Built on Security and Privacy
We protect your content and your data with industry-leading security practices and transparent policies.
End-to-End Encryption
All evidence packages are encrypted at rest using AES-256. Your content library is encrypted both in transit and at rest.
SOC 2 Compliant
We undergo regular third-party audits to ensure compliance with SOC 2 Type II security standards.
Infrastructure Security
Hosted on AWS with DDoS protection, automatic failover, and 99.9% uptime SLA for enterprise customers.
Privacy First
We never sell your data. We only collect what's necessary to provide the service. You can export or delete your data anytime.
GDPR & CCPA Compliant
Full compliance with GDPR, CCPA, and other global privacy regulations. Data residency options available.
Legal Admissibility
Evidence packages include chain of custody documentation and cryptographic signatures for legal proceedings.
How We Protect Your Data
Public Data Only
We only capture publicly accessible content. We never bypass login walls, paywalls, or scrape private accounts. This ensures we operate within legal and ethical boundaries.
Ownership Verification
Before you can export evidence packages, you must verify ownership of your content (OV1 or OV2). This prevents abuse of our platform for malicious DMCA claims.
Secure Storage
All uploaded content and evidence packages are stored in encrypted S3 buckets with strict access controls. Only you can access your data.
Transparent Logging
Every action on our platform is logged with timestamps and cryptographic signatures. This creates an immutable audit trail for legal proceedings.
Responsible Usage Policy
We're committed to preventing abuse of our platform
✅ Acceptable Use
- Protecting your own original content from theft
- Verifying ownership before filing DMCA claims
- Capturing evidence from publicly accessible web pages
- Using evidence packs for legitimate legal proceedings
❌ Prohibited Use
- Filing false or fraudulent DMCA claims
- Harassing other users or platforms
- Scraping content you don't own
- Bypassing login walls or paywalls
- Engaging in copyright trolling
Have security questions?
Our security team is here to answer any questions about our practices, compliance, or infrastructure.
Contact Security Team