+84 28 7500 1130
Governance & Governance

Privacy Protocol

Effective as of April 20, 2026. This document outlines how Insight Calytris manages sensitive information while conducting high-level research and strategic analysis for the Vietnamese market.

Doc Reference IC-SRV-2026-PP
Research strategy environment

Transparency Note

We only collect data necessary to fulfill our objective of providing insight vision for the Vietnamese business landscape.

Information Capture and Intent

At Insight Calytris, our research methodology is built on a foundation of professional integrity. When you interact with our platforms or engage our consultancy services, we process information that falls into two primary categories:

  • 01

    Direct Identification Data

    Includes your name, corporate email address, and professional title shared via inquiry forms or during strategic consultations. This allows us to maintain direct correspondence regarding your specific market needs.

  • 02

    Technical Telemetry

    Analytical logs including IP addresses, regional identifiers, and site interaction metrics. We utilize this to refine our digital interface and ensure the delivery of high-performance research content.

The Usage Mandate

Data is never repurposed for third-party commercial exploitation. Its lifecycle within Insight Calytris is strictly limited to improving strategic output and maintaining regional service standards.

Review our scope

Data Protection &
Structural Security

Protecting the proprietary intelligence of our clients is fundamental to the Insight Calytris mission. Our security architecture adheres to international standards for business intelligence firms.

Encryption

Military-grade AES-256 standards applied to all stored research repositories.

Access Control

Strict multi-factor authentication protocols for all analyst workstations.

Local Jurisdictional Compliance

As a consultancy operating in Ho Chi Minh City, we align our operations with Vietnamese laws concerning electronic data transactions and cybersecurity, ensuring your research remains protected within local and international legal frameworks.

Security infrastructure
ISO Standards

Integrity Log

"Research without confidentiality is merely noise. We prioritize the signal."

Data center operations

Your Intelligence Sovereignty

Under our protocol, you maintain complete control over the information you provide.