Privacy Policy
Last Updated: January 14, 2026
Introduction: VerifiedDataOps (“Company,” “we,” “us,” or “our”) is committed to protecting your privacy. This Privacy Policy explains what information we collect, how we use and share it, and your rights regarding that information. It applies to information collected through our website and services (collectively, the “Service”). By using the Service, you consent to the data practices described in this Policy. We strive to adhere to applicable privacy laws, including the EU General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), and this Policy is designed to be transparent about our practices.
If you have any questions about our Privacy Policy or data handling, please contact us at privacy@verifieddataops.com.
Information We Collect
We collect both personal information (which can identify you as an individual) and non-personal information (which does not directly identify you). The types of information we collect include:
Information You Provide to Us: When you interact with our Service, for example by filling out a contact form, signing up for newsletters, requesting a demo, or communicating with us via email or chat, you may provide personal information. This can include your name, email address, company name, phone number, job title, or any other information you choose to give us. If you send us documents or data files for our data processing services, those files may contain personal or sensitive information as well; we refer to this as “Uploaded Content” or “Client Data.” You are responsible for ensuring you have the right to share any personal data contained in Uploaded Content with us.
Automatically Collected Data: When you visit our Site or use the Service, we (or our third-party analytics providers) automatically collect certain information about your device and usage of the site via cookies, scripts, and similar technologies. This may include your IP address, browser type, device type, operating system, referring/exit pages, date/time stamps, and actions you take on our site (such as pages viewed, links clicked, and search queries). This data is generally used in aggregate form to analyze how users navigate our Site and to improve the user experience. We may also log certain information for security and debugging (e.g., error logs, login attempts).
Cookies & Similar Technologies: We use cookies and similar tracking technologies (such as web beacons and local storage) to remember your preferences, understand usage patterns, and customize content. Cookies are small text files placed on your device. Some cookies are essential for the Site to function (e.g., to keep you logged in if we offer account login), while others are used for analytics or advertising. For instance, we may use Google Analytics or a similar tool that sets cookies to collect usage data and report website trends. You can control or delete cookies through your browser settings. Note that if you disable cookies, some features of our Service may not function properly.
Third-Party Affiliate Tracking: Because VerifiedDataOps participates in affiliate marketing programs (such as those from Fiverr or Upwork), our Site may contain affiliate links. If you click on an affiliate link on our site, a cookie or similar tracker from the affiliate program may be placed on your browser to attribute any resulting business activity to our referral. These affiliate tracking cookies are provided by the third-party platform or affiliate network, not by VerifiedDataOps directly. We do not receive personal details from these cookies; we only receive aggregate information such as that a referral was made. However, please be aware that those third-party platforms will handle any data collected via their tracking technologies under their own privacy policies. We do not share any of your personal data (like your name or contact info) with affiliate partners – the only data involved in affiliate tracking is the identification of our Site as the referrer.
Service Usage Data (Transactional): If you use our data processing Service, we may collect information related to your transactions, such as details of the tasks you submit (e.g., task type, parameters, and filenames or types of data processed), timestamps of task submissions and completions, and usage frequency. This information helps us operate the Service (for example, queueing tasks and providing results) and improve it (like optimizing performance or understanding what features are most used).
Sensitive Personal Data: We do not intentionally collect any sensitive personal information (such as social security numbers, health information, or financial account details) through our website forms. We ask that you do not submit such sensitive information to us through public forms. If such information is contained in files you upload for processing, we treat it as part of your Client Data and protect it accordingly, but you should ensure you have the right to include it and share it with us under applicable law. We do not use any personal data from your Uploaded Content for any purpose other than providing the Service to you.
How We Use Your Information
We use the collected information for the following purposes:
To Provide and Operate the Service: We process your personal information to fulfill the purpose of your interaction with VerifiedDataOps. For example, if you upload a dataset or document for analysis, we use the data you provided to perform the requested operations and return results. If you fill out a contact form requesting information or support, we use your contact details to respond. Essentially, any data you actively provide will be used for the reason you provided it (e.g., delivering our services or answering your queries).
Service Improvement and Analytics: We use usage data, feedback, and aggregate analytics to understand how our Service is used and to improve its functionality and performance. For instance, we might analyze usage trends to optimize our user interface or server performance. Analytics also help us identify and fix bugs or errors. This type of analysis often uses de-identified or aggregated data (which does not identify individual users) whenever possible. We may use third-party analytics tools (like Google Analytics) to assist with this, which means certain technical data and usage info might be processed by those providers on our behalf.
Communication: We may use your contact information (such as email address or phone number) to send you service-related communications. These include transactional messages (for example, confirmations when a task is completed, notices of scheduled maintenance or downtime, responses to support inquiries, or updates to terms and policies). We may also send promotional communications about new features, services, or content that we believe could be of interest to you if you have opted in to receive such marketing messages. You can always opt out of marketing emails by clicking the “unsubscribe” link in any promotional email or by contacting us. (Transactional or service-critical emails, however, may still be sent as needed for the operation of the Service or for legal notices.)
Security and Fraud Prevention: Information (including automatically collected data like IP addresses and log entries) may be used to monitor for and prevent fraudulent or malicious activity. We use data to protect the integrity and security of our systems, accounts, and users. For example, we may detect multiple failed login attempts or unusual usage patterns and take action. We also may use data to enforce our Terms of Service and to prevent misuse of our Service.
Legal Compliance and Obligations: In certain cases, we may need to use or disclose your information to comply with legal obligations, such as responding to lawful requests by public authorities, including to meet national security or law enforcement requirements. We may also process your data to exercise or defend legal claims, audit compliance requirements, or as otherwise required by law.
We do not use personal information for any purposes that are incompatible with the above, and we do not engage in “selling” personal data as defined under CCPA (we do not exchange personal information for money or other valuable consideration for the other party’s independent use). In particular, any personal data contained in your Uploaded Content is only used to perform the service you’ve requested and not for marketing or product development. We do not use your uploaded documents or data to train machine learning models or AI outside the scope of your own task. Your data remains isolated and confidential.
How We Share or Disclose Information
We understand the importance of keeping your information private. We do not sell your personal information to third parties for their marketing purposes. However, we do share information in certain circumstances to run our business and provide our services:
Third-Party Service Providers: We use reputable third-party companies to help us operate and improve our Service. These include hosting providers (for our website and databases), cloud infrastructure (for processing and storing data – e.g., our servers on platforms like Vercel or AWS), analytics services, email service providers (for sending communications), customer support platforms, payment processors (if applicable for billing), and other similar service providers. These third parties may only access your information to perform tasks on our behalf and are obligated not to disclose or use it for other purposes. We strive to choose providers that maintain high standards of security and privacy compliance (for example, cloud providers compliant with SOC 2 or ISO 27001 standards). Any personal data shared with our processors is done pursuant to data processing agreements that ensure your data is protected. For instance, if we store files or data for processing on cloud storage, those files are encrypted and only accessible to us (and never used by the cloud provider for anything other than storage).
Affiliates and Business Transfers: We do not currently have corporate affiliates (subsidiaries or parent companies), but if VerifiedDataOps in the future is involved in a merger, acquisition, investment, financing, or sale of business assets, or in the unlikely event of bankruptcy or receivership, your information (including customer data) might be transferred to the involved parties as part of that transaction. If such a transfer occurs, we will ensure the recipient is bound to respect your personal data in a manner consistent with this Privacy Policy. We will also provide notice on our website if a change of ownership occurs that affects the handling of personal information.
Legal Requirements and Protection of Rights: We may disclose your information if required to do so by law or in the good-faith belief that such action is necessary to (a) comply with a legal obligation, such as a subpoena, court order, or other process; (b) protect and defend the rights, property, or safety of VerifiedDataOps, our customers, or others; (c) investigate or assist in preventing any violation of law or these Terms of Service or other agreements; or (d) respond to an emergency that we believe in good faith requires us to disclose information to assist in preventing death or serious bodily injury of any person.
Your Consent: We will share your personal information with third parties if (and only if) you have given us explicit consent to do so. For example, if you request that we integrate our Service with a third-party application or platform on your behalf, we will transfer data as needed to fulfill your request. Another example could be if you want us to retain your data longer than our standard retention period (see Data Retention below) for a specific purpose – we would only do so with your permission.
Importantly, we do not share your uploaded files or raw data with any third party except as necessary to provide the Service (for example, transmitting them to a cloud server or a subcontractor strictly for processing under our instruction) or as required by law. We also do not use or disclose any personal information from your Uploaded Content for marketing or advertising. All such data is handled confidentially.
Data Retention
We believe in data minimization – keeping data only for as long as necessary to fulfill the purposes for which it was collected. Our retention practices are as follows:
Uploaded Content: Any files or datasets you upload for processing are automatically deleted from our systems within 24 hours after your task is completed (often sooner). By default, we do not retain your uploaded documents or the results longer than needed to ensure you have safely received your output. Once the task is done and the results are delivered, a countdown to deletion is triggered for the input files and output (unless the output constitutes a report we continue to host for your download—if so, we’ll notify you how long that will remain available). Our Data Destruction Policy (see below) provides more details, but the key point is zero-retention by default for client-provided data. Unless you explicitly request us to retain your files longer (for example, for a multi-day project or ongoing analysis), they will be purged from active storage within roughly one day. In the rare case where longer retention is requested or required (e.g., by law or specific agreement), we will apply strict access controls and delete the data as soon as the retention period expires.
Account and Contact Data: If you create an account on our platform or provide us with contact details (say, to receive newsletters or to correspond about our services), we will retain that information for as long as your account is active or as needed to provide services to you. If you simply contact us with an inquiry, we will retain your information long enough to respond and follow up, and a reasonable period thereafter in case you have additional questions. For marketing email lists, we retain your email on our mailing list until you unsubscribe or until we periodically clean up inactive contacts. If you opt-out of marketing communications, we may keep your contact information on a suppression list to ensure we honor your opt-out decision.
Analytics Data: Aggregated analytics data (which does not directly identify individuals) may be retained for a longer period for historical trend analysis. However, IP addresses or other identifiers that could be linked to an individual are either not stored at all in our analytics, or are anonymized/truncated (for example, using IP masking in Google Analytics), or deleted after a short retention (e.g., raw logs might be kept for a few weeks before being purged).
Transaction and Support Records: We may retain records of transactions, communications, and support tickets for a period of time (even after you stop using the Service) to have a history in case of legal disputes, audits, or to improve our service. These records typically include minimal personal data – mostly context of the service provided or correspondence. They will be retained as long as reasonably necessary for those purposes and then deleted or anonymized.
Legal Requirements: In certain cases, we may need to retain information for longer periods if required by law. For instance, if financial transactions are involved, we might keep invoicing records for accounting and tax purposes for up to the legally required retention period. Similarly, if we are obligated to preserve data due to litigation holds or government orders, we will retain the data for as long as instructed.
Once data is no longer needed, we will securely delete or anonymize it so that it can no longer be associated with you. When we delete electronic data, we use commercially reasonable measures to ensure the data is irrecoverable (including removing it from live databases and from any backup media once backups cycle out).
Data Security
We take security seriously and implement a variety of measures to protect your personal information and uploaded data:
Encryption: All communications between your browser and our Site occur over secure, industry-standard TLS (HTTPS) connections. This means data in transit is encrypted. Additionally, files and sensitive data stored on our servers are protected by encryption at rest (using strong encryption algorithms) whenever feasible. For example, if your uploaded documents are stored in a cloud storage bucket while awaiting processing, that storage is encrypted. If we use databases to store personal information, those databases are encrypted at rest or employ filesystem encryption.
Access Controls: Access to systems that contain personal or client data is restricted to authorized personnel who need access to perform their job duties. We employ authentication measures (strong passwords, multi-factor authentication where possible, keys) to prevent unauthorized access. Internally, our team is trained on the importance of data privacy and security. We limit the viewing of your Uploaded Content to automated processes whenever possible – no human at VerifiedDataOps will routinely read your uploaded documents or data unless it’s necessary to troubleshoot a specific issue or you have given explicit permission for support purposes. In typical operations, processing is automated.
Segmentation and Isolation: We isolate customer data. Your data tasks are processed in isolated environments so that no other client can access your information. We also maintain logical separation between environments (e.g., development, testing, and production data are segregated).
Network Security: Our servers are protected by firewalls and monitoring systems. We regularly update our software and systems to address security vulnerabilities. We may utilize intrusion detection or prevention systems and perform periodic security audits or penetration testing (directly or via third parties) to evaluate the strength of our defenses.
Data Minimization: As discussed in the Data Retention section, we minimize how long we keep personal data and client files. By purging Uploaded Content quickly and not collecting unnecessary personal information, we reduce exposure. We cannot lose what we don’t have.
Backup & Recovery: We do maintain backups for disaster recovery purposes, but such backups are encrypted and retained only for short durations. Our backup processes are designed to avoid retaining client Uploaded Content any longer than necessary. For instance, any snapshot or backup that incidentally contains your files will expire and be deleted in the normal course of our backup rotation (typically within a few days). Additionally, if a restoration from backup were ever required, we would re-delete any client files that had been deleted as per our policy but reappeared due to the backup. We also log deletions of files to ensure that our automated deletion processes have indeed executed as intended.
Monitoring: We monitor our systems for potential security breaches and have an incident response plan in place. If we detect any security incident that compromises your personal data, we will notify affected users and relevant authorities as required by law.
While we employ strong safeguards, no method of transmission over the Internet or electronic storage is 100% secure. Therefore, we cannot guarantee absolute security. However, we continually evaluate and update our security measures to follow best practices and mitigate new threats. Users are also responsible for maintaining the security of their login credentials and not sharing access to their accounts. If you believe your interaction with us is no longer secure (for example, you feel your account has been compromised), please contact us immediately.
Your Rights and Choices
General Rights: You have certain rights regarding your personal information, subject to local data protection laws. These may include the right to access the personal data we hold about you, the right to correct or update that data if it’s inaccurate, the right to request deletion of your personal data, the right to restrict or object to processing of your data, and (if applicable) the right to data portability (receiving a copy of your data in a structured, commonly used format). We will honor such requests in accordance with applicable law. Below, we highlight specific rights under GDPR and CCPA, but even if you are not covered by those laws, we will endeavor to provide you with similar control over your information.