Compliance & Trust Center
Understanding how MeshPrivacy operates, our legal framework, and your responsibilities as a user.
How MeshPrivacy Works
Your Request
You submit a task specifying the target URL and service type
MeshPrivacy Processing
We execute the technical challenge resolution on your behalf
Your Response
You receive valid session tokens to use with your requests
Conduit Model: MeshPrivacy operates as a specialized Connectivity API and technical conduit service. We provide the interoperability layer for your requests. You retain full control over what URLs you access and how you use the tokens we generate. We do not initiate requests to third parties on our own behalf.
Liability Framework
You (the Principal) direct the actions. MeshPrivacy (the Agent) executes technical tasks on your behalf. Liability for the purpose and use of the service rests with the Principal.
- You determine the target URLs
- You decide how to use returned tokens
- You are responsible for compliance with target site ToS
Consider a shooting range: the range provides the facility and equipment, but the shooter is responsible for their actions and targets. Similarly, MeshPrivacy provides technical infrastructure, while you remain responsible for your use of that infrastructure and your compliance with applicable laws and terms.
Compliance
SOC 2 Type II
Security, availability, and confidentiality controls audited annually
GDPR Compliant
EU data protection requirements with DPA available
CCPA Compliant
California consumer privacy rights respected
Your Responsibilities
By using MeshPrivacy, you agree to use the service responsibly and in compliance with all applicable laws. Please review our Terms of Service and Acceptable Use Policy carefully.
Questions about compliance?
Contact our compliance team for enterprise requirements, DPAs, or security questionnaires.
Contact Us