Tiger Data Intelligence logo
TigerData Intelligence

Privacy as a Performance Metric.

At Tiger Data Intelligence, we treat your information with the same rigor we apply to our high-stakes analytics. Modern intelligence requires a foundation of absolute transparency.

Last Revision: February 17, 2026
Tiger Data Intelligence Workspace

Core Evidence Protocols

We do not engage in broad-spectrum surveillance. Our analytics models focus on business-critical vectors while maintaining user anonymity wherever technically feasible.

Intentional Data Acquisition

When you engage with our digital ecosystem, we collect identifiers that allow us to provide specific intelligence services. This includes your name, corporate email address, and IP-derived location data. This is not for profiling, but to ensure that the data insights we deliver are geographically and contextually relevant to your specific market in Bangkok or globally.

Technical Metadata Logs

To maintain the integrity of our platform, our servers log interaction patterns. This refined intelligence helps us optimize page performance and security. We monitor:

  • Browser Fingerprint Types
  • Navigation Latency Markers
  • Referral Architecture
  • System Resolution Data
Data Sovereignty
Protocol Archive: Secure Infrastructure

Individual Autonomy & Access

Under the Personal Data Protection Act (PDPA) of Thailand and international standards, you maintain specific leverages over your digital footprint.

Request Rectification

If our analytics records contain inaccuracies regarding your professional profile, you have the right to demand immediate correction.

Portability Rights

You may request a structured export of the intelligence we hold about you to migrate it to another service provider of your choosing.

Erasure Mandate

Beyond legally mandated retention periods for financial reporting, you can request the permanent deletion of your personal data insights.

Securing the Intelligence Chain

Encryption at Rest & Transit

All data insights are protected using AES-256 encryption. Communication between our analytics engine and your browser uses TLS 1.3 protocols to prevent interception.

Access Control Lists (ACL)

Only essential Tiger Data Intelligence personnel with verified clearance can access raw data. We perform quarterly audits of access logs to ensure zero unauthorized entry.

Zero-Trust Environment

Our internal network operates on a zero-trust model. Every request for data insights must be authenticated and authorized, regardless of the origin location.

Security Infrastructure

Data Purpose & Utility Registry

Formal disclosure of data intent processes.

Category Primary Utility Retention
Technical Identifiers Performance analytics & security hardening 24 Months
Professional Liaison Info Project communications & service delivery Duration of contract + 5 years
User Preference Vectors Interface optimization & UX intelligence 12 Months
Marketing Consents Newsletter distribution & regional updates Until withdrawal

Notice of Third-Party Disclosure

We do not sell your data. We share information only with trusted cloud infrastructure partners (e.g., AWS, Google Cloud) that host our intelligence platform, or when legally compelled by Thai authorities.

Reach our Data Privacy Officer.

If you have questions regarding our data insights methodology or wish to exercise your rights, our dedicated compliance team in Bangkok is ready to assist.

Direct Communication

+66 2 214 5532

info@tigerdataintelligence.digital

Operational Base

Phaya Thai Road 210,
Bangkok, Thailand
Mon-Fri: 9:00-18:00

© 2026 Tiger Data Intelligence. All Legal Protections Applied.