Back to Home

Privacy Policy

Your privacy and security are fundamental to everything we do at ICEProof. This policy explains how we protect your personal information.

Last updated: January 15, 2025
Questions? privacy@iceproof.app

Our Privacy Commitment

At ICEProof, privacy isn't an afterthought—it's the foundation of our service. We've built our entire platform with privacy-by-design principles, ensuring your sensitive information remains secure and under your complete control.

Zero Knowledge
We can't access your data
Local First
Data stays on your device
Full Control
You own your information

Information We Collect

Personal Information

  • Account credentials (email, encrypted password)
  • Emergency contact information you provide
  • Profile information (name, phone number)
  • Device identifiers for security purposes

Document Data

  • Documents you choose to store (encrypted locally)
  • Document metadata (creation date, file size)
  • OCR text extraction for search functionality
  • Document categories and tags you assign

Usage Information

  • App usage patterns and feature interactions
  • Emergency alert triggers and responses
  • Technical logs for security and debugging
  • Performance and crash analytics

Location Data

  • Location data only during active emergency alerts
  • Location sharing preferences you set
  • GPS coordinates shared with your chosen contacts
  • Location accuracy and timestamp information

How We Use Your Information

Core App Functionality

  • Secure storage and retrieval of your documents
  • Emergency alert delivery to your chosen contacts
  • Account authentication and security
  • Biometric authentication setup and management

Safety and Security

  • Fraud prevention and security monitoring
  • Emergency response coordination
  • Account recovery and identity verification
  • Compliance with legal obligations

Service Improvement

  • App performance optimization
  • New feature development
  • User experience enhancement
  • Technical support and troubleshooting

Data Protection & Security

Encryption Standards

  • AES-256 encryption for all sensitive data
  • End-to-end encryption for document storage
  • Encrypted data transmission (TLS 1.3)
  • Client-side encryption before cloud storage

Access Controls

  • Multi-factor authentication options
  • Biometric locks (Face ID, Touch ID, Fingerprint)
  • Auto-lock after inactivity
  • Zero-knowledge architecture

Data Minimization

  • Collect only necessary information
  • Local storage preferred over cloud
  • Automatic data purging after retention periods
  • Optional cloud backup with user consent

Information Sharing

Emergency Contacts

  • Share location and emergency info only with contacts you designate
  • Share only during active emergency situations
  • Full control over what information is shared
  • Ability to stop sharing at any time

Service Providers

  • Cloud infrastructure providers (encrypted data only)
  • Analytics services (anonymized data)
  • Payment processors (subscription management)
  • Support services (with your explicit consent)

Legal Requirements

  • Comply with valid legal requests
  • Protect rights and safety of users
  • Prevent fraud and abuse
  • National security requirements when legally obligated

We Never Share

  • Your documents or personal data for marketing
  • Information with data brokers
  • Unencrypted sensitive information
  • Data without your explicit consent (except legal requirements)

Your Privacy Rights

Access and Control

  • View and download all your stored data
  • Correct or update your personal information
  • Delete your account and all associated data
  • Export your data in portable formats

Communication Preferences

  • Opt out of non-essential communications
  • Choose emergency notification methods
  • Control marketing and promotional messages
  • Manage push notification settings

Regional Rights (GDPR, CCPA)

  • Right to be forgotten (data deletion)
  • Right to data portability
  • Right to restrict processing
  • Right to object to certain uses

Data Retention

Account Data

  • Retained while your account is active
  • Deleted within 30 days of account closure
  • Emergency contacts removed immediately upon request
  • Backup data permanently deleted within 90 days

Document Storage

  • Documents stored as long as you keep them
  • Automatic deletion available with retention schedules
  • Immediate deletion upon user request
  • Secure wiping of deleted document data

Analytics and Logs

  • Usage analytics retained for 24 months maximum
  • Security logs kept for 12 months
  • Error logs automatically deleted after 6 months
  • Emergency event logs retained for legal compliance periods

International Data Transfers

Cross-Border Protections

  • Standard Contractual Clauses for EU transfers
  • Adequacy decisions compliance
  • Data localization options where required
  • User control over data location preferences

Regional Compliance

  • GDPR compliance for European users
  • CCPA compliance for California residents
  • PIPEDA compliance for Canadian users
  • Local data protection law adherence

Children's Privacy

Age Requirements

  • Service not intended for children under 13
  • Parental consent required for 13-17 year olds
  • Special protections for family account features
  • Educational resources for digital safety

Family Features

  • Parent/guardian controls for minor accounts
  • Limited data collection for minors
  • Enhanced security for family emergency plans
  • Age-appropriate privacy settings

Contact Us About Privacy

Have questions about this privacy policy or how we handle your data? We're here to help.

Privacy Officer

privacy@iceproof.app

Data Protection

dpo@iceproof.app

General Support

support@iceproof.app

Response Time

We respond to privacy inquiries within 48 hours

Data Requests

Data access/deletion requests processed within 30 days

Updates

We'll notify you of any significant policy changes