Privacy & Security by design

We build trust through transparency, ethical data practices, and enterprise-grade security.

Privacy‑first

We do not collect PII; we respect robots.txt and enforce rate limits

  • • No personal identifiable information collected
  • • Respect for website robots.txt directives
  • • Ethical rate limiting to prevent server overload
  • • Focus on behavioral and structural signals only

Data retention

Configurable TTL (30/60/90 days)

  • • Flexible retention policies
  • • Automatic data expiration
  • • User-controlled data lifecycle
  • • Secure deletion processes

Trust & Compliance

Optional OSINT via official APIs/approved providers only; data residency upon request

  • • SOC 2 Type II compliance
  • • GDPR and CCPA compliance
  • • Optional data residency
  • • Third-party security audits

Auditability

Result timestamps, source URLs, and activity logs for in‑app review

  • • Complete audit trails
  • • Source attribution for all data
  • • Timestamp tracking
  • • Activity monitoring

Learn more about our practices

Get detailed information about our methodology, privacy practices, and security measures.

Download our Methodology & Privacy overview