We Know Where You Live. Here's Why.
Privacy is a myth. But we respect it anyway. Read this policy to understand what information we collect, why we collect it, and how we use it to decide whether you’re ready for what comes next.
Welcome to Transparency
The Order of the Illuminati (“The Order,” “We,” “Us,” or “Our”) operates this website (the “Site”). We take privacy seriously. Not because we’re required to—though we are, by various international laws, treaties, and a gentleman’s agreement with the European Union—but because trust is the foundation of any worthwhile relationship.
This Privacy Policy explains:
-
What information we collect about you
-
How we collect it
-
Why we collect it
-
What we do with it
-
Who we share it with
-
How long we keep it
-
What rights you have
By using this Site, you consent to the data practices described in this policy. If you do not consent, you must leave immediately. We will know you visited. We will know you left. We will respect your decision. For now.
Important Note: This Site operates across multiple jurisdictions. We comply with:
-
GDPR (European Union)
-
CCPA/CPRA (California)
-
LGPD (Brazil)
-
PIPEDA (Canada)
-
The Unspoken Accord (The Shadow Realm)
If you are located in any of these jurisdictions, additional rights may apply. Scroll to Section 11 for region-specific information.
The Data We Gather on Your Journey
We collect several types of information. Some you provide willingly. Some you provide unknowingly. Some is whispered to us by the universe itself.
2.1. Information You Provide Directly
When you interact with this Site, you may choose to provide:
Personal Identification Information:
-
Full legal name
-
Date of birth
-
Place of birth
-
Current address
-
Email address
-
Phone number
-
Government-issued ID (for high-level applications)
-
Photographs (for vetting purposes)
-
Biometric data (if you attend in-person meetings)
Financial Information:
-
Payment card details (processed through encrypted third-party processors)
-
Banking information (for high-level members)
-
Cryptocurrency wallet addresses
-
Net worth estimates
-
Income details
Application Information:
-
Employment history
-
Education background
-
Ambitions and motivations
-
Personal accomplishments and failures
-
Family information
-
Known associations
-
Deepest desires (the essay question wasn’t rhetorical)
Communication Information:
-
Emails sent to us
-
Messages through contact forms
-
Encrypted communications
-
Telepathic transmissions (we receive them; we don’t store them out of respect)
2.2. Information We Collect Automatically
When you visit our Site, we automatically collect:
Technical Data:
-
IP address (and location derived from it)
-
Browser type and version
-
Operating system
-
Device type (desktop, mobile, tablet, toaster—yes, someone tried)
-
Screen resolution
-
Language preferences
-
Time zone
Usage Data:
-
Pages visited
-
Time spent on each page
-
Links clicked
-
Scroll depth
-
Mouse movements (we know where you hover)
-
Keystroke patterns (not the content—just the rhythm)
-
Session duration
-
Return frequency
Behavioral Data:
-
How you found our Site (search terms, referral sites)
-
Whether you read the Terms of Use (we check)
-
Whether you scrolled to the bottom (dedication)
-
Whether you returned after reading (curiosity)
-
Whether you shared our content (discretion test)
Inferred Data:
-
Based on your behavior, we infer:
-
Your level of interest
-
Your skepticism quotient
-
Your patience threshold
-
Your suitability for membership
-
Your favorite color (not relevant, but we’re often right)
-
2.3. Information We Receive from Third Parties
We may receive information about you from:
Data Brokers:
We purchase data from reputable sources to verify application information. If you lie on your application, we will know. We will not confront you. We will simply note your lack of integrity.
Social Media Platforms:
If you interact with our content on social media, we may receive:
-
Your public profile information
-
Your engagement metrics
-
Your network connections (indirectly)
-
Your sense of humor (by analyzing which memes you share)
Government Databases:
We have access to publicly available government records. We don’t break laws. We just use what’s already there.
Our Members:
If a current member refers you, they may provide:
-
Your name
-
Your qualifications
-
Your weaknesses (for testing purposes)
-
Your favorite drink (important for recruitment meetings)
The Universe:
Sometimes information simply arrives. A coincidence. A synchronicity. A dream. We don’t question it. Neither should you.
We Leave Crumbs. So Do You.
We use cookies and similar tracking technologies to enhance your experience, analyze usage, and, frankly, keep an eye on things.
3.1. What Are Cookies?
Cookies are small text files placed on your device when you visit a website. They help websites remember you, your preferences, and your behavior. Think of them as tiny breadcrumbs you leave behind. We follow them. Not in a creepy way. In a helpful way.
3.2. Types of Cookies We Use
| Cookie Type | Purpose | Duration |
|---|---|---|
| Essential Cookies | Site functionality, security, and basic operations. Without these, the Site breaks. | Session to Persistent |
| Preference Cookies | Remember your settings, language, and whether you’ve seen our warnings. | 1 year |
| Analytics Cookies | Understand how users interact with our Site. What works. What doesn’t. Who’s serious. | 2 years |
| Marketing Cookies | Track your interests across the web. Not for advertising—for profiling. | 90 days |
| The 33rd Cookie | There’s always a 33rd. We can’t tell you what it does. That would defeat the purpose. | Indefinite |
3.3. Third-Party Cookies
We use third-party services that may place their own cookies:
-
Google Analytics: Tracks usage patterns
-
Facebook Pixel: Tracks conversions and engagement
-
Stripe: Processes payments
-
Various Security Services: Monitor for threats
We do not control third-party cookies. Their privacy policies apply.
3.4. Your Cookie Choices
You can:
-
Accept all cookies (easiest)
-
Reject non-essential cookies (you’ll still see the Site, just with fewer features)
-
Block all cookies (the Site will function poorly. You will also appear distrustful, which is noted.)
-
Delete existing cookies (we’ll just place new ones. It’s fine.)
To manage cookies, adjust your browser settings. To manage your destiny, adjust your life choices.
What We Do with What We Know
We use collected information for the following purposes:
4.1. Primary Purposes
| Purpose | Description | Legal Basis |
|---|---|---|
| Application Processing | Evaluate your suitability for membership. Determine if you possess the 33 qualities. | Contract (you applied) |
| Communication | Respond to inquiries, send updates, and deliver application decisions. | Consent / Contract |
| Site Improvement | Analyze usage to optimize content, design, and user experience. | Legitimate Interest |
| Security | Protect against fraud, abuse, and unauthorized access. | Legal Obligation / Legitimate Interest |
| Vetting | Verify information provided. Cross-reference with internal and external databases. | Legitimate Interest |
4.2. Secondary Purposes
| Purpose | Description | Legal Basis |
|---|---|---|
| Profiling | Assess suitability for different levels of membership. Determine your potential. | Legitimate Interest |
| Behavioral Analysis | Understand decision-making patterns. Identify leaders. Spot followers. | Legitimate Interest |
| Testing | Send subtle tests disguised as coincidences. See how you react. | Consent (implied by continued use) |
| Research | Study human behavior, ambition, and susceptibility to mystery. | Legitimate Interest |
| The Long Game | Maintain records for future consideration. You may not be ready now. You may be ready in 10 years. We’ll remember. | Legitimate Interest |
4.3. What We Do NOT Do
We do NOT:
-
Sell your personal information to advertisers (we find advertising vulgar)
-
Share your information with political campaigns (we’re above that)
-
Use your data to manipulate elections (that’s the other organization)
-
Send you spam (occasional updates, but never spam)
-
Weaponize your secrets (they’re for reference only)
For Our European Friends
If you are located in the European Economic Area (EEA), we process your personal information under the following legal bases:
5.1. Contractual Necessity
Processing necessary to:
-
Evaluate your application
-
Provide requested services
-
Communicate about your status
5.2. Legitimate Interests
Processing necessary for:
-
Site security and fraud prevention
-
Improving our services
-
Vetting potential members
-
Maintaining historical records
We balance our interests against your rights. When we weigh them, you often come out ahead. Sometimes we do. It depends on the application.
5.3. Consent
Processing based on your consent for:
-
Marketing communications
-
Certain types of data collection
-
Special category data (if provided)
You may withdraw consent at any time. Your application will be noted accordingly.
5.4. Legal Obligations
Processing required to comply with:
-
Tax laws
-
Anti-money laundering regulations
-
Court orders
-
Reasonable requests from legitimate authorities
Who Else Gets to See
We do not sell your personal information. We do, however, share it in specific circumstances.
6.1. Within The Order
Your information may be shared with:
-
Vetting Committee: Evaluates applications
-
Case Officers: Assigned to guide candidates
-
Security Team: Monitors for threats
-
Legal Department: Ensures compliance
-
The Inner Circle: Reviews exceptional candidates
Access is granted on a need-to-know basis. Need is determined by us.
6.2. Third-Party Service Providers
We share data with trusted partners who help us operate:
| Provider | Purpose | Data Shared |
|---|---|---|
| Web Hosting | Site infrastructure | Technical data, usage data |
| Payment Processors | Transaction handling | Payment information (encrypted) |
| Analytics Providers | Usage analysis | Technical data, behavioral data |
| Security Services | Threat monitoring | IP addresses, access logs |
| Background Check Services | Application verification | Personal identification |
| Legal Counsel | Compliance and defense | As necessary |
All providers are bound by confidentiality agreements and may only use data as instructed.
6.3. Legal Disclosures
We may disclose information if required by:
-
Law enforcement
-
Court order
-
Regulatory authority
-
Legitimate government request
We will challenge overbroad requests. We will comply with legitimate ones. If we must disclose, we will notify you if legally permitted.
6.4. Business Transfers
If The Order is acquired, merged, or undergoes restructuring, your information may be transferred. You will be notified. The new entity will be bound by this policy or a substantially similar one.
6.5. Emergencies
We may disclose information to:
-
Prevent imminent harm
-
Protect the safety of members
-
Address fraud or security threats
How We Protect What We Know
We implement robust security measures to protect your information. We have resources that governments envy. We use them wisely.
7.1. Technical Measures
-
Encryption: AES-256 for data at rest. TLS 1.3 for data in transit.
-
Access Controls: Multi-factor authentication. Role-based permissions. Biometric verification for sensitive systems.
-
Monitoring: 24/7 intrusion detection. Behavioral analytics. Kevin watches the screens. Kevin never sleeps.
-
Backups: Redundant, encrypted, geographically distributed. If one continent burns, your data survives.
-
Penetration Testing: Regular testing by internal and external security teams. We try to break our own systems. We succeed occasionally. Then we fix it.
7.2. Organizational Measures
-
Training: All members receive security training. Violations are treated seriously. Last violator is still looking for their car keys. (They’ll find them eventually.)
-
Access Reviews: Quarterly reviews of who has access to what. Many are removed. Few are added. The circle remains small.
-
Incident Response: Dedicated team for security events. Tested quarterly. Ready always.
7.3. Limitations
No security system is perfect. While we strive to protect your information, we cannot guarantee absolute security. The only guaranteed security is never having existed. Since you exist, we do our best.
If a breach occurs, we will notify affected individuals as required by law. We will also notify our lawyers. Then we will fix the problem. Then we will find out who did it. Then we will have a conversation with them. (The conversation is very polite. We’re civilized.)
We Remember Everything. But We Don’t Keep It Forever.
We retain information for as long as necessary to fulfill the purposes outlined in this policy, unless a longer retention period is required or permitted by law.
8.1. Retention Periods
| Data Type | Retention Period | Rationale |
|---|---|---|
| Application Data (Accepted) | Lifetime of membership + 33 years | Historical record. Legacy purposes. |
| Application Data (Rejected) | 10 years | Potential reconsideration. We change our minds. People change. |
| Application Data (Withdrawn) | 3 years | Cooling-off period. You may return. |
| Payment Information | 7 years | Tax and legal compliance. |
| Technical Data | 2 years | Usage analysis. Security monitoring. |
| Cookies | As specified in Section 3 | Varies by cookie type. |
| Communications | 5 years | Reference. Context. Entertainment. |
| The 33rd Category | Indefinite | You wouldn’t understand. |
8.2. Anonymization
After retention periods expire, we may:
-
Delete the data entirely
-
Anonymize the data (removing identifying information)
-
Aggregate the data for research purposes
Anonymized data is no longer personal information. It becomes ours. We use it to study humanity. You are helping science.
What You Can Control
Depending on your location, you may have certain rights regarding your personal information.
9.1. Rights Summary
| Right | Description | Limitations |
|---|---|---|
| Right to Know | Know what information we collect and how we use it. | This policy covers it. |
| Right to Access | Request a copy of your personal information. | Subject to identity verification. Redactions for security. |
| Right to Correct | Request correction of inaccurate information. | We verify before updating. |
| Right to Delete | Request deletion of your personal information. | Exceptions apply (legal obligations, fraud prevention). |
| Right to Restrict | Request restricted processing. | We may limit rather than delete. |
| Right to Portability | Receive your data in a machine-readable format. | Where technically feasible. |
| Right to Object | Object to processing based on legitimate interests. | We will weigh your interests against ours. |
| Right to Withdraw Consent | Withdraw consent where processing is based on consent. | Your application may be affected. |
9.2. How to Exercise Your Rights
To exercise any of these rights:
-
Submit a request through our Privacy Request Portal (encrypted preferred)
-
Email privacy@theorder.nexus (PGP encryption required)
-
Send a letter to our P.O. Box (allow 3-6 months)
-
Think very loudly at 3:33 AM (not guaranteed, but we try)
We will respond within 30 days (or as required by applicable law). Complex requests may take longer. We will keep you informed.
9.3. Verification
To protect your privacy, we verify all requests. Verification may require:
-
Providing identifying information
-
Answering security questions
-
Confirming details from your application
-
Telepathic confirmation (if applicable)
If we cannot verify your identity, we will not process the request. We will also note your inability to provide verification. This is not a test. (Or is it?)
9.4. Appeals
If we deny your request, you may appeal. Appeals are reviewed by a different team. Their decision is final. Unless it’s appealed again. Then it’s final again.
Children’s Privacy
Minors Need Not Apply
This Site is not intended for individuals under 18 years of age. We do not knowingly collect personal information from children.
If you are under 18:
-
Do not submit an application
-
Do not provide any personal information
-
Do not read the hidden messages (they’re not for you)
If we discover that we have collected information from a child under 18:
-
We will delete it immediately
-
We will notify the child’s parent or guardian (if we can identify them)
-
We will send a strongly worded psychic warning about following instructions
Parents or guardians who believe their child has provided information should contact us immediately. We will handle it. We will also handle the child’s curiosity. Not harshly. Just… educationally.
Where in the World Are You?
Different regions have different rights. Here’s what applies to you.
11.1. California Residents (CCPA/CPRA)
If you are a California resident, you have additional rights:
Right to Opt-Out of Sale/Sharing: We do not sell personal information. We do share it as described in Section 6. You may opt out of sharing for cross-context behavioral advertising. We don’t really do that either, but we provide the option out of respect.
Right to Limit Sensitive Information: We do not use sensitive information for purposes beyond those necessary. If you believe we have, contact us.
Shine the Light: California residents may request information about disclosures of personal information to third parties for direct marketing purposes. We don’t do that, but we’ll confirm in writing if asked.
Authorized Agents: You may designate an authorized agent to make requests on your behalf. The agent must provide proof of authorization. We may contact you to verify.
Non-Discrimination: Exercising your rights will not result in discrimination. It may result in your application being reconsidered. But not discrimination. We’re very careful about that.
11.2. European Residents (GDPR)
If you are in the EEA, UK, or Switzerland, you have the rights described in Section 9. Additionally:
Data Protection Officer: We have appointed a Data Protection Officer. They are a Level 28 member who specializes in compliance. Contact them at dpo@theorder.nexus.
Supervisory Authority: You have the right to lodge a complaint with your local data protection authority. We prefer you talk to us first. We’re reasonable. Usually.
International Transfers: Your information may be transferred outside the EEA. When we do, we ensure appropriate safeguards (Standard Contractual Clauses, Binding Corporate Rules, or encrypted carrier pigeons).
11.3. Brazil (LGPD)
If you are in Brazil, you have the rights under the Lei Geral de Proteção de Dados. These largely mirror GDPR rights. Contact our Brazilian representative at brasil@theorder.nexus.
11.4. Canada (PIPEDA)
If you are in Canada, you have the right to:
-
Access your information
-
Challenge accuracy
-
Withdraw consent (subject to contractual limitations)
We comply with PIPEDA’s accountability requirements. Our Canadian operations are overseen by a Level 25 member who apologizes frequently. It’s authentic.
11.5. Australia (Privacy Act)
If you are in Australia, you have the right to access and correct your information. We comply with the Australian Privacy Principles. We also find the accent charming.
11.6. The Shadow Realm
If you are accessing this Site from non-corporeal dimensions, standard privacy laws do not apply. We do, however, respect astral boundaries. Your ectoplasmic data is safe.
International Data Transfers
Your Data Travels. It Has a Passport.
The Order operates globally. Your information may be transferred to, stored, and processed in countries outside your home jurisdiction.
Where Your Data May Go:
-
United States (primary servers)
-
Germany (historical archives)
-
Switzerland (financial data)
-
Singapore (Asia-Pacific operations)
-
Classified locations (the less you know)
Safeguards for Transfers:
-
Standard Contractual Clauses (EU Commission approved)
-
Binding Corporate Rules (internal data protection standards)
-
Adequacy decisions (where applicable)
-
Encryption (always)
By providing information, you consent to these transfers. If you do not consent, do not provide information. We will still know you visited. But we will have less to work with.
Third-Party Links
We Are Not Responsible for Them
Our Site may contain links to third-party websites, services, and encrypted portals. We do not control these third parties. This Privacy Policy does not apply to them.
If you click a link:
-
You leave our Site
-
You enter their jurisdiction
-
You are subject to their policies
We recommend reviewing their privacy policies. Some are very interesting. One of them contains a hidden message that leads back here. It’s a circle. Much like life.
Changes to This Privacy Policy
We Evolve. So Does This.
We may update this Privacy Policy from time to time. When we do:
-
We will change the “Last Updated” date
-
We will post the new policy on this page
-
We will notify active users (email for members, psychic nudge for seekers)
-
We will not reduce your rights without consent
Material Changes: If we make material changes, we will:
-
Provide prominent notice on the Site
-
Send notifications to affected users
-
Give you time to review before they take effect
Your continued use after changes constitutes acceptance. If you do not accept, you must stop using the Site. We will respect your decision. We will also note your departure. The file remains.
Contact Information
How to Reach the Keepers of Data
If you have questions, concerns, or requests regarding this Privacy Policy or our data practices:
15.1. Contact Methods
Encrypted Email:
ascend@arcaneinitiates.club
(PGP key available upon request. Also hidden in the source code of this page. Find it if you can.)
Telepathic:
Think your message clearly. We receive psychic communications daily. Speak slowly. Use simple concepts. We’ll understand.
15.2. Response Times
| Request Type | Response Time |
|---|---|
| Simple inquiries | 7-14 days |
| Access requests | 30 days (GDPR) / 45 days (CCPA) |
| Deletion requests | 30-60 days |
| Complex requests | 60-90 days |
| Requests from celebrities | 24 hours (we have standards) |
15.3. Escalation
If you are unsatisfied with our response, you may:
-
Request review by our Privacy Committee
-
Lodge a complaint with your local data protection authority
-
Meditate on the situation (solutions often appear)
We want to resolve concerns. We are not adversarial. We are simply… particular about our data.
The Final Truth
What We Really Want You to Know
We collect information because we are selective. Not everyone is suited for what we offer. Not everyone deserves what we guard.
Your data helps us determine:
-
Whether you are ready
-
Whether you are worthy
-
Whether you are one of us
If you made it this far down the Privacy Policy:
-
You are patient
-
You are thorough
-
You care about details
These are excellent qualities. They will serve you well on the path ahead.
One final note: The information in this policy is accurate. But it is not complete. There are things we cannot explain in a legal document. There are things that must be shown, not told.
If you are meant to know them, you will.
If you are not… you will forget you ever read this.
Acknowledgement:
By using this Site, you acknowledge that you have read and understood this Privacy Policy. You acknowledge that you may not remember all of it. You acknowledge that some of it may have been for your eyes only.
I Understand and Accept
(Clicking this button confirms your acknowledgment. Your consent is recorded. Your journey continues.)
Document Control:
-
Policy Owner: Office of the Grand Master
-
Reviewed By: The Inner Circle Legal Committee
-
Approved By: Level 33 Council
-
Next Review Date: November 13, 2033 (or sooner, if the stars demand it)
Disclaimer: This Privacy Policy is a legally compliant document presented within a thematic context. The Order respects your privacy rights as defined by applicable law. Any mystical or mysterious elements are for entertainment purposes only. Unless they’re not. We’re not telling.