Privacy Policy & Legal

Complete legal framework and comprehensive privacy protection. Your rights and our obligations in the digital age.

Critical Legal Notice

This document constitutes our complete legal framework. By using SRIFT, you agree to all terms outlined herein.

Prohibited Activities

  • Sharing copyrighted material without authorization
  • Transmitting malware, viruses, or harmful code
  • Conducting illegal activities or transactions
  • Harassing, threatening, or harming others
  • Violating intellectual property rights
  • Engaging in cybercrime or unauthorized access
  • Sharing sensitive personal data without consent
  • Violating any applicable laws or regulations
  • Attempting to breach system security
  • Using the service for terrorism or criminal activities

Comprehensive Legal Protection

This document constitutes our complete Privacy Policy, Terms of Use, Terms and Conditions, and all legal protections. By using SRIFT, you agree to all terms outlined herein.

Zero-Knowledge Architecture

We operate on a fundamental principle: we cannot access, read, or store your communications, files, or personal data. Even if legally compelled, we have no technical ability to provide access to your private information.

Terms of Use

By accessing and using SRIFT, you accept and agree to be bound by these terms and conditions

Service & Responsibilities

You acknowledge that you have read, understood, and agree to be bound by these Terms of Use

You are responsible for all activities conducted through your sessions

You must not use the service for illegal, harmful, or unauthorized purposes

You must comply with all applicable laws and regulations

Prohibited Uses

Transmitting malware, viruses, or harmful code

Sharing copyrighted material without authorization

Conducting illegal activities or transactions

Harassing, threatening, or harming others

Privacy Policy

How we protect your privacy and handle your data

Information We Don't Collect

  • Personal identification information
  • Email addresses or contact details
  • File contents or metadata
  • Chat messages or conversations
  • Session history or activity logs
  • Device identifiers or IP addresses
  • Browsing history or preferences
  • Financial or payment information

Minimal Technical Data

  • Temporary session IDs (cryptographically generated)
  • Connection status (active/inactive)
  • Session duration (for cleanup)
  • Number of participants (for capacity)
  • Server performance metrics
  • Error logs (no user data)
  • System health monitoring
  • Network connectivity status

Data Protection Measures

  • AES-256-GCM encryption for all data in transit
  • TLS 1.3 for secure connections
  • Perfect Forward Secrecy implementation
  • Automatic data deletion within 24 hours
  • Zero-knowledge architecture
  • Regular security audits and updates
  • End-to-end encryption for all communications
  • No server-side data storage

Terms and Conditions

Complete terms governing your use of SRIFT services

Intellectual Property

SRIFT and all related trademarks are owned by Sripto Corporation

Users retain ownership of their uploaded content

No transfer of intellectual property rights occurs

Reverse engineering of our technology is prohibited

Limitation of Liability

Service provided "as is" without warranties

Not liable for indirect or consequential damages

Maximum liability limited to service fees paid

Force majeure events excluded from liability

Legal Protections & Safeguards

Comprehensive legal protections to ensure your rights and our compliance

User Rights

  • Right to access your data (minimal technical data)
  • Right to request data deletion
  • Right to data portability
  • Right to lodge complaints
  • Right to withdraw consent
  • Right to legal remedies
  • Right to compensation
  • Right to representation

Our Commitments

  • No data collection without consent
  • Transparent data processing
  • Minimal data collection principle
  • Purpose limitation compliance
  • Data minimization practices
  • Storage limitation compliance
  • Accuracy and integrity maintenance
  • Confidentiality and security

Global Legal Compliance

Major Regulations

GDPR (EU) - Full Compliance
CCPA (California) - Complete Coverage
PIPEDA (Canada) - Full Compliance
LGPD (Brazil) - Complete Coverage
POPIA (South Africa) - Full Compliance
Indian IT Act 2000 - Complete Coverage
Australian Privacy Act - Full Compliance
UK Data Protection Act - Complete Coverage

Asia-Pacific

PDPA (Singapore) - Full Compliance
PDPA (Malaysia) - Complete Coverage
PDPA (Thailand) - Full Compliance
PDPA (Philippines) - Complete Coverage
PDPA (Indonesia) - Full Compliance
PDPA (Vietnam) - Complete Coverage
PDPA (Japan) - Full Compliance
PDPA (South Korea) - Complete Coverage

Global Coverage

PDPA (Taiwan) - Full Compliance
PDPA (Hong Kong) - Complete Coverage
PDPA (New Zealand) - Full Compliance
PDPA (Israel) - Complete Coverage
PDPA (UAE) - Full Compliance
PDPA (Mexico) - Complete Coverage
PDPA (Argentina) - Full Compliance
+ 30+ More Countries

Important Legal Notice

While we implement the highest security measures, no system is completely immune to risks. We strongly recommend using SRIFT for legitimate purposes only and maintaining your own security practices. We are not liable for any misuse of our service or any damages resulting from such misuse. Users are responsible for compliance with all applicable laws and regulations.

Encrypted Communication Privacy

Complete privacy protection for encrypted chat, audio conferencing, and untraceable communication

Encrypted Chat Privacy

  • All messages encrypted with AES-256-GCM
  • Perfect forward secrecy for all conversations
  • No message storage on our servers
  • Anonymous messaging without identity tracking
  • Untraceable communication patterns
  • No message metadata collection
  • Ghost messaging - invisible to third parties
  • Zero-knowledge message encryption

Audio Conference Privacy

  • All audio encrypted with military-grade security
  • No recording or storage of audio content
  • Ghost audio conferences - invisible to outsiders
  • Anonymous participation without identity
  • Untraceable meeting patterns
  • No call metadata or participant tracking
  • Perfect forward secrecy for all calls
  • Zero-knowledge audio encryption

Data Collection & Privacy Features

Comprehensive overview of what we collect, what we don't, and how we protect your privacy

What We Never See

  • File contents, names, or metadata
  • Encrypted chat messages or conversations
  • Audio conference recordings or transcripts
  • Voice call data or meeting content
  • User identities or personal info
  • Session history or activity logs
  • Connection patterns or timing
  • IP addresses or location data
  • Device fingerprints or identifiers
  • Browsing history or preferences

What We Protect

  • Your complete privacy and anonymity
  • End-to-end encryption for all data
  • Zero-knowledge architecture
  • Perfect forward secrecy
  • No server-side data storage
  • Automatic data deletion
  • GDPR and global compliance
  • Your fundamental rights

Technical Privacy Features

AES-256-GCM encryption
TLS 1.3 connections
Perfect forward secrecy
Zero server storage
24-hour auto-deletion
Anonymous sessions
No tracking cookies
Global compliance

Global Privacy Standards Compliance

Comprehensive compliance with all major global privacy regulations and standards

Major Privacy Regulations

  • GDPR (EU) - General Data Protection Regulation
  • CCPA (California) - California Consumer Privacy Act
  • PIPEDA (Canada) - Personal Information Protection
  • LGPD (Brazil) - Lei Geral de Proteção de Dados
  • POPIA (South Africa) - Protection of Personal Information
  • Indian IT Act 2000 - Information Technology Act
  • Australian Privacy Act 1988
  • UK Data Protection Act 2018

Regional Privacy Laws

  • PDPA (Singapore) - Personal Data Protection Act
  • PDPA (Malaysia) - Personal Data Protection Act
  • PDPA (Thailand) - Personal Data Protection Act
  • PDPA (Philippines) - Data Privacy Act
  • PDPA (Indonesia) - Personal Data Protection Law
  • PDPA (Vietnam) - Personal Data Protection Decree
  • PDPA (Japan) - Personal Information Protection Act
  • PDPA (South Korea) - Personal Information Protection Act

Additional Global Standards

ISO 27001 - Information Security
SOC 2 Type II - Security Controls
NIST Cybersecurity Framework
PCI DSS - Payment Card Industry
HIPAA - Healthcare Privacy
FERPA - Educational Privacy
COPPA - Children's Privacy
CCPA - California Privacy

Audio Conferencing Security & Anti-Fraud Protection

Comprehensive security measures and fraud prevention for secure audio conferencing

Prohibited Audio Activities

  • Recording audio conferences without consent
  • Eavesdropping or unauthorized listening
  • Impersonating other participants
  • Sharing conference links publicly
  • Conducting fraudulent meetings
  • Phishing attempts via audio
  • Social engineering attacks
  • Harassment or threatening behavior

Anti-Fraud Measures

  • No audio recording capabilities
  • Anonymous participation only
  • No participant identification
  • Session-based access control
  • No call history storage
  • Zero-knowledge architecture
  • End-to-end encryption
  • No metadata collection

Comprehensive Prohibited Activities

Financial Crimes

  • • Money laundering
  • • Fraudulent transactions
  • • Identity theft
  • • Credit card fraud
  • • Investment scams
  • • Cryptocurrency fraud
  • • Ponzi schemes
  • • Pyramid schemes

Cyber Crimes

  • • Hacking attempts
  • • Malware distribution
  • • Phishing attacks
  • • Ransomware
  • • DDoS attacks
  • • Data breaches
  • • Social engineering
  • • Account takeover

Illegal Content

  • • Child exploitation
  • • Human trafficking
  • • Drug trafficking
  • • Weapons trading
  • • Terrorist activities
  • • Hate speech
  • • Violence incitement
  • • Copyright infringement

Audio Conference Abuse

  • • Unauthorized recording
  • • Eavesdropping
  • • Impersonation
  • • Harassment
  • • Spam calls
  • • Conference bombing
  • • Privacy violations
  • • Misinformation spread

Scam Prevention & User Safety

Comprehensive protection against scams, fraud, and malicious activities

Common Scam Types

  • Phishing attacks via audio calls
  • Fake investment opportunities
  • Romance scams and catfishing
  • Tech support scams
  • Government impersonation
  • Lottery and prize scams
  • Cryptocurrency fraud
  • Identity theft attempts

Safety Measures

  • Never share personal information
  • Verify caller identity independently
  • Be suspicious of urgent requests
  • Never send money to strangers
  • Report suspicious activities
  • Use anonymous participation
  • Trust your instincts
  • End suspicious calls immediately

Reporting & Enforcement

If you encounter any suspicious activities, scams, or illegal behavior on our platform, please report it immediately to support@sripto.tech. We take all reports seriously and will investigate promptly. Due to our zero-knowledge architecture, we cannot monitor conversations, but we can take action on reported violations.

Report Types

  • • Scam attempts
  • • Fraudulent activities
  • • Harassment or threats
  • • Illegal content sharing
  • • Privacy violations
  • • System abuse

Enforcement Actions

  • • Session termination
  • • IP blocking
  • • Legal reporting
  • • Law enforcement cooperation
  • • Platform restrictions
  • • Investigation support

Data Subject Rights & User Controls

Complete user rights and controls under global privacy regulations

Your Rights

  • Right to Access - Request your data
  • Right to Rectification - Correct your data
  • Right to Erasure - Delete your data
  • Right to Portability - Export your data
  • Right to Object - Opt-out of processing
  • Right to Restriction - Limit processing
  • Right to Withdraw Consent
  • Right to Lodge Complaints

Our Commitments

  • No data collection without consent
  • Transparent data processing
  • Minimal data collection principle
  • Purpose limitation compliance
  • Data minimization practices
  • Storage limitation compliance
  • Accuracy and integrity maintenance
  • Confidentiality and security

Exercise Your Rights

To exercise any of your data subject rights, contact us at support@sripto.tech. We will respond to your request within 30 days as required by law. Due to our zero-knowledge architecture, we have minimal data to provide, but we will assist you with any requests to the fullest extent possible.

Email: support@sripto.tech
Website: www.sripto.tech
Response Time: 30 days
Free of charge

Contact Information

Support: support@sripto.tech
Legal: support@sripto.tech
Security: support@sripto.tech
Privacy: support@sripto.tech
Compliance: support@sripto.tech

Legal Information

Company: Sripto Corporation Private Limited
Jurisdiction: India
Registration: Under Indian Companies Act, 2013
Effective Date: 11/20/2025
Last Updated: 11/20/2025
Version: 2.0.0

Complete Legal Document

This document serves as our complete Privacy Policy, Terms of Use, Terms and Conditions, and all legal protections. By using SRIFT, you acknowledge that you have read, understood, and agree to all terms outlined herein. This document is legally binding and enforceable in all jurisdictions where SRIFT is available. Users are responsible for understanding and complying with all applicable laws in their jurisdiction.

Dispute Resolution

Informal resolution through support channels first

Arbitration for unresolved disputes

Governing law: Indian jurisdiction

Class action waivers apply

Policy Updates

Updates notified via website and email

Continued use constitutes acceptance

Version tracking and change logs

30-day notice for major changes

Loading map...