryption for data at rest and TLS 1.3 for data in transit. Our internal security protocol is built on "Least Privilege Access"—meaning only the developer who needs to see a specific dataset to solve your issue ever gets the key.

3. Protection of Minors

Our projects are not aimed at those under the age of 13. If we discover we have inadvertently collected data from a child, we execute an immediate purge of that data from all active and backup servers.

4. Policy Evolution

We update this privacy-policy to reflect changes in legal landscape or our development stack. If a change is significant, we will notify you via the email in your account record. Continuing to use XATARIXV services after February 18, 2026, constitutes acknowledgement of these terms.

Direct Legal Channel

Contact our Data Protection Officer

[email protected]

15-03, Wisma MPL, 8 Jalan Kamunting, Kuala Lumpur