Privacy Policy

Your privacy is our priority. Learn how we protect your personal information and digital assets with our flexible security options, including optional zero-knowledge encryption.

Last updated: January 30, 2025

1. Overview

Safeinity ("we," "our," or "us") is committed to protecting your privacy and ensuring the security of your personal information and digital assets. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our digital estate planning platform.

Key Principle: We do not rent, sell, or trade your personal information - to anyone. We will respond only to U.S. based court orders for user information - and only if we have a valid legal obligation to do so.
Key Principle: We do not track your site behavior and do not rent, sell or trade any such data. We do not send marketing related communications, except we might send one communication in a 6 month period in order to announce a new feature or service. We do not use tracking cookies or similar technologies for advertising or marketing purposes. We try, hard, to avoid enshitification of our platform.

2. Information We Collect

2.1 Personal Information

We at times, collect the following types of personal information:

  • Account Information: Name, email address, phone number, and password
  • Profile Information: Security preferences, notification settings, and plan type
  • Beneficiary Information: Names, contact details, and relationships of designated beneficiaries
  • Payment Information: Billing address and payment method details (processed by Stripe)

2.2 Digital Asset Information

Depending on your chosen security method, we may have different levels of access to your digital assets:

For Client-Side Encrypted Assets:

We cannot access the content of these files and only collect metadata:

  • Asset categories and labels (for organization purposes)
  • Creation and modification timestamps
  • File sizes and encryption metadata
  • Broad access patterns and usage statistics (to prevent abuse of file uploads)
For Standard Uploads:

We collect both content and metadata for service functionality:

  • File content (for preview, sharing, and beneficiary access)
  • Asset categories and labels
  • Creation and modification timestamps
  • Security method preferences (Shamir sharing, time-lock, legal escrow)

2.3 Technical Information

We collect this data to prevent technical attacks, but purge it regularly:

  • IP addresses and device information
  • Browser type and version
  • Operating system information
  • Usage analytics and performance metrics

3. How We Use Your Information

We use your information for the following purposes:

Service Provision
  • Manage your account and digital vault
  • Process beneficiary designations
  • Enable security features and access controls
  • Facilitate digital asset inheritance
Platform Improvement
  • Analyze usage patterns for optimization
  • Develop new security features
  • Improve user experience and interface
  • Conduct security audits and monitoring
Communication
  • Send important security notifications
  • Provide customer support
  • Share product updates and features
  • Process heartbeat confirmations
Legal Compliance
  • Meet regulatory requirements
  • Respond to legal requests
  • Prevent fraud and abuse

4. Information Sharing and Disclosure

We do not sell, trade, or rent your personal information to third parties. We may share your information only in the following circumstances:

4.1 Service Providers

We work with trusted third-party service providers who assist us in operating our platform:

  • Payment Processing: Stripe for secure payment processing
  • Email Services: For transactional and notification emails
  • SMS Services: For transactional and notification texts
  • Chat: We use a 3rd party chat and customer support provider
  • Cloud Infrastructure: For secure data storage and processing
  • Analytics: For platform performance and usage analysis

4.2 Legal Requirements

We may disclose your information when required by US law or to:

  • Comply with court orders
  • Protect our rights, property, or safety
  • Prevent fraud or security threats
  • Respond to emergency situations

4.3 Business Transfers

In the event of a merger, acquisition, or sale of assets, your information may be transferred as part of the transaction. We will notify you of any such change in ownership. Ownership has no interest in selling or going public with Safeinity. This is a for profit company but ownership also considers our service to you a personal obligation.

5. Data Security

We implement industry-leading security measures to protect your information:

Files: AES-256-GCM
Military-grade encryption for your files
Optional Zero-Knowledge
Choose client-side encryption for maximum privacy
Secure Infrastructure
SOC 2 compliant cloud hosting

Additional Security Measures:

  • Transport Layer Security (TLS) for all communications
  • Regular security audits and penetration testing
  • Multi-factor authentication support
  • Automated threat detection and monitoring
  • Regular security training for all employees

6. Security Options & Privacy Architecture

Safeinity offers flexible security options to meet your privacy needs:

Option 1: Client-Side Encryption (Zero-Knowledge)

Maximum Privacy: When you choose client-side encryption, even Safeinity cannot access your encrypted digital assets, master encryption password, or key shards.

How Zero-Knowledge Works:

  1. Client-Side Encryption: All sensitive data is encrypted on your device before being sent to our servers
  2. Key Management: Encryption keys are derived from YOUR master key and never stored on our servers or seen by Safeinity
  3. Secure Storage: We only store encrypted data that we cannot decrypt

Option 2: Standard Upload

Convenient Access: Standard uploads provide easier sharing and beneficiary access while still maintaining server-side security measures.

Standard Upload Security:

  • Server-Side Protection: Files are protected by enterprise-grade security measures
  • Access Controls: Robust authentication and authorization systems
  • Data Encryption: Files are encrypted at rest using industry-standard methods
  • Audit Logging: All access is logged and monitored

Regardless of your chosen method, your data is protected by our comprehensive security infrastructure. Client-side encryption provides maximum privacy, while standard uploads offer enhanced convenience and sharing capabilities.

7. Data Retention

We retain your information for as long as necessary to provide our services and fulfill the purposes outlined in this policy:

Data Type Retention Period Purpose
Account Information Active account + inheritance period only Service provision
Digital Assets (Client-Side Encrypted) Active account + inheritance period only Secure storage (content inaccessible to Safeinity)
Digital Assets (Standard Upload) Active account + inheritance period only Digital estate planning and beneficiary access
Activity Logs Max: Active account + inheritance period. Generally much less. Security monitoring and audit trails
Payment Information 7 years after last transaction Stripe maintains records for financial record keeping and tax compliance

8. Your Rights and Choices

You have the following rights regarding your personal information:

Access

Request a copy of the personal information we hold about you

Correction

Update or correct inaccurate personal information

Deletion

Request deletion of your personal information

9. Cookies and Tracking Technologies

We use cookies and similar technologies to enhance your experience and provide our services. For detailed information, please see our Cookie Policy.

Essential Cookies:

  • Authentication and session management
  • Security features and fraud prevention
  • Core platform functionality

Optional Cookies:

  • Analytics and performance monitoring
  • User preference storage
  • Communication optimization

10. International Data Transfers

Your information may be transferred to and processed in countries other than your country of residence. We ensure that all international transfers are protected by appropriate safeguards:

11. Children's Privacy

Our services are not intended for individuals under the age of 18. We do not knowingly collect personal information from children under 18. If we become aware that we have collected personal information from a child under 18, we will take steps to delete such information promptly.

If you are a parent or guardian and believe your child has provided us with personal information, please contact us immediately at #application.email.support#.

12. Changes to This Privacy Policy

We may update this Privacy Policy from time to time to reflect changes in our practices or applicable laws. When we make changes, we will:

  • Update the "Last updated" date at the top of this policy
  • Notify you via email or text (if possible) for material changes
  • Display a prominent notice on our platform

Your continued use of our services after any changes constitutes acceptance of the updated Privacy Policy.

13. Contact Information

NOT AUTHORIZED
Contact Shane or Rodney.