Privacy Policy
Effective Date: January 28, 2026
Last Updated: January 28, 2026
1. Introduction
Pruved ("we," "our," or "us") is committed to protecting your privacy. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our platform, including:
- Pruved Web Application (pruved.com) - For protocol management, execution monitoring, and evidence replay
- Pruved Field App (Mobile application for iOS/Android) - For field technicians to execute protocols and capture evidence
By using our services, you agree to the collection and use of information in accordance with this policy.
2. Information We Collect
2.1 Personal Information
For Web Application Users (Administrators, Supervisors):
- Name, email address, and contact information
- Organization details (company name, address)
- User credentials (encrypted passwords)
- Profile information and preferences
For Field App Users (Technicians):
- Phone number (for device registration and OTP verification)
- Device information (model, operating system, unique device fingerprint)
- Professional credentials and role within organization
2.2 Location Data
Field App - GPS Location:
- Precise Location (Foreground): Captured when technicians perform protocol steps to establish chain of custody for evidence
- Background Location: Used during evidence upload to maintain location metadata integrity. Required to ensure evidence authenticity when the app is backgrounded during upload processing
- Location data is tied to specific work executions and evidence captures
- Location history is not tracked outside of active job execution
2.3 Media and Evidence
Captured by Field App:
- Photos, videos, and audio recordings taken during protocol execution
- Timestamps (both device time and NTP-verified time when available)
- GPS coordinates at moment of capture
- Device sensor data (accelerometer, gyroscope, barometer) for forensic verification
- Cryptographic hashes and signatures for evidence integrity
All media is captured solely for the purpose of documenting industrial operations and creating tamper-proof audit trails. Media is encrypted during transmission and storage.
2.4 Technical and Usage Data
- IP address and browser information
- Device identifiers and operating system details
- App usage statistics and performance metrics
- Crash reports and error logs (anonymized)
- Network connectivity status (for offline operation management)
2.5 Protocol and Execution Data
- Protocol definitions and workflow specifications
- Execution records (who performed what task, when, and where)
- Inspection results, defect reports, and quality metrics
- Asset and equipment information
- Approval and verification records
3. How We Use Your Information
3.1 Primary Purposes
- Protocol Execution: Enable technicians to follow work procedures and capture evidence
- Chain of Custody: Maintain tamper-proof audit trails with location, time, and device verification
- Evidence Management: Store, process, and serve media files for compliance and verification
- Quality Assurance: Review execution replays and approve evidence quality
- Defect Tracking: Report, assign, and verify defect resolutions
3.2 Operational Purposes
- Authenticate users and authorize access to organization data
- Manage device binding and prevent unauthorized access
- Facilitate offline operation with background synchronization
- Send OTP codes and job notifications via SMS/push
- Monitor system performance and diagnose technical issues
3.3 Legal and Compliance
- Comply with warranty, insurance, and regulatory requirements
- Respond to legal requests and prevent fraud or misuse
- Maintain records for audit and dispute resolution
4. Data Sharing and Disclosure
4.1 Within Your Organization
Data is shared within your organization according to role-based access controls. Administrators can view all executions, supervisors can review their team's work, and technicians can only access their assigned jobs.
4.2 Service Providers
We use trusted third-party services to operate our platform:
- Cloud Storage (AWS S3): Encrypted media storage
- Database Hosting: Secure data storage and processing
- SMS Gateway: OTP delivery for device verification
- Analytics: Anonymized usage metrics (Google Analytics)
All service providers are bound by data protection agreements and process data only as instructed.
4.3 Legal Requirements
We may disclose information if required by law, court order, or governmental request, or to protect our rights, property, or safety.
4.4 Business Transfers
In the event of a merger, acquisition, or sale of assets, your information may be transferred to the acquiring entity. You will be notified of any such change.
4.5 No Sale of Personal Data
We do not sell, rent, or trade your personal information to third parties for marketing purposes.
5. Data Security
5.1 Technical Safeguards
- Encryption: All data is encrypted in transit (TLS 1.3) and at rest (AES-256)
- Access Controls: Role-based permissions and multi-factor authentication
- Device Binding: Field app credentials are tied to specific devices
- Cryptographic Sealing: Evidence chains use SHA-256 hashing for tamper detection
- Secure Storage: Media files stored in isolated, access-controlled buckets
5.2 Organizational Measures
- Regular security audits and penetration testing
- Employee training on data protection practices
- Incident response procedures for data breaches
- Automatic session timeouts and secure credential storage
5.3 Data Retention
We retain data for as long as necessary to fulfill the purposes outlined in this policy or as required by law:
- Execution Records: Retained indefinitely for compliance and audit purposes (can be deleted upon request)
- Media Evidence: Stored according to your organization's retention policy
- User Accounts: Deleted within 30 days of account closure
- Logs and Analytics: Retained for 12 months for operational purposes
6. Managing Your Data and Permissions
You can:
- Request access to, correction, or deletion of your data
- Export your execution records and evidence files
- Opt out of non-essential communications
- Revoke device permissions (camera, microphone) in device settings
6.1 Location Permissions
Field App users can manage location permissions:
- Android: Settings → Apps → Pruved → Permissions → Location
- iOS: Settings → Privacy → Location Services → Pruved
Note: Location is required for evidence chain of custody. Disabling it will prevent protocol execution.
To exercise these rights, contact hello@pruved.com. Some data may be retained for legal compliance.
7. Cookies and Local Storage
Web Application:
- Essential: Authentication sessions, security tokens
- Analytics: Google Analytics (anonymized) - you can opt out
- Preferences: Theme, language settings
Field App:
- Encrypted credentials in device secure storage
- Offline data in local SQLite database
- Pending upload queue
8. International Data Transfers
Our services are hosted on servers in the United States. If you access our platform from outside the U.S., your data will be transferred and processed there. We use encryption, access controls, and standard data protection agreements to secure international transfers.
9. Children's Privacy
Our services are intended for professional use by adults (18 years or older). We do not knowingly collect information from children under 18. If we become aware of such collection, we will promptly delete the data.
10. Changes to This Policy
We may update this Privacy Policy from time to time to reflect changes in our practices or legal requirements. We will notify you of material changes by:
- Posting an updated policy on our website with a new "Last Updated" date
- Sending email notifications to registered users
- Displaying in-app notices for Field App users
Your continued use of our services after changes constitutes acceptance of the updated policy.
11. Contact Us
If you have questions, concerns, or requests regarding this Privacy Policy or our data practices, please contact us:
Pruved Privacy Team
Email: hello@pruved.com
Website: pruved.com
Response Time: We aim to respond to all privacy inquiries within 30 days.
12. Your Privacy Rights
Depending on your location, you may have additional rights under data protection laws (GDPR, CCPA, DPDP Act, etc.):
- Right to access and receive a copy of your personal data
- Right to correct inaccurate or incomplete data
- Right to request deletion of your data
- Right to data portability (receive data in machine-readable format)
- Right to object to certain processing activities
- Right to withdraw consent at any time
We do not sell your personal data. Data is shared only with service providers necessary for platform operation.
To exercise any of these rights or if you have concerns about how we handle your data, contact us at hello@pruved.com. We will respond within 30 days.
Acknowledgment: By using Pruved's services, you acknowledge that you have read and understood this Privacy Policy and agree to its terms. If you do not agree, please discontinue use of our platform.