Eastern Strategic Research logo
Eastern Strategic Research
Governance & Ethics

Privacy as a Strategic Asset.

At Eastern Strategic Research, we believe that high-fidelity analytics and robust data insights are only possible through unwavering commitment to individual privacy.

Information Acquisition

We collect information to provide a more tailored experience when you interact with our platform. This includes direct identifiers—such as your name, corporate email address, and phone number (+60 3 2145 6632)—which you provide when requesting our intelligence reports or consultation services.

Beyond direct input, we use automated systems to gather technical data points, including IP addresses and browser types. This technical intelligence allows our team to optimize the performance of our digital infrastructure and ensure that our analytics delivery remains stable across all regions.

Secure data transmission visualization

"Data is the fuel of modern strategy, but trust is the engine."

The Integrity Framework

A Processing Intent

We utilize the data gathered primarily to fulfill your requests for strategic intelligence and to improve our proprietary data insights models. We do not sell personal identifiers to third-party brokers; your information is handled exclusively to facilitate our professional relationship.

B Retention Limits

Information is stored only for as long as is necessary to provide the requested services or to comply with Malaysian legal obligations. Once the professional utility phase concludes, data is purged using secure deletion protocols to prevent unauthorized recovery.

C Security Architecture

We protect your data with multi-layered encryption both at rest and in transit. Our internal access controls ensure that only essential personnel can view sensitive records, audited regularly by our compliance department in Kuala Lumpur.

D Transparency Rights

You retain the right to access, rectify, or request the erasure of your personal data at any time. We respond to all such requests within the statutory timeframe, ensuring your digital footprint remains under your control.

Operational Realities & Policy Boundaries

Third-Party Synergy

To deliver high-level analytics, we partner with specialized cloud providers and technical software vendors. While data may flow through these systems, these partners are contractually bound to maintain confidentiality and are prohibited from using your data for their own marketing purposes.

Only essential metadata shared for functional stability.
Architectural precision representing data structure Corporate transparency and oversight

Legal Compulsion

There are rare instances where we may be legally required to disclose personal information, such as in response to a valid court order or a government audit within the Malaysian jurisdiction. In these cases, we disclose only the minimum data required to satisfy the legal mandate.

All disclosures strictly logged and verified by legal counsel.

Terminology & Definitions

Personal Identifiers
Any data that can uniquely identify an individual, including email addresses, phone numbers, and unique device fingerprints.
De-identified Data
Information that has been stripped of direct identifiers, used primarily for aggregate industry-wide analytics and trend forecasting.
Data Controller
Eastern Strategic Research acts as the controller for the information you provide via this website, determining the purpose and means of processing.

Inquiries & Oversight

Questions regarding our data handling practices or requests for record modification should be directed to our Privacy Officer. We are committed to resolving any concerns promptly and transparently.

Effective Date: February 17, 2026. This policy is reviewed annually to ensure alignment with global data protection standards and local Malaysian regulations.