Policy Framework v2.1 // Founded 2023
Privacy
Architecture.
At Hirall Solutions (Est. 2023), we treat data privacy as a core engineering protocol, not just a legal requirement. This document outlines how we protect and manage the information that powers your enterprise.
01Data Collection Protocols
We collect information necessary to provide high-fidelity enterprise software and industrial hardware services. This includes:
- Entity Data: Business names, registration details, and tax identifiers.
- Transaction Data: M-Pesa ledger records, STK push responses, and payment reconciliation metadata.
- Technical Logs: IP addresses, hardware identifiers (Hardware IDs), and system performance metrics.
02Purpose of Processing
Your data is processed exclusively for the optimization of your Hirall ecosystem:
- To facilitate real-time financial reconciliation via the M-Pesa G2 protocol.
- To train internal predictive AI models for inventory and revenue forecasting (Anonymized).
- To maintain 99.9% system uptime through pro-active logic auditing.
03Data Sovereignty & Security
Hirall Solutions complies with the Kenyan Data Protection Act (2019). We implement end-to-end encryption (AES-256) for all data in transit and at rest within our cloud clusters.
Audit Status
Current Security Protocol: Zero-Trust Architecture active across all Hirall Hardware and Software Kernels.
Last Updated: February 2026
Legal Liaison: hirallsolutionske@gmail.com
Legal Liaison: hirallsolutionske@gmail.com