Privacy Policy
Last Updated: January 15, 2026
This document describes how Xralventox obtains, manages, retains, and ultimately disposes of information relating to individuals who engage with our investment advisory platform. It reflects our operational philosophy regarding data stewardship and your autonomy over the specifics we hold about you.
We recognize that capital allocation decisions demand careful consideration. The same applies to entrusting someone with details about your financial circumstances and goals. Our approach centers on limiting intake to what serves a clear functional need while maintaining transparency about how those details move through our organization.
Note: This policy addresses personal information handling exclusively. For technical aspects including cookies, analytics scripts, and tracking mechanisms, please refer to our separate Cookie Policy accessible from the footer navigation.
Information We Derive From Your Engagement
Details emerge from your interactions with our platform at several distinct moments. Each category serves a different operational need, and understanding the nature of these connections helps clarify why specific elements are recorded.
Account Registration Details
When establishing an account, you provide identification markers and contact channels. These include your full legal name, email address, phone number, and residential location. We capture this during the signup flow because executing transactions, communicating portfolio updates, and meeting regulatory obligations all depend on reliable contact information and verified identity.
Canadian securities regulations require us to confirm who we're advising. The jurisdiction where you reside determines which disclosure requirements apply to our communications with you. Your phone number becomes relevant if urgent portfolio adjustments need immediate discussion rather than waiting for email responses.
Financial Profile Construction
Small capital investing requires understanding risk tolerance, time horizon, and current holdings. You share income ranges, existing investment positions, liquidity needs, and specific goals during the onboarding questionnaire. This data shapes the recommendations we generate.
Without knowing whether you're building an emergency fund or optimizing returns on temporarily idle capital, our suggestions would miss the mark. A client with three months until a home purchase needs fundamentally different guidance than someone parking earnings for five years. The financial snapshot you provide prevents mismatched advice.
Transaction and Activity Records
Platform interactions generate operational records automatically. Login timestamps, pages viewed, documents downloaded, trades executed, and support queries all leave traces. These emerge passively as you navigate rather than through deliberate disclosure.
Activity logs serve multiple functions. Security monitoring identifies unusual access patterns that might indicate unauthorized entry. Performance analysis reveals which educational resources resonate with clients. Regulatory audits require transaction histories showing the advice-to-execution chain remained appropriate.
We never request credit card numbers, banking passwords, or account credentials beyond what's needed for funding your investment account through our regulated custodian partner. Legitimate operational needs have clear boundaries. Requests falling outside those parameters should raise immediate concern.
How Information Flows Through Our Operations
Once details enter our systems, they move through distinct operational channels based on functional requirements. Understanding these pathways clarifies who accesses what and why those access patterns exist.
Internal Handling and Team Access
Advisory staff review client financial profiles when generating recommendations. Customer support accesses contact details and account status when resolving queries. Compliance personnel examine transaction records during regulatory filings. Technology teams work with anonymized usage patterns when optimizing platform performance.
Access operates on necessity. A support representative helping you reset a password doesn't see your full financial profile. An advisor developing your portfolio strategy doesn't browse your support ticket history. Technical controls enforce these boundaries through role-based permissions that limit data exposure to relevant job functions.
Operational Service Providers
Certain functions depend on specialized external providers. Our custodian partner holds your investment assets and executes trades. Email infrastructure delivers account notifications and market updates. Cloud hosting providers maintain the servers running our platform. Payment processors handle subscription billing.
These relationships involve contractual data protection obligations. Service agreements specify that providers may only use client information for delivering their contracted function. They can't repurpose financial details for unrelated marketing or sell contact lists to third parties. We select partners based partly on their demonstrated security practices and regulatory compliance records.
Regulatory and Legal Disclosures
Investment advisory services operate within a comprehensive regulatory framework. Securities regulators may request client files during examinations. Court orders can compel disclosure in litigation. Tax authorities sometimes require transaction records for verification purposes. Law enforcement might seek information pursuant to valid legal process.
These aren't discretionary choices. Refusing lawful regulatory requests results in license suspension or worse. We don't volunteer information proactively, but compliance with legitimate legal demands isn't optional. When disclosure occurs under these circumstances, we're often legally prohibited from notifying the affected individual in advance.
Business Transition Scenarios
Should Xralventox be acquired, merge with another firm, or transfer client relationships to a successor advisor, your information would move with those accounts. The acquiring entity inherits both our client relationships and the associated data supporting those advisory engagements.
Such transitions require client notification under securities regulations. You maintain the right to close your account and move assets elsewhere if a successor firm doesn't meet your preferences. Your information doesn't transfer until the business transition formally completes and regulatory approvals finalize.
Your Control Mechanisms and Rights
Information stewardship isn't a one-way street. You maintain several avenues for examining, correcting, limiting, or eliminating the details we hold. The mechanisms vary depending on what you're trying to accomplish.
Access and Correction Procedures
You can review the personal and financial information in your account profile by logging into the platform and navigating to account settings. Most details are directly editable through the interface. If you spot inaccuracies or outdated information, update those fields yourself or contact support if the interface prevents self-service corrections.
For information not visible in your dashboard but held in our operational systems, submit a formal access request via email to contact@xralventox.com. We'll provide a comprehensive report within 30 days covering what we hold, how it's categorized, and where it originated. There's no charge for one request per year. Additional requests may incur reasonable administrative fees covering retrieval and compilation costs.
Data Portability and Export
You can request an export of your account data in machine-readable format. This includes your profile information, transaction history, communication records, and document archive. The export arrives as a structured file compatible with common spreadsheet and database applications.
This proves useful when moving to another investment platform or maintaining personal financial records. Submit export requests through your account dashboard. Processing typically completes within five business days. Large archives spanning multiple years might require additional time.
Restriction and Objection Options
You can object to certain data uses by adjusting communication preferences in your account settings. This limits marketing messages, educational content, and non-essential notifications. However, you can't opt out of transaction confirmations, regulatory disclosures, or critical security alerts. Those communications serve legal obligations and account protection functions that override preference settings.
If you believe we're handling your information in ways that exceed legitimate operational needs, document your concerns in writing and send them to our privacy contact. We'll investigate, explain the business rationale, and adjust our practices if your objection identifies an unnecessary use case.
Account Closure and Deletion
Closing your account initiates a graduated deletion process. We immediately terminate platform access and cease advisory services. Your investment positions transfer to another custodian per your instructions or liquidate according to your selected option.
Complete information deletion doesn't occur instantly. Securities regulations require us to retain client files for seven years following account closure. This retention obligation serves regulatory examination requirements and potential dispute resolution needs. After the retention period expires, we permanently purge your data from active systems and backup archives.
During the retention period, your information enters an inactive state with severely restricted access. Only compliance personnel responding to regulatory requests or resolving formal disputes can retrieve closed account records. The data doesn't feed marketing systems, populate analytics, or influence operational decisions.
Security Approach and Residual Risks
We employ technical, administrative, and physical safeguards to protect client information against unauthorized access, alteration, or destruction. Understanding both our protective measures and their inherent limitations provides a realistic picture of information security in a digital environment.
Technical Protections
Data transmission occurs over encrypted connections using current TLS standards. Stored information resides in encrypted databases with access controlled through multi-factor authentication requirements. Platform infrastructure operates behind firewalls with intrusion detection systems monitoring for suspicious activity patterns.
We maintain separate environments for production systems and development work. Test databases contain synthetic data rather than real client information. Code changes undergo security review before deployment. Third-party penetration testing firms periodically probe our defenses to identify vulnerabilities before malicious actors can exploit them.
Administrative Controls
Employees complete security training covering data handling protocols, phishing recognition, and incident response procedures. Access to client information requires justified business need documented in access request records. We periodically audit who has access to what and revoke permissions that no longer align with current job functions.
Background checks screen staff members before granting system access. Confidentiality agreements impose contractual obligations beyond regulatory requirements. Incident response plans define procedures for containing, investigating, and remediating security events that manage to bypass preventive controls.
Acknowledged Limitations
No security architecture eliminates every conceivable risk. Determined attackers with substantial resources occasionally breach well-defended systems. Insider threats from rogue employees can subvert technical controls. Human error creates opportunities for social engineering that bypasses technological defenses.
We can't guarantee absolute security any more than a bank can promise its vault will never be robbed. What we can do is implement controls consistent with industry standards, monitor for emerging threats, respond promptly when incidents occur, and maintain transparency about our security posture rather than making unrealistic promises of impenetrability.
Breach Notification Commitments
If a security incident compromises your information, we'll notify you directly via email and provide details about what occurred, which data elements were exposed, what steps we're taking in response, and what protective actions you should consider. Notification timing depends on investigation needs and law enforcement coordination requirements, but occurs as soon as reasonably feasible.
We also file required reports with securities regulators and privacy authorities per applicable breach notification laws. Transparency during security incidents serves everyone's interests even when the news is uncomfortable to deliver.
Children's Information and Platform Eligibility
Investment advisory services require legal capacity to enter binding contracts. Our platform serves adults who meet age of majority requirements in their jurisdiction. We don't knowingly collect information from individuals under 18 years old.
If we discover that someone under the minimum age has created an account, we immediately terminate platform access and delete associated information. Parents or guardians who believe their minor child has registered should contact us immediately so we can investigate and remediate.
Custodial investment accounts for minors involve the parent or guardian as the account holder with the minor as beneficiary. In those arrangements, we obtain and handle information about the adult account holder, not the minor beneficiary.
Questions and Concerns
Privacy practices evolve as regulations change, business operations develop, and technology capabilities shift. This policy receives periodic updates reflecting those developments. We'll notify active account holders of material changes via email and update the revision date displayed at the top of this document.
Reach our privacy team through any of these channels:
Phone
+1 519-966-2150
22 Pembroke St W
Pembroke, ON K8A 5M3
Canada