🛡️ Security & Use Disclaimer

Last Updated:
← Back

Table of Contents

CRITICAL SECURITY NOTICE: InkDecoder is designed for defensive security and legitimate document processing purposes only. Any misuse for malicious activities is strictly prohibited and may result in immediate account termination and legal action.

1. Security Overview

This Security & Use Disclaimer outlines important security considerations, limitations, and user responsibilities when using InkDecoder's AI-powered document transcription service. Your security and privacy are important to us, but you must understand the inherent risks and limitations.

Defensive Security Focus:
  • InkDecoder is intended for legitimate document digitization and defensive security analysis
  • The service supports security professionals in analyzing documents for threats
  • We do not support or facilitate any malicious or offensive security activities
  • All usage must comply with applicable laws and ethical standards

1.1 Security Risk Classification

We classify security risks as follows:

2. Data Security Disclaimers

2.1 Data Transmission Security Medium Risk

Data in Transit: While we use HTTPS/TLS encryption for data transmission, internet communications are inherently insecure. Sensitive or classified documents should not be transmitted over public networks without additional encryption.

Data transmission risks include:

2.2 Data Storage Security Medium Risk

While we implement industry-standard security measures, we cannot guarantee absolute protection against:

2.3 Image Processing Security Low Risk

Temporary Processing: Uploaded images are processed in memory and immediately deleted after transcription. However, temporary data may briefly exist in system memory, logs, or cache.

3. Document Handling & Privacy

3.1 Sensitive Document Warnings High Risk

DO NOT UPLOAD:
  • Classified or government documents without proper authorization
  • Medical records containing protected health information (PHI)
  • Financial documents with account numbers or SSNs
  • Legal documents subject to attorney-client privilege
  • Corporate confidential or trade secret materials
  • Personal identification documents (passports, licenses)
  • Documents containing passwords or security credentials

3.2 Document Redaction Requirements

Before uploading documents, users must:

3.3 Metadata and Hidden Information Medium Risk

Document images may contain hidden metadata including:

4. Third-Party Service Risks

4.1 AI Processing Risks Medium Risk

OpenAI Integration: Document images are sent to OpenAI for processing. While OpenAI has security measures in place, this creates additional data exposure risks beyond our direct control.

Third-party AI processing risks include:

4.2 Payment Security Low Risk

Payment processing through Stripe creates additional security considerations:

4.3 Infrastructure Dependencies

Our service relies on various third-party infrastructure providers, creating potential points of failure or security compromise in the supply chain.

5. User Security Responsibilities

5.1 Document Security Assessment

Users are solely responsible for:

5.2 Access Control High Risk

Account Security: Users must maintain strict access controls and immediately report any unauthorized access or suspicious activity.

User access control responsibilities:

5.3 Network Security

Users should:

6. Prohibited Content & Usage

6.1 Strictly Prohibited Uses High Risk

FORBIDDEN ACTIVITIES:
  • Processing stolen, hacked, or illegally obtained documents
  • Attempting to exploit or reverse engineer our security measures
  • Using the service for offensive security or malicious purposes
  • Processing documents for identity theft or fraud
  • Uploading documents containing malware or malicious code
  • Circumventing usage limits or access controls
  • Sharing account credentials or unauthorized access

6.2 Regulated Content Restrictions

Users must not upload documents containing:

6.3 Defensive Security Applications

Acceptable defensive security uses include:

7. Account Security Warnings

7.1 Authentication Security Medium Risk

Password Security: Weak passwords, password reuse, or compromised credentials can lead to unauthorized account access and potential data exposure.

Authentication security risks:

7.2 Session Security

Users should be aware of session security risks:

7.3 Account Monitoring

Users should regularly monitor for:

8. Network & Transmission Security

8.1 Network Vulnerabilities Medium Risk

Network-based security risks include:

8.2 Corporate Network Considerations

Enterprise Users: Corporate firewall policies, proxy servers, and network monitoring may affect service functionality and data privacy.

Corporate network factors:

8.3 International Data Routing

Data may traverse multiple international jurisdictions during transmission, subject to various:

9. Compliance & Regulatory Disclaimers

9.1 Regulatory Compliance Responsibility High Risk

User Compliance: Users are solely responsible for ensuring their use of InkDecoder complies with all applicable laws, regulations, and industry standards in their jurisdiction.

Compliance considerations include:

9.2 Audit and Compliance Monitoring

InkDecoder does not provide:

9.3 Cross-Border Data Transfer Compliance

Users must consider:

10. Security Incident Response

10.1 Incident Reporting

Report Security Issues: If you discover any security vulnerabilities or incidents, please report them immediately to our security team.

Report security incidents including:

10.2 Incident Response Limitations

Our incident response capabilities are limited to:

We cannot provide incident response for:

10.3 User Incident Response Responsibilities

Users must:

11. Security Limitations

11.1 Technical Security Limitations

InkDecoder's security is limited by:

11.2 No Security Guarantees High Risk

NO ABSOLUTE SECURITY: InkDecoder cannot and does not guarantee absolute security or protection against all possible threats, attacks, or vulnerabilities.

11.3 Evolving Threat Landscape

Security threats continuously evolve, and new vulnerabilities may be discovered that affect:

12. Recommended Security Practices

12.1 Document Security Best Practices

We recommend users:

12.2 Account Security Best Practices

12.3 Organizational Security Practices

Organizations should:

13. Security Contact Information

For security-related inquiries, vulnerability reports, or incident notifications:

  • Security Email: security@inkdecoder.com
  • General Support: support@inkdecoder.com
  • Subject Line: Use "SECURITY" prefix for urgent matters
  • Response Time: Security issues will be prioritized and addressed promptly
Vulnerability Disclosure: We welcome responsible security research and will work with researchers to address legitimate security concerns.

🇪🇺 GDPR Compliance Notice

European Union General Data Protection Regulation (GDPR) Compliance: This Security Disclaimer is designed to comply with GDPR requirements for EU residents. You have specific rights regarding your personal data including the right to access, rectify, erase, restrict processing, data portability, and object to processing of your personal data.

Your GDPR Rights: You may exercise these rights at any time by contacting our Data Protection Officer. We will respond to all legitimate requests within one month as required by GDPR. For detailed information about how we process your data, please review our Privacy Policy.

Data Protection Officer: For GDPR-related inquiries, contact our Data Protection Officer at privacy@inkdecoder.com with "GDPR" in the subject line.

FINAL SECURITY REMINDER: InkDecoder is designed for defensive security and legitimate document processing only. Users assume all responsibility for security risks and must implement appropriate safeguards for their specific use cases.

InkDecoder Security & Use Disclaimer - Effective as of
Security is a shared responsibility between InkDecoder and our users.