Skip to content
Company Logo Protektant
Cookies on Protektant
We use necessary cookies to make the site work and optional cookies to improve your experience. By clicking Accept all, you agree to our use of cookies as described in our Cookie Policy.

Privacy Policy

Protektant Privacy Policy

Last updated: October 17, 2025

Privacy Policy

This Privacy Policy explains how Traditional Knowledge Inc. (“TKI”, “we”, “us”) collects, uses, stores, and protects your information when you use Protektant, our platform that supports Indigenous Nations, Knowledge Holders, and Subscribers.

1. Who We Are

Traditional Knowledge Inc. operates Protektant, a SaaS platform that helps Indigenous Nations manage and safeguard Traditional and Ecological Knowledge (TEK).

  • Indigenous Nations maintain sovereignty over their Sovereign Data Treasury (aggregate TEK dataset).
  • Knowledge Holders retain ownership of their individual TEK.
  • Subscribers (Crown and corporate clients) access TEK through subscriptions, subject to permissions and privacy controls.

Data Controller & Processor Roles

TKI acts as the data controller for platform metadata and operational analytics, determining the purposes and means of their processing. TKI also acts as a data processor for TEK submissions, processing such data under the authority and governance of Indigenous Nations and Knowledge Holders who remain the data owners.

2. Children & Age Requirements

  • The Platform is not directed to children under 13.
  • We do not knowingly collect information from anyone under 13.
  • Users aged 13–17 may use the Platform only with parental or guardian consent.
  • If we learn we collected data from a child under 13 without consent, we will delete it.

3. Information We Collect

  1. Account Information: name, email, phone, Indigenous Nation affiliation, credentials.
  2. TEK Submissions: text, media, geospatial, and ecological data you choose to share; privacy status: PUBLIC, MASKED, or PRIVATE (Knowledge Holder-controlled).
  3. Payment & Financial Information: for Subscribers, billing and payment details; for Knowledge Holders, honoraria payout details (via payment processor).
  4. Metadata: usage logs, timestamps, device/browser data. Metadata belongs to TKI; TEK data belongs to you.
  5. Support Communications: messages, feedback, and support tickets.

4. How We Use Information

  • To operate, secure, and improve Protektant.
  • To process subscriptions, honoraria payouts, and royalties.
  • To provide Indigenous Nations with aggregated insights for consultation and governance.
  • To comply with law, enforce our Terms of Service, and resolve disputes.
  • For audit and compliance logging (e.g., TEK privacy status changes).
  • To exercise our licensed rights to use TEK within Protektant and facilitate honoraria in exchange for such use.

We do not sell or share personal data for advertising or profiling.

5. Data Ownership & Control

License Grant, Consideration, and Platform Exclusivity

By submitting Traditional or Ecological Knowledge (“TEK”) to Protektant, Knowledge Holders retain ownership of their TEK but grant Traditional Knowledge Inc. (“TKI”) an exclusive, perpetual, worldwide, and irrevocable license to use, process, store, and display such TEK solely within the Protektant platform and its lawful successors.

This license authorizes TKI to:

  • host and secure TEK within the Protektant system and its Sovereign Data Treasury architecture;
  • make TEK accessible to Subscribers through authorized subscriptions and privacy-controlled interfaces;
  • process, calculate, and facilitate honoraria associated with such access; and
  • perform all compliance, audit, and verification functions required by law or platform governance.

Consideration

The facilitation by TKI of lawful honoraria mechanisms — enabling compensation from Subscribers to Knowledge Holders — constitutes full and sufficient consideration for this license.

Exclusivity and Walled-Garden Security

TEK hosted within the Protektant platform is subject to an exclusive operational environment. Except where expressly authorized in writing by TKI and the originating Indigenous Nation, the TEK may not be hosted, distributed, copied, or monetized outside the Protektant platform.

To ensure continuity of security and performance, TKI may engage third-party infrastructure or service providers at its sole discretion. Such providers are deemed to operate within and as components of the Sovereign Data Treasury architecture, acting under TKI’s direction and subject to equivalent confidentiality, security, and data-protection obligations. The engagement, substitution, or modification of such providers does not alter the scope of this license or require renewed consent from Knowledge Holders, Indigenous Nations, or Subscribers.

Irrevocability

Once any Subscriber has lawfully accessed TEK or an honoraria transaction has been processed, the license becomes fully vested and irrevocable, continuing in perpetuity worldwide for as long as the Protektant platform or its lawful successors operate.

Metadata Ownership

TKI is the exclusive data controller and owner of all platform metadata, including logs, analytics, and system-generated datasets. Metadata are distinct from TEK and are retained for operational integrity, security, and compliance purposes.

6. Sharing of Information

  • With Indigenous Nations: aggregated or masked TEK according to Knowledge Holder settings.
  • With Subscribers: access to TEK subject to subscriptions and privacy settings.
  • With Service Providers: cloud hosting, payment processing, virus scanning, or analytics partners acting within the Sovereign Data Treasury architecture.
  • As Required by Law: subpoenas, lawful requests, or regulatory duties.
  • For Security: to prevent fraud, protect intellectual property, and enforce platform integrity.

7. Data Storage & Security

  • Data are hosted on secure Google Cloud servers, with storage regions selected to comply with applicable privacy laws, including PIPEDA.
  • Encryption in transit (TLS/SSL) and at rest.
  • Role-based access controls (RBAC).
  • Backups and disaster recovery systems are maintained.

8. Your Rights

Under PIPEDA and applicable laws, you have rights to:

  • Access: request a copy of your personal data.
  • Correction: update or rectify inaccuracies.
  • Deletion: request deletion, subject to legal or contractual limits.
  • Consent Withdrawal: revoke consents for uses not tied to legal or operational necessity.

Requests: privacy@protektant.com

9. International Users

While hosted on Google Cloud, your data may be processed in regions outside your jurisdiction, subject to Canadian law and this Policy.

10. Retention

  • Personal data are retained only as long as necessary for the purposes outlined.
  • TEK submissions: retained unless deleted by you.
  • Payment and financial data: retained for at least seven (7) years for audit and regulatory compliance.
  • Metadata and logs: retained for compliance and security (minimum two years).

Deletion requests trigger secure anonymization logs retained for verification purposes.

11. Dispute Resolution

Disputes under this Policy are governed by the Protektant Dispute Resolution Policy (DRP) and the laws of Ontario, Canada.

12. Changes to this Policy

  • We may update this Policy from time to time.
  • Material changes will be notified by email and posted on-platform 30 days in advance.
  • Continued use of Protektant after such changes constitutes acceptance.

13. Contact Us

Traditional Knowledge Inc.
Attn: Privacy Officer
Ottawa, Ontario, Canada
Email: privacy@protektant.com

Back to top ↑