← Back to par Noir
🛡️ Privacy by Design
Identity Protocol is built on the principle of privacy by design. We believe that your personal information belongs to you, and we are committed to protecting your privacy while providing a secure, decentralized identity management system.
🚫 Information We Do NOT Collect
We do not collect, store, or process your personal information, including:
- Identity Data: Your pN names, passcodes, or identity details
- Personal Information: Names, addresses, phone numbers, or email addresses
- Usage Data: How you use the service or which features you access
- Device Information: Device identifiers, IP addresses, or location data
- Biometric Data: Fingerprint, face, or other biometric information
🚫 No Tracking or Analytics
- No Cookies: We do not use tracking cookies
- No Analytics: We do not track user behavior or analytics
- No Profiling: We do not create user profiles or behavioral analysis
- No Third-Party Tracking: We do not allow third-party tracking
🔐 How Your Data is Handled
Local Storage Only
- Device Storage: All your data is stored locally on your devices
- No Cloud Storage: We do not store your data on our servers
- User Control: You have complete control over your data
- Encryption: All data is encrypted with military-grade encryption
Decentralized Processing
- Local Processing: All data processing happens on your devices
- No Server Processing: We do not process your data on our servers
- Peer-to-Peer: Direct communication between users when needed
- IPFS Integration: Optional decentralized metadata storage
Data Ownership
- Your Ownership: You own 100% of your identity data
- No License: We do not claim any rights to your data
- Export Rights: You can export your data at any time
- Deletion Rights: You can delete your data completely
🔄 Data Sharing and Third Parties
Your Control Over Sharing
- Granular Permissions: You control exactly what data is shared
- Revocation Rights: You can revoke access at any time
- Audit Trail: Complete history of data sharing
- No Automatic Sharing: Nothing is shared without your explicit consent
Third-Party Integrations
- Optional Services: Third-party integrations are completely optional
- Your Choice: You choose which integrations to use
- Separate Privacy: Third-party services have their own privacy policies
- No Data Transfer: We do not transfer your data to third parties
🛡️ Security Measures
Encryption Standards
- Military-Grade: AES-256 encryption for all data
- End-to-End: Encryption from device to device
- Key Management: Secure key generation and storage
- No Backdoors: We cannot access your encrypted data
Security Practices
- Regular Updates: Security updates and patches
- Vulnerability Disclosure: Prompt disclosure of security issues
- Security Audits: Regular security assessments
- Best Practices: Following industry security standards
🌍 International Data Transfers
No Data Transfers
- Local Storage: All data stays on your local devices
- No Cross-Border: We do not transfer data across borders
- No International Processing: No international data processing
- Your Control: You control where your data is stored
Compliance with Laws
- GDPR Compliance: Compliance with European data protection laws
- CCPA Compliance: Compliance with California privacy laws
- Local Laws: Compliance with local privacy and data laws
- Export Controls: Compliance with export control regulations
🔍 Your Privacy Rights
Right to Access
- Your Data: You have complete access to your data
- Export Rights: You can export your data at any time
- Transparency: Complete transparency about data handling
- No Barriers: No barriers to accessing your data
Right to Deletion
- Complete Deletion: You can delete all your data
- No Retention: We do not retain deleted data
- Immediate Effect: Deletion takes effect immediately
- No Recovery: Deleted data cannot be recovered
Right to Portability
- Data Export: Export your data in standard formats
- No Restrictions: No restrictions on data export
- Multiple Formats: Export in various formats
- Complete Data: Export all your data, not just portions
Right to Object
- No Processing: We do not process your data
- No Profiling: We do not create profiles
- No Marketing: We do not use data for marketing
- No Automated Decisions: No automated decision making
🎯 Privacy Principles
- Privacy by Design: Privacy is built into the system design
- Default Privacy: Privacy is the default setting
- Minimal Data: Only minimal data is collected (none in our case)
- User Control: Users have complete control over their data
- Transparency: Clear, understandable privacy information
- No Hidden Practices: No hidden data collection or processing
- Open Source: Source code is available for review
- User Empowerment: You have complete control over your data
📝 Privacy Policy Summary
- No Data Collection: We do not collect your personal information
- Local Storage: All data is stored locally on your devices
- Your Ownership: You own 100% of your data
- Your Control: You control what data is shared
- Strong Encryption: Military-grade encryption protects your data
- No Tracking: No tracking, analytics, or profiling
- Privacy Rights: You have all standard privacy rights
- Transparency: Complete transparency about data handling
This Privacy Policy explains how Identity Protocol protects your privacy in our decentralized identity management system.