Privacy Policy

How CrowINT-Evidence stores, processes, and protects workspace and artifact data

Deterministic evidence mapping active
Checking workspace

Privacy Policy

CrowINT-Evidence is built as an artifact-based evidence engine for infrastructure and cloud compliance review. This policy explains, at a practical level, what we collect, how we use it, and what responsibilities remain with the people using the product.

What We Collect

We store the information needed to run CrowINT-Evidence workspaces, including uploaded artifacts, parsed resource data, generated observations, control results, generated reports, and related assessment metadata. Uploaded artifacts may include Terraform files, IAM policies, Kubernetes manifests, storage configuration exports, vulnerability scan outputs, and similar technical evidence files.

We also store limited workspace and session data so the product can keep a browser connected to the correct workspace context. This can include workspace identifiers, session records, timestamps, and basic request metadata needed for security, troubleshooting, and service reliability.

How We Use Data

We use uploaded content to parse infrastructure artifacts, normalize technical evidence, build correlated inventory, evaluate supported controls, generate evidence-backed results, and produce exportable reports. We also use operational data to maintain sessions, secure the service, detect misuse, and improve reliability.

CrowINT-Evidence does not sell user data. We do not use uploaded artifacts as a generic public data source. If product analytics or operational logs are retained, they are used to operate, secure, and improve the service rather than to commercialize customer content.

Storage and Processing

Uploaded artifacts and generated outputs are stored and processed so CrowINT-Evidence can deliver assessment results, inventory views, remediation guidance, and HTML or JSON exports. Processing is limited to the functions required for the evidence workflow. CrowINT-Evidence is not a live cloud scanner and does not require direct access to a customer's running AWS environment in order to evaluate uploaded artifacts.

We take reasonable technical and organizational steps to protect stored data, including access controls, session handling, and service-level safeguards appropriate for an early-stage SaaS product. No hosted system can promise absolute security, so customers should avoid uploading data they are not prepared to handle under normal cloud security risk assumptions.

User Responsibility

Users are responsible for ensuring they are authorized to upload the artifacts, configurations, policies, and supporting evidence they place into CrowINT-Evidence. That includes responsibility for internal approvals, third-party restrictions, confidentiality obligations, and the sensitivity of the material being assessed.

If uploaded content contains personal data, regulated information, or sensitive infrastructure details, the uploader remains responsible for confirming that the use of CrowINT-Evidence is appropriate for that content and for applying any organizational controls required by policy or law.

No Sale of Data

CrowINT-Evidence does not sell uploaded artifacts, workspace data, or report content. The product exists to help teams review and explain technical control evidence, not to trade or broker customer data.

As the service evolves, we may refine operational practices, retention periods, and security controls. Material updates to this policy should be reflected here so the product description remains aligned with how CrowINT-Evidence actually operates.