Privacy Policy

Effective Date: January 28, 2026

Last Updated: January 28, 2026

1. Introduction

Pruved ("we," "our," or "us") is committed to protecting your privacy. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our platform, including:

  • Pruved Web Application (pruved.com) - For protocol management, execution monitoring, and evidence replay
  • Pruved Field App (Mobile application for iOS/Android) - For field technicians to execute protocols and capture evidence

By using our services, you agree to the collection and use of information in accordance with this policy.

2. Information We Collect

2.1 Personal Information

For Web Application Users (Administrators, Supervisors):

  • Name, email address, and contact information
  • Organization details (company name, address)
  • User credentials (encrypted passwords)
  • Profile information and preferences

For Field App Users (Technicians):

  • Phone number (for device registration and OTP verification)
  • Device information (model, operating system, unique device fingerprint)
  • Professional credentials and role within organization

2.2 Location Data

Field App - GPS Location:

  • Precise Location (Foreground): Captured when technicians perform protocol steps to establish chain of custody for evidence
  • Background Location: Used during evidence upload to maintain location metadata integrity. Required to ensure evidence authenticity when the app is backgrounded during upload processing
  • Location data is tied to specific work executions and evidence captures
  • Location history is not tracked outside of active job execution

2.3 Media and Evidence

Captured by Field App:

  • Photos, videos, and audio recordings taken during protocol execution
  • Timestamps (both device time and NTP-verified time when available)
  • GPS coordinates at moment of capture
  • Device sensor data (accelerometer, gyroscope, barometer) for forensic verification
  • Cryptographic hashes and signatures for evidence integrity

All media is captured solely for the purpose of documenting industrial operations and creating tamper-proof audit trails. Media is encrypted during transmission and storage.

2.4 Technical and Usage Data

  • IP address and browser information
  • Device identifiers and operating system details
  • App usage statistics and performance metrics
  • Crash reports and error logs (anonymized)
  • Network connectivity status (for offline operation management)

2.5 Protocol and Execution Data

  • Protocol definitions and workflow specifications
  • Execution records (who performed what task, when, and where)
  • Inspection results, defect reports, and quality metrics
  • Asset and equipment information
  • Approval and verification records

3. How We Use Your Information

3.1 Primary Purposes

  • Protocol Execution: Enable technicians to follow work procedures and capture evidence
  • Chain of Custody: Maintain tamper-proof audit trails with location, time, and device verification
  • Evidence Management: Store, process, and serve media files for compliance and verification
  • Quality Assurance: Review execution replays and approve evidence quality
  • Defect Tracking: Report, assign, and verify defect resolutions

3.2 Operational Purposes

  • Authenticate users and authorize access to organization data
  • Manage device binding and prevent unauthorized access
  • Facilitate offline operation with background synchronization
  • Send OTP codes and job notifications via SMS/push
  • Monitor system performance and diagnose technical issues

3.3 Legal and Compliance

  • Comply with warranty, insurance, and regulatory requirements
  • Respond to legal requests and prevent fraud or misuse
  • Maintain records for audit and dispute resolution

4. Data Sharing and Disclosure

4.1 Within Your Organization

Data is shared within your organization according to role-based access controls. Administrators can view all executions, supervisors can review their team's work, and technicians can only access their assigned jobs.

4.2 Service Providers

We use trusted third-party services to operate our platform:

  • Cloud Storage (AWS S3): Encrypted media storage
  • Database Hosting: Secure data storage and processing
  • SMS Gateway: OTP delivery for device verification
  • Analytics: Anonymized usage metrics (Google Analytics)

All service providers are bound by data protection agreements and process data only as instructed.

4.3 Legal Requirements

We may disclose information if required by law, court order, or governmental request, or to protect our rights, property, or safety.

4.4 Business Transfers

In the event of a merger, acquisition, or sale of assets, your information may be transferred to the acquiring entity. You will be notified of any such change.

4.5 No Sale of Personal Data

We do not sell, rent, or trade your personal information to third parties for marketing purposes.

5. Data Security

5.1 Technical Safeguards

  • Encryption: All data is encrypted in transit (TLS 1.3) and at rest (AES-256)
  • Access Controls: Role-based permissions and multi-factor authentication
  • Device Binding: Field app credentials are tied to specific devices
  • Cryptographic Sealing: Evidence chains use SHA-256 hashing for tamper detection
  • Secure Storage: Media files stored in isolated, access-controlled buckets

5.2 Organizational Measures

  • Regular security audits and penetration testing
  • Employee training on data protection practices
  • Incident response procedures for data breaches
  • Automatic session timeouts and secure credential storage

5.3 Data Retention

We retain data for as long as necessary to fulfill the purposes outlined in this policy or as required by law:

  • Execution Records: Retained indefinitely for compliance and audit purposes (can be deleted upon request)
  • Media Evidence: Stored according to your organization's retention policy
  • User Accounts: Deleted within 30 days of account closure
  • Logs and Analytics: Retained for 12 months for operational purposes

6. Managing Your Data and Permissions

You can:

  • Request access to, correction, or deletion of your data
  • Export your execution records and evidence files
  • Opt out of non-essential communications
  • Revoke device permissions (camera, microphone) in device settings

6.1 Location Permissions

Field App users can manage location permissions:

  • Android: Settings → Apps → Pruved → Permissions → Location
  • iOS: Settings → Privacy → Location Services → Pruved

Note: Location is required for evidence chain of custody. Disabling it will prevent protocol execution.

To exercise these rights, contact hello@pruved.com. Some data may be retained for legal compliance.

7. Cookies and Local Storage

Web Application:

  • Essential: Authentication sessions, security tokens
  • Analytics: Google Analytics (anonymized) - you can opt out
  • Preferences: Theme, language settings

Field App:

  • Encrypted credentials in device secure storage
  • Offline data in local SQLite database
  • Pending upload queue

8. International Data Transfers

Our services are hosted on servers in the United States. If you access our platform from outside the U.S., your data will be transferred and processed there. We use encryption, access controls, and standard data protection agreements to secure international transfers.

9. Children's Privacy

Our services are intended for professional use by adults (18 years or older). We do not knowingly collect information from children under 18. If we become aware of such collection, we will promptly delete the data.

10. Changes to This Policy

We may update this Privacy Policy from time to time to reflect changes in our practices or legal requirements. We will notify you of material changes by:

  • Posting an updated policy on our website with a new "Last Updated" date
  • Sending email notifications to registered users
  • Displaying in-app notices for Field App users

Your continued use of our services after changes constitutes acceptance of the updated policy.

11. Contact Us

If you have questions, concerns, or requests regarding this Privacy Policy or our data practices, please contact us:

Pruved Privacy Team

Email: hello@pruved.com

Website: pruved.com

Response Time: We aim to respond to all privacy inquiries within 30 days.

12. Your Privacy Rights

Depending on your location, you may have additional rights under data protection laws (GDPR, CCPA, DPDP Act, etc.):

  • Right to access and receive a copy of your personal data
  • Right to correct inaccurate or incomplete data
  • Right to request deletion of your data
  • Right to data portability (receive data in machine-readable format)
  • Right to object to certain processing activities
  • Right to withdraw consent at any time

We do not sell your personal data. Data is shared only with service providers necessary for platform operation.

To exercise any of these rights or if you have concerns about how we handle your data, contact us at hello@pruved.com. We will respond within 30 days.

Acknowledgment: By using Pruved's services, you acknowledge that you have read and understood this Privacy Policy and agree to its terms. If you do not agree, please discontinue use of our platform.