Login | Register a plan
Standard Operating Procedure for Data Requests

This page is for any government security agency who wishes to subpoena any user account/s or collect my users' data. This is my standard operating procedure for data requests and subpoenas. I will never do anything other than what I am laying out to you for handling requests.

First of all. Do NOT use any other email than Any email sent to any other address will be discarded.

2nd: No keys shall ever be handed to a government entity under any circumstances. For the sake of user security, NO keys shall ever be handed over to any entity, governmental or not. Because we don't have the keys... They do... We store no records of user keys. Nor do I care that much about what our users' keys are, anyway. Their keys, not mine.

3rd: In the email, provide the email address of the account you want investigated. I am not too sure what you can do with encrypted data. After all, it is encrypted... I would need some evidence of wrongdoing/potential wrongdoing before handing over data.

4th: Any questions regarding me cooperating with mass data collection shall be answered in the next sentence. NO, go away. I don't care about "muh terrorist threat", you want to violate Article 12 of the Universal Declaration of Human Rights and the 4th Amendment of the United States. I couldn't care less about your reason to try to steal my users' data, you're not having it without a reason.

Finally: Any and all data requests, after they have been dealt with, will be announced to the public. The only exception would be if what is dug up is for an impending terror attack, or something equally crucial for secrecy. Then I'll keep quiet, because nobody wants the terrorists to be alerted to their data being handed over and that they're being exposed. That's our policy. We don't violate our policies and principles. Plus, transparency is good. You should try that more instead of having data analysts from NC do it for you.

"The right of the people to be secure in their persons, houses, papers, and effects (items of property), against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." - 4th Amendment of the Constitution of the United States of America (Found within the Bill of Rights)

"No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence. Everyone has the right to the protection of the law against such interference." - Universal Declaration of Human Rights, Article 12


Get in contact!

Our Social Media!