Checked & Verified ("Checked & Verified," "we," "our," "us") is committed to protecting your privacy and providing transparency about how we collect, use, share, and protect information when you use our website, mobile application, dashboards, verification tools, APIs, and all related services ("Services").
This Privacy Policy applies to all users—including consumers, businesses, government agencies, healthcare entities, educational institutions, financial institutions, and other organizations.
By accessing or using the Services, you agree to the practices described in this Privacy Policy.
1. Information We Collect
We collect information in the following categories:
1.1 Information You Provide Directly
- Account registration data (name, email, phone number, password)
- Organization details for enterprise accounts (entity name, domain, contact info)
- Verification submissions for communication channels (email domains, phone numbers, codes)
- User-submitted scam reports
- Support requests or communication with our team
You may choose not to provide certain information, but doing so may limit your ability to use the Services.
1.2 Automatically Collected Information
When you use the Services, we automatically collect:
- Device identifiers
- IP address
- Browser type and version
- App version and OS details
- Usage patterns and activity logs
- Communication metadata (NOT message content) such as:
- Sender address or number
- Timestamps
- Delivery pathway information
- Domain and routing details
- Protocol-level metadata
- Diagnostic, performance, and crash logs
We do not access the content of your calls, texts, or emails.
1.3 Information from Third Parties
We may receive:
- Sender identity information from registered organizations
- Fraud intelligence feeds
- Public records or open-source data
- Carrier or email provider metadata (non-content)
- Information from law enforcement, regulators, or industry security groups
We do not purchase consumer PII from data brokers.
2. How We Use Your Information
We use collected information to:
- Provide, maintain, and improve the Services
- Verify communication metadata
- Display verification signals, risk indicators, or warnings
- Detect fraud patterns and suspicious behavior
- Analyze usage trends
- Respond to customer support inquiries
- Protect the security and integrity of the Services
- Enforce our Terms of Use
3. Marketing, Analytics & Research Use
Checked & Verified may use collected data—including de-identified, aggregated, or anonymized data—for:
- Marketing
- Public fraud education
- Product demonstrations
- Industry insights
- Trend reporting
- Case studies
- Statistical analysis
- Platform optimization
- Research and development
We will never share or sell your personal identifying information (PII) without your express written permission, unless required by law.
4. How We Share Information
We may share non-PII or de-identified data with:
- Law enforcement agencies
- Fraud monitoring organizations
- Government regulators
- Industry security groups
- Verified enterprise partners
- Academic research institutions
- Service providers who support platform operations
We may share PII only in the following circumstances:
4.1 With Your Written Permission
Required for sharing identifiable data with any third party.
4.2 For Legal Compliance
We may disclose information if required by:
- Subpoena
- Court order
- Government investigation
- Applicable laws or regulations
4.3 To Protect Rights, Safety & Security
We may share information to:
- Prevent harm
- Respond to security incidents
- Investigate fraud or abuse
- Protect platform users
Checked & Verified never sells, trades, or rents PII.
5. How We Protect Your Information
We use a combination of:
- Encryption (data in transit & at rest)
- Access controls and authentication
- Log auditing
- Firewalling technologies
- Network segmentation
- Secure server environments
- Regular penetration testing
- Least-privilege access protocols
- Data minimization principles
However, no security method is perfect. We cannot guarantee complete protection against unauthorized access, breach, or fraud.
6. Special Considerations for Regulated Industries
Checked & Verified does not require or store the following:
- PHI (Protected Health Information) — Healthcare/HIPAA
- FERPA-protected student records — Education
- GLBA-regulated financial account data
- PCI-DSS payment card data
- Classified or restricted government data
- Sensitive infrastructure operational data
Use of the Services does not establish regulatory compliance for your organization. Checked & Verified is a communication verification layer, not a regulated data processor unless separately contracted.
7. Children's Privacy
Our Services are not directed to children under 13.
We do not knowingly collect PII from children.
If we learn that a child has provided PII, we will delete it.
8. Retention of Information
We retain data only for as long as necessary to:
- Provide the Services
- Comply with legal obligations
- Resolve disputes
- Enforce our Terms
Metadata and log data may be retained longer for security analysis and fraud research.
Users may request deletion of their PII at any time (subject to legal restrictions).
9. User Rights & Controls
Depending on your jurisdiction, you may have rights to:
- Access your data
- Correct inaccurate data
- Request deletion
- Opt out of marketing
- Restrict or object to processing
- Request data portability
To exercise rights, contact us at:
📧 Support@checkedandverified.com
We may need to verify your identity before fulfilling requests.
10. Cookies & Tracking Technologies
Checked & Verified may use:
- Cookies
- Pixel tags
- Local storage
- Device tokens
- Analytics tools
We use these to:
- Improve user experience
- Enhance security
- Track bugs or errors
- Measure site performance
- Personalize functionality
You may adjust your browser settings to reject cookies, but doing so may limit functionality.
11. Third-Party Services & Links
Our platform may integrate with or link to third-party tools or websites.
Checked & Verified does not control and is not responsible for:
- Their content
- Their privacy practices
- Their data handling policies
- Their security measures
Use these services at your own risk.
12. International Data Transfers
If you are outside the United States:
- Your data may be transferred to and processed in the U.S.
- U.S. laws may differ from your home country
- We apply appropriate safeguards to international transfers
13. Data Breach Notification
If a breach involving your PII occurs:
- We will notify affected users
- We will notify regulators when required by law
- We will take steps to remediate the incident
14. Changes to This Privacy Policy
We may update this Privacy Policy periodically.
Changes take effect when posted.
Continued use of the Services constitutes acceptance of the revised policy.
15. Contact Information
If you have questions about this Privacy Policy or want to submit a data request, contact us: