Quick Links
Privacy Policy
1 — Data Collected
System diagnostics & metrics
Infrastructure usage patterns
API call data & analytics
Deployment activity logs
Authentication identifiers
Compute resource statistics
2 — Usage of Collected Data
Improve orchestration efficiency
Adaptive performance tuning
Smart auto-scaling triggers
Threat detection mechanisms
System uptime analysis
Execution performance metrics
3 — Safeguards & Encryption
SOC2-aligned infrastructure
AES-256 encryption end-to-end
Multi-zone backup redundancy
Live anomaly detection
Threat intelligence (AI-powered)
Automated patch rollout
4 — Information Access Control
Never commercialized or resold
Fully sandboxed execution zones
No cross-user data visibility
Access gated via signed keys
Compliant with global standards
Only disclosed if legally required
5 — Data Ownership & Controls
Inspect your usage and metrics
Export logs upon request
Modify retention timelines
Adjust AI personalization flags
Limit access by role
Permanently delete records
6 — Monitoring & Cookies
Essential-only cookie policy
Infrastructure monitoring
In-system usage analytics
Session and error tracing
Preference memory (local)
User-configurable monitoring
7 — Retention & Compliance
Logs kept 30 days by default
Metrics kept for 12 months
Security logs: 24-month cycle
Audit data: 7-year retention
Auto-purged after expiry
Retention modifiable per user
Contact us
General & Technical Inquiries:
hello@exyra.ai
Ecosystem & Partnerships:
ecosystem@exyra.ai
Exyra
Deploy logic, not code.
Autonomous systems demand autonomous observability. Exyra delivers full-system awareness out of the box.