▲ DraftThis policy is published for public review. It becomes legally binding upon formation of the Privacy Beat operating entity. The data practices described below are real and in effect today.
the·privacy·beat
▣ The Privacy Beat · Privacy Policy

The policy
we score ourselves by.

What we collect, how long we keep it, who else touches it, and what you can ask us to do about it. Read it. Then read the Transparency Report where we grade ourselves by the same rubric we apply to everyone else.

▢ The short version

The Privacy Beat does not require accounts, does not set tracking cookies, and does not run ads or analytics. We do not sell, rent, or share your data with anyone for any reason.

When you analyze a privacy policy, the text you enter is sent to our LLM provider (Anthropic) and the resulting analysis is cached on our servers so the next person asking the same question gets an instant answer at lower cost. Your IP address is hashed and counted for abuse prevention. That's it.

The full policy below specifies retention windows, third parties, and your rights.

▢ Contents
  1. Who we are
  2. What we collect
  3. What we do not collect
  4. How long we keep it
  5. Third parties we use
  6. How we share data
  7. Your rights
  8. Security
  9. Breach notification
  10. Children
  11. Changes to this policy
  12. Contact
§ 01

Who we are

The Privacy Beat is a privacy-policy analyzer that scores publicly available privacy policies against U.S. federal law. The service is operated from the United States and is currently in pre-formation status — the operating entity has not yet been incorporated.

This policy describes the data practices that are in effect today and that will become legally binding when the operating entity is formed. The technical architecture, retention windows, and third-party relationships described here are real and accurate at the time of publication.

§ 02

What we collect

We collect three categories of data, each with a specific purpose. Nothing else.

Category What it is Why we collect it Where it's stored
Query input The privacy policy text or URL you submit for analysis. To send to our LLM provider for scoring against the rubric. Supabase (cached); Anthropic (in-flight only).
Analysis output The structured JSON report returned by the LLM for your query. To return to you, and to serve to the next user who asks the same question without re-running the analysis. Supabase (cached).
Hashed IP Your IP address, processed through SHA-256 with a static salt. Per-IP rate limiting (abuse prevention) and aggregate request counts. Upstash Redis (rate limit window); Supabase (request log).

About the IP hash: we hash your IP address with a static salt (pb-salt-2026) before storing it. Hashing is a form of pseudonymization, not anonymization — a determined adversary with the salt and a list of candidate IPs could reverse-engineer the mapping. We treat the hashed IP as personal data and apply the same protections we apply to other categories.

§ 03

What we do not collect

We don't collect the following. If we ever start collecting any of them, we'll update this policy and notify users on the home page before the change takes effect.

§ 04

How long we keep it

Each category has a specific retention window. We don't keep anything longer than we need to.

Category Retention How it ends
Query input Until superseded Cached analyses are retained until a fresher analysis replaces them. Our re-check schedule is tiered: results under 24 hours old serve immediately, results between 1 and 7 days old are probed for source-policy updates when accessed, and results over 7 days old are always re-analyzed. In practice no cached entry persists more than a few weeks of active use.
Analysis output Until superseded Same as query input — analysis is paired with the query that generated it.
Hashed IP 90 days Hashed IPs are retained for up to 90 days for abuse prevention and aggregate request counts, then deleted. Rate-limit windows in Upstash expire on a rolling 1-hour basis.

Honest disclosure: the 90-day deletion of hashed IPs is currently performed manually. A scheduled deletion function in Supabase is on the roadmap and will be deployed in a future release. See the Transparency Report for the full roadmap.

§ 05

Third parties we use

The Privacy Beat is built on commercial infrastructure. The following vendors process data on our behalf. Each has its own privacy policy, which we link to so you can review them yourself.

§ 06

How we share data

We do not sell, rent, lease, or otherwise commercially share your data. Period.

The third-party vendors listed in § 05 process data on our behalf strictly for the purposes described — hosting, caching, rate limiting, and LLM analysis. They are bound by their own terms of service and privacy obligations. We do not allow them to use your data for their own marketing, training, or product development.

The only situation in which we would disclose data to a party not listed above is in response to a legally valid request — a search warrant, subpoena, or court order — that we cannot challenge. If we receive such a request, we will challenge it where there is a non-frivolous basis to do so. Because we do not collect personally identifying data, the practical scope of any disclosure is very limited.

§ 07

Your rights

Because we don't collect identifying information, most of the rights below are easier to exercise practically than legally — there is rarely anything to find or delete that's tied to you specifically. We commit to the following standards regardless.

  1. Right to know. You can ask us what categories of data we hold that could be associated with you. We respond within 30 calendar days of receiving a verifiable request.
  2. Right to deletion. You can ask us to delete any data we hold that could be associated with you. We respond within 30 calendar days. For hashed IPs, deletion happens by purging the row matching the hash you provide; we cannot reverse the hash for you, but you can supply your IP address and we will compute the hash and delete the matching row.
  3. Right to correction. If you believe an analysis is wrong about a specific company's policy, you can request correction or removal of the cached result. We respond within 30 calendar days.
  4. Right to portability. If we hold any data that's associated with you, you can request a copy in machine-readable format (JSON). We respond within 30 calendar days.
  5. Right to object. You can object to any specific use of your data. We respond within 30 calendar days and will either honor the objection or explain in writing why we can't.
  6. No retaliation. We will never refuse service, charge a different price, or degrade service quality because you exercised any right above.

All requests should be sent to the contact address in § 12. We will respond from the same address. If you don't receive a response within 30 days, follow up — we'd rather be reminded than miss a request.

Honest disclosure: we do not yet have a formal rights-request endpoint or workflow. Requests are handled manually by the operator. A formal endpoint with verification flow is on the roadmap. See the Transparency Report.

§ 08

Security

The Privacy Beat is built with security as a first-order concern, not an afterthought.

What we do

What we have not yet done

We have not commissioned a third-party security audit, do not have a published vulnerability disclosure program, and do not yet have a formal incident response plan. These are on the roadmap. See the Transparency Report.

If you discover a security issue, please report it to the contact address in § 12 with the subject line "Security". We will respond within 5 business days.

§ 09

Breach notification

If we discover a security breach affecting data covered by this policy, we will:

  1. Investigate within 24 hours of discovery to determine the scope and nature of the breach.
  2. Post a public notice on the home page within 72 hours of confirming a breach occurred, describing what happened, what data was affected, and what we're doing about it.
  3. File required regulatory notices within applicable timelines (typically 30–60 days under federal and state law).
  4. Publish a post-mortem within 30 days of remediation, describing the root cause and the steps we've taken to prevent recurrence.

Because we do not collect personally identifying data, the practical impact of any breach is significantly limited. The most sensitive information we hold is hashed IPs, which cannot be used to identify a specific user without additional context.

Honest disclosure: we do not yet have a documented incident response plan. The commitments above will be operationalized into a written runbook on the roadmap. See the Transparency Report.

§ 10

Children

The Privacy Beat is not directed to children under 13. We do not knowingly collect any data from children under 13.

Per our own Methodology page, we apply the Epic Rule to ourselves: a "not directed to children" disclaimer is not enough on its own. The reason we score well on this category despite the disclaimer is structural — our service does not collect personal information from any user, regardless of age. There are no accounts, no profiles, no behavioral advertising, no behavioral tracking. A child using the analyzer is not at greater data-protection risk than an adult, because we collect the same minimal amount from both.

If you are a parent or guardian and believe a child has provided personal information through any contact with us (for example, by writing to our contact address), please email us and we will delete the information within 30 days.

§ 11

Changes to this policy

We will update this policy as our practices change. Material changes — anything that expands what we collect, reduces user rights, or adds a new third-party recipient — will be announced on the home page at least 30 days before they take effect, with a link to the previous version of the policy archived for comparison.

Non-material changes — typo fixes, clarifications, link updates — take effect immediately and are noted in the version history at the bottom of this page (to be added in a future update).

The version of this policy is shown in the meta panel at the top of the page.

§ 12

Contact

For privacy questions, data-subject requests, security reports, or anything else related to this policy:

▶ Email
We aim to acknowledge all messages within 5 business days.
Verifiable rights requests are processed within 30 calendar days.

A dedicated privacy@theprivacybeat.org address is on the roadmap. Until then, the Gmail address above is the canonical contact.

Operating entity status The Privacy Beat is operated personally by the project's founder pending formation of a dedicated operating entity. Once that entity is formed, this policy will be re-published with the entity name, mailing address, and registered agent. The data practices described in this policy will not change as a result of entity formation — only the legal counterparty named at the top.