Privacy Policy | Privnotepad – Secure Self-Destructing Notes Data Protection

Privacy Policy & Data Protection Commitment

Privnotepad’s fundamental commitment to privacy protection, data security, and user confidentiality. This policy explains how we implement zero-knowledge encryption, automatic message deletion, and strict no-logs practices to protect your secure self-destructing notes.

  Last Updated: January 1, 2024  |    Version: 3.0  |    Status: Actively Enforced
Zero
Personal Data Collected
256-bit
Military Encryption
Auto
Message Deletion
No Logs
Policy Enforced

Our Privacy-First Principles

Built on fundamental principles that guide every aspect of our secure messaging service and data protection practices.

Zero-Knowledge Encryption

We never have access to your unencrypted messages. All encryption happens client-side before data reaches our servers.

Automatic Data Deletion

Messages are permanently deleted after reading or expiration. No backups, no recovery possible.

Complete Anonymity

No registration required. No personal data collected. Your privacy is our priority, not your identity.

Full Transparency

Clear documentation of our practices. No hidden tracking, no vague policies, no data selling.

Our Privacy Commitment to You

  At Privnotepad, we believe privacy is a fundamental human right. We’ve built our entire service around protecting your confidential communications with military-grade encryption and automatic data deletion. We never sell your data, we never track your activity, and we never compromise on security.  

1. Overview & Our Privacy Commitment

1.1 Introduction to Our Privacy Policy

This Privacy Policy describes how Privnotepad (“we”, “our”, or “us”) collects, uses, processes, and protects information in relation to our secure self-destructing notes service. Our service is designed with privacy-by-design principles and implements zero-knowledge encryption architecture to ensure maximum protection for your confidential communications.

1.2 The Privnotepad Privacy Philosophy

We operate on three core privacy principles:

  1. Data Minimization: We collect the absolute minimum data necessary to provide our service
  2. Automatic Deletion: All user data is automatically deleted after its intended purpose is served
  3. Zero-Knowledge: We never have access to your unencrypted content or personal information

💡 Key Privacy Feature: Unlike traditional messaging services, Privnotepad does not require account creation, email registration, or any personal information. You can use our secure messaging service completely anonymously.

2. What Data We Collect (Minimal & Purpose-Limited)

2.1 Data Collection Principles

We adhere to strict data collection limitations:

  • Only collect data absolutely necessary for service operation
  • Never collect personal identification information
  • Automatically delete all data after expiration
  • No tracking, profiling, or behavioral monitoring

2.2 Data Collection Categories

Data Category What We Collect Purpose Retention Period
Message Content Encrypted text only Service delivery Until deletion (auto or manual)
Operational Data Anonymous usage statistics Service improvement 30 days maximum
Security Logs Minimal security event data Abuse prevention 7 days maximum
Performance Metrics Anonymous performance data Service optimization 14 days maximum

⚠️ Important: We DO NOT COLLECT personal identification information, IP addresses (beyond basic security logging), geolocation data, device identifiers, or any information that could identify individual users.

2.3 What We Never Collect

To ensure maximum privacy protection, we explicitly do not collect:

  • Personal Information: Names, email addresses, phone numbers, physical addresses
  • Identification Data: Government IDs, social security numbers, passport information
  • Financial Information: Credit card numbers, bank account details, payment information
  • Behavioral Data: Browsing history, search patterns, app usage patterns
  • Location Data: GPS coordinates, IP-based location information
  • Social Data: Contact lists, social media connections, relationship information

3. How We Protect Your Data (Security Measures)

3.1 Comprehensive Security Architecture

We implement multiple layers of security protection:

🔐 End-to-End Encryption

Messages encrypted before leaving your device, decrypted only by recipient

🛡️ TLS 1.3 Encryption

All data transmissions protected with latest TLS protocols

🔑 Perfect Forward Secrecy

Unique encryption keys for each message session

🚫 No Data Retention

Automatic deletion from all servers after expiration

3.2 Technical Security Measures

Our technical infrastructure includes:

  • Server Security: Regular security audits, intrusion detection systems, DDoS protection
  • Network Security: Firewalls, VPNs, secure network architecture
  • Access Controls: Multi-factor authentication, role-based access, audit logging
  • Physical Security: Secure data centers with 24/7 monitoring and biometric access
  • Code Security: Regular security reviews, dependency scanning, vulnerability testing

3.3 Organizational Security Measures

Beyond technical measures, we implement organizational protections:

  • Employee Training: Regular security and privacy training for all staff
  • Data Protection Officer: Designated privacy officer overseeing compliance
  • Incident Response: Documented procedures for security incidents
  • Third-Party Audits: Regular independent security assessments
  • Privacy by Design: Privacy considerations integrated into all development

4. Encryption & Cryptographic Protection

4.1 Encryption Standards & Protocols

We use industry-standard encryption protocols:

Encryption Type Standard Used Key Strength Purpose
Message Encryption AES-256-GCM 256-bit Content protection
Transmission Encryption TLS 1.3 256-bit Data in transit
Key Exchange ECDH with Curve25519 128-bit equivalent Secure key sharing
Password Protection Argon2id Variable Additional security layer

4.2 Zero-Knowledge Architecture

Our zero-knowledge design ensures:

  1. Client-Side Encryption: All encryption happens in your browser before transmission
  2. Key Management: Encryption keys never leave your device
  3. Server Blindness: Our servers only handle encrypted data they cannot decrypt
  4. No Access: We cannot read your messages even if compelled legally

🔐 Encryption Process: When you create a secure note: (1) Your browser generates a random encryption key, (2) Your message is encrypted with AES-256, (3) Only the encrypted data is sent to our servers, (4) The key is embedded in the shareable link, (5) Recipient’s browser uses the key to decrypt the message.

5. Data Retention & Automatic Deletion

5.1 Our Data Retention Philosophy

We believe data should exist only as long as necessary. Our automatic deletion policies ensure:

  • Messages delete automatically after being read
  • Unread messages delete after expiration timer
  • No backups or archives of deleted messages
  • Cryptographic shredding of encryption keys

5.2 Retention Periods by Data Type

Immediate

After reading (burn-on-read)

5 min – 7 days

Timer-based expiration

7 days

Maximum security logs

30 days

Maximum operational data

5.3 Deletion Process & Verification

Our secure deletion process includes:

  1. Triggering Event: Read receipt or timer expiration
  2. Key Destruction: Immediate cryptographic key deletion
  3. Data Erasure: Multiple overwrite passes on storage
  4. Backup Purge: Removal from all backup systems
  5. Verification: Automated verification of complete deletion
  6. Logging: Audit trail of deletion events (non-recoverable)

⚠️ Permanent Deletion: Once messages are deleted through our system, recovery is impossible. We use cryptographic shredding techniques that make data recovery technically infeasible, even with forensic tools.

6. GDPR Compliance & International Data Protection

6.1 General Data Protection Regulation (GDPR)

Privnotepad is designed with GDPR compliance in mind, particularly through:

Right to Erasure
Automatic deletion fulfills this right

Data Minimization
Collect only necessary data

Security by Design
Built-in protection measures

Transparency
Clear privacy documentation

6.2 International Data Transfers

Our data processing infrastructure is designed with international privacy standards in mind:

  • Server Locations: Data processed in GDPR-compliant jurisdictions
  • Transfer Mechanisms: Standard contractual clauses where applicable
  • Jurisdiction: Service operated under privacy-friendly jurisdictions
  • Local Compliance: Consideration of local privacy laws in operations

6.3 Data Processing Agreements

For business users and enterprise customers, we offer:

  • Data Processing Addendums (DPAs): Custom agreements for GDPR compliance
  • Subprocessor Disclosure: Full transparency about third-party services
  • Audit Support: Documentation for compliance verification
  • Breach Notification: Procedures for data breach notifications

7. Your Privacy Rights & Controls

7.1 Fundamental Privacy Rights

Regardless of jurisdiction, we recognize and support these fundamental privacy rights:

Your Privacy Rights

Right to Access

Request confirmation of whether we process your data and access to that data. Due to our zero-knowledge architecture, we cannot access your message content, but we can confirm operational data.

Right to Rectification

Request correction of inaccurate personal data. Since we don’t collect personal data, this primarily applies to any contact information you voluntarily provide for support purposes.

Right to Erasure

Request deletion of your personal data. Our automatic deletion system already fulfills this right for messages. For other data, we process deletion requests within 30 days.

Right to Restriction

Request restriction of processing under certain circumstances. You can choose not to use specific features or contact us to limit data processing.

Right to Data Portability

Receive your personal data in a structured, commonly used format. Given our minimal data collection, portability primarily applies to operational data.

Right to Object

Object to processing of personal data. You can opt out of optional data collection and processing activities through your browser settings or by not using specific features.

Compliance & Certifications

GDPR Ready
HIPAA Considerate
CCPA Aligned
Zero-Knowledge
No-Logs Policy

8. Third-Party Services & Data Sharing

8.1 Our No-Data-Sharing Policy

We maintain a strict no-data-sharing policy:

  • No Selling: We never sell, rent, or trade user data
  • No Sharing: We don’t share data with third parties for marketing
  • No Profiling: We don’t create user profiles for advertising
  • Limited Exceptions: Only for essential service operation or legal requirements

8.2 Essential Service Providers

We use these essential service providers who may process limited data:

Service Provider Purpose Data Processed Privacy Measures
Hosting Provider Infrastructure hosting Encrypted message data GDPR compliance, data encryption
CDN Services Content delivery Static assets, no user data Privacy-focused providers
Security Services DDoS protection, security IP addresses (temporary) Automatic deletion, no logging
Analytics Services Service improvement Anonymous usage data No personal data, opt-out available

8.3 Legal Requirements

We may disclose information if required by legal processes:

  • Court Orders: Valid court orders or subpoenas
  • Legal Compliance: To comply with applicable laws
  • Safety Protection: To protect safety, rights, or property
  • Fraud Prevention: To prevent or investigate fraud

⚠️ Important Limitation: Due to our zero-knowledge encryption, we cannot provide message content in response to legal requests because we don’t have access to encryption keys or unencrypted content. We can only provide encrypted data that is useless without the keys.

9. Children’s Privacy Protection

9.1 Age Restrictions

Privnotepad is not intended for children under 16 years of age. We do not knowingly collect personal information from children under 16. If you are a parent or guardian and believe your child has provided us with personal information, please contact us immediately.

9.2 Parental Controls

Parents and guardians should:

  • Monitor children’s internet usage
  • Use parental control tools to restrict access
  • Educate children about online privacy
  • Contact us if children are using our service

👨‍👩‍👧‍👦 Family Safety: While our service provides strong privacy protections, it’s designed for responsible adult use. We recommend parents supervise children’s use of all online services, including privacy tools.

10. Changes to This Privacy Policy

10.1 Policy Updates

We may update this Privacy Policy periodically to reflect:

  • Changes in our data practices
  • New legal requirements
  • Service improvements
  • User feedback

10.2 Notification of Changes

When we make significant changes to this policy:

  1. We will update the “Last Updated” date at the top
  2. We may provide additional notice through our website
  3. We will not reduce your rights without explicit consent
  4. Continued use constitutes acceptance of changes

10.3 Change History

Recent policy updates:

  • January 1, 2024: Comprehensive update with enhanced transparency
  • July 1, 2023: Added GDPR compliance details
  • January 1, 2023: Initial privacy policy publication

11. Contact Information & Questions

11.1 Data Protection Officer

For privacy-related inquiries, contact our Data Protection Officer:

Privnotepad Data Protection Officer

Email: dpo@privnotepad.com

Response Time: Within 48 hours

Preferred Method: Encrypted Email

11.2 General Support

For general questions about our secure messaging service:

  • Support Email: support@privnotepad.com
  • Security Reports: security@privnotepad.com
  • Business Inquiries: business@privnotepad.com

11.3 Regulatory Authorities

If you have concerns about our data processing, you may contact your local data protection authority. We commit to cooperating with regulatory bodies to resolve any privacy concerns.

12. Key Definitions & Terminology

12.1 Privacy Terminology

Term Definition
Zero-Knowledge Encryption Encryption system where service provider cannot access unencrypted data
End-to-End Encryption Encryption where only communicating users can read messages
Automatic Deletion Systematic removal of data after specific conditions are met
No-Logs Policy Commitment to not retain records of user activities
Data Minimization Collecting only data necessary for specific purposes
GDPR General Data Protection Regulation (EU data protection law)

12.2 Service Terminology

  • Secure Note: Encrypted message with automatic deletion
  • Self-Destruct Timer: Countdown to automatic message deletion
  • Burn-on-Read: Immediate deletion after message is viewed
  • Encryption Key: Cryptographic key used to encrypt/decrypt messages
  • Shareable Link: Unique URL containing encrypted message and key

Questions About Our Privacy Policy?

Contact our Data Protection Team for clarification about our privacy practices, data protection measures, or to exercise your privacy rights.

48 Hours
Max Response Time
100%
Request Completion
Encrypted
Communication Channel

  Note: For maximum security when discussing sensitive privacy matters, consider using Privnotepad itself to send encrypted messages to our team. This ensures complete confidentiality of your inquiry.