Policy Framework v2.1 // Founded 2023

Privacy
Architecture.

At Hirall Solutions (Est. 2023), we treat data privacy as a core engineering protocol, not just a legal requirement. This document outlines how we protect and manage the information that powers your enterprise.

01Data Collection Protocols

We collect information necessary to provide high-fidelity enterprise software and industrial hardware services. This includes:

  • Entity Data: Business names, registration details, and tax identifiers.
  • Transaction Data: M-Pesa ledger records, STK push responses, and payment reconciliation metadata.
  • Technical Logs: IP addresses, hardware identifiers (Hardware IDs), and system performance metrics.

02Purpose of Processing

Your data is processed exclusively for the optimization of your Hirall ecosystem:

  • To facilitate real-time financial reconciliation via the M-Pesa G2 protocol.
  • To train internal predictive AI models for inventory and revenue forecasting (Anonymized).
  • To maintain 99.9% system uptime through pro-active logic auditing.

03Data Sovereignty & Security

Hirall Solutions complies with the Kenyan Data Protection Act (2019). We implement end-to-end encryption (AES-256) for all data in transit and at rest within our cloud clusters.

Audit Status

Current Security Protocol: Zero-Trust Architecture active across all Hirall Hardware and Software Kernels.

Last Updated: February 2026
Legal Liaison: hirallsolutionske@gmail.com