Internset DAO LLC ("we," "us," or "our") operates platforms such as InternsetDAO.com, Stipent.com, and related decentralized applications (DApps). This Decentralized Data Storage Policy outlines our approach to securely storing, managing, and accessing data using decentralized storage networks and blockchain-based systems.
1. Purpose
The purpose of this policy is to:
- Ensure secure and transparent data storage through decentralized infrastructure.
- Maintain data availability and redundancy while preventing data loss or unauthorized access.
- Comply with legal standards for decentralized data storage and user data protection.
2. Scope
This policy applies to all platform-related data stored through decentralized systems, including:
- Blockchain Data: On-chain records related to transactions, token distributions, and governance votes.
- Platform Content: Public-facing content like smart contract metadata, DAO proposals, and treasury reports.
- User-Generated Content (UGC): Submissions from users, such as proposals, project updates, and voting records.
- Backup Data: Redundant data backups and immutable data snapshots.
3. Data Storage Framework
To ensure data integrity, availability, and security, Internset DAO uses a combination of:
A. Decentralized Storage Networks
We utilize decentralized storage providers such as:
- IPFS (InterPlanetary File System): For storing documents, metadata, and public files.
- Arweave: For permanent storage of key platform records, if needed.
- Blockchain Storage: On-chain records are stored directly on Polygon (Layer 2) or another supported blockchain.
B. Data Types Stored
Data Type | Storage Method | Security Level |
Smart Contract Data | Blockchain (Polygon) | Immutable & Public |
Transaction Records | Blockchain (Explorer) | Immutable & Public |
User Submissions (Proposals) | IPFS / Off-Chain Database | Encrypted & Verified |
Platform Content & Metadata | IPFS / Cloud Storage | Encrypted & Redundant |
Data Backups | IPFS / Encrypted Vaults | Secure & Redundant |
4. Data Security Measures
We implement the following security measures for decentralized data storage:
A. Encryption Standards
- Data Encryption: Sensitive data is encrypted before storage using industry-standard cryptographic algorithms (e.g., AES-256).
- Transport Layer Security (TLS): End-to-end encryption is enforced during data transfer.
B. Data Redundancy & Replication
- Decentralized Replication: Files stored on decentralized networks (e.g., IPFS) are replicated across multiple nodes, ensuring high availability even if individual nodes go offline.
- Disaster Recovery: Critical data is periodically backed up and verified to ensure business continuity.
C. Access Control & Authorization
- Multi-Signature Wallets: Only authorized DAO members with multi-signature approval can make critical updates to platform data.
- Access Logs: All data access events are logged and auditable to prevent unauthorized access.
5. Data Privacy & Compliance
To ensure privacy protection and regulatory compliance, we adhere to the following standards:
A. Data Minimization
- Minimal Data Collection: We only store necessary data to enable decentralized governance, token management, and platform operations.
B. Data Anonymization
- Personal Data Anonymization: User-sensitive data (if collected) is anonymized or pseudonymized before storage.
- On-Chain Transparency: Blockchain data is publicly accessible but anonymous by design.
C. Legal Compliance
We comply with relevant legal frameworks, including:
- GDPR (General Data Protection Regulation): For European Union users.
- CCPA (California Consumer Privacy Act): For California-based users.
- Wyoming DAO Laws (§ 17-31-101): Governing decentralized organizations registered in Wyoming, USA.
6. Incident Response & Data Breach Management
If a data breach or security incident occurs, we follow a three-step incident response process:
- Detection: Real-time monitoring systems detect unusual activity.
- Investigation & Containment: The core development team assesses the breach, isolates affected systems, and prevents further unauthorized access.
- Notification & Remediation:
- Community Disclosure: Affected parties are notified immediately if sensitive data is compromised.
- Post-Incident Report: An incident report is published, outlining the cause, resolution, and preventive measures.
7. User Responsibilities
Users interacting with Internset DAO’s platforms must adhere to the following responsibilities:
- Data Backup: Users are encouraged to back up important data such as wallet credentials, proposals, or project updates.
- Compliance with Terms: Users must follow platform terms and submit only authorized content for storage on decentralized networks.
8. Violations & Enforcement
Policy Violations may include:
- Unauthorized Data Access: Attempting to access, modify, or tamper with stored data without authorization.
- Prohibited Content Upload: Uploading illegal, offensive, or copyrighted material without proper permissions.
Enforcement Actions May Include:
- Content Removal: Immediate removal of violating content.
- Account Termination: Suspension of accounts involved in policy violations.
- Legal Action: Pursuit of legal claims if applicable.
9. Amendments to This Policy
Internset DAO LLC reserves the right to update this policy at any time. Updated versions will be published on official platforms with the revised effective date clearly indicated. Continued platform use after updates constitutes acceptance of the revised terms.