ORIGEN TECH LLC
COMPREHENSIVE DATA POLICY



Effective Date: February 17, 2026
Last Updated: February 17, 2026
Version: 1.17

TABLE OF CONTENTS

  1. 1. DEFINITIONS AND SCOPE

  2. 2. CORPORATE STRUCTURE AND DATA OWNERSHIP

  3. 3. DATA SOVEREIGNTY ARCHITECTURE

  4. 4. AIMEE PLATFORM DATA PRACTICES

  5. 5. R.A.I.N. INFRASTRUCTURE DATA PRACTICES

  6. 6. DATA COLLECTION AND USAGE

  7. 7. DATA RETENTION AND DELETION

  8. 8. DATA SECURITY MEASURES

  9. 9. THIRD-PARTY RELATIONSHIPS

  10. 10. INTERNATIONAL COMPLIANCE

  11. 11. USER AND CLIENT RIGHTS

  12. 12. BREACH NOTIFICATION PROCEDURES

  13. 13. INTELLECTUAL PROPERTY PROTECTIONS

  14. 14. LIABILITY LIMITATIONS

  15. 15. POLICY MODIFICATIONS

  16. 16. CONTACT INFORMATION

  17. 17. SEVERABILITY AND GOVERNING LAW

1. DEFINITIONS AND SCOPE

1.1 CORPORATE ENTITIES

"Origen Tech" or "Company" refers to Origen Tech LLC, a Nevada limited liability company, and all wholly-owned subsidiaries and operating entities.

"AIMEE" refers to the Artificial Intelligence Messaging Engagement Engine platform operated by Origen Tech.

"R.A.I.N." refers to Remote Access Intelligence Network, the sovereign AI infrastructure division of Origen Tech.

"Owner" refers to the sole member and beneficial owner of Origen Tech LLC.

1.2 DATA CLASSIFICATIONS

"Customer Data" means any data provided to or collected by AIMEE from end users (venue customers, content subscribers, etc.) in the course of platform operations.

"Client Data" means any data, models, algorithms, or infrastructure owned by or operated on behalf of R.A.I.N. clients.

"Platform Data" means operational data generated by AIMEE or R.A.I.N. systems, including logs, analytics, and performance metrics.

"Proprietary Data" means any data, algorithms, models, or intellectual property developed by Origen Tech or its systems.

"Sovereign Data" means Client Data that is physically isolated and controlled exclusively by the client under R.A.I.N. infrastructure agreements.

1.3 PARTIES

"Venue Partners" means businesses using AIMEE for customer engagement (restaurants, hotels, nightlife establishments, etc.).

"Creators" means individuals using AIMEE for audience engagement (OnlyFans creators, influencers, etc.).

"R.A.I.N. Clients" means entities utilizing sovereign AI infrastructure services (betting syndicates, family offices, hedge funds, etc.).

"End Users" means individuals who interact with AIMEE-powered messaging services.

2. CORPORATE STRUCTURE AND DATA OWNERSHIP

2.1 ABSOLUTE OWNERSHIP

All data infrastructure, systems, algorithms, and intellectual property developed by or through Origen Tech are the sole and exclusive property of the Owner. This includes:

  • All AIMEE platform code, models, and systems

  • All R.A.I.N. infrastructure designs and implementations

  • All customer databases and derived intelligence

  • All proprietary algorithms and AI models

  • All business processes and operational frameworks

2.2 ENTITY SEPARATION

Where Origen Tech operates through separate legal entities (Embassy LLCs, international subsidiaries, etc.):

  • All intellectual property licenses flow from Origen Tech to subsidiary entities

  • All data generated by subsidiary operations belongs to Origen Tech

  • Local partners may receive operational equity but never IP ownership

  • Data flows are unidirectional: subsidiaries to Origen Tech, never reverse

  • Dissolution of any subsidiary entity returns all data to Origen Tech

2.3 IRREVOCABLE ASSIGNMENTS

Any employee, contractor, partner, or affiliate executing work for Origen Tech irrevocably assigns all IP, data, and work product to the Owner. No exceptions.

3. DATA SOVEREIGNTY ARCHITECTURE

3.1 R.A.I.N. SOVEREIGNTY PRINCIPLES

R.A.I.N. infrastructure operates on absolute data sovereignty:

  • CLIENT HARDWARE OWNERSHIP

  • Clients purchase or lease dedicated physical hardware

  • Hardware is owned by client, housed by R.A.I.N.

  • Zero shared compute resources between clients

  • PHYSICAL ISOLATION

  • Each client's infrastructure is physically separated

  • Isolated power, cooling, and network infrastructure

  • No cross-contamination of data between clients

  • Visual verification available via surveillance systems

  • ZERO CLOUD DEPENDENCIES

  • No data leaves client's physical hardware

  • No cloud APIs, no third-party model access

  • All processing occurs on client-owned infrastructure

  • No internet connectivity required for AI operations

3.2 DATA FLOW RESTRICTIONS

Under R.A.I.N. agreements:

  • Client data NEVER flows to Origen Tech systems

  • Origen Tech has NO access to Client Sovereign Data

  • Models trained on client data remain on client hardware

  • Surveillance of client areas is client-viewable only

  • Physical access to client infrastructure requires client authorization

3.3 ORIGEN TECH'S ROLE

For R.A.I.N. clients, Origen Tech provides:

  • Physical facility and security infrastructure

  • Power, cooling, and network backbone

  • System administration and maintenance services

  • Hardware procurement and installation

  • Compliance monitoring and reporting

Origen Tech does NOT provide:

  • Access to Client Sovereign Data

  • Analytics derived from client operations

  • Cross-client intelligence or pattern recognition

  • Third-party access to client systems

4. AIMEE PLATFORM DATA PRACTICES

4.1 DATA WE COLLECT

AIMEE collects and processes:

  • CUSTOMER COMMUNICATIONS

  • Text messages sent via iMessage or LINE

  • Customer responses to AI-generated messages

  • Message timestamps and delivery status

  • Read receipts and engagement metrics

  • CUSTOMER PROFILE DATA

  • Names, nicknames, and aliases

  • Phone numbers or LINE IDs

  • Location information (if provided)

  • Birthdays and special dates

  • Preferences and stated interests

  • Purchase history and spending patterns

  • Visit frequency and recency

  • Relationship status and personal details (if shared)

  • BEHAVIORAL DATA

  • Response times and engagement patterns

  • Conversation sentiment and tone

  • Topic preferences and aversions

  • Time-of-day interaction patterns

  • Message length and complexity preferences

  • VENUE PARTNER DATA

  • Business hours and operations

  • Service menus and pricing

  • Staff names and roles

  • Brand voice and communication style

  • Customer segmentation rules

  • Promotional campaigns and offers

4.2 HOW WE USE DATA

Customer Data is used to:

  • Generate contextually appropriate AI responses

  • Personalize messaging based on customer history

  • Automate follow-up sequences and retention campaigns

  • Segment customers for targeted outreach

  • Analyze engagement effectiveness

  • Improve AI model performance

  • Generate reporting and analytics for Venue Partners

4.3 DATA OWNERSHIP - AIMEE CONTEXT

CRITICAL DISTINCTION:

  • VENUE PARTNERS own their customer relationships

  • CREATORS own their subscriber relationships

  • ORIGEN TECH owns the platform, systems, and derived intelligence

  • ORIGEN TECH owns all AI models trained on platform data

  • ORIGEN TECH owns all aggregated and anonymized insights

Venue Partners and Creators are granted:

  • Access to their customer data via AIMEE dashboard

  • Export capabilities for their customer lists

  • Right to delete their account and associated customer data

Venue Partners and Creators are NOT granted:

  • Ownership of AIMEE AI models

  • Ownership of platform infrastructure

  • Rights to derived intelligence used across platform

  • Source code or algorithmic IP

4.4 CROSS-CLIENT INTELLIGENCE

Origen Tech reserves the right to:

  • Train AI models on aggregated data across all Venue Partners

  • Use anonymized patterns to improve platform performance

  • Develop industry benchmarks and insights

  • Create proprietary algorithms from platform-wide data

Individual customer data is never shared between Venue Partners, but system-wide learning benefits all platform users.

5. R.A.I.N. INFRASTRUCTURE DATA PRACTICES

5.1 CLIENT DATA ISOLATION

  • Each client operates on dedicated hardware

  • Network isolation prevents cross-client data flow

  • Physical barriers separate client infrastructure zones

  • Access controls restrict Origen Tech personnel from client areas

  • Encryption keys are client-managed, not Origen Tech-managed

5.2 SURVEILLANCE AND MONITORING

Physical security surveillance at R.A.I.N. facility:

  • Perimeter cameras monitor property boundaries

  • Common areas (entry, parking) are surveilled

  • Client-specific areas have client-viewable cameras

  • Clients can access their surveillance feeds remotely

  • Origen Tech personnel movements in client areas are logged

  • All surveillance data is stored locally, not in cloud

5.3 OPERATIONAL DATA

Origen Tech collects minimal operational data:

  • Power consumption per client zone

  • Cooling system performance

  • Network bandwidth utilization

  • Physical access logs (who entered where, when)

  • System uptime and maintenance events

This operational data is used solely for facility management and is not analyzed for intelligence purposes.

5.4 ABSOLUTE NON-DISCLOSURE

Origen Tech personnel are bound by:

  • Strict NDAs prohibiting disclosure of client operations

  • Zero-knowledge protocols for system administration

  • No retention of temporary access credentials

  • Immediate access revocation upon service termination

  • Criminal and civil penalties for unauthorized access

6. DATA COLLECTION AND USAGE

6.1 LEGAL BASIS FOR COLLECTION

AIMEE Platform: Contractual necessity (to provide messaging services), Legitimate business interest (platform improvement), Consent (for optional data like birthdays, preferences)

R.A.I.N. Infrastructure: Contractual necessity (to provide infrastructure services), Legal obligation (facility security and compliance)

6.2 AUTOMATED DECISION-MAKING

AIMEE uses AI to generate responses, determine timing, segment customers, and prioritize interactions. End Users have the right to request human review, opt out of automated messaging, and request deletion of their data.

6.3 DATA MINIMIZATION

We collect only data necessary for service provision. No collection of sensitive data unless specifically required by service.

6.4 PURPOSE LIMITATION

Data is used only for purposes disclosed at collection. No sale of data to third parties. No use for purposes unrelated to disclosed services.

7. DATA RETENTION AND DELETION

7.1 RETENTION PERIODS - AIMEE

Customer conversation data: Active customers retained indefinitely, inactive customers retained for 24 months after last interaction, deleted accounts purged within 30 days.

Venue Partner data: Active accounts retained indefinitely, terminated accounts retained for 90 days then purged, legal hold retained as required by law.

7.2 RETENTION PERIODS - R.A.I.N.

Client operational data: Retained for duration of contract, purged within 30 days of termination. Surveillance data: 90-day rolling retention, client-specific areas available to client.

7.3 DELETION PROCEDURES

Upon deletion request: Data marked for deletion within 48 hours, purged from production within 30 days, purged from backups within 90 days. Anonymized aggregated data may be retained for analytics.

7.4 RIGHT TO DELETION

Users can request deletion by contacting Venue Partner, emailing privacy@origentech.com, or using in-platform deletion tools. Deletion requests processed within 30 days.

8. DATA SECURITY MEASURES

8.1 INFRASTRUCTURE SECURITY

R.A.I.N. Facility (67859 Valle Vista Rd, Twentynine Palms, CA):

  • PHYSICAL SECURITY

  • Perimeter fencing around 128-acre property

  • 24/7 AI-powered surveillance (Frigate NVR)

  • Access control systems with biometric verification

  • Security personnel and autonomous monitoring systems

  • ENVIRONMENTAL CONTROLS

  • Redundant power systems (solar + battery + generator)

  • Climate-controlled server environments

  • Fire suppression systems

  • Seismic and disaster resistance measures

  • NETWORK SECURITY

  • VLAN segmentation by client and function

  • Zero internet exposure for client infrastructure

  • Encrypted network traffic

  • Intrusion detection and prevention systems

  • Regular security audits

8.2 DIGITAL SECURITY

Encryption: Data encrypted in transit (TLS 1.3+) and at rest (AES-256). Client-managed encryption keys for R.A.I.N. clients.

Access Controls: Role-based access control, multi-factor authentication, principle of least privilege, regular access reviews.

Monitoring and Logging: Real-time intrusion detection, comprehensive audit logs, anomaly detection, regular security assessments, annual penetration testing.

8.3 PERSONNEL SECURITY

  • All employees and contractors undergo background checks

  • Signed confidentiality and IP assignment agreements

  • Security awareness training (quarterly)

  • Immediate access revocation upon termination

  • Zero-knowledge protocols for R.A.I.N. client access

8.4 INCIDENT RESPONSE

Documented procedures for breach detection, containment, forensic investigation, notification, remediation, and post-incident review.

9. THIRD-PARTY RELATIONSHIPS

Service providers must sign DPAs, implement equivalent security, use data only for specified purposes, and delete data upon contract termination. Origen Tech never sells customer data. Subprocessor list maintained at www.origentech.com/subprocessors.

10. INTERNATIONAL COMPLIANCE

Compliance with: CCPA, state privacy laws (Virginia, Colorado, Connecticut, Utah), GDPR, Japan APPI, Thailand PDPA, Singapore PDPA, Australia Privacy Act. Data Protection Officer: dpo@origentech.com

11. USER AND CLIENT RIGHTS

End users have rights to access, rectification, erasure, portability, objection, restriction, and human review. Venue Partners can export data, delete accounts, access analytics. R.A.I.N. clients have absolute control over Sovereign Data, physical access to infrastructure, audit rights, portability, and veto power over Origen Tech personnel access.

12. BREACH NOTIFICATION PROCEDURES

Breach response within 24 hours (contain and assess), 72 hours (investigate and notify authorities), 30 days (notify affected individuals). Notifications include breach nature, data types affected, consequences, measures taken, and recommended actions.

13. INTELLECTUAL PROPERTY PROTECTIONS

Origen Tech owns all AIMEE platform IP, R.A.I.N. infrastructure designs, and derived intelligence. R.A.I.N. clients retain ownership of their proprietary algorithms and models trained on Sovereign Data. Platform-generated IP: Venue Partners own customer lists, Origen Tech owns AI models and analytics. All work product assigns to Origen Tech irrevocably.

14. LIABILITY LIMITATIONS

Services provided 'AS IS' without warranties. Liability limited to direct damages only, capped at amount paid in preceding 12 months. Not liable for lost profits, data loss (except gross negligence), third-party actions, force majeure, or acts of God. Clients indemnify Origen Tech for their misuse of services.

15. POLICY MODIFICATIONS

Origen Tech may modify policy at any time. Changes effective 30 days after notification (60 days for material changes). Continued use constitutes acceptance. Users who disagree may terminate and request data deletion. All versions archived and available upon request.

16. CONTACT INFORMATION

PRIVACY INQUIRIES: privacy@origentech.com

DATA PROTECTION OFFICER: dpo@origentech.com

SECURITY INCIDENTS: security@origentech.com

GENERAL SUPPORT: support@origentech.com


MAILING ADDRESS: Origen Tech LLC

[Corporate Address]


R.A.I.N. FACILITY: 67859 Valle Vista Rd

Twentynine Palms, CA 92277


BUSINESS HOURS: 24/7/365 for critical security matters

9am-6pm PT for general inquiries

17. SEVERABILITY AND GOVERNING LAW

Governed by laws of Nevada (corporate), California (facility), federal laws, and applicable jurisdictions. Disputes resolved through negotiation, then binding arbitration (JAMS rules) in Las Vegas, Nevada. Exceptions for injunctive relief, IP disputes, and criminal matters.

ACKNOWLEDGMENT AND ACCEPTANCE

By using Origen Tech services (AIMEE or R.A.I.N.), you acknowledge that you have read, understood, and agree to be bound by this Comprehensive Data Policy.


For Venue Partners, Creators, and R.A.I.N. Clients: Your continued use of services constitutes binding acceptance.


For End Users: Your interactions with AIMEE-powered messaging constitute acceptance of data practices described herein.


This policy is effective as of February 17, 2026.



ORIGEN TECH LLC
By: _______________________________
Title: Managing Member
Date: February 17, 2026

APPENDICES

APPENDIX A: DATA PROCESSING ADDENDUM (DPA)

[Available upon request or maintained at www.origentech.com]


APPENDIX B: SUBPROCESSOR LIST

[Available upon request or maintained at www.origentech.com]


APPENDIX C: SECURITY WHITEPAPER

[Available upon request or maintained at www.origentech.com]


APPENDIX D: BREACH RESPONSE PROCEDURES

[Available upon request or maintained at www.origentech.com]


APPENDIX E: DATA RETENTION SCHEDULE

[Available upon request or maintained at www.origentech.com]


APPENDIX F: INTERNATIONAL DATA TRANSFER IMPACT ASSESSMENT

[Available upon request or maintained at www.origentech.com]