The Sovereignty
of Your Information.
At Lycian Data Horizon, we view data not as a commodity, but as the fundamental infrastructure of regional development. Our commitment to privacy is built into the architecture of our economic planning models. This policy details how we protect the integrity of the data that fuels our analysis.
Lycian Data Horizon
Ankara Headquarters
"Regional intelligence is impossible without individual privacy. We maintain the horizon by protecting the source."
Internal Architecture Notes
01. Purpose Limitation
Personal identifiers are strictly decoupled from our economic planning datasets. We utilize differential privacy techniques to ensure that aggregated data analysis does not inadvertently reveal individual entries.
REF: ARCH-DOC-001 / ANKARA02. Ankara Data Residency
All primary server clusters are localized within Turkey. Our facility at Tunali Hilmi Cd. 180 adheres to strict physical security protocols, ensuring that regional development insights remain within sovereign operational control.
REF: FACILITY-SEC-KVKK / 2026
Visualizing Internal Integrity • Functional Esthetics
Inventory
Of Identity
—
Technical Metadata
IP addresses and browser fingerprints used solely for security auditing and regional traffic mapping across our data analysis platforms.
Inquiry Records
Name, business email, and phone number (+90) provided during consultation requests for bespoke regional development frameworks.
Usage Geolocation
Approximate location data derived from network logs to optimize delivery speeds for our research dashboard in specific Turkish provinces.
Contractual Data
Tax credentials and billing records necessary for formalizing economic planning partnerships and compliance audits.
Empowering the Data Subject
Under the Law on Protection of Personal Data (KVKK) No. 6698, you maintain unalienable rights over your footprint in our systems. We do not just comply; we provide direct channels for execution.
-
Request Disclosure Obtain a portable file of all data currently associated with your corporate profile.
-
Invocation of Erasure Request total purging of records beyond statutory retention requirements.
Infrastructure Hardening
Quantitative measures for qualitative trust.
Encryption Layering
AES-256 standards are applied to all datasets at rest. For data analysis in transit, we enforce TLS 1.3 protocols, ensuring zero-interception communication between our Ankara servers and your terminal.
Access Zero-Trust
Internal access to client intelligence requires multi-factor authentication and role-based clearance. No single analyst has holistic access to unmasked identifiers across regional development projects.
Retention Limits
We operate on a "Depreciation of Utility" principle. Metadata that no longer informs economic planning accuracy is automatically purged after a 24-month rolling period.
Questions concerning your data?
Our Chief Privacy Officer serves as the lead auditor for all regional development datasets handled by Lycian Data Horizon. We are committed to absolute clarity in every interaction.
Global Compliance Desk
info@lyciandatahorizon.digital
+90 312 482 7910
Ankara HQ Operations
Tunali Hilmi Cd. 180,
Cankaya, Ankara, Turkey