Privacy & Security by design
We build trust through transparency, ethical data practices, and enterprise-grade security.
Privacy‑first
We do not collect PII; we respect robots.txt and enforce rate limits
- • No personal identifiable information collected
- • Respect for website robots.txt directives
- • Ethical rate limiting to prevent server overload
- • Focus on behavioral and structural signals only
Data retention
Configurable TTL (30/60/90 days)
- • Flexible retention policies
- • Automatic data expiration
- • User-controlled data lifecycle
- • Secure deletion processes
Trust & Compliance
Optional OSINT via official APIs/approved providers only; data residency upon request
- • SOC 2 Type II compliance
- • GDPR and CCPA compliance
- • Optional data residency
- • Third-party security audits
Auditability
Result timestamps, source URLs, and activity logs for in‑app review
- • Complete audit trails
- • Source attribution for all data
- • Timestamp tracking
- • Activity monitoring
Learn more about our practices
Get detailed information about our methodology, privacy practices, and security measures.
Download our Methodology & Privacy overview