Privacy Protocol & Data Stewardship
1 Introduction
Welcome to ESHA Hub. We are an open innovation, research, and learning community dedicated to those who wish to explore, understand, and create.
At ESHA Hub, we value curiosity over rote learning and skill over age. Because our platform thrives on the exchange of ideas, research proposals, and creative content, trust is our most valuable asset. This Privacy Protocol outlines how we handle your data, your intellectual efforts, and your digital footprint. We are committed to transparency, ensuring that your focus remains on innovation while we take care of your privacy.
2 Information We Collect
To facilitate research, verify talent, and maintain a safe community, we collect specific types of information. We practice data minimization, meaning we only ask for what is necessary.
A. Information You Provide Voluntarily
When you join, apply for a program, or submit content:
- • Identity Data: Name, age, and photograph.
- • Contact Data: Email address, phone number, and residential address.
- • Profile Data: Skills, interests, educational background (formal or informal), and areas of research interest.
- • Uploaded Content: Research papers, project documents, introduction videos, skill demonstration videos, and digital signatures for form verification.
B. Technical Data
When you navigate our website, we may automatically collect:
- • Device Information: Browser type, operating system, and IP address.
- • Usage Data: Pages visited, time spent on the hub, and interaction with resources.
3 How We Use Your Data
We use your data solely to empower your journey within ESHA Hub. We do not sell, trade, or rent your personal information to advertisers.
- Evaluation & Selection Assessing applications based on merit, talent, and learning mindset rather than standard academic metrics.
- Collaboration Connecting you with mentors, peers, or research partners relevant to your field of interest.
- Verification Using digital signatures and video uploads to verify the authenticity of the applicant and their work.
- Communication Sending updates regarding workshops, research opportunities, or changes to community guidelines.
- Security Monitoring the platform to prevent spam, unauthorized access, or harmful behavior.
4 Age, Eligibility & Participation Policy
ESHA Hub is unique in its approach to age. We believe innovation is not bound by years.
No Age Barriers
We accept members of all ages—children, youth, adults, and senior citizens. Selection is based strictly on skill, talent, curiosity, and the willingness to learn.
Safety for Minors
While we welcome young innovators, we prioritize their safety. For participants under the age of 18, we may require contact information for a parent or legal guardian to ensure transparent communication.
Voluntary Participation
ESHA Hub does not support forced activities. Participation is voluntary and should be driven by the individual's passion. We do not promote child labor or exploitation; we promote child genius and creativity.
Guardian Involvement
We encourage parents and guardians to be part of the learning journey, assisting younger members with document uploads or complex form submissions where necessary.
5 User-Uploaded Content & Intellectual Property
We understand that you may be uploading original ideas, research drafts, or creative videos.
- Usage of Uploads: Documents and videos uploaded during the application or collaboration process are viewed only by authorized ESHA Hub evaluators and mentors.
- Respect for IP: We respect your intellectual property. Uploading a proposal to ESHA Hub does not transfer ownership to us. We use it solely to assess your potential and capacity for innovation.
- Digital Signatures: If you provide a digital signature, it is strictly used for consent verification on specific forms and is stored securely.
6 Data Storage & Security
We employ industry-standard security measures to protect your data from unauthorized access, alteration, or destruction.
- Storage: Data is hosted on secure servers with restricted access.
- Encryption: Sensitive data transmission is protected via SSL/TLS encryption protocols.
- Limitations: While we strive for maximum security, no method of transmission over the Internet is 100% infallible. We acknowledge this reality and commit to immediate notification and action in the unlikely event of a data breach.
7 Third-Party Services
To operate efficiently, we utilize trusted third-party service providers. These partners are selected based on their commitment to security.
- Analytics: We may use tools (like Google Analytics) to understand how our website is used.
- Form Handling: We use secure platforms for processing application forms and document uploads.
- Hosting: Our digital infrastructure is hosted by reputable cloud service providers.
These parties have access to personal data only to perform specific tasks on our behalf.
8 Cookies
Our website uses cookies (small text files) to enhance your experience.
- Essential Cookies: Necessary for the website to function (e.g., keeping you logged in).
- Analytical Cookies: Help us track website performance.
You can choose to disable cookies through your browser settings, though this may limit some features of the Hub.
9 Your Rights and Control
You own your data. As a member of ESHA Hub, you have the right to:
Access
Request a copy of the personal data we hold about you.
Correction
Update or correct any inaccurate information.
Deletion
Request the removal of your personal data or account ("Right to be Forgotten").
Withdraw Consent
You may withdraw your consent for data processing at any time.
10. Updates to This Protocol
As ESHA Hub grows and technology evolves, we may update this Privacy Protocol. Any significant changes will be communicated via email or a prominent notice on our website. We encourage you to review this page periodically.
Have Questions?
If you have questions regarding this protocol, data safety, or wish to exercise your rights, please reach out to us. We are real people, and we are here to help.