We understand the sensitive nature of forensic audits. Our privacy model is designed for newsrooms, legal teams, and high-assurance professionals.
All uploaded assets are encrypted using industry-standard AES-256 protocols. Your data is protected from unauthorized access at every stage of the forensic lifecycle.
Audited assets are temporarily retained only to complete analysis and generate the evidence trail. For enterprise users, we offer 'Zero-Persistence' configurations.
We collect diagnostic data to improve forensic engine accuracy, including file types, metadata footprints, and spectral anomalies. We do not sell your data to third-party brokers.
Your uploaded content is used exclusively for the generation of the audit report. We may use anonymized Signal Data to train our local detection heuristics, but your original assets are never shared.
Note: SHA-256 hashes of audited assets are registered on our Transparency Ledger for chain-of-custody. A hash is a one-way cryptographic fingerprint; it does not reveal the content of the asset but proves its forensic state at a specific point in time.
Enterprise users have complete control over data retention policies, including immediate purging of all assets and diagnostic logs post-audit.
Last Updated: March 2026. For specific security inquiries, contact security@veridex.internal