Privacy Protocols
Securing the data of Nigeria's most impactful mobilization network.
Data Transparency
At RHIC (Renewed Hope Innovators Coalition), we prioritize the security and sovereignty of our members' data. This protocol outlines how we collect, protect, and utilize information to drive national progress.
- Identity Verification: We collect basic profile data (Name, Phone, Location) to authenticate legitimate coalition members.
- Field Intelligence: Intelligence reports and media uploads are geotagged to verify ground truth during mobilization.
- Financial Security: All patronage and contributions are processed through encrypted, compliant gateways.
Security Architecture
Sovereign Hosting
Data is stored on high-availability, high-security infrastructure with redundant backups.
Role-Based Access
Intelligence is only visible to authorized command levels per the S-EAGLE protocols.
Encrypted Transit
All communication between your device and our servers is secured via 256-bit SSL encryption.
Zero Data Sale
We never sell or distribute member data to third-party commercial entities.
Your Rights
As a member of the coalition, you retain full rights to request data extracts or the deletion of your profile in alignment with the NDPR (Nigeria Data Protection Regulation).