Data Protection & Security Policy
Our commitment to the absolute integrity, privacy, and security of all client communications and strategic assets.
Last Updated: January 23, 2026
The Principle of Privilege
At Mtengwa Strategic Advisory, we treat all client inquiries, project briefs, and data submissions with the same level of confidentiality as a legal or medical consultation. Your intellectual property and strategic intent are safe with us.
1. Information Collection & Use
We collect information solely for the purpose of evaluating and executing strategic advisory engagements. This includes:
- Contact details provided via our secure forms or direct email.
- Project briefs and technical requirements shared during discovery.
- Operational data necessary for architectural reviews or audits.
We do not sell, rent, or trade your personal information to third parties. We do not use your proprietary data to train public AI models.
2. Communication Security
All digital communication channels are secured to industry standards:
- Website Transmission: All data transmitted via our website forms is encrypted using Transport Layer Security (TLS/SSL).
- Email Integrity: Our primary communication channels utilize enterprise-grade encryption and access controls.
- Limited Access: Access to client correspondence is strictly limited to the Principal Consultant and authorized technical staff under non-disclosure agreements (NDAs).
3. Data Deletion & The "Right to be Forgotten"
We respect your right to digital sovereignty. Upon the conclusion of an engagement, or at your specific request:
- We will securely delete all non-essential client data from our active systems.
- You may request a full export of any personal data we hold about you.
- You may request the permanent erasure of your contact record from our CRM and marketing databases.
To initiate a data deletion request, please contact the Data Controller directly using the details below.
4. Client Asset Protection
For clients engaging our BuruOps Intelligence Lab for technical implementation:
- We utilize ephemeral environments for testing where possible, ensuring no residual data remains after a test.
- Code repositories and architectural diagrams are stored in encrypted, access-controlled environments.
- We adhere to a "Least Privilege" access model for all client infrastructure.
5. Legal Disclaimer
While we employ robust security measures to protect your data, no method of transmission over the Internet is 100% secure. We cannot guarantee absolute security. By using our services, you acknowledge that you provide information at your own risk.
This policy is governed by the laws of England and Wales.
6. Data Controller Contact
For any inquiries regarding data protection, security audits, or deletion requests, please contact:
Principal Data Controller: Burhani Mtengwa, MBCS
Email: contact@mtengwa.co.uk
Office: Woking, Surrey, United Kingdom
© 2026 Mtengwa Strategic Advisory. All rights reserved.
