Your Cart

Premium
Total Due KES 0
Secure Checkout

Security Protocol

Data Privacy

Secure Link Established: February 2026.
Transparency is our baseline. This document outlines how the Rexius Lited Ecosystem collects, encrypts, and utilizes your digital footprint.

The Privacy Commitment

At Rexius Lited, we treat your data as a private, high-value asset. Your digital identity is encrypted and stored strictly within our secure Command Node architecture. We do not participate in data brokerage, and we do not sell your telemetry to unauthorized third-party entities. Excellence in commerce requires absolute trust, and we engineer our systems to protect that trust.

01 Telemetry & Data Acquisition

To successfully route physical and digital assets to you, the ecosystem must process specific data points. We operate on a principle of data minimization, collecting only what is strictly necessary:

Identity Vectors

Legal Name, Encrypted Email Address, Direct Comms (Phone Number).

Logistics Data

Delivery Coordinates, Billing Addresses, Geo-Routing metrics.

02 Cryptographic Standards

Financial signals are the most critical data points in the ecosystem. Rexius Lited operates a zero-knowledge architecture regarding your raw banking credentials.

  • All payment routing is handled via heavily audited, PCI-DSS compliant gateways (M-Pesa, Visa, Mastercard integration networks).
  • We never store raw credit card numbers or banking PINs on our proprietary servers. We only receive cryptographic tokens confirming transaction success or failure.

03 External Routing (Third Parties)

Information is strictly compartmentalized. We only share specific data fragments with vetted operational partners (such as our premium courier services and financial clearing houses) solely for the purpose of fulfilling your acquisition. These partners are legally bound to uphold the Rexius security standard and cannot utilize your data for independent marketing.

04 Cookie Architecture

The Rexius Lited terminal deploys localized "Cookies" (temporary data fragments) to your browser. This architecture is required to maintain your active session, secure your cart inventory, and remember your interface preferences. You may configure your local terminal to reject these fragments, though it may degrade the operational fluidity of the platform.

05 The Purge Protocol (Your Rights)

You retain absolute sovereignty over your digital footprint. At any point, you may initiate the Purge Protocol to exercise the following rights:

Data Access Modification Complete Erasure

End-to-End Encryption

Your connection to the Rexius Lited ecosystem is secured via advanced cryptographic tunneling (256-bit SSL). For privacy inquiries or to initiate a data purge, contact our Privacy Officer.

Contact Privacy Officer

Secure Link: rexiuslited.co.ke/contact