PRIVACY POLICY AND DATA SHIELDING (AEGIS PLS)
Last Update: March 2026
Responsible Entity: Business of Global Marketing, LLC (BGM Corporation)
Commercial Brands: AEGIS PLS / NovaCore Software
EIN: 87-1348703
Registered Office: 990 Biscayne Blvd, Ste 501-16, MIAMI, FL US 33132-1556
Jurisdiction: Florida, United States
01 CLAUSE 1: REGULATORY FRAMEWORK AND COMMITMENT
This Privacy and Data Shielding Policy constitutes the technical and legal regulatory framework governing the deployment and use of your infrastructure. AEGIS PLS and NovaCore Software are commercial brands operated and legally represented by Business of Global Marketing, LLC, headquartered in Miami, USA, the entity responsible for providing the infrastructure and processing the technical data necessary for its implementation. Our commitment is based on the US regulatory framework, including the Florida Digital Bill of Rights (FDBOR), the Florida Information Protection Act (FIPA), and the California Consumer Privacy Act (CCPA) standards where applicable. Access to and protection of your information are articulated to guarantee absolute confidentiality and the inalienable technical sovereignty of your assets. Although the engineering is provided by the Company, the operational control and custody of the information reside exclusively with the Holder.
02 CLAUSE 2: PRIVACY SOVEREIGNTY PHILOSOPHY
Unlike centralized services, Aegis operates under the principle of Privacy by Architecture. Our infrastructure does not manage your data; it provides the technical environment for you to be the sole custodian of your information and assets. Upon completion of implementation, technical sovereignty is total and irreversible.
03 CLAUSE 3: DATA COLLECTION IN THE ADMISSION PROTOCOL
Aegis applies a strict data minimization policy. During the start of the protocol, only the following data is processed:
- Identity Validation: Full name or legal entity to ensure compliance with protocol integrity standards.
- Secure Connectivity: An encrypted contact channel for technical implementation coordination.
- Infrastructure Metrics: The declared capital range is used exclusively to dimension the response capacity and operational limits of the Aegis Bridge.
04 CLAUSE 4: PRIVATE INSTANCE SHIELDING
Your information does not reside in shared databases or conventional cloud environments:
- Physical Isolation: Each user receives a dedicated infrastructure instance, logically isolated from any other system.
- Zero-Backdoor Architecture: After Phase 4, a permanent wipe of any engineering access is executed; the Company does not retain access keys or recovery methods.
- End-to-End Encryption: All communication between your device and your infrastructure is shielded by military-grade encryption protocols.
05 CLAUSE 5: BIOMETRIC DATA MANAGEMENT
Aegis has no technical capacity to intercept, store, or view your biometric data:
- Security Enclave: FaceID/TouchID synchronization happens at the hardware level in your personal device's secure enclave.
- Inalienability: Transaction execution authority resides exclusively on your physical device.
06 CLAUSE 6: RISK SEGREGATION IN THE AEGIS BRIDGE (VISA)
The use of the optional spending module protects the privacy of your main capital:
- Compartmentalization: Visa network compliance processes (KYC) are managed in a segregated manner and have no technical visibility into your PLS vault.
- Selective Visibility: You decide which assets to project to the spending bridge, keeping the rest of your assets invisible to the global financial system.
07 CLAUSE 7: NO-LOGGING POLICY
Aegis does not track or generate historical records (logs) of your operations, balances, or movements within your private instance.
08 CLAUSE 8: EXERCISE OF RIGHTS AND TECHNICAL SOVEREIGNTY
You maintain the right to access, rectify, and delete Admission Protocol information:
- During Admission: You can request data deletion at any time prior to implementation.
- After Transfer (Phase 4): Due to the Zero-Backdoor protocol, the Company possesses neither the technical capacity nor physical access to view or extract data. Data deletion is the sole responsibility of the owner.
09 CLAUSE 9: SECURE CONTACT CHANNEL
For technical inquiries regarding your data shielding:
"At Aegis, we understand that privacy is not an option, but an inalienable fundamental right."
This technical shielding protocol ensures that your assets remain under your exclusive control, free from external interference and protected by the most advanced engineering available. Your financial sovereignty starts here, with absolute ownership of your own infrastructure.