Information We Collect

At EIR Reader, we adhere to the principle of Data Minimization. We collect and process only the information necessary to deliver our core services. We do not collect data for secondary purposes, analytics profiling, or commercial exploitation.

📁 User-Provided Content

When you use the EIR Reader platform, you may intentionally provide the following information:

  • Source Files: Electronic Information Resource (EIR) files that you upload for processing and analysis.
  • Support Metadata: Contact information (such as email addresses) and diagnostic logs that you voluntarily share for technical support and troubleshooting purposes.

🔍 System-Generated Data

Our system may collect limited technical information automatically to maintain service quality:

  • Session Information: Temporary connection data used solely during your current session.
  • Error Logs: Anonymized processing failures collected to improve system reliability.

Technical Processing & Security Architecture

The EIR Reader is engineered with privacy by design principles. Our infrastructure implements Zero-Persistence Architecture, meaning your files and sensitive data are treated as temporary, transient resources with no permanent storage.

🔒 Zero-Knowledge Cryptography Implementation

Our system is architecturally incapable of accessing unencrypted content. Decryption keys are processed exclusively in volatile RAM memory and are never persisted to disk, transmitted to external servers, or logged in any form. Upon session termination, all cryptographic material is securely purged from memory.

🛡️ Security Processing Pipeline

Security Stage Protection Mechanism
🔐 Data Transit End-to-end encryption using TLS 1.3 protocol with forward secrecy enabled.
⚙️ Processing Executed within an isolated, process-level sandboxed environment with restricted system permissions.
🗑️ Session Termination Memory buffers are cryptographically zeroed and overwritten immediately upon session end.
📊 Logging No file content or decryption keys are ever logged. Only anonymized processing metrics are retained.

Data Processing Purpose & Limitations

We process your data exclusively for the following legitimate purposes:

  • ⚡ Service Delivery: Facilitating the core functionality of electronic information resource processing as explicitly requested by the user.
  • 🛡️ Security Integrity: Detecting and preventing unauthorized access attempts, automated abuse, and distributed denial-of-service (DDoS) attacks.
  • ✅ System Reliability: Aggregated, fully anonymized error analysis to identify and remediate processing failures and improve overall system stability.

📋 Explicit Processing Limitations

We do not use your data for:

  • Behavioral analytics, user profiling, or pattern tracking
  • Machine learning model training or AI development
  • Marketing, advertising, or commercial profiling
  • Third-party data monetization or sale
  • Cross-service user tracking or linking

Third-Party Disclosures

We do not sell your data. We do not share your files with third parties for marketing or training AI models.

We utilize Secure Cloud infrastructure. These providers have no access to the keys or content within your files.

Global Privacy Rights

In accordance with GDPR, CCPA, and APPI standards, files are deleted automatically. No manual request is needed for file erasure.

Data Retention Policy

  • 📄 Processed Files: Immediately after session.
  • 📊 Technical Logs: Purged after 30 days.
  • 🔑 Keys/Passwords: Never stored (0 second retention).