Privacy Policy.
TruepixID creates tamper-evident integrity records for images and short videos without storing original files. Our architecture is built on Verified, Not Stored™ — meaning we create cryptographic integrity records without retaining your media. This policy applies to users in both the United States and Canada.
Information We Collect
We only collect the minimum data required to deliver verification:
- SHA-256 file hash (no access to original content)
- Verification timestamps (UTC)
- Region and selected retention tier (US / CA)
- Email (optional: receipts, deletion confirmation, account binding)
- Operational metadata (file size, type, fraud-prevention signals)
No Storage of Original Media
TruepixID does not retain original media beyond the user-selected retention window. After verification and expiration of the selected retention period, media artifacts are permanently deleted and cannot be recovered.
Regional Data Residency
Media artifacts are temporarily stored in encrypted AWS S3 private buckets located in:
Data never transfers across borders or replicates outside the selected region. Artifacts are retained only for the selected retention window and automatically deleted thereafter.
Retention Periods
Choose the retention window that fits your workflow. All data is permanently deleted at expiry.
Pre-Deletion Notifications
Alerts are issued at both 72 hours and 24 hours prior to expiration, giving you time to download or extend your artifact before permanent deletion.
Irreversible Cryptographic Deletion
When retention ends, objects are permanently deleted. A cryptographic receipt records deletion using timestamp, region, and hash.
Verification Receipts
Receipts are retained for 90 days for audit and compliance purposes. They contain metadata only — never original images or video.
Credit Validity
Verification credits are valid for 12 months and expire if unused. Promotional or trial credits may have shorter durations.
Use of Information
Collected data is used exclusively for:
- Generate timestamps, overlays, and receipts
- Enable billing, usage reporting, and fraud protection
- Support account and entitlement management
- Secure platform integrity and security event monitoring
Subprocessors
We use subprocessors including but not limited to AWS, Stripe, CloudFront, and Postmark. All subprocessors operate under strict contractual confidentiality and compliance controls.
- AWS — storage, compute, and CDN infrastructure
- Stripe — payment processing and billing
- CloudFront — secure content delivery
- Postmark — transactional email and receipts
Questions about your data?