GDPR Compliant
SOC 2 Compliant
Our Privacy Principles
These core commitments guide everything we do at iVerify.
No Private Data Collection
Our application does not access your private data. We do not collect messages, photos, emails, browsing history, contacts, or personal content.
Transparent Operations
You always know what we access and why. Clear documentation, open processes, and straightforward communication about how our security platform works.
Minimal Data Philosophy
We collect minimal security data to detect threats. Our application identifies vulnerabilities and attacks without accessing your personal information.
We've built our platform to protect without prying
No Private Data
We do do not collect or have access to names, photos, videos, old browsing data, call history, app usage data, location metadata, contacts, calendar information, or payment details. Your device analysis happens locally, ensuring your personal content stays personal.
No Personally Identifiable Information
We do not collect names, dates of birth, addresses, phone numbers, identification numbers, passport numbers, credit card or bank account numbers, medical records, login IDs, or passwords. Email addresses are only collected when you explicitly opt to share diagnostic data with our team.
How We Protect Your Privacy
Privacy protection in practice. Here's how we enforce our commitments with technology and policy.
Data Minimization
We collect only what's necessary for security. Telemetry is used solely for threat detection and service improvement.
Encryption & Access Controls
All data is encrypted in transit and at rest. Strict access controls limit exposure to authorized security personnel only.
Informed Consent
Advanced forensic features for threat hunting require your explicit consent. You'll know what diagnostic data is collected and you can withdraw consent at anytime.
Location Data
For enterprise customers with location protection features enabled, data is processed on-device and never stored. iVerify never stores or shares location information.
Flexible Data Retention
You control how long we keep your data. Enterprise customers can set custom retention periods, or basic users can request for us to delete your information entirely at any time. Your data, your timeline.
Security and Compliance Resources
Your right to know. Access complete documentation on data protection, privacy practices, and our legal obligations