Privacy Policy

Complete transparency about how we protect your privacy with zero-knowledge architecture.

Our Privacy Commitment

Scrub Metadata is built on the principle of zero-knowledge privacy. We cannot access, view, or store your files because all processing happens entirely within your browser.

Zero-Knowledge Architecture

Your files are processed entirely in your browser using advanced client-side algorithms. This makes it technically impossible for us to access your data.

Effective Date: 8/1/2025Last Updated: 8/1/2025Version 1.0

🛡️ Zero-Knowledge Architecture

How It Works

Your Device
Browser Processing
Clean File Download
All steps happen locally on your device - no data transmission to our servers

We Cannot Access

Your original files
Your processed files
File contents or metadata
Personal information within files
Processing history or patterns
File names or locations
Device or browser information
Usage analytics or tracking (ZERO tracking implemented)

🌍 GDPR Compliance (European Union)

Your GDPR Rights

Right to Information - Complete transparency in this policy
Right of Access - Request any data we have (typically none)
Right to Rectification - Correct any inaccurate data
Right to Erasure - Delete your data on request
Right to Restriction - Limit processing of your data
Right to Portability - Export your data (we have none)
Right to Object - No analytics to opt-out from

📞 Contact Information

Privacy Questions

Email: scrubmetadata@gmail.com
Response: Within 48 hours
Languages: English + others

Data Subject Requests

GDPR: scrubmetadata@gmail.com
CCPA: scrubmetadata@gmail.com
General: scrubmetadata@gmail.com

Security Concerns

Email: scrubmetadata@gmail.com
PGP Key: Available upon request
Bug Bounty: Responsible disclosure

✅ Privacy by Design Principles

Our service embodies all seven Privacy by Design principles established by Dr. Ann Cavoukian:

1. Proactive not Reactive

Zero-knowledge architecture prevents privacy issues before they occur

2. Privacy as the Default

Maximum privacy settings are built-in, not optional

3. Privacy Embedded

Built into core technology from the ground up

4. Full Functionality

Privacy protection without compromising features

5. End-to-End Security

Complete security throughout the entire process

6. Visibility and Transparency

This comprehensive and clear privacy policy

7. Respect for User Privacy

User privacy is our primary consideration in all decisions