Information We Collect
At EIR Reader, we adhere to the principle of Data Minimization. We collect and process only the information necessary to deliver our core services. We do not collect data for secondary purposes, analytics profiling, or commercial exploitation.
📁 User-Provided Content
When you use the EIR Reader platform, you may intentionally provide the following information:
- Source Files: Electronic Information Resource (EIR) files that you upload for processing and analysis.
- Support Metadata: Contact information (such as email addresses) and diagnostic logs that you voluntarily share for technical support and troubleshooting purposes.
🔍 System-Generated Data
Our system may collect limited technical information automatically to maintain service quality:
- Session Information: Temporary connection data used solely during your current session.
- Error Logs: Anonymized processing failures collected to improve system reliability.
Technical Processing & Security Architecture
The EIR Reader is engineered with privacy by design principles. Our infrastructure implements Zero-Persistence Architecture, meaning your files and sensitive data are treated as temporary, transient resources with no permanent storage.
Our system is architecturally incapable of accessing unencrypted content. Decryption keys are processed exclusively in volatile RAM memory and are never persisted to disk, transmitted to external servers, or logged in any form. Upon session termination, all cryptographic material is securely purged from memory.
🛡️ Security Processing Pipeline
| Security Stage | Protection Mechanism |
|---|---|
| 🔐 Data Transit | End-to-end encryption using TLS 1.3 protocol with forward secrecy enabled. |
| ⚙️ Processing | Executed within an isolated, process-level sandboxed environment with restricted system permissions. |
| 🗑️ Session Termination | Memory buffers are cryptographically zeroed and overwritten immediately upon session end. |
| 📊 Logging | No file content or decryption keys are ever logged. Only anonymized processing metrics are retained. |
Data Processing Purpose & Limitations
We process your data exclusively for the following legitimate purposes:
- ⚡ Service Delivery: Facilitating the core functionality of electronic information resource processing as explicitly requested by the user.
- 🛡️ Security Integrity: Detecting and preventing unauthorized access attempts, automated abuse, and distributed denial-of-service (DDoS) attacks.
- ✅ System Reliability: Aggregated, fully anonymized error analysis to identify and remediate processing failures and improve overall system stability.
📋 Explicit Processing Limitations
We do not use your data for:
- Behavioral analytics, user profiling, or pattern tracking
- Machine learning model training or AI development
- Marketing, advertising, or commercial profiling
- Third-party data monetization or sale
- Cross-service user tracking or linking
Global Privacy Rights
In accordance with GDPR, CCPA, and APPI standards, files are deleted automatically. No manual request is needed for file erasure.
Data Retention Policy
- 📄 Processed Files: Immediately after session.
- 📊 Technical Logs: Purged after 30 days.
- 🔑 Keys/Passwords: Never stored (0 second retention).