Enterprise Privacy & Compliance Framework — BlueNexus

Last Updated: 23.12.25

Introduction

This Enterprise Privacy and Compliance Framework supplements BlueNexus Tech Pty Ltd's Global Privacy Policy. It provides detailed regulatory compliance information for enterprise customers, developers, partners, and auditors to support due diligence, security reviews, and regulatory assessments.

Clarification on "We", "Us", "Our"

These terms refer to BlueNexus as a legal entity and its personnel (employees, contractors, administrators). They do not refer to automated platform processing where human access to decrypted data does not occur.

The framework includes:

  1. Data Sovereignty Principles
  2. ANNEX A — GDPR & UK GDPR Compliance
  3. ANNEX B — CCPA/CPRA Compliance
  4. ANNEX C — Australian Privacy Act Compliance
  5. ANNEX D — U.S. State Privacy Laws
  6. ANNEX E — International Data Transfers
  7. ANNEX F — Subprocessor Annex
  8. ANNEX G — HIPAA Disclaimer
  9. ANNEX H — Definitions & Roles
  10. ANNEX I — Technical Architecture Overview
  11. Jurisdiction / Governing Law Disclaimer

Data Sovereignty Principles

1. User-Controlled Encryption & Permissions

Platform features enable user-controlled environments where users manage:

BlueNexus cannot decrypt content in these environments.

2. Developer-Controlled Routing & Processing

Developers integrating the Platform are responsible for:

BlueNexus processes developer-routed data solely on documented instructions as Processor.

3. Confidential Compute & Zero-Access Design

For workloads processed in Trusted Execution Environments (TEEs), the Platform relies on trusted third-party hardware and software vendors. These secure enclaves provide:

This architecture prevents BlueNexus personnel from accessing decrypted enclave content.

4. Region Selection & Data Localisation

Where supported, users and developers may select preferred regions for:

The Platform enforces these selections without redirecting data unless required for security or performance, where permitted by contract.


ANNEX A — GDPR & UK GDPR Compliance

1. Roles Under GDPR / UK GDPR

1.1 Controller / Processor

Developer-Managed Data

Sovereign or User-Controlled Accounts

Operational Account & Platform Data

1.2 Joint Controllers

BlueNexus does not become a Joint Controller unless explicitly agreed in writing.

2. Lawful Bases for Processing (Article 6)

Processing Activity Purpose Lawful Basis
Account creation and authentication Access to Services Article 6(1)(b) — Contract
Security logs and fraud detection Platform integrity Article 6(1)(f) — Legitimate Interests
Support communications Responding to inquiries Article 6(1)(b) or (a)
Website analytics Improve performance Article 6(1)(f)
Compliance obligations AML/CTF, tax, legal duties Article 6(1)(c)

When BlueNexus is the Processor, the Developer/Enterprise Customer determines the lawful basis.

3. Special Category Data (Articles 9 & 10)

4. Data Subject Rights (Articles 12–23)

Sovereign / User-Controlled Accounts

Rights exercised directly through the user's dashboard or authorized applications.

Developer-Managed Data

Data subjects must contact the Controller (developer or enterprise customer). BlueNexus will assist under DPA Art. 28(3)(e).

When BlueNexus is Controller

Requests may be submitted to: legal@bluenexus.ai

Response periods:

5. International Transfers (Chapter V)

BlueNexus uses:

If an EU/UK representative is required under Article 27, BlueNexus will appoint one and update this Annex.

6. Processor Commitments (Article 28)

BlueNexus shall:

7. Supervisory Authorities


ANNEX B — California CCPA / CPRA Compliance

1. Notice at Collection

BlueNexus may collect:

BlueNexus does not:

2. California Consumer Rights

Consumers may have rights to:

Requests: legal@bluenexus.ai

3. Appeals Process

If a request is denied, users may appeal by submitting an email referencing the decision. BlueNexus will respond within required timelines.


ANNEX C — Australian Privacy Act (APPs)

This Annex outlines compliance with the Australian Privacy Principles.

APP 1 — Open & Transparent Management

BlueNexus maintains internal governance and data handling policies.

APP 2 — Anonymity & Pseudonymity

Anonymous browsing permitted; identification required for account creation.

APP 3 — Collection

Personal information collected only where reasonably necessary.

APP 4 — Unsolicited Information

Deleted when not required.

APP 5 — Notification

Users are informed of:

APP 6 — Use & Disclosure

Used only for the primary purpose or as permitted by law.

APP 7 — Direct Marketing

No direct marketing without consent.

APP 8 — Cross-Border Disclosure

Reasonable steps taken to ensure overseas recipients handle data appropriately.

APP 11 — Security

Technical and organisational measures used, including TEE-based confidential compute.

APP 12–13 — Access & Correction

Users may request access or correction by contacting BlueNexus.


ANNEX D — U.S. State Privacy Laws

1. Rights Provided

Residents may exercise rights to:

BlueNexus does not engage in targeted advertising or selling without explicit user consent.

2. Sensitive Data

If developers route sensitive data, they must obtain affirmative consent.

3. Appeals

Denied requests may be appealed within the statutory timeframe.

4. Processor Duties

Where BlueNexus acts as Processor:


ANNEX E — International Data Transfers

1. Regions of Processing

Processing may occur in:

BlueNexus does not process or store data in geographic regions other than those explicitly selected or authorised.

2. Transfer Safeguards

Where required:

3. Data Localisation Support

If specific customers require data residency restrictions, BlueNexus can restrict regions at the customer's direction (subject to availability).


ANNEX F — Subprocessor Annex

BlueNexus uses the following categories of subprocessors:

1. Infrastructure & Compute Providers

2. Authentication & Security Providers

3. Observability & Monitoring

4. Payments

5. Communications

A public list of subprocessors is available at bluenexus.ai.

Enterprise customers will receive prior notice of material changes in accordance with the DPA.


ANNEX G — HIPAA Disclaimer

Some developers or enterprise customers may route health or medical information through the Services.

The Platform is designed to support HIPAA-compliant deployments. However, BlueNexus does not act as a Business Associate under HIPAA unless a separate, written Business Associate Agreement (BAA) is agreed.

By default, the Services are not provided on a HIPAA-compliant basis unless explicitly agreed in writing.

Developers and customers are responsible for obtaining any required consents, authorisations, or approvals regarding health-related data processed using the Services.


ANNEX H — Definitions & Roles

"Personal Information" / "Personal Data": Information relating to an identified or identifiable individual.

"Developer" / "Controller": Entity determining the purpose and means of data processing.

"Processor": Entity processing personal information on behalf of a Controller.

"Sovereign Account / User-Controlled Account": Non-custodial account where the user controls access keys, encryption keys and permissions.

"Confidential Compute / TEE": Hardware-backed secure environment providing encrypted-in-use processing.

"Subprocessor": Third party engaged by BlueNexus to support service functionality.


ANNEX I — Technical Architecture Overview

This section provides a high-level technical overview of the Platform for compliance teams, auditors, and enterprise customers.

1. Confidential Compute (Trusted Execution Environments — TEEs)

The Platform supports processing within Trusted Execution Environments, which provide:

BlueNexus cannot view, modify, or extract data processed inside TEEs.

2. Encrypted Storage & Routing Layers

All data handled by the Services is protected with:

Routing metadata may be collected to maintain availability, performance and security, but decrypted content is never logged.

3. Machine Identity & Attestation

The Platform uses:

These controls restrict workloads to authorised environments only.

4. Zero-Access Operational Model

The technical architecture is designed to ensure BlueNexus cannot access decrypted user or developer content through:

This model supports compliance with GDPR recommendations on supplementary measures, including EDPB Recommendations 01/2020.

5. Supported Processing Modes

Developers and enterprise customers may be able to choose:

Details vary by product configuration and customer contract.


Jurisdiction / Governing Law Disclaimer

This Enterprise Privacy and Compliance Framework and the Global Privacy Policy do not establish governing law, forum, or venue for disputes.

Jurisdiction, venue, and dispute resolution procedures are governed solely by the Enterprise Agreement, Terms of Service, or other applicable contractual documents between the parties.