- IP addresses
- Failed login attempts
- Administrative access events
- System-level security signals
These logs exist for fraud detection, abuse prevention, and platform integrity.
3. Cookies
We use limited cookies for functional purposes only.
Functional Cookies
- Login session management
- Screen preference storage
- Comment form convenience
- Temporary browser compatibility checks
These cookies:
- Do not contain sensitive financial information
- Are not used for cross-site behavioral advertising
- Expire automatically based on session or defined duration
If you disable cookies, certain account functions may not operate correctly.
4. Embedded Content
Articles or documentation may contain embedded content (e.g., videos, diagrams, or third-party media).
Embedded content behaves as if you visited the external website directly. Those providers may:
- Collect usage data
- Set cookies
- Track interaction
We do not control third-party privacy practices.
5. Data Sharing
We do not sell personal data.
Data may be shared only with:
- Payment processors (to complete transactions)
- Spam detection services
- Hosting and infrastructure providers
- Legal authorities when required by law
If you request a password reset, your IP address may be included in the reset email for security verification.
6. Data Retention
We retain data only as long as necessary.
Comments
Comments and associated metadata may be retained indefinitely for moderation continuity.
Customer Accounts
Account data is retained while the account remains active or as required for:
- License enforcement
- Tax compliance
- Fraud prevention
- Legal obligations
Security logs may be retained for audit and integrity purposes.
7. Your Rights
Depending on your jurisdiction, you may have the right to:
- Request access to your personal data
- Request correction of inaccurate data
- Request deletion of personal data
- Request export of your stored data
Deletion requests may be limited where data must be retained for:
- Legal compliance
- Financial records
- Security investigations
- Fraud prevention
To make a request, contact:
[Insert Support Email]
8. Data Security
We implement:
- HTTPS encryption
- Restricted administrative access
- Server-level security controls
- Audit logging
- Least-privilege principles
For Omniscient products:
Omniscient is designed as an investigator-controlled system. AI components, where present, operate in observation or assistance roles and do not exercise autonomous authority.
Nexus Instruments does not remotely access private Omniscient deployments unless explicitly authorized for support.
9. International Users
If you access this website from outside our hosting jurisdiction, you understand that your data may be transferred and processed in the hosting country.
10. Changes to This Policy
We may update this Privacy Policy to reflect operational, legal, or product changes.
Updated versions will be posted on this page with a revised effective date.
