Data Privacy

Privacy & Forensic
Data Integrity.

We understand the sensitive nature of forensic audits. Our privacy model is designed for newsrooms, legal teams, and high-assurance professionals.

Encryption at Rest

All uploaded assets are encrypted using industry-standard AES-256 protocols. Your data is protected from unauthorized access at every stage of the forensic lifecycle.

Temporary Persistence

Audited assets are temporarily retained only to complete analysis and generate the evidence trail. For enterprise users, we offer 'Zero-Persistence' configurations.

1. Information We Collect

We collect diagnostic data to improve forensic engine accuracy, including file types, metadata footprints, and spectral anomalies. We do not sell your data to third-party brokers.

2. Use of Forensic Data

Your uploaded content is used exclusively for the generation of the audit report. We may use anonymized Signal Data to train our local detection heuristics, but your original assets are never shared.

3. Immutable Ledger Transparency

Note: SHA-256 hashes of audited assets are registered on our Transparency Ledger for chain-of-custody. A hash is a one-way cryptographic fingerprint; it does not reveal the content of the asset but proves its forensic state at a specific point in time.

4. Enterprise Control

Enterprise users have complete control over data retention policies, including immediate purging of all assets and diagnostic logs post-audit.

Last Updated: March 2026. For specific security inquiries, contact security@veridex.internal